Toutes les formations Global Knowledge

Page 1 sur 104Voir tout le catalogue

Depuis 1996, Global Knowledge propose une gamme complète de formations en informatique et en management. Il est aujourd'hui reconnu pour la qualité pédagogique et technique de ces formations ainsi que pour la richesse de son offre. Plus de 400 formations sont conçues par et pour des professionnels de l'informatique : systèmes et réseaux ainsi que les thématiques associés telles que la sécurité, les communications unifiées, les bases de données, le développement d'applications etc. Global Knowledge, c'est donc un catalogue d'offre complet autour des métiers de l'informatique mais aussi du management. La stratégie et la gouvernance sont aussi abordées pour accompagner toute direction d'entreprise dans la gestion de ses services informatiques.

À retrouver sur http://www.globalknowledge.fr/
Stagiaires par an8771
Date de création1996
Nombre de formateurs49
Global Knowledge
Introduction to Junos SecurityPar Global Knowledge

After successfully completing this course, you should be able to:

• Identify high-level security challenges in today’s networks.

• Identify products that are incorporated into the Juniper Connected Security solution.

• Explain the value of implementing security solutions.

• Explain how Juniper Connected Security solves the cyber security challenges of the future.

• Explain the SRX Series devices and the added capabilities that next-generation firewalls provide.

• Explain traffic flows through the SRX Series devices.

• List the different security objects and how to create them.

• Describe interface types and perform basic interface configuration tasks.

• Describe the initial configuration for an SRX Series device.

• Explain security zones.

• Describe screens and their use.

• Explain address objects.

• Describe services and their use.

• Describe the purpose for security policies on an SRX Series device.

• Describe zone-based policies.

• Describe global policies and their use.

• Explain unified security policies.

• Configure unified security policies with the J-Web user interface.

• Describe IDP signatures.

• Configure an IDP policy using predefined templates with the J-Web user interface.

• Describe the use and configuration of the integrated user firewall feature.

• Describe the UTM security services

• List the available UTM services on the SRX Series device.

• Configure UTM filtering on a security policy with the J-Web user interface.

• Explain Sky ATP’s use in security.

• Describe how Sky ATP and SRX Series devices operate together in blocking threats.

• Describe NAT and why it is used.

• Explain source NAT and when to use it.

• Explain destination NAT and when to use it.

• Explain static NAT and its uses.

• Describe the operation and configuration the different types of NAT.

• Identify various types of VPNs.

• Describe IPsec VPNs and their functionality.

• Describe how IPsec VPNs are established.

• Describe IPsec traffic processing.

• Configure IPsec VPNs with the J-Web user interface.

• Describe and configure proxy IDs and traffic selectors with the J-Web user interface.

• Monitor IPsec VPNs with the J-Web user interface.

• Describe the J-Web monitoring features.

• Explain the J-Web reporting features.

• Describe the Sky Enterprise service and how it can save resources.

• Explain the functionality of Junos Space Security Director.

Global Knowledge
Introduction to Junos Automation and DevOpsPar Global Knowledge

After completing this course you should be able to:

  • Describe the Junos operating system and its basic design architecture.
  • Explain traffic processing for transit and exception traffic.
  • Describe the Junos CLI and its features.
  • List and perform initial configuration tasks.
  • Describe interface types and perform basic interface configuration tasks.
  • Describe DevOps principles and practices.
  • Explain how DevOps can benefit an IT organization.
  • List and describe the various APIs Junos provides for automation.
  • Discuss various frameworks, libraries and tools available to automate Junos devices.
  • Read Junos XML documents.
  • Use XPath to navigate a Junos XML document.
  • Use NETCONF and the XML API to issue RPCs.
  • Use NETCONF and the XML API to configure a Junos device.
  • Understand JSON syntax.
  • Understand YAML syntax.
  • Create JSON and YAML documents.
  • Perform Ansible installation.
  • Retrieve information from Junos devices using Ansible.
  • Use Ansible to configure Junos devices.
  • Create and execute simple Python scripts.
  • Use the Python interactive interpreter.
  • Install Junos PyEZ.
  • Use PyEZ to connect to Junos devices.
  • Use PyEZ to issue RPCs.
  • Use PyEZ to modify a Junos device configuration.
  • Use PyEZ to upgrade Junos devices.
  • Describe basic PyEZ exception handling.
  • Describe the capabilities of the Junos REST AP.
  • Use the Junos REST API Explorer.
  • Issue Junos REST API RPCs.
Global Knowledge
Enterprise Multicloud Automation and Orchestration Using ContrailPar Global Knowledge

After successfully completing this course, you should be able to:

