Main › Microsoft Public Key Infrastructure 2015 (ERC-A9)

Microsoft Public Key Infrastructure 2015 (ERC-A9)

Microsoft Public Key Infrastructure 2015 (ERC-A9)

Main › ITIL® Foundation for IT Service Management (with Case Study)

ITIL® Foundation for IT Service Management (with Case Study)

ITIL® Foundation for IT Service Management (with Case Study)

COURSE OVERVIEW

This 3-day course introduces the fundamentals of IT Service Management (ITSM) based on the IT Infrastructure Library (ITIL®). It describes the key concepts, processes, functions and roles of the ITIL® service lifecycle. The course is made up of lectures and practical assignments, which provide an interactive learning experience. This results in good awareness and comprehension of the main aspects of ITIL®. The course prepares attendees for the ITIL® Foundation Certificate examination. An exam voucher is provided to each student upon completion of the training.

PREREQUISITES
  • Experience and knowledge of IT computing environments are useful but not essential
AUDIENCE
  • IT professionals, business managers and business process owners
  • Individuals who require a basic understanding of the ITIL® framework and how it may be used to enhance the quality of IT service management within an organization
  • IT professionals that are working within an organization that has adopted and adapted ITIL® who need to be informed about and thereafter contribute to an ongoing service improvement program
COURSE OBJECTIVES

Candidates can expect to gain knowledge and understanding in the following upon successful completion of the education and examination components related to this certification:

  • Service management as a practice (comprehension)
  • The ITIL® service lifecycle (comprehension)
  • Generic concepts and definitions (awareness)
  • Key principles and models (comprehension)
  • Selected processes (awareness)
  • Selected functions (awareness)
  • Selected roles (awareness)
  • Technology and architecture (awareness)
  • Competence and training (awareness)
NEXT STEPS
  • Courses from the Lifecycle or Capability streams leading to the ITIL® Expert qualification
BENEFITS TO YOU
  • Understand how IT Services create value for the business and the importance of IT Service Management in making this happen
  • Understand how IT and the Business can collaborate to improve overall productivity and efficiency
  • See how each stage of the service lifecycle contributes to the overall service and how each process and role plays a part
  • Discover how to become more proactive
  • Learn ITSM concepts via a case study and related assignments
COURSE OUTLINE

Service Management as a Practice

  • Define the concept of a service, and comprehend and explain the concept of service management as a practice

The ITIL® service lifecycle

  • Understand the value of the ITIL® service lifecycle, how the processes integrate with each other, throughout the lifecycle and explain the objectives, scope and business value for each phase in the lifecycle

Generic concepts and definitions

  • Define some of the key terminology and explain the key concepts of service management

Key principles and models

  • Comprehend and account for the key principles and models of service management and to balance some of the opposing forces within service management

Processes

  • Understand how the service management processes contribute to the ITIL® service lifecycle, to explain the purpose, objectives, scope, basic concepts, activities and interfaces of the processes

Functions

  • Explain the role, objectives and organizational structures of the different functions

Roles

  • Account for and be aware of the responsibilities of some of the key roles in service management

Technology and architecture

  • Understand how service automation assists with expediting service management processes

Competence and training

  • Competence and skills for service management

Mock exam

  • Help the candidate to pass the ITIL® Foundation exam

For more information about HP training programs in Ukraine visit the web site at http://www8.hp.com/ua/ru/training/index.html

Main › ITIL® Service Operation (SO)

ITIL® Service Operation (SO)

ITIL® Service Operation (SO)

SPECIAL NOTES

A 90-minute multiple-choice exam is included with the cost of the course.

For RAIL (live online instructor-led) sessions: The course will be in session on all three days (8:30am- approximately 5:00pm Central Time). After completing the course, you will take the exam through CSME at your convenience via an exam voucher. (Note: Exam Vouchers expire within 30 days of completion of the course). Upon registering, you will receive specific instructions on how to arrange for your exam. HP strongly recommends you take the exam within a few days of completing the course.

COURSE OVERVIEW

This 3-day course is designed for those involved in event management and monitoring, problem management and root cause analysis, and access management. The course also covers communication and stakeholder management, service desk organization, technical management, and application management. The course prepares attendees for the ITIL® Intermediate Qualification: Service Operation Certificate, one of the modules that leads to the ITIL® Expert Certificate in IT Service Management.

PREREQUISITES
  • Hold the ITIL® Foundation Certificate in IT Service Management (or other appropriate earlier ITIL® and bridge qualifications)
  • A basic IT literacy and around 2 years IT experience are highly desirable
  • At least 21 contact hours (hours of instruction, excluding breaks, with an Accredited Training Organization (ATO) or an accredited e-learning solution), as part of a formal, approved training course/scheme
  • Complete at least 21 hours of personal study by reviewing the syllabus and the ITIL® Service Operation publication in preparation for the examination
AUDIENCE
  • Chief information officers (CIOs), Chief technology officers (CTOs), Managers, Supervisory staff, Team leaders, Service designers
  • IT architects, IT planners, IT consultants, IT audit managers, IT security managers
  • ITSM trainers involved in the ongoing management, co-ordination and integration of operation activities within the service lifecycle
  • Individuals who require a detailed understanding of the ITIL® service operation stage of the ITIL® service lifecycle and how it may be implemented to enhance the quality of IT service provision within an organization
  • IT professionals working within or about to enter a service operation environment and requiring an understanding of the concepts, processes, functions and activities involved
  • Individuals who have attained the ITIL® Foundation Certificate in IT Service Management and wish to advance to higher level ITIL® certifications
  • Individuals seeking the ITIL® Expert Certification in IT Service Management for which this qualification can be one of the prerequisite modules
  • Individuals seeking progress toward the ITIL® Master Certificate in IT Service Management for which the ITIL® Expert is a prerequisite
COURSE OBJECTIVES

Candidates can expect to gain competencies in the following upon successful completion of the education and examination components related to this certification:

