Event Details
This workshop provides participants with the necessary skills of setting up the modern-day network: Software Defined Networks. They will gain hands-on experience configuring, monitoring, and supporting services, devices and users running within such networks. Participants will have the knowledge required to configure, manage, operate, and troubleshoot a software defined network environment by using security best practices, scripting, and automation.
CONTENT
Architecture & Controller Deployment
- Describe Software Defined Network Architecture and Components
- Describe controller cloud deployment
- Describe Controller On-Premise Deployment
- Configure and verify certificates and whitelisting
- Troubleshoot control-plane connectivity between controllers
Design and implement hybrid IT network architectures at scale
- Implement connectivity for hybrid IT
- Given a scenario, derive an appropriate hybrid IT architecture connectivity solution
- Explain the process to extend connectivity using built-in platform tools
- Evaluate design alternatives that leverage industry standards
- Define routing policies for hybrid IT architectures
Design and implement Software Defined Networks
- Apply networking concepts
- Define network architectures to suit customer requirements
- Propose optimized designs based on the evaluation of an existing implementation
- Determine network requirements for a specialized workload
- Derive an appropriate architecture based on customer and application requirements
- Evaluate and optimize cost allocations given a network design and application data flow
Configure network integration with application services
- Evaluate DNS solutions in a hybrid IT architecture
- Determine the appropriate configuration of DHCP within the network
- Determine an appropriate load balancing strategy within the network ecosystem
- Determine a content distribution strategy to optimize for performance
- Reconcile service requirements with network requirements
Manage, optimize, and troubleshoot the network
- Troubleshoot and resolve a network issue
- Describe monitoring and reporting
- Configure and verify monitoring and reporting
- Implement software upgrade
Policies
- Configure and verify control policies
- Configure and verify data policies
- Configure and verify end-to-end segmentation
- Configure and verify network application-aware routing
- Configure and verify direct Internet access
Automate Administrative tasks
- Evaluate automation alternatives within for network deployments
- Evaluate tool-based alternatives within your network for network operations and management
Design and implement for security and compliance
- Evaluate design requirements for alignment with security and compliance objectives
- Evaluate monitoring strategies in support of security and compliance objectives
- Evaluate security features for managing network traffic
- Utilize encryption technologies to secure network communications
- Configure and verify service insertion
- Describe application-aware firewall
- Configure and verify QoS treatment on the network
FOR WHOM:
Auditors, Computer Executives, Internal Control Officers, CIOs, IT Development Managers, Heads of Department, System Administrators/Engineers, IT Professionals, and Security department managers who form part of the contingency planning or review team.
TRAINING METHODOLOGY
The training methodology combines lectures, discussions, group exercises and illustrations. Participants will gain both theoretical and practical knowledge of the topics. The emphasis is on the practical application of the topics and as a result participant will go back to the workplace with both the ability and the confidence to apply the techniques learned to their duties.
This course is available in the following locations:
Nigeria - $5500
Rwanda - $7500
UK - $8500
USA - $8500