  • Describe the benefits of Contrail Enterprise Multicloud.
  • Describe the use cases of Contrail Enterprise Multicloud.
  • Understand the Contrail Enterprise Multicloud architecture.
  • Explain Kubernetes architecture.
  • Explain how Contrail integrates with Kubernetes.
  • Understand how Contrail Security is used with Kubernetes.
  • List main deployment methods for Contrail with Kubernetes.
  • Explain Red Hat OpenShift architecture.
  • Explain how Contrail integrates with Red Hat OpenShift.
  • Understand how to launch OpenShift workloads and connect them over Contrail Virtual Networks.
  • Understand how Contrail Security is used with Red Hat OpenShift.
  • Explain vCenter architecture.
  • Understand vCenter integration with Contrail.
  • Describe how to connect vCenter workloads using Contrail virtual networks.
  • Describe how to use Contrail Security features to secure vCenter workloads.
  • Understand how VMware vRealize Orchestrator works with Contrail.
  • Explain the main AWS concepts.
  • Describe how to launch AWS workloads with Contrail Enterprise Multicloud .
  • Describe how to connect AWS workloads to private cloud over Contrail VNs.
  • Explain the main Azure concepts.
  • Describe how to launch Azure workloads with Contrail Enterprise Multicloud .
  • Describe how to connect Azure workloads to private cloud over Contrail VNs.
  • Explain the main GCP concepts.
  • Describe how to launch GCP workloads with Contrail Enterprise Multicloud .
  • Describe how to connect GCP workloads to private cloud over Contrail VNs.
  • Describe service chaining within Contrail.
  • Configure In-Network, In-Network-NAT, and Transparent service chains.
  • Understand route leaking, policies, and aggregation in service chains.
  • Understand the features of Juniper cSRX.
  • Configure cSRX service chains.
Global Knowledge
Junos AutomationPar Global Knowledge

After successfully completing this course, you should be able to:

