Main › CISSM) Certified Information System Security Manager

CISSM) Certified Information System Security Manager

CISSM) Certified Information System Security Manager

PREREQUISITES: 

A minimum of 1 year in Information Systems

STUDENT MATERIALS:

Student Workbook

CERTIFICATION EXAMS:
  • Mile2 C)ISSM – Certified Information Systems Security Manager
  • Covers ISACA® CISM exam objectives
CPES: 32 HOURS
WHO SHOULD ATTEND?
  • IS Security Officers
  • IS Managers
  • Risk Managers
  • Auditors
  • Information Systems Owners
  • IS Control Assessors
  • System Managers
  • Government

The Certified Information Systems Security Manager covers the skills and knowledge to assess threat analysis and risks, Risk & incident management, Security programs and CISO roles, IS security strategy and frameworks, Audit and Risk management creation of policies, compliance and awareness, as well as DR and BCP development, deployment and maintenance.

THE CERTIFIED INFORMATION SYSTEMS SECURITY MANAGER WILL RECEIVE IN-DEPTH KNOWLEDGE IN TOPICS THAT PERTAIN TO THE FOLLOWING:  
  • Information Security Governance
  • Information Risk Management & Compliance
  • Information Security Program Development & Management
  • Information Security Incident management.
COURSE CONTENT
MODULE 1 – INTRODUCTION
MODULE 2 – INFORMATION SECURITY GOVERNANCE
MODULE 3 – INFORMATION RISK MANAGEMENT AND COMPLIANCE
MODULE 4 – INFORMATION SECURITY PROGRAM DEVELOPMENT AND MANAGEMENT
MODULE 5 –  INFORMATION SECURITY INCIDENT MANAGEMENT
DETAILED MODULE DESCRIPTION
MODULE 1 – INTRODUCTION
  • Welcome
  • Agenda
  • CISM
  • CISM Exam Review Course Overview
  • CISM Qualifications
  • The Learning Environment
  • Daily Format
  • Domain Structure
  • Course Structure
  • Logistics
MODULE 2 – INFORMATION SECURITY GOVERNANCE
  • Course Agenda
  • Examination Content
  • Chapter 1 Learning Objectives
  • The First Question
  • Information Security Governance Overview
  • Selling the Importance of Information Security
  • The First Priority for the CISM
  •  Business Goals and Objectives
  • Outcomes of Information Security Governance
  • Benefits of Information Security Governance
  • Performance and Governance
  • Information Security Strategy
  • Developing Information Security Strategy
  • Elements of a Strategy
  • Objectives of Security Strategy
  • The Goal of Information Security
  • Defining Security Objectives
  • Business Linkages
  • Business Case Development
  • The Information Security Program
  • Security Program Priorities
  • Security versus Business
  • Security Program Objectives
  • What is Security?
  • Security Integration
  • Security Program
  • Architecture
  • Information Security Frameworks
  • Using an Information Security Framework
  • The Desired State of Security
  • The Desired State cont.
  • The Maturity of the Security Program Using CMM
  • Using the Balanced Scorecard
  • The ISO27001:2013 Framework
  • Examples of Other Security Frameworks
  • Examples of Other Security Frameworks
  • Constraints and Considerations for a Security Program
  • Constraints and Considerations for a Security Program cont.
  • Elements of Risk and Security
  • Risk Management
  • Information Security Concepts
  • Information Security Concepts cont.
  • Security Program Elements
  • Security Program Elements cont.
  • Third Party Agreements
  • Roles and Responsibilities of Senior Management
  • Senior Management Commitment
  • Steering Committee
  • CISO Chief Information Security Officer Responsibilities
  • Business Manager Responsibilities
  • IT Staff Responsibilities
  • Centralized versus Decentralized Security
  • Evaluating the Security Program
  • Audit and Assurance of Security
  • Evaluating the Security Program
  • Effective Security Metrics
  • Effective Security Metrics cont.
  • Key Performance Indicators (KPIs)
  • End to End Security
  • Correlation Tools
  • Reporting and Compliance
  • Regulations and Standards
  • Effect of Regulations
  • Reporting and Analysis
  • Ethics
  • Ethical Standards
  • Ethical Responsibility
  • Practice Questions
MODULE 3 – INFORMATION RISK MANAGEMENT AND COMPLIANCE
  • Exam Relevance
  • Information Asset Classification
  • Roles and Responsibilities
  • Roles and Responsibilities
  • Information Classification Considerations
  • Regulations and Legislation
  • Asset Valuation
  • Valuation Process
  • Information Protection
  • Information Asset Protection
  • Definition of Risk
  • Why is Risk Important
  • Risk Management Definition
  • Risk Management Objective
  • Risk Management Overview
  • Risk Management Overview
  • Defining the Risk Environment
  • Threats to Information and Information Systems
  • Threat Analysis
  • Aggregate Risk
  • Cascading Risk
  • Identification of Vulnerabilities
  • The Effect of Risk
  • Impact
  • Impact cont.
  • Risk Management Process
  • Risk Assessment Methodology
  • Annualized Loss Expectancy (ALE)
  • Qualitative Risk Assessment
  • Data Gathering Techniques
  • Results of Risk Assessment
  • Alignment of Risk Assessment and BIA
  • Risk Treatment
  • Risk Treatment
  • Risk Mitigation and Controls
  • Control Recommendations
  • Cost Benefit Analysis of Controls
  • Cost Benefit Analysis of Controls cont.
  • Risk Mitigation Schematic
  • Control Types and Categories
  • Control Types and Categories cont.
  • Security Control Baselines
  • Ongoing Risk Assessment
  • Measuring Control Effectiveness
  • Building Risk Management In (Agenda)
  • Risk Related to Change Control
  • Controlling Risk in Change Control
  • Risk Management During SDLC
  • Ongoing Risk Management Monitoring and Analysis
  • Audit and Risk Management
  • Audit and Risk Management cont.
  • Risk in Business Process Re-Engineering
  • Risk in Project Management
  • Risk During Employment Process
  • New Employee Initiation
  • Risk During Employment