  • Introduction to service operation
  • Service operation principles
  • Service operation processes
  • Common service operation activities
  • Organizing for service operation: functions
  • Technology considerations
  • Implementation of service operation
  • Challenges, critical success factors and risks
NEXT STEPS
  • Courses from the Lifecycle or Capability streams leading to the ITIL® Expert qualification
BENEFITS TO YOU
  • Identify the ITIL® lifecycle and the fundamental processes involved in Service Operation and how to integrate them into your business’ IT service model
  • Understand how IT and the Business can collaborate to improve overall productivity and efficiency
  • Learn how to move from a reactive relationship to a proactive relationship between IT and users
COURSE OUTLINE

Introduction to Service Operation

  • The purpose, objectives and scope of service operation
  • The value to the business
  • The context of service operation in the ITIL® service lifecycle
  • The fundamental aspects of service operation and the ability to define them

Service Operation Principles

  • How an understanding of the basic conflict between maintaining the status quo and adapting to changes in business needs can lead to better service operation
  • Other service operation principles including: involvement in other lifecycle stages; understanding operational health; the need for good documentation and communication including a communication strategy
  • Service operation inputs and outputs

Service Operation Processes

  • The use, interaction and value of each of the service operation processes: event management, incident management, request fulfilment, problem management, and access management

Common Service Operation Activities

  • How the common activities of service operation are co-ordinated for the ongoing management of the technology that is used to deliver and support the services
  • How monitoring, reporting and control of the services contributes to the ongoing management of the services and the technology that is used to deliver and support the services
  • How the operational activities of processes covered in other lifecycle stages contribute to service operation
  • How IT operations staff should look for opportunities to improve the operational activities

Organizing for Service Operation

  • The role, objectives and activities of each of the four functions of service operation: service desk, technical management, IT operations management, and application management
  • Service operation roles and responsibilities, where and how they are used as well as how a service operation organization would be structured to use these roles

Technology Considerations

  • The generic requirements of technologies that support service management across all lifecycle stages
  • The specific technology required to support the service operation processes and functions

Implementation of Service Operation

  • Specific issues relevant to implementing service operation including: managing change in service operation; assessing and managing risk in service operation; operations staff involvement in service design and service transition
  • Planning and implementing service management technologies within a company

Challenges, critical success factors and risks

  • The challenges (e.g. engagement with staff outside service operation, justifying funding), critical success factors (e.g. management and business support, staff retention) and risks (e.g. loss of service) related to service operation

For more information about HP training programs in Ukraine visit the web site at http://www8.hp.com/ua/ru/training/index.html

Main › ITIL® Service Design (SD)

ITIL® Service Design (SD)

ITIL® Service Design (SD)

SPECIAL NOTES

A 90-minute multiple-choice exam is included with the cost of the course.

For RAIL (live online instructor-led) sessions: The course will be in session on all three days (8:30am- approximately 5:00pm Central Time). After completing the course, you will take the exam through CSME at your convenience via an exam voucher. (Note: Exam Vouchers expire within 30 days of completion of the course). Upon registering, you will receive specific instructions on how to arrange for your exam. HP strongly recommends you take the exam within a few days of completing the course.

COURSE OVERVIEW

This 3-day course teaches the students how to plan, implement and optimize service design processes consistent with ITIL® best practices. By applying ITIL® Service Design best practices IT departments ensure that new services meet commitments related to the service quality and availability, customer satisfaction and cost-effectiveness. The course prepares attendees for the ITIL® Intermediate Qualification: Service Design Certificate, one of the modules that leads to the ITIL® Expert Certificate in IT Service Management

PREREQUISITES
  • Hold the ITIL® Foundation Certificate in IT Service Management (or other appropriate earlier ITIL® and bridge qualifications)
  • A basic IT literacy and around 2 years IT experience are highly desirable
  • At least 21 contact hours (hours of instruction, excluding breaks, with an Accredited Training Organization (ATO) or an accredited e-learning solution), as part of a formal, approved training course/scheme
  • Complete at least 21 hours of personal study by reviewing the syllabus and the ITIL® Service Design publication in preparation for the examination
AUDIENCE
  • Chief information officers (CIOs), Chief technology officers (CTOs), Managers, Supervisory staff, Team leaders, Service designers
  • IT architects, IT planners, IT consultants, IT audit managers, IT security managers
  • ITSM trainers involved in the ongoing management, coordination and integration of design activities within the service lifecycle
  • Individuals who require a detailed understanding of the ITIL® service design stage of the ITIL® service lifecycle and how it may be implemented to enhance the quality of IT service provision within an organization
  • IT professionals working within, or about to enter, a service design environment and requiring an understanding of the concepts, processes, functions and activities involved
  • Individuals who have attained the ITIL® Foundation Certificate in IT Service Management and wish to advance to higher level ITIL®certifications
  • Individuals seeking the ITIL® Expert Certificate in IT Service Management for which this qualification can be one of the prerequisite modules
  • Individuals seeking progress toward the ITIL® Master Certificate in IT Service Management for which the ITIL® Expert is a prerequisite
COURSE OBJECTIVES

Candidates can expect to gain competencies in the following upon successful completion of the education and examination components related to this certification:

  • Introduction to service design
  • Service design principles
  • Service design processes
  • Service design technology-related activities
  • Organizing for service design
  • Technology considerations
  • Implementation and improvement of service design
  • Challenges, critical success factors and risks
BENEFITS TO YOU
  • Identify the ITIL® Lifecycle and the fundamental processes involved in Service Design and how to integrate them into your business’ IT service model
  • Understand how IT and the Business can collaborate to improve overall productivity and efficiency
  • Learn to move the reactive relationship between IT and users to a proactive relationship
NEXT STEPS
  • Courses from the Lifecycle or Capability streams leading to the ITIL® Expert qualification
COURSE OUTLINE

Introduction to Service Design

  • The purpose, goals and objectives of service design
  • The scope of service design
  • The business value of service design activities
  • The context of service design in the ITIL® service lifecycle
  • Service design inputs and outputs and the contents and use of the service design package and service acceptance criteria

Service Design Principles

  • Design service solutions related to a customer’s needs
  • Design and utilize the service portfolio to enhance business value
  • The measurement systems and metrics
  • Service design models to accommodate different service solutions

Service Operation Processes

  • The interaction of service design processes: Design Coordination, Service Catalogue Management, Service Level Management, Supplier Management, Capacity Management, Availability Management, IT Service Continuity Management, Information Security Management
  • The flow of service design as it relates to the business and customer
  • The design aspects and how they are incorporated into the service design process