  • Risk at Termination of Employment
  • Risks During Procurement
  • Risk During Procurement cont.
  • Reporting to Management
  • Documentation
  • Training and Awareness
  • Training and Awareness
  • Training for End Users
  • Practice Questions
MODULE 4 – INFORMATION SECURITY PROGRAM DEVELOPMENT AND MANAGEMENT
  • Security Strategy and Program Relationship
  • Information Security Management
  • Importance of Security Management
  • Definition
  • Effective Security Management
  • Reasons for Security Program Failure
  • Program Objectives
  • Security Program Development
  • Security Program Development cont.
  • Outcomes of Information Security Program Development
  • Governance of the Security Program
  • Role of the Information Security Manager (Agenda)
  • Strategy
  • Policy
  • Creating Effective Policy
  • Awareness
  • Implementation
  • Monitoring
  • Compliance
  • Developing an Information Security Road Map
  • Defining Security Program Objectives
  • Inventory of Information Systems
  • Challenges in Developing an Information Security Program
  • Challenges in Developing an Information Security Program cont.
  • Elements of a Security Program Road Map
  • Security Programs and Projects
  • Security Program and Project Development
  • Security Project Planning
  • Selection of Controls
  • Common Control Practices
  • Security Program Elements (Agenda)
  • Policies
  • Acceptable Use Policy
  • Acceptable Use Policy cont.
  • Standards
  • Procedures
  • Guidelines
  • Technology
  • Personnel Security
  • Training and Skills Matrix
  • Organizational Structure
  • Outsourced Security Providers
  • Third-party Service Providers
  • Facilities
  • Facilities Security
  • Environmental Security
  • Information Security Concepts (Agenda)
  • Information Security Concepts (Agenda)
  • Access Control
  • Identification
  • Authentication
  • Authorization
  • Accounting / Auditability
  • Criticality
  • Sensitivity
  • Trust Models
  • Technology-based Security
  • Technologies
  • Security in Technical Components
  • Operations Security
  • Technologies – Access Control Lists
  • Filtering and Content Management
  • Technologies – SPAM
  • Technologies – Databases and DBMS
  • Encryption
  • Technologies – Cryptography
  • Technologies – Cryptography cont.
  • Technologies – Encryption cont.
  • Technologies – Hashing Algorithms
  • Technology – Communications OSI Model
  • Technology – Communications TCP/IP
  • Technologies – Operating Systems
  • Technology – Firewalls
  • Emerging Technologies
  • Intrusion Detection Policies and Processes
  • Intrusion Detection Systems
  • IDS / IPS
  • Password Cracking
  • Vulnerability Assessments
  • Penetration Testing
  • Penetration Testing cont.
  • Third Party Security Reviews
  • Integration into Life Cycle Processes
  • Security in External Agreements
  • Security in External Agreements
  • Security Program Implementation
  • Phased Approach
  • Challenges During Implementation
  • Evaluating the Security Program
  • Evaluating Security Program cont.
  • Evaluating the Security Program cont.
  • Measuring Information Security Risk and Loss
  • Measuring Effectiveness of Technical Security Program
  • Measuring Effectiveness of Security Management
  • Security Project Management
  • Review of Security Compliance
  • Practice Questions
MODULE 5 –  INFORMATION SECURITY INCIDENT MANAGEMENT
  • Learning Objectives
  • Definition
  • Goals of Incident Management and Response
  • Goals of Incident Response cont.
  • What is an Incident – Intentional
  • What is an Incident – Unintentional
  • History of Incidents
  • Developing Response and Recovery Plans
  • Incident Management and Response
  • Incident Management and Response cont.
  • Incident Management and Response cont.
  • Importance of Incident Management and Response
  • Incident Response Functions
  • Incident Response Manager Responsibilities
  • Incident Response Manager Responsibilities cont.
  • Requirements for Incident Response Managers
  • Senior Management Involvement
  • The Desired State
  • Strategic Alignment of Incident Response
  • Detailed Plan of Action for Incident Management
  • Detailed Plan of Action for Incident Management – Prepare
  • Detailed Plan of Action for Incident Management – Prepare cont.
  • Detailed Plan of Action for Incident Management – Protect
  • Detailed Plan of Action for Incident Management – Detect
  • Detailed Plan of Action for Incident Management – Triage
  • Detailed Plan of Action for Incident Management – Response
  • Elements of an Incident Response Plan
  • Crisis Communications
  • Challenges in Developing an Incident Management Plan
  • Personnel
  • Personnel cont.
  • Personnel cont.
  • Team Member Skills
  • Skills cont.
  • Skills cont.
  • Security Concepts and Technologies
  • Organizing, Training and Equipping the Response Staff
  • Value Delivery
  • Performance Measurement
  • Reviewing the Current State of Incident Response Capability
  • Audits
  • Gap Analysis – Basis for
  • an Incident Response Plan
  • When an Incident Occurs
  • During an Incident
  • During an Incident cont.
  • Containment Strategies
  • The Battle Box
  • Evidence Identification and Preservation
  • Post Event Reviews
  • Disaster Recovery Planning (DRP) and Business Recovery Processes
  • Development of BCP and DRP
  • Plan Development
  • Plan Development cont.
  • Recovery Strategies
  • Recovery Strategies
  • Basis for Recovery Strategy Selections
  • Disaster Recovery Sites
  • Disaster Recovery Sites cont.
  • Recovery of Communications
  • Notification Requirements
  • Notification Requirements cont.
  • Response Teams
  • Insurance
  • Testing Response and Recovery Plans
  • Types of Tests
  • Test Results
  • Test Results cont.
  • Plan Maintenance Activities
  • BCP and DRP Training
  • Practice Questions