Service design technology-related activities

  • Requirements engineering in the design process and utilizing the types of requirements as identified for any system: functional, management/operations and usability
  • The design of technical architectures for data and information management, and application management

Organizing Service Design

  • How to design, implement and populate a RACI diagram for any process that is within the scope of IT service management
  • The service design roles and responsibilities, where and how they are used and how a service design organization would be structured to use these roles

Technology Considerations

  • Service design related service management tools, where and how they would be used
  • The benefits and types of tools that support service design

Implementation and improvement of service design

  • The six-stage implementation / improvement cycle and how the activities in each stage of the cycle are applied
  • How business impact analysis, service level requirements and risk assessment can affect service design solutions

Challenges, critical success factors and risks

  • Be able to provide insight and guidance for design challenges, risks and critical success factors

For more information about HP training programs in Ukraine visit the web site at http://www8.hp.com/ua/ru/training/index.html

Main › ITIL® Managing Across the Lifecycle (MALC)

ITIL® Managing Across the Lifecycle (MALC)

ITIL® Managing Across the Lifecycle (MALC)

SPECIAL NOTES

IMPORTANT: Please read the Prerequisites section below. You must have at least 17 ITIL expert credits in order to take the Managing Across the Lifecycle class and exam.

This course includes a 2- hour multiple-choice exam.

For RAIL (live online instructor-led) sessions: The course will be in session on all five days (8:30am-4:00pm Central Time). This schedule allows you some extra office or study time at the end of each day. After completing the course, you will take the exam through CSME. Upon registering, you will receive specific instructions on how to arrange for your exam. HP strongly recommends you schedule your exam for within a few days of completing the course.

For face-to-face instructor-led sessions: The exam will be administered from 1:30pm – 3:00pm on the afternoon of the last day.  Students should arrange their return travel accordingly.

COURSE OVERVIEW

This 5-day course gives participants the skills to support an organization’s service delivery by bridging the service lifecycle stages. The course teaches the value of one combined service management practice as opposed to separate subject areas. ITIL® processes and practices, as learnt from the lifecycle and capability streams of the intermediate certificates, are put into a context of delivering this value. Participants learn how to apply and integrate their ITIL® knowledge in the workplace in a tangible way.

PREREQUISITES
  • Candidates wishing to be trained and examined for this qualification must already have two (2) credits from the ITIL® Foundation certificate and must, as a minimum, have obtained a further 15 credits to a total of at least 17 credits. Holders of ITIL® Expert Certificate in IT Service Management are also eligible
  • Complete at least 30 contact hours for this syllabus as part of a formal, approved training course/scheme. Contact hours are hours of instruction, excluding breaks, with an accredited training organization (ATO) or an accredited e-learning solution
  • Complete at least 28 hours of personal study by reviewing foundation and intermediate level knowledge, for example the terms within the terminology list and by reviewing the syllabus and the ITIL® core publications in preparation for the examination
AUDIENCE
  • Chief information officers, Senior IT managers, IT managers, Supervisors, IT professionals, IT operations practitioners, IT development practitioners
  • Individuals who require a business and management level understanding of the ITIL® service lifecycle and how it may be implemented to enhance the quality of IT service provision within an organization
  • Individuals seeking the ITIL® Expert in IT Service Management certificate, for which this qualification is the final mandatory module
  • Individuals seeking progress towards the ITIL® Master in IT Service Management, for which the ITIL® Expert in IT Service Management certificate is a prerequisite
COURSE OBJECTIVES

Upon successful completion of the education and examination components related to this qualification, candidates can expect to gain competencies in the following:

  • Key concepts of the service lifecycle
  • Communication and stakeholder management
  • Integrating service management processes across the service lifecycle
  • Managing services across the service lifecycle
  • Governance and organization
  • Measurement
  • Implementing and improving service management capability
BENEFITS TO YOU
  • Learn how to integrate ITIL® service lifecycle stages, processes and practices
  • Apply ITIL® knowledge in the workplace
NEXT STEPS
COURSE OUTLINE

Key concepts of the service lifecycle

  • Managing services and service management
  • The service lifecycle
  • Service value across the different stages of the service lifecycle
  • Other key concepts

Communication and stakeholder management

  • Co-ordination of business relationship management across the service lifecycle, and the role of business relationship management in communication
  • Stakeholder management and communication
  • The value of good communication and ensuring its flow across the service lifecycle

Integrating service management processes across the service lifecycle

  • The integration of service management processes through the service lifecycle
  • The impact of service strategy on other service lifecycle stages
  • The value of a service lifecycle perspective when designing service solutions
  • The inputs and outputs of processes and stages in the service lifecycle
  • The value to business and the interfaces of all processes in the ITIL® service lifecycle

Managing services across the service lifecycle

  • Identification and assessment of customer and stakeholder needs and requirements across all service lifecycle stages, and ensuring appropriate priority is given to them
  • How the service design package provides a link between service design, service transition and service operation
  • Managing cross-lifecycle processes to ensure appropriate impact and involvement at all required service lifecycle stages
  • Implementing and improving services, using key sources of information for identifying the need for improvement
  • The challenges, critical success factors and risks of the service lifecycle stages, and potential conflicts and competing issues across the service lifecycle

Governance and organization

  • Governance
  • Organizational structure, skills and competence
  • Service provider types and service strategies

Measurement

  • Measuring and demonstrating business value
  • Determining and using metrics
  • Design and development of measurement frameworks and methods
  • Monitoring and control systems
  • Use of event management tools to increase visibility of the infrastructure and IT service delivery

Implementing and improving service management capability

  • Implementing service management
  • Assessing service management
  • Improving service management
  • Key considerations for the implementation and improvement of both the service management practice and the services themselves
  • Key considerations when planning and implementing service management technologies

For more information about HP training programs in Ukraine visit the web site at http://www8.hp.com/ua/ru/training/index.html

Main › ITIL® Service Transition (ST)

ITIL® Service Transition (ST)

ITIL® Service Transition (ST)

SPECIAL NOTES

A 90-minute multiple-choice exam is included with the cost of the course.