Main › VMware Horizon [V7]: Install, Configure, Manage [V7.0]

VMware Horizon [V7]: Install, Configure, Manage [V7.0]

VMware Horizon [V7]: Install, Configure, Manage [V7.0]

Main › VMware vSphere: Automation with vSphere PowerCLI

VMware vSphere: Automation with vSphere PowerCLI

VMware vSphere: Automation with vSphere PowerCLI

COURSE OVERVIEW

This 2-day, hands-on training course introduces the use of VMware vSphereT PowerCLI to automate VMware vSphere 4. This course demonstrates ways to automate tasks that can reduce your IT costs while improving efficiency, availability, flexibility, and manageability. This course is 40% lecture and 60% hands-on lab.

PREREQUISITES
  • System administration experience on Microsoft Windows or Linux operating systems
  • Completion of either the VMware vSphere: Install, Configure, Manage (HH627S) or the VMware vSphere: Fast Track (HH629S)
  • Scripting experience in one of the following languages: Windows PowerShell, Windows PowerShell, VBScript, Perl, UNIX shell scripts, Python, or other languages with variables and control structures
AUDIENCE
  • This course is designed for technical persons responsible for managing ESX, VMware ESXi, and VMware vCenterT Server, including IT managers, system architects, and system administrators.
COURSE OBJECTIVES

By the end of the course, you should understand how to use vSphere PowerCLI to perform the following tasks:

  • Automate VMware® ESXT configuration
  • Automate the provisioning of virtual machines
  • Automate changes to virtual machine configuration
  • Automate cluster operations
  • Automate reporting
COURSE OUTLINE

Module 1: Course Introduction

Module 2: Introduction to vSphere PowerCLI

  • Define the main vSphere PowerCLI object
  • Define the main commandlets in vSphere PowerCLI
  • Connect to a vSphere infrastructure
  • Get help for commandlets

Module 3: Automating ESX Host Configuration

  • Automate configuration of virtual switches on ESX hosts
  • Automate configuration of datastores on ESX hosts

Module 4: Virtual Machine Provisioning, Configuration, and Protection

  • Automate creation of virtual machines
  • Change virtual machine settings programmatically
  • Run vSphere PowerCLI scripts in virtual machines
  • Automate virtual machine protection

Module 5: Automating Cluster Operations

  • Automate virtual machine storage migration
  • Automate VMware vMotionT
  • Create a VMware Distributed Resource Scheduler/VMware High Availability cluster
  • Automate cluster configuration
  • Automate resource pool creation and configuration

Module 6: Automating Reporting

  • Automate reporting about virtual machines
  • Automate reporting about ESX hosts
  • Automate reporting about clusters

For more information about HP training programs in Ukraine visit the web site at http://www8.hp.com/ua/ru/training/index.html

Main › HP-UX System and Network Administration I (H3064S)

HP-UX System and Network Administration I (H3064S)

HP-UX System and Network Administration I (H3064S)

COURSE OVERVIEW

This hands-on course is the first of two courses that prepare system administrators to successfully configure, manage, maintain, and administer HP-UX servers in a networked environment. This course focuses on configuring disks, file systems, peripherals, and user accounts, as well as managing and configuring core OS, patches, and application software. Successful completion of HP-UX System and Network Administration I and II will help prepare students for the HP-UX CSA technical certification exam. The 5-day course is 50 percent lecture and 50 percent hands-on labs using HP servers.

PREREQUISITES
  • UNIX Fundamentals (51434S) or equivalent experience
AUDIENCE
  • HP-UX 11i system administrators and others who install, configure, and maintain HP-UX servers
COURSE OBJECTIVES

At the conclusion of this course you will be able to:

  • Install and manage HP-UX software and patches
  • Configure and manage peripheral devices and device files
  • Configure and manage disks using HP Logical Volume Manager (LVM)
  • Configure and manage file systems using HP Journal File System (JFS)
  • Configure HP-UX kernel drivers, subsystems, and tunable parameters
  • Minimize planned and unplanned downtime with DRD
  • Shutdown, boot, reboot Integrity HP-UX servers
NEXT STEPS
  • HP-UX System and Network Administration II (H3065S)
BENEFITS TO YOU
  • Gain the skills required to effectively install, configure, and manage HP-UX systems so users experience smooth running IT operations
COURSE OUTLINE

Navigating the System Management Homepage (SMH)

  • SAM and SMH overview
  • Launching the SMH GUI and TUI
  • Verifying SMH certificates
  • Logging into the SMH
  • Navigating the SMH interface
  • Launching SMH tools
  • Launching SMH tasks
  • Viewing SMH logs
  • Managing SMH access control
  • Managing SMH authentication
  • SMH and SIM integration concepts

Managing Users and Groups

  • User and group concepts
  • /etc/passwd, /etc/shadow, and /etc/group concepts
  • Creating, modifying, deactivating, and removing user accounts
  • Configuring password aging and password security policies
  • Managing groups
  • Managing /etc/skel

Navigating the HP-UX File System

  • Static and dynamic files and directory concepts
  • OS and application directory concepts
  • Top level directory concepts and contents
  • Searching for files and executables using the find, whereis, which, and file commands

Configuring Hardware

  • Hardware component overview
  • CPU, cell, crossbar, and Blade overview
  • SBA, LBA, and I/O overview
  • iLO/MP, core I/O, and interface adapter card overview
  • Internal disks, tapes, and DVD overview
  • Disk array, LUN, SAN, and multipathing overview
  • Partitioning overview
  • nPar, vPar, VM, and secure resource partition overview
  • System type overview
  • Entry-class rackmount server overview
  • Mid-range rackmount server overview
  • High-end server overview
  • HP BladeSystem overview
  • HP BladeSystem c-class enclosure overview
  • HP Integrity blade server overview
  • HP Integrity Superdome 2 overview
  • Viewing system hardware configuration
  • Viewing nPar, vPar, and VM hardware
  • Hardware address concepts
  • Legacy HBA, SCSI, and FC hardware address concepts
  • Agile View HBA, SCSI, and FC hardware address concepts
  • Viewing legacy hardware addresses
  • Viewing LUNs via Agile View
  • Viewing a LUN’s lunpaths via Agile View
  • Viewing an HBA’s lunpaths via Agile View
  • Viewing LUN health via Agile View
  • Viewing LUN attributes via Agile View
  • Enabling and disabling lunpaths
  • Slot address concepts
  • Slot address components
  • Viewing slot addresses
  • Installing interface cards with and without OL*
  • Installing new devices

Configuring Device Special Files

  • DSF attribute concepts
  • DSF directories
  • Legacy DSF names
  • Persistent DSF names
  • LUN, disk, and DVD DSF names
  • Boot disk DSFs
  • Tape drive DSFs
  • Tape autochanger DSFs
  • Terminal, modem, and printer DSFs
  • Listing legacy DSFs
  • Listing persistent DSFs
  • Correlating persistent and legacy DSFs
  • Correlating persistent DSFs with lunpaths and WWIDs
  • Decoding legacy and persistent DSF attributes
  • Creating DSFs via insf, mksf, and mknod
  • Removing DSFs via rmsf
  • Disabling and enabling legacy mode DSFs

Managing Disk Devices

  • Disk partitioning concepts
  • Whole disk partitioning concepts
  • LVM disk partitioning concepts
  • LVM physical volume concepts
  • LVM volume group concepts
  • LVM logical volume concepts
  • LVM extent concepts
  • LVM extent size concepts
  • LVM versions and limits
  • LVM DSF directories
  • LVMv1 device files
  • LVMv2 device files
  • Creating physical volumes
  • Creating LVMv1 volume groups
  • Creating LVMv2 volume groups
  • Creating logical volumes
  • Verifying the LVM configuration
  • Comparing disk space management tools

Managing File Systems

  • File system concepts
  • File system types
  • Superblock, inode, directory, block, extent, and intent log concepts
  • Hard and symbolic link concepts
  • HFS and VxFS comparison
  • Creating file systems
  • Mounting file systems
  • Unmounting file systems
  • Automatically mounting file systems
  • Mounting CDFS file systems
  • Mounting LOFS file systems
  • Mounting ISO file systems
  • Mounting MemFS file systems

Managing Swap Space

  • HP-UX memory concepts
  • HP-UX swap concepts
  • HP-UX swap types
  • HP-UX pseudoswap
  • Enabling swap via the CLI
  • Enabling swap via /etc/fstab
  • Monitoring swap space
  • Disabling swap
  • Guidelines for configuring swap space

Maintaining Logical Volumes and File Systems

  • Defragmenting file systems
  • Repairing corrupted file systems
  • Monitoring free space
  • Reclaiming wasted file system space
  • Extending, reducing, and removing volume groups
  • Extending, reducing, and removing logical volumes
  • Extending and reducing file systems