For VILT (virtual instructor-led training) sessions:The course will be in session on all three days (8:30am- approximately 5:00pm Central Time). After completing the course, you will take the exam through CSME at your convenience via an exam voucher. (Note: Exam Vouchers expire within 30 days of completion of the course). Upon registering, you will receive specific instructions on how to arrange for your exam. HP strongly recommends you take the exam within a few days of completing the course.

COURSE OVERVIEW

This 3-day course covers the Service Transition component of the ITIL® lifecycle. Topics include change management, service asset and configuration management, service release and deployment, service validation and testing, change evaluation, and decision making with the Service Management Knowledge System (SMKS). The course prepares attendees for the ITIL® Intermediate Qualification: Service Transition Certificate, one of the modules that leads to the ITIL® Expert Certificate in IT Service Management.

PREREQUISITES
  • Hold the ITIL® Foundation Certificate in IT Service Management (or other appropriate earlier ITIL® and bridge qualifications)
  • A basic IT literacy and around 2 years IT experience are highly desirable
  • Undertake at least 21 contact hours (hours of instruction, excluding breaks, with an Accredited Training Organization (ATO) or an accredited e-learning solution), as part of a formal, approved training course/scheme
  • Complete at least 21 hours of personal study by reviewing the syllabus and the ITIL® Service Transition publication in preparation for the examination
AUDIENCE
  • Chief information officers (CIOs), Chief technology officers (CTOs), Managers, Supervisory staff, Team leaders, Service designers
  • IT architects, IT planners, IT consultants, IT audit managers, IT security managers
  • ITSM trainers involved in the ongoing management, coordination and integration of transition activities within the service lifecycle
  • Individuals who require a detailed understanding of the ITIL® service transition stage of the ITIL® service lifecycle and of how it may be implemented to enhance the quality of IT service provision within an organization
  • IT professionals working within, or about to enter, a service transition environment and requiring a detailed understanding of the processes, functions and activities involved
  • Individuals who have attained the ITIL® Foundation Certificate in IT Service Management and wish to advance to higher level ITIL®certifications
  • Individuals seeking the ITIL® Expert Certification in IT Service Management for which this qualification can be one of the prerequisite modules
  • Individuals seeking progress toward the ITIL® Master Certificate in IT Service Management for which the ITIL® Expert is a prerequisite
COURSE OBJECTIVES

Candidates can expect to gain competencies in the following upon successful completion of the education and examination components relating to this certification:

  • Introduction to service transition
  • Service transition principles
  • Service transition processes
  • Managing people through service transitions
  • Organizing for service transition
  • Technology considerations
  • Implementing and improving service transition
  • Challenges, critical success factors and risks
NEXT STEPS
  • Courses from the Lifecycle or Capability streams leading to the ITIL® Expert qualification
BENEFITS TO YOU
  • Identify the ITIL® lifecycle and the fundamental processes involved in Service Transition and how to integrate them into your business’ IT service model
COURSE OUTLINE

Introduction to Service Transition

  • The purpose and objectives of service transition
  • The scope of service transition and ways that service transition adds value to the business
  • The context of service transition in relation to all other lifecycle stages

Service Transition Principles

  • Service transition policies, principles and best practices for service transition
  • How to use metrics to ensure the quality of a new or changed service and the effectiveness and efficiency of service transition
  • The inputs to and outputs from service transition as it interfaces with the other service lifecycle phases

Service Transition Processes

  • A management perspective of the purpose and value of the service transition processes, how they integrate within service transition and how they interface with other lifecycle phases
  • Processes: Transition Planning and Support, Change Management, Service Asset and Configuration Management, Release and Deployment Management, Service Validation and Testing, Change Evaluation, Knowledge Management

Managing People through Service Transitions

  • How to address and manage the communication and commitment aspects of service transition
  • How to manage organizational and stakeholder change
  • How to develop a stakeholder management strategy, map and analyse stakeholders and monitor changes in stakeholder commitment

Organizing for service transition

  • How the technical and application management functions interface with service transition
  • The interfaces that exist between service transition and other organizational units (including programmes, projects, service design and suppliers) and the “handover points” required to ensure delivery of new or change services within the agreed schedule
  • Service transition roles and responsibilities, where and how they are used, as well as examples of how small or larger service transition organizations would be structured to use these roles
  • Why service transition needs service design and service operation, what it uses from them and how

Technology Considerations

  • Technology requirements that support the service transition stage and its integration into the service lifecycle
  • Types of knowledge management, service asset and configuration management and workflow tools that can be used to support service transition

Implementing and improving service transition

  • The key activities for introducing an integrated service transition approach into an organization
  • The design, creation, implementation and use of service transition in a virtual or cloud environment.

Challenges, critical success factors and risks

  • Be able to provide insight and guidance for service transition challenges, risks and critical success factors

For more information about HP training programs in Ukraine visit the web site at http://www8.hp.com/ua/ru/training/index.html

Main › HP ServiceGuard on Linux (H4C21S)

HP ServiceGuard on Linux (H4C21S)

HP ServiceGuard on Linux (H4C21S)

COURSE OVERVIEW

This course is designed for experienced Linux system and network administrators implementing HP Serviceguard A.12.00. Topics include the basic requirements of a highly available system and progress through to the configuration of a Serviceguard cluster/packages, culminating in using both NFS and Oracle 11gR2 toolkit packages along with using the cluster simulator and analytics utilities. The course is 50 percent lecture and 50 percent hands-on labs using RHEL 6.4.