Preparing for Disasters

  • Disaster recovery, mirroring, and DRD concepts
  • Using DRD to minimize planned downtime
  • Using DRD to minimize unplanned downtime
  • Installing DRD
  • Using the drd command
  • Creating a DRD clone
  • Synchronizing a DRD clone
  • Verifying a DRD clone’s status
  • Accessing inactive images via DRD-safe commands
  • Managing software via DRD-safe commands
  • Managing kernel tunables via DRD-safe commands
  • Accessing inactive images via other commands
  • Activating and deactivating an inactive image
  • Customizing the make_*_recovery archive contents
  • Backing up the boot disk via make_tape_recovery
  • Backing up the boot disk via make_net_recovery
  • Using a make_*_recovery archive
  • Interacting with the recovery process

Accessing the System Console and the iLO/MP

  • Management processor concepts
  • Viewing MP/console ports
  • Connecting MP serial and LAN ports
  • Accessing the MP
  • Navigating the MP menu and web interfaces
  • Accessing nPar, vPar, and VM consoles
  • Accessing the VFP, console log, and system event log
  • Accessing the MP help menus
  • Accessing the MP command menu
  • Configuring the MP LAN interface
  • Enabling MP remote access
  • Managing MP user accounts and access levels
  • Managing MP login sessions
  • Rebooting via the MP

Booting PA-RISC Systems

  • HP-UX shutdown and reboot concepts
  • PA-RISC boot process major players
  • PA-RISC boot disk structures
  • PA-RISC boot process overview
  • Autoboot and manual boot concepts
  • Interacting with the BCH and ISL/IPL

Booting Integrity Systems

  • HP-UX shutdown and reboot concepts
  • Integrity boot process major players
  • Integrity boot disk structures
  • Integrity boot disk system, OS, and HPSP structures
  • Integrity and PA-RISC boot process comparison
  • UEFI/EFI addressing concepts
  • Autoboot and manual boot concepts
  • Booting from primary, alternate, and arbitrary boot devices
  • Booting from Ignite-UX servers and recovery archives
  • Managing boot menu settings
  • Managing console settings
  • Interacting with the UEFI/EFI shell
  • Interacting with the hpux.efi OS loader

Configuring the HP-UX Kernel

  • Kernel configuration concepts
  • Special kernel configurations
  • Kernel configuration commands
  • Modifying the current kernel configuration
  • Creating a named configuration
  • Copying a configuration
  • Loading a configuration
  • Kernel module concepts, states, and state changes
  • Viewing and managing module states
  • Kernel tunable concepts and types
  • Viewing, managing, and monitoring kernel tunables
  • Viewing, managing, and monitoring kernel resource alarms
  • Kernel troubleshooting
  • Viewing the kernel change log
  • Booting from an alternate kernel
  • Booting via override parameters
  • Booting to tunable maintenance mode

Managing Software with SD-UX

  • SD-UX software structure concepts
  • SD-UX software depot concepts
  • SD-UX IPD concepts
  • SD-UX daemon and agent concepts
  • Listing software
  • Installing and updating software
  • Removing software

Managing Patches with SD-UX

  • Patch concepts
  • Patch naming convention concepts
  • Patch supersession concepts
  • Patch rating concepts
  • Patch source concepts
  • Patch tool concepts
  • Downloading and installing patches from the HPSC
  • Installing patches from DVD, tape, and directory depots
  • Listing patches
  • Removing patches

Installing the OS with Ignite-UX

  • Install source concepts
  • Planning an install
  • Choosing an operating environment
  • Choosing an install-time security bundle
  • Locating the source media
  • Initiating a PA-RISC install
  • Initiating an Integrity install
  • Navigating the Ignite-UX menus
  • Verifying an installation
  • Completing post-install configuration tasks

Self-Study Appendices

  • Managing printers
  • Connecting to a network
  • Navigating the System Administration Manager (SAM)
  • Configuring the HP-UX 11i v1 kernel

For more information about HP training programs in Ukraine visit the web site at http://www8.hp.com/ua/ru/training/index.html

Main › P9500 Replication Class & HP Performance Advisor 5.0 (HK906SхHK736S)

P9500 Replication Class & HP Performance Advisor 5.0 (HK906SхHK736S)

P9500 Replication Class & HP Performance Advisor 5.0 (HK906SхHK736S)

OVERVIEW

HK906s –

This 2-day course introduces students to the P9500 disk array replication solutions. Students will get configuration practice on our P9500’s with P9000 Business Copy, Business Copy Snapshot, RAID Manager and Continuous Access Synchronous and Continuous Access Journal.

HK736S

This course shows how to use the HP StorageWorks P9000 Performance Advisor Software product, version 5.0. It includes information about user tasks and array troubleshooting. Extensive notes and real-world tips are provided in the slide note-windows. This course is intended for users and HP service providers who are basically familiar with HP StorageWorks XP/P9000 disk array hardware, software, and storage systems. New version-5.0 features, as well as performance monitoring methods for both array types are discussed.

AUDIENCE
  • Storage Administrators
  • Storage Managers, database and network administrators, project managers, and others who work in a network storage environment, using HP XP/P9000 Arrays and HP XP/P9000 Performance Advisor products. The course is intended for those with little or no experience using the HP/P9000 Performance Advisor application.
PREREQUISITES
  • P9500 Administration and Configuration HK905S
  • Knowledge of networks and the storage administration tasks for the OS the P9500 will be useful
  • It is also beneficial to have an understanding of SANs

A basic understanding of:

  • Operating systems, networks and databases
  • Direct Attached Storage (DAS)
  • Direct Attached Storage (DAS)
  • Network Attached Storage (NAS)
  • HP XP and P9500 disk array hardware and software configuration
  • Disk storage concepts
KEY TOPICS
  • Understand HP P9500 disk array replication solutions
  • Describe and configure Continuous Access Synchronous and Continuous Access Journaling
  • Understand the configuration and use of Raid Manager for managing Business Copy, Business Copy Snapshot and Continuous Access

HK736S -After completing this course, you should be able to perform the following:

  • Describe the differences between the earlier XP array architecture and that of the latest P9500 array
  • View, chart and report PA data using the PA web GUI
  • Make recommendations to improve storage system performance
  • Understand the functionality of Business Copy and Business Copy Snapshot
  • Describe and configure Continuous Access Synchronous and Continuous Access Journaling
  • Describe the use of Command View Advanced Edition Replication Manager in conjunction with Business Copy and Continuous Access
  • Describe the XP/P9000 Performance Advisor functionality
  • Describe the process of installing and configuring the PA Management Server and PA Host agent
  • Use PA to identify and diagnose storage problems

For more information about HP training programs in Ukraine visit http://www8.hp.com/ua/ru/training/index.html

Main › UNIX Fundamentals (51434S)

UNIX Fundamentals (51434S)

UNIX Fundamentals (51434S)

COURSE OVERVIEW

This course is an extensive introduction to the UNIX® operating system and how to use its many commands and utilities. It also covers the standard UNIX system file editor and basic shell programming. This course is the foundation and prerequisite for most other courses in HP Education’s Tru64 and HP-UX curricula. The 5-day course is 60 percent lecture and 40 percent hands-on labs using HP servers.

PREREQUISITES
  • General computer literacy
AUDIENCE
  • System administrators, network administrators, software developers, programmers, operators, and technical users
COURSE OBJECTIVES
  • Prepare for our HP-UX system administration and software development courses
  • Learn to use your UNIX system effectively and save time by automating tasks with shell programs
  • Customize your UNIX system to meet your individual needs
  • Learn how to use the full capabilities of your system through hands-on lab exercises
BENEFITS TO YOU
  • Build your UNIX knowledge and command skills
  • Increase your productivity
  • Prepare for additional education in HP education’s HP-UX system administration courses
NEXT STEPS
  • HP-UX System and Network Administration I (H3064S)
COURSE OUTLINE

Introduction to UNIX

  • UNIX structure and capability overview
  • UNIX history
  • UNIX standards

Logging in and general orientation

  • Logging in and logging out
  • Viewing online man pages
  • Executing basic UNIX commands

Navigating the file system

  • UNIX File system layout concepts
  • Absolute and relative pathname concepts
  • Navigating and viewing directories with cd, pwd, and ls
  • Creating and removing directories with mkdir and rmdir
  • Searching directories with find

Managing Files

  • File concepts
  • File characteristics
  • Viewing files with cat, more, head, and tail
  • Printing files with lp, lpstat, and cancel
  • Managing files with cp, mv, ln, and rm

File permissions and access

  • UNIX file permission concepts
  • Managing file permissions with chmod and umask
  • Managing other attributes with chgrp, chown, and touch
  • Changing user and group identities with su and chgrp

Introduction to the vi editor

  • Editing files with the vi editor

Shell basics

  • Shell features
  • Shell types
  • Using command aliasing
  • Using command line recall and editing
  • Modifying TERM, PATH, and other environment variables

Shell advanced features

  • Defining local and environment variables
  • Variable substitution
  • Alias substitution
  • Command substitution
  • Tilde substitution

File name generation

  • File name generation character concepts
  • File name generation characters: ?, [], and *

Quoting

  • Quoting concepts
  • Quoting characters: ,”, ‘

Input and output redirection

  • Redirecting standard input, standard output, and standard error
  • Using sort, wc, and grep filters

Pipes

  • Shell pipeline concepts
  • Using tee, cut, tr, more, and pr filters

Network services

  • Local Area Networks (LANs)
  • Hostnames
  • Testing connectivity: ping
  • ARPA services: telnet, ftp
  • Berkeley services: rlogin, remsh, rcp
  • Secure shell Services: ssh, scp, sftp

Process management

  • Process overview
  • Listing processes with ps
  • Starting processes in the background with “&”
  • Starting processes in the background with nohup
  • Moving jobs to the background and foreground with bg and fg
  • Prioritizing processes with nice
  • Terminating processes with signals
  • Terminating processes with kill
  • Scheduling processes with cron and crontab
  • Scheduling processes with at

Introduction to shell programming

  • Writing simple shell programs
  • Using environment variables in shell scripts
  • Using positional parameters in shell scripts
  • Using read in shell scripts

Shell programming branches

  • Using if and case constructs for conditional branching
  • Using and generating return codes
  • Using string, integer, and file tests

Shell programming loops

  • Performing arithmetic in the shell
  • Shell script while loops
  • Shell script until loops
  • Shell script for loops