PREREQUISITES
  • Background in Linux system and network administration including Logical Volume Manager (LVM) and/or Veritas Volume Manager (VxVM)
AUDIENCE
  • Linux system and network administrators who currently, or soon will, develop, design, implement, and monitor Serviceguard (SG) clusters on Linux
COURSE OBJECTIVES

At the conclusion of this course you should be able to:

  • Configure, implement, and manage an HP SG cluster and packages
  • Install HP Serviceguard A.12.00 and Serviceguard Manager
  • Using ‘cmeasyinstall’
  • Utilize basic troubleshooting techniques
  • Install and configure NFS and Oracle packages using the toolkits
  • Use Live Application Detach and ‘rolling upgrade’
  • Configure generic resources
  • Use the SG simulator and SG cluster analytics
BENEFITS TO YOU
  • Protect mission critical applications against a variety of hardware and software failures through effective use of Serviceguard on Linux
  • Reduce application downtime by learning how to configure Serviceguard cluster and using Serviceguard’s rolling upgrade facility
  • Minimize, and in some instances eliminate, your application downtime by learning how to automate the detection of failures and restoration of application service
COURSE OUTLINE

Introduction to High Availability

  • What is high availability and reducing the risk
  • Storage technologies and HA network design

High Availability with Serviceguard (SG)

  • SG features and benefits and SG packages
  • Minimizing planned downtime
  • Installing prerequisite software
  • Serviceguard Manager

Storage for Serviceguard

  • Volume management
  • Persistent reservation overview
  • Review of LVM and VxVM concepts
  • Configure a shared LVM volume and VxVM data group
  • Using hosttags

Cluster Concepts and Configuration

  • Describe the difference between heartbeat, stationary, and standby LAN interfaces
  • Configure active/standby LAN interfaces using channel bonding
  • Cluster arbitration using a LockLUN and Quorum server
  • Steps to configure a Serviceguard cluster
  • View the status of the cluster and log file

Additional Cluster Features

  • Test the local LAN failover
  • Node failures and cluster reformation
  • Node joining and leaving a cluster
  • Basic cluster management

Packages and Services

  • Configure a basic Serviceguard package
  • The package configuration file
  • Package and node switching management
  • Interpret package status from cmviewcl
  • Package log file

Package Policies

  • Package FAILOVER and FAILBACK policies
  • Package access control
  • Using package dependencies, priorities, and weights

Application Monitoring Scripts and Toolkits

  • Writing and using an application monitor
  • The package control script
  • Application integration toolkits

Cluster Troubleshooting

  • Test clusters and packages for problems
  • Using the log files
  • Using Serviceguard commands for troubleshooting
  • Approaches to troubleshooting

Cluster and Package Online Reconfiguration

  • Cluster modifications online and online package modifications
  • Storage reconfiguration
  • Add and remove a node or package while the cluster is running

Highly Available NFS

  • Install the NFS server toolkit
  • Configure an NFS server package using the NFS toolkit
  • Configure an NFS client package
  • Test the NFS server package for various failures

Highly Available Oracle Database

  • Install the Oracle database toolkit
  • Configure an Oracle 11gR2 database package using the Oracle toolkit
  • Check the operation of the Oracle database and failover

Cluster and Package Maintenance

  • Rolling upgrade of Serviceguard
  • Kernel parameter change using Live Application Detach
  • Package partial startup

Generic Resources

  • Configure and use generic resources in a package

Cluster Simulation

  • Investigate the simulator interface and actions

Cluster Analytics

  • Install the Analytics utility
  • Display data collected by Serviceguard Cluster Analytics

Serviceguard Manager

  • Discuss the components of Serviceguard Manager
  • Navigate the Serviceguard Manager interface

For more information about HP training programs in Ukraine visit the web site at http://www8.hp.com/ua/ru/training/index.html

Main › HP-UX Performance and Tuning (H4262S)

HP-UX Performance and Tuning (H4262S)

COURSE OVERVIEW

This course shows you how to optimize the performance of your computing environment, including multiprocessor and cell-based systems. Extensive hands-on labs allow you to gain experience using standard UNIX and HP-specific tools to monitor, analyze, and tune the performance of HP-UX systems and common network services. The 5-day course is 50 percent lecture and 50 percent hands-on.

PREREQUISITES
  • HP-UX System and Network Administration I (H3064S) and HP-UX System and Network Administration II (H3065S) or for Experienced UNIX System Administrators(H5875S)
  • Inside the HP-UX Operating System (H5081S) is advantageous
AUDIENCE

Experienced HP-UX system and network administrators

COURSE OBJECTIVES
  • Explore a methodology for investigating performance issues
  • Identify tools used to monitor HP-UX performance
  • Identify bottlenecks and potential problems
  • Determine appropriate remedial actions to take
BENEFITS TO YOU
  • Effectively utilize the range of performance tools that are available to you
  • Learn how to regularly monitor your systems and quickly recognize problems
  • Optimize your systems by identifying and removing performance bottlenecks
  • Effectively allocate resources such as CPU, memory, disk I/O bandwidth among your critical and lower priority users and applications
  • Deliver a guaranteed level of application performance to your end users
DETAILED COURSE OUTLINE

Introduction to Performance

  • What is a performance problem
  • The “System centric” view of performance
  • Measuring performance
  • The first rule of interpreting metrics
  • Types of performance
  • Multiprocessor scaling
  • Bottlenecks
  • Baseline
  • Queuing and response times
  • Increasing CPU counts and utilization
  • Types of metrics

HP Performance Tools

  • HP Performance tools
  • Sources of data
  • Glance
  • GPM – Glance Plus Motif
  • Adviser and Alarms
  • HP Performance Agent and Manager
  • HP Performance Manager
  • PRM
  • WLM
  • gWLM
  • Unix Performance Tools
  • Caliper
  • Prospect
  • tusc
  • lsof
  • sar
  • top

CPUs and Performance

  • Types of CPU bottlenecks
  • CPUs and performance
  • Data access times
  • Tuning for data latency
  • Performance and system size
  • mpsched
  • Launch policies
  • Processor sets
  • Address translation delays
  • Variable page size kernel parameters
  • The change attributes command
  • Hyperthreading
  • Shared caches
  • Compiler optimizations

Processes and Performance

  • CPU performance problems
  • Understanding the “standard” scheduler
  • Load balancing
  • Managing priorities
  • psets
  • Priority Inversion
  • Interrupt processing
  • Looking at CPU Utilization

CPUs Adjusting Performance

  • Unix commands to adjust prioritie
  • HP Tools and CPU Management
  • Process Resource Manager

VxFS I/O Performance

  • Layers of I/O
  • I/O and performance
  • The filesystem layer
  • VxFS performance topics
  • VxFS inodes and extents
  • Defragmenting OnlineJFS filesystems
  • Understanding your I/O workload
  • Mount options
  • Caching controls
  • DSYNC
  • Concurrent I/O
  • vxtunefs
  • Performance implications of locks
  • Large directories
  • Buffered I/O, reading ahead
  • Writing behind
  • Direct I/O
  • Caching

Volume Manager I/O Performance

  • Volume managers, introduction
  • Mirroring and performance
  • Striping
  • Multipathing
  • Load balancing policies
  • Looking at I/O performance in glance
  • Examining VxVM performance with vxstat
  • How PRM Manages Disk Bandwidth

Disk I/O Performance

  • The SCSI layer
  • Optimizing I/Os in the SCSI Layer
  • Device caching
  • Setting low level SCSI parameters
  • Immediate reporting with simple disks
  • I/O related wait states
  • Process system calls

Cell Local Memory and Performance

  • LORA
  • Uniform Memory access patterns
  • Non-Uniform memory access platform
  • Locality domains to manage ccNUMA memory
  • Configuring CLM
  • Impact of I/O locality
  • Applications suited to LORA
  • LORA with nPars
  • LORA with vPars
  • LORA with VM
  • SAP on LORA
  • Java on LORA
  • Oracle on LORA
  • Strategies for HP NUMA platforms

Memory

  • System memory management
  • When does memory affect performance
  • Virtual memory
  • Memory allocation
  • vhand, the page daemon
  • Memory Resource Groups
  • File/Buffer cache paging differences
  • Diagnosing memory problems
  • Tuning the swap environment
  • How PRM manages memory
  • Memory File System

Virtual Machine Performance

  • Monitoring VMs
  • hpvmsar
  • HP Integrity VM Manager
  • Glance
  • Measureware

Java Performance

  • Measureware
  • Java out of the box
  • HPjmeter
  • Java Management console
  • Recipes for diagnosing problems

Network Performance

  • Types of performance
  • Latency and response time
  • Bandwidth
  • Layers within networking

For more information about HP training programs in Ukraine visit the web site at http://www8.hp.com/ua/ru/training/index.html

Main › HP-UX System and Network Troubleshooting (H4264S)

HP-UX System and Network Troubleshooting (H4264S)

HP-UX System and Network Troubleshooting (H4264S)

COURSE OVERVIEW

This course provides troubleshooting tools and procedures to find and fix HP-UX system problems. Concepts are refreshed before tools and techniques are examined. Critical thinking labs are provided using case studies, demonstrations, and hands-on break/fix labs. The course is 55 percent lecture and 45 percent hands-on labs using HP Integrity servers.

AUDIENCE

Experienced HP-UX system administrators

PREREQUISITES
  • HP-UX System and Network Administration I (H3064S) and HP-UX System and Network Administration II (H3065S) or
  • HP-UX System and Network Administration for Experienced UNIX® System Administrators (H5875S) or
  • Equivalent experience
BENEFITS TO YOU
  • Learn the techniques needed to troubleshoot and recover your system components
  • Understand fsck and the recovery options to restore lost data
  • Anticipate problems and minimize network downtime by using basic diagnostics tools
  • Ensure your network is operating properly by checking NFS and DNS functionality
  • Keep your system current by managing software patches
COURSE OBJECTIVES

At the conclusion of this course you should be able to:

  • Use the Management Processor for troubleshooting
  • Troubleshoot EFI problems
  • Recover a non-bootable HP Integrity system or partition
  • Troubleshoot an 11i v3 kernel, system startup, and kernel crash dump
  • Troubleshoot process, login, patch, and storage problems
  • Troubleshoot LVM, VxVM, and VxFS problems
  • Troubleshoot network problems
NEXT STEPS
  • HP-UX Logical Volume Manager (H6285S)
  • Inside HP-UX (H5081S)
  • HP-UX Performance and Tuning (H4262S)
  • HP-UX Partition Management (HG770S)
COURSE OUTLINE

Troubleshooting Methodology and Resources

  • Troubleshooting methodology and techniques
  • Troubleshooting resources
  • Common troubleshooting and monitoring tools

HP-UX Concepts Review

  • HP-UX structural overview
  • System calls and processes

Troubleshooting HP-UX Startup Files

  • Concepts review: system startup
  • System configuration files
  • Interrupting the rc start scripts
  • System startup links and sequence
  • Booting to single-user mode

Troubleshooting Process Problems

  • Concept review: What is a process?
  • Troubleshooting processes and memory problems
  • Zombie processes
  • Identifying CPU-intensive processes
  • Advanced system features, hyper-threading, NUMA, and LORA
  • Managing workloads and enhanced user core naming

Troubleshooting Storage

  • Concepts review: how I/O requests are processed
  • HP-UX hardware addressing
  • Storage device special files and slot addresses
  • Storage-related commands

Troubleshooting Logical Volumes

  • Concepts review: LVMs
  • Recovering lost or damaged structures
  • Missing device files and failed disks
  • VxVM structures
  • Restoring group configuration and recovering volumes

Troubleshooting File Systems

  • Concepts review: file system overview
  • File system corruption examples
  • Troubleshooting techniques
  • fsck, fsadm, and fsdb

Troubleshooting Login Problems

  • Concept review: login methods
  • Troubleshooting GUI login
  • Protecting the system with /etc/shadow
  • Pluggable authentication modules

Troubleshooting Software and Patch Installation

  • Concept review: installing software
  • Patch management process and HP-UX patch management
  • Using DRD to install software and patches
  • Troubleshooting patches
  • Working with SD-UX logfiles and common SD-UX problems

Troubleshooting Network Problems

  • Networking subsystem layers
  • Troubleshooting configuration problems and the nwmgr command
  • Subnetting, routing, and DNS concepts and troubleshooting
  • Network tracing and performance
  • NFS review and common problems

Troubleshooting the Kernel

  • Concepts review: kernel configuration
  • Kernel troubleshooting and recovery options
  • Booting from an alternate kernel
  • Kernel crashes and analysis
  • Dump units and post-reboot configuration

Troubleshooting Hardware and Firmware

  • Concepts review: kernel provides hardware services to applications
  • Troubleshooting hardware and firmware
  • Management Processor overview and commands

Troubleshooting HP Integrity System Boot

  • Concepts review: HP Integrity boot disk structure
  • Booting from an alternate disk from EFI
  • Booting a DRD clone and booting alternatives
  • Recovery shell, system startup, and EFI recovery options
  • Partitions and booting: HP Integrity nPar and vPar boot sequence

For more information about HP training programs in Ukraine visit the web site at http://www8.hp.com/ua/ru/training/index.html

Main › HP-UX Security (H3541S)

HP-UX Security (H3541S)

HP-UX Security (H3541S)

SPECIAL NOTES

This fast-paced hands-on course examines a variety of popular tools and techniques for hardening and securing HP-UX systems. The course is 50% lecture / 50% lab.