Offline file storage

  • Creating and using tar archives
  • Creating and using cpio archives

For more information about HP training programs in Ukraine visit the web site at http://www8.hp.com/ua/ru/training/index.html

Main › HP-UX System and Network Administration I (H3064S)

HP-UX System and Network Administration I (H3064S)

HP-UX System and Network Administration I (H3064S)

COURSE OVERVIEW

This hands-on course is the first of two courses that prepare system administrators to successfully configure, manage, maintain, and administer HP-UX servers in a networked environment. This course focuses on configuring disks, file systems, peripherals, and user accounts, as well as managing and configuring core OS, patches, and application software. Successful completion of HP-UX System and Network Administration I and II will help prepare students for the HP-UX CSA technical certification exam. The 5-day course is 50 percent lecture and 50 percent hands-on labs using HP servers.

PREREQUISITES
  • UNIX Fundamentals (51434S) or equivalent experience
AUDIENCE
  • HP-UX 11i system administrators and others who install, configure, and maintain HP-UX servers
COURSE OBJECTIVES

At the conclusion of this course you will be able to:

  • Install and manage HP-UX software and patches
  • Configure and manage peripheral devices and device files
  • Configure and manage disks using HP Logical Volume Manager (LVM)
  • Configure and manage file systems using HP Journal File System (JFS)
  • Configure HP-UX kernel drivers, subsystems, and tunable parameters
  • Minimize planned and unplanned downtime with DRD
  • Shutdown, boot, reboot Integrity HP-UX servers
NEXT STEPS
  • HP-UX System and Network Administration II (H3065S)
BENEFITS TO YOU
  • Gain the skills required to effectively install, configure, and manage HP-UX systems so users experience smooth running IT operations
COURSE OUTLINE

Navigating the System Management Homepage (SMH)

  • SAM and SMH overview
  • Launching the SMH GUI and TUI
  • Verifying SMH certificates
  • Logging into the SMH
  • Navigating the SMH interface
  • Launching SMH tools
  • Launching SMH tasks
  • Viewing SMH logs
  • Managing SMH access control
  • Managing SMH authentication
  • SMH and SIM integration concepts

Managing Users and Groups

  • User and group concepts
  • /etc/passwd, /etc/shadow, and /etc/group concepts
  • Creating, modifying, deactivating, and removing user accounts
  • Configuring password aging and password security policies
  • Managing groups
  • Managing /etc/skel

Navigating the HP-UX File System

  • Static and dynamic files and directory concepts
  • OS and application directory concepts
  • Top level directory concepts and contents
  • Searching for files and executables using the find, whereis, which, and file commands

Configuring Hardware

  • Hardware component overview
  • CPU, cell, crossbar, and Blade overview
  • SBA, LBA, and I/O overview
  • iLO/MP, core I/O, and interface adapter card overview
  • Internal disks, tapes, and DVD overview
  • Disk array, LUN, SAN, and multipathing overview
  • Partitioning overview
  • nPar, vPar, VM, and secure resource partition overview
  • System type overview
  • Entry-class rackmount server overview
  • Mid-range rackmount server overview
  • High-end server overview
  • HP BladeSystem overview
  • HP BladeSystem c-class enclosure overview
  • HP Integrity blade server overview
  • HP Integrity Superdome 2 overview
  • Viewing system hardware configuration
  • Viewing nPar, vPar, and VM hardware
  • Hardware address concepts
  • Legacy HBA, SCSI, and FC hardware address concepts
  • Agile View HBA, SCSI, and FC hardware address concepts
  • Viewing legacy hardware addresses
  • Viewing LUNs via Agile View
  • Viewing a LUN’s lunpaths via Agile View
  • Viewing an HBA’s lunpaths via Agile View
  • Viewing LUN health via Agile View
  • Viewing LUN attributes via Agile View
  • Enabling and disabling lunpaths
  • Slot address concepts
  • Slot address components
  • Viewing slot addresses
  • Installing interface cards with and without OL*
  • Installing new devices

Configuring Device Special Files

  • DSF attribute concepts
  • DSF directories
  • Legacy DSF names
  • Persistent DSF names
  • LUN, disk, and DVD DSF names
  • Boot disk DSFs
  • Tape drive DSFs
  • Tape autochanger DSFs
  • Terminal, modem, and printer DSFs
  • Listing legacy DSFs
  • Listing persistent DSFs
  • Correlating persistent and legacy DSFs
  • Correlating persistent DSFs with lunpaths and WWIDs
  • Decoding legacy and persistent DSF attributes
  • Creating DSFs via insf, mksf, and mknod
  • Removing DSFs via rmsf
  • Disabling and enabling legacy mode DSFs

Managing Disk Devices

  • Disk partitioning concepts
  • Whole disk partitioning concepts
  • LVM disk partitioning concepts
  • LVM physical volume concepts
  • LVM volume group concepts
  • LVM logical volume concepts
  • LVM extent concepts
  • LVM extent size concepts
  • LVM versions and limits
  • LVM DSF directories
  • LVMv1 device files
  • LVMv2 device files
  • Creating physical volumes
  • Creating LVMv1 volume groups
  • Creating LVMv2 volume groups
  • Creating logical volumes
  • Verifying the LVM configuration
  • Comparing disk space management tools