COURSE OVERVIEW

This course examines the most common HP-UX system security vulnerabilities, and introduces a variety of tools and techniques that can be used to prevent hackers from exploiting these vulnerabilities.

PREREQUISITES
  • HP-UX System and network administration I (H3064S) and HP-UX System and Network Administration II (H3065S) or
  • HP-UX for experienced UNIX system administrators (H5875S) or equivalent experience
  • Equivalent experience
AUDIENCE
  • Experienced system and network administrators responsible for securing and monitoring HP-UX systems
BENEFITS TO YOU
  • Learn how to use Role Based Access Control (RBAC), Secure Shell (SSH), Host Intrusion Detection System (HIDS), Software Assistant (SWA), IPFilter, Bastille, and other HP supported tools to harden and secure HP-UX systems
  • Create secure, isolated execution environments for applications with HP-UX security compartments and Secure Resource Partitions
  • Learn how to use Tripwire, John the Ripper, nmap, lsof, and other open source tools to further improve HP-UX system security
COURSE OUTLINE

Introduction

  • Why security?
  • HP-UX security tools
  • HP-UX security certifications
  • Course agenda

Securing user accounts: user passwords

  • Understanding the /etc/passwd file
  • Understanding the /etc/shadow file
  • DES-based password encryption
  • SHA512 password encryption
  • Enabling shadow passwords
  • Enabling SHA512 passwords
  • Enabling long passwords
  • Managing passwords
  • Configuring password aging
  • Cracking passwords with John the Ripper
  • Authenticating users via PAM
  • Configuring /etc/pam.conf

Securing user accounts: special cases

  • Protecting user accounts: guidelines
  • Protecting the root account: guidelines
  • Limiting root and operator access via /etc/security
  • Limiting root and operator access via sudo
  • Limiting root and operator access via the restricted SAM builder
  • Limiting root and operator access via the SMH
  • Configuring accounts for guest users
  • Configuring accounts for single application users
  • Configuring accounts for teams and groups
  • Preventing dormant accounts

Securing user accounts: Standard Mode Security Extensions (SMSE)

  • Configuring SMSE user security
  • Understanding Standard Mode Security Enhancements Benefits
  • Understanding SMSE attributes and repositories
  • Configuring /etc/security.dsc
  • Configuring /etc/default/security
  • Configuring /etc/passwd and /etc/shadow
  • Configuring /var/adm/userdb/ via userdbset, userdbget, and userdbck
  • Enforcing SMSE security policies

Securing user accounts: Role Based Access Control (RBAC)

  • RBAC features and benefits
  • Installing RBAC
  • Configuring & assigning RBAC roles
  • Configuring & assigning RBAC authorizations
  • Configuring RBAC commands & privileges
  • Verifying the RBAC database
  • Configuring RBAC logging & auditing
  • Running commands with privrun
  • Editing files with privedit
  • Enabling RBAC keystroke logging

Protecting data via file permissions and JFS Access Control Lists (ACLs)

  • Understanding how hackers exploit improper file and directory permissions
  • Viewing and changing file permissions
  • Searching for files with improper permissions
  • Configuring and using the SUID bit
  • Configuring and using the SGID bit
  • Configuring and using the sticky bit
  • Configuring and using JFS ACLs

Protecting data via swverify, md5sum, and Tripwire

  • File integrity checking overview
  • Verifying executable integrity with swverify
  • Verifying file integrity with md5sum
  • Verifying file integrity with Tripwire
  • Installing Tripwire
  • Creating Tripwire keys
  • Creating the Tripwire configuration file
  • Creating the Tripwire policy file
  • Creating the Tripwire database
  • Performing a Tripwire integrity check
  • Updating the Tripwire database
  • Updating the Tripwire policy file

Protecting data via Encrypted Volumes and File Systems (EVFS)

  • EVFS, EVS, and EFS features and benefits
  • EVFS architecture
  • EVFS volumes
  • EVFS volume encryption keys, user keys, and recovery keys
    • Step 1: Installing and configuring EVS software
    • Step 2: Creating user keys
    • Step 3: Creating recovery keys
    • Step 4: Creating an LVM or VxVM volume
    • Step 5: Creating EVS device files
    • Step 6: Creating and populating the volume’s EMD
    • Step 7: Enabling the EVS volume
    • Step 8: Creating and mounting a file system
    • Step 9: Enabling autostart
    • Step 10: Migrating data to the EVS volume
    • Step 11: Backing up the EVS configuration
  • Managing EVS volume users
  • Managing the EVS key database
  • Extending an EVS volume
  • Reducing an EVS volume
  • Removing EVS volumes
  • Backing up EVS volumes
  • EVS limitations
  • EVS and TPM/TCS integration overview

Securing network services: inetd & tcpwrapper

  • inetd service overview
  • inetd configuration file overview
  • Securing inetd
  • Securing the inetd internal services
  • Securing the RPC services
  • Securing the Berkeley services
  • Securing FTP
  • Securing FTP service classes
  • Securing anonymous FTP
  • Securing guest FTP
  • Securing other ftpaccess security features
  • Securing other inetd services
  • Securing other non-inetd services
  • Securing inetd via TCPwrapper

Securing network services: SSH

  • Legacy Network Service Vulnerabilities: DNS
  • Legacy Network Service Vulnerabilities: Sniffers
  • Legacy Network Service Vulnerabilities: IP spoofing
  • Solution: Securing the Network Infrastructure
  • Solution: Using Symmetric Key Encryption
  • Solution: Using Public Key Encryption
  • Solution: Using Public Key Authentication
  • HP-UX Encryption & Authentication Product overview
  • Configuring SSH encryption & server authentication
  • Configuring SSH client/user authentication
  • Configuring SSH single sign-on
  • Managing SSH keys
  • Using the UNIX SSH Clients
  • Using PuTTY SSH Clients