Managing File Systems

  • File system concepts
  • File system types
  • Superblock, inode, directory, block, extent, and intent log concepts
  • Hard and symbolic link concepts
  • HFS and VxFS comparison
  • Creating file systems
  • Mounting file systems
  • Unmounting file systems
  • Automatically mounting file systems
  • Mounting CDFS file systems
  • Mounting LOFS file systems
  • Mounting ISO file systems
  • Mounting MemFS file systems

Managing Swap Space

  • HP-UX memory concepts
  • HP-UX swap concepts
  • HP-UX swap types
  • HP-UX pseudoswap
  • Enabling swap via the CLI
  • Enabling swap via /etc/fstab
  • Monitoring swap space
  • Disabling swap
  • Guidelines for configuring swap space

Maintaining Logical Volumes and File Systems

  • Defragmenting file systems
  • Repairing corrupted file systems
  • Monitoring free space
  • Reclaiming wasted file system space
  • Extending, reducing, and removing volume groups
  • Extending, reducing, and removing logical volumes
  • Extending and reducing file systems

Preparing for Disasters

  • Disaster recovery, mirroring, and DRD concepts
  • Using DRD to minimize planned downtime
  • Using DRD to minimize unplanned downtime
  • Installing DRD
  • Using the drd command
  • Creating a DRD clone
  • Synchronizing a DRD clone
  • Verifying a DRD clone’s status
  • Accessing inactive images via DRD-safe commands
  • Managing software via DRD-safe commands
  • Managing kernel tunables via DRD-safe commands
  • Accessing inactive images via other commands
  • Activating and deactivating an inactive image
  • Customizing the make_*_recovery archive contents
  • Backing up the boot disk via make_tape_recovery
  • Backing up the boot disk via make_net_recovery
  • Using a make_*_recovery archive
  • Interacting with the recovery process

Accessing the System Console and the iLO/MP

  • Management processor concepts
  • Viewing MP/console ports
  • Connecting MP serial and LAN ports
  • Accessing the MP
  • Navigating the MP menu and web interfaces
  • Accessing nPar, vPar, and VM consoles
  • Accessing the VFP, console log, and system event log
  • Accessing the MP help menus
  • Accessing the MP command menu
  • Configuring the MP LAN interface
  • Enabling MP remote access
  • Managing MP user accounts and access levels
  • Managing MP login sessions
  • Rebooting via the MP

Booting PA-RISC Systems

  • HP-UX shutdown and reboot concepts
  • PA-RISC boot process major players
  • PA-RISC boot disk structures
  • PA-RISC boot process overview
  • Autoboot and manual boot concepts
  • Interacting with the BCH and ISL/IPL

Booting Integrity Systems

  • HP-UX shutdown and reboot concepts
  • Integrity boot process major players
  • Integrity boot disk structures
  • Integrity boot disk system, OS, and HPSP structures
  • Integrity and PA-RISC boot process comparison
  • UEFI/EFI addressing concepts
  • Autoboot and manual boot concepts
  • Booting from primary, alternate, and arbitrary boot devices
  • Booting from Ignite-UX servers and recovery archives
  • Managing boot menu settings
  • Managing console settings
  • Interacting with the UEFI/EFI shell
  • Interacting with the hpux.efi OS loader

Configuring the HP-UX Kernel

  • Kernel configuration concepts
  • Special kernel configurations
  • Kernel configuration commands
  • Modifying the current kernel configuration
  • Creating a named configuration
  • Copying a configuration
  • Loading a configuration
  • Kernel module concepts, states, and state changes
  • Viewing and managing module states
  • Kernel tunable concepts and types
  • Viewing, managing, and monitoring kernel tunables
  • Viewing, managing, and monitoring kernel resource alarms
  • Kernel troubleshooting
  • Viewing the kernel change log
  • Booting from an alternate kernel
  • Booting via override parameters
  • Booting to tunable maintenance mode

Managing Software with SD-UX

  • SD-UX software structure concepts
  • SD-UX software depot concepts
  • SD-UX IPD concepts
  • SD-UX daemon and agent concepts
  • Listing software
  • Installing and updating software
  • Removing software

Managing Patches with SD-UX

  • Patch concepts
  • Patch naming convention concepts
  • Patch supersession concepts
  • Patch rating concepts
  • Patch source concepts
  • Patch tool concepts
  • Downloading and installing patches from the HPSC
  • Installing patches from DVD, tape, and directory depots
  • Listing patches
  • Removing patches

Installing the OS with Ignite-UX

  • Install source concepts
  • Planning an install
  • Choosing an operating environment
  • Choosing an install-time security bundle
  • Locating the source media
  • Initiating a PA-RISC install
  • Initiating an Integrity install
  • Navigating the Ignite-UX menus
  • Verifying an installation
  • Completing post-install configuration tasks

Self-Study Appendices

  • Managing printers
  • Connecting to a network
  • Navigating the System Administration Manager (SAM)
  • Configuring the HP-UX 11i v1 kernel

For more information about HP training programs in Ukraine visit the web site at http://www8.hp.com/ua/ru/training/index.html