Securing network services: IPFilter & nmap

  • Firewall overview
  • Packet filtering firewalls
  • Network Address Translation firewalls
  • Host versus perimeter firewalls
  • Installing IPFilter
  • Managing IPFilter rulesets
  • Configuring a default deny policy
  • Preventing IP and loopback spoofing
  • Controlling ICMP service access
  • Controlling access to UDP services
  • Controlling access to TCP services
  • Controlling access via active and passive FTP
  • Testing IPFilter rulesets with ipftest
  • Testing IPFilter rulesets with nmap
  • Monitoring IPFilter & Nessus

Hardening HP-UX with Bastille

  • Bastille overview
  • Installing Bastille
  • Generating a Bastille assessment
  • Creating a Bastille configuration file
  • Applying a Bastille configuration file
  • Applying a pre-configured Bastille configuration file
  • Applying a pre-configured Bastille configuration via Ignite-UX
  • Reviewing the Bastille logs
  • Monitoring changes with bastille_drift
  • Reverting to the pre-Bastille configuration
  • Integrating Bastille and HP SIM

Monitoring activity via system log files

  • Monitoring log files
  • Monitoring logins via last, lastb, and who
  • Monitoring processes via ps, top, and whodo
  • Monitoring file access via ll, fuser, and lsof
  • Monitoring network connections via netstat, idlookup, and lsof
  • Monitoring inetd connections
  • Monitoring system activity via syslogd
  • Configuring /etc/syslog.conf
  • Hiding connections, processes, and arguments
  • Doctoring log files and time stamps

Monitoring activity via SMSE auditing

  • Auditing overview
  • Trusted system versus SMSE auditing
  • Enabling and disabling auditing
  • Verifying auditing
  • & system calls to audit
  • Selecting users to audit
  • Selecting system calls, aliases, and events to audit
  • Creating and applying an audit profile
  • Viewing and filtering audit trails via auditdp
  • Switching audit trails
  • Understanding audomon AFS & FSS switches
  • Understanding audomon audit trail names
  • Configuring audomon parameters
  • Configuring audomon custom scripts

Monitoring suspicious activity via HP’s Host Intrusion Detection System (HIDS)

  • HIDS overview
  • HIDS architecture
  • Installing HP’s HIDS product
  • Configuring HIDS detection templates and properties
  • Configuring HIDS surveillance groups
  • Configuring HIDS surveillance schedules
  • Configuring HIDS response scripts
  • Assigning surveillance schedules to clients
  • Monitoring HIDS alerts and errors

Managing security patches with Software Assistant (SWA)

  • Security patch overview
  • SWA overview
  • Reading US-CERT advisory bulletins
  • Reading HP-UX security bulletins
  • Installing swa
  • Generating swa reports
  • Viewing swa reports
  • Retrieving swa recommended patches
  • Installing swa patches
  • Installing other products recommended by swa
  • Applying other manual changes
  • Regenerating swa reports
  • Purging swa caches
  • Viewing swa logs
  • Customizing swa defaults
  • Integrating SWA and HP SIM
  • Preventing unauthorized swa and swlist access
  • Preventing buffer overflow attacks
  • Setting the executable_stack kernel parameter
  • Setting the chatr +es executable stack option

Hardening HP-UX with Bastille

  • Bastille overview
  • Installing Bastille
  • Generating a Bastille assessment
  • Creating a Bastille configuration file
  • Applying a Bastille configuration file
  • Applying a pre-configured Bastille configuration file
  • Applying a pre-configured Bastille configuration via Ignite-UX
  • Reviewing the Bastille logs
  • Monitoring changes with bastille_drift
  • Reverting to the pre-Bastille configuration

Isolating applications via security compartments

  • Security compartment concepts
  • & Using FGP TRIALMODE
  • Compartment rule concepts
  • INIT compartment concepts
  • Installing compartment software
  • Enabling compartment functionality
  • Creating and modifying compartments
  • Viewing compartments
  • Adding network interface rules
  • Adding file permission rules
  • Adding a compartment-specific directory
  • Viewing compartments
  • Configuring compartment administrators
  • Configuring compartment users
  • Executing commands in compartments
  • Removing compartments
  • Disabling compartment functionality

Isolating Applications via Secure Resource Partitions

  • SRP concepts
  • SRP example
  • SRP subsystems
  • SRP templates
  • SRP services
  • Installing SRP
  • Enabling and configuring SRP
  • Verifying the SRP configuration
  • Creating an SRP interactively
  • Creating an SRP non-interactively
  • Adding the init, prm, network, ipfilter, login, and ipsec services to an SRP
  • Adding the ssh, apache, tomcat, and oracle templates to an SRP
  • Adding the custom template to an SRP
  • Deploying an application in an SRP
  • Updating an SRP
  • Viewing the SRP configuration & status
  • Starting & stopping an SRP
  • Accessing an SRP
  • Removing an SRP

Appendix: Improving user and password security with trusted systems

  • Trusted system overview
  • Configuring password format policies
  • Configuring password aging policies
  • Configuring user account policies
  • Configuring terminal security policies
  • Configuring access control policies
  • Configuring password aging policies
  • Understanding the /tcb directory structure

Appendix: Implementing chroot()

  • Limiting file access via chroot()
  • Configuring chroot()ed applications

Appendix: Implementing Fine Grained Privileges (FGP)

  • Limiting privileges via FGP
  • Installing FGP Software
  • Installing FGP Software
  • Recognized Privileges
  • Permitted, Effective, and Retained Privilege Sets
  • Configuring FGP Privileges via setfilexsec
  • Configuring FGP Privileges via RBAC
  • Configuring & Using FGP TRIALMODE

Appendix: Configuring Process Resource Manager (PRM)

  • Allocating resources without PRM
  • Allocating resources with PRM
  • PRM advantages
  • PRM managers
  • PRM groups
  • PRM Fair Share Scheduler concepts & configuration
  • PRM PSET concepts & configuration
  • PRM memory manager concepts & configuration
  • Reviewing available resources
  • Analyzing application requirements
  • Enabling PRM
  • Creating and updating the PRM configuration file
  • Monitoring resource usage

For more information about HP training programs in Ukraine visit the web site at http://www8.hp.com/ua/ru/training/index.html