  • Describe the NETCONF protocol.
  • Explain the capabilities of the Junos OS XML API.
  • Describe the use of XSLT, SLAX, and XPath in the XML API.
  • Describe the Junos Automation UI and explain the role of gRPC, NETCONF, and REST in Junos Automation.
  • Identify the languages, frameworks, management suites, and tools used in automating Junos.
  • Describe the YANG Protocol and explain the capabilities of YANG.
  • Use the YANG model to issue Junos commands and to configure Junos.
  • Explain the benefits of using JSON and YAML.
  • List where JSON and YAML are used in Junos Automation.
  • Convert between JSON, YAML, and XML.
  • Describe the features and benefits of using Python in Junos automation.
  • Configure Junos devices to use Python and create simple Python scripts.
  • Describe the function of Junos operation, commit, event, and SNMP scripts.
  • Implement Junos operation, commit, event, and SNMP scripts using Python.
  • Identify how Junos automation uses Jinja2 and create Python scripts that use Jinja2.
  • Explain how PyEZ makes Junos automation easier and the Junos OS support for PyEZ.
  • Use PyEZ to gather facts from Junos, perform configuration tasks, and use PyEZ to manipulate the file system and perform system upgrades to Junos.
  • Implement OpenConfig in the Junos OS.
  • Describe the process of implementing custom YANG modules.
  • Implement a translation script for a custom YANG module.
  • Explain the use of the Junos REST API in automation.
  • Use the Junos REST API to get information from Junos.
  • Describe what JET is and what it includes.
  • Create a project in the JET IDE.
  • Execute scripts using on-box and off-box automation.
  • Explain the four JET application development workflows.
  • Describe how Ansible is used in Junos automation and install Ansible.
  • Create Ansible playbooks to automate Junos.
  • Describe how JSNAPy can help automate Junos devices.
  • Implement JSNAPy into a Junos environment.
  • Describe how ZTP works.
  • Configure in-band ZTP and out-of-band ZTP.
Global Knowledge
Juniper Networks Design SecurityPar Global Knowledge
  • After successfully completing this course, you should be able to:
  • Identify high level security challenges with different design architectures.
  • Explain the value of implementing security solutions in any network design.
  • Identify key factors in Juniper Networks security focus.
  • List and describe the security platforms and solutions offered by Juniper Networks.
  • Perform the steps necessary to identify customer security requirements.
  • Explain what is required to define the scope of the security design.
  • Identify the data required to perform a data analysis of the customer’s existing network and use that information in the design.
  • Describe traditional security practices used to secure a network.
  • Explain the added capabilities that next generation firewalls provide.
  • Explain the evolution of modern security models.
  • Describe intelligent networks.
  • Explain how Software-Defined Secure Networking improves security in network design.
  • Explain the need for centralized Security Management.
  • Describe what Junos Space Security Director can do to manage network security.
  • Describe the function of Juniper Secure Analytics in managing network security.
  • List the main components of the Juniper Automation Stack.
  • Explain Juniper Networks automation solutions.
  • Describe the benefits of automating security.
  • Describe how security works in a virtualized environment.
  • Explain the benefits of service chaining.
  • Describe Juniper Virtual SRX and Container SRX products.
  • Describe network virtualization with VMware NSX.
  • Describe the benefits of HA with security devices.
  • Discuss how to handle asymmetric traffic with security devices.
  • Describe different options for SRX chassis cluster deployments.
  • Describe the main security concerns for the campus and the branch networks.
  • Explain end-to-end security concepts.
  • Describe security functions at different network layers.
  • Explain network authentication and access control concepts.
  • Describe common campus and branch network security design examples.
  • Describe security considerations for the enterprise WAN.
  • Explain when to use IPsec and NAT in the enterprise WAN.
  • Explain virtual router applications for the enterprise WAN.
  • Discuss security best practices in the enterprise WAN.
  • Describe security in the service provider WAN.
  • Discuss security best practices for the service provider WAN.
  • Discuss the security requirements and design principles of the data center.
  • Describe the security elements of the data center.
  • Explain how to simplify security in the data center.
  • Discuss the security enforcement layers in the data center.
Global Knowledge
Junos Subscriber ManagementPar Global Knowledge
  • After successfully completing this course, you should be able to:
  • Describe the fundamentals of subscriber management on a device running the Junos OS, including broadband access design concepts, hardware and software requirements, and configuration components.
  • Configure subscriber AAA.
  • Configure, verify, and troubleshoot extended DHCP local server, extended DHCP relay agent, and DHCP relay proxy mode.
  • Configure dynamic Point-to-Point Protocol over Ethernet (PPPoE) for subscriber access.
  • Configure subscriber addressing.
  • Configure, verify, and troubleshoot dynamic profiles.
  • List predefined Junos variables used in subscriber management.
  • Configure, verify, and troubleshoot static and dynamic virtual LANs (VLANs).
  • Configure, verify, and troubleshoot static and dynamic subscriber interfaces.
  • Describe Layer 2 and Layer 3 wholesale services.
  • Configure and implement Layer 2 and Layer 3 wholesale services.
  • Configure, verify, and troubleshoot dynamic firewall services.
  • Configure, verify, and troubleshoot subscriber CoS.
  • Configure, verify, and troubleshoot dynamic multicast services.
  • Configure, verify, and troubleshoot the Access Node Control Protocol.
Global Knowledge
Advanced Data Center SwitchingPar Global Knowledge
  • List the various models of QFX5100 Series switches and explain how they solve current challenges.
  • List some data center architecture options.
  • Explain the purpose, components, and operations of ZTP.
  • Deploy a QFX5100 Series switch using ZTP.
  • Explain the purpose, components, and operations of ISSU.
  • Upgrade a QFX5100 Series switch using ISSU.
  • Explain the purpose, components, and operations of MC-LAG.
  • Implement an MC-LAG on QFX5100 Series switches.
  • Describe key concepts, components, and operation of a mixed Virtual Chassis.
  • Implement a mixed Virtual Chassis and verify its operations.
  • Describe Virtual Chassis Fabric concepts and components.
  • Describe how to provision a Virtual Chassis Fabric using different methods.
  • Describe the requirements and upgrade procedure of Virtual Chassis Fabric.
  • Describe how to manage a Virtual Chassis Fabric with Junos Space.
  • List and use available troubleshooting tools.
  • Identify and resolve potential issues with MC LAG.
  • Identify and resolve potential issues with Virtual Chassis.
  • Identify and resolve potential issues with VCF.
  • Describe the various data center fabric architectures.
  • Explain and configure routing in an IP Fabric.
  • Explain, configure, and monitor VXLAN when using multicast signaling.
  • Describe configure, and monitor EVPN signaling for VXLAN.
  • Describe the control and data plane of an MPLS VPN.
  • Describe the DCI options when using a VXLAN overlay with EVPN signaling.
Global Knowledge
Juniper Networks Design - Data CenterPar Global Knowledge

After successfully completing this course, you should be able to:

  • State high-level concepts about different data center architectures.
  • Identify features used to interconnect data centers.
  • Identify key high-level considerations about securing and monitoring a data center deployment.
  • Outline key high-level concepts when implementing different data center approaches.
  • Recommend data center cooling designs and considerations.
  • Explain device placement and cabling requirements.
  • Outline different data center use cases with basic architectures.
  • Describe a traditional multitier data center architecture.
  • Explain link aggregation and redundant trunk groups.
  • Explain multichassis link aggregation.
  • Summarize and discuss key concepts and components of a Virtual Chassis.
  • Summarize and discuss key concepts and components of a VCF.
  • Summarize and discuss key concepts and components of a QFabric System.
  • Summarize and discuss key concepts and components of Junos Fusion.
  • List the reasons for the shift to IP fabrics.
  • Summarize how to scale an IP fabric.
  • State the design considerations of a VXLAN overlay.
  • Define the term Data Center Interconnect.
  • List differences between the different Layer 2 and Layer 3 DCIs.
  • Summarize and discuss the benefits and use cases for EVPN.
  • Discuss the security requirements and design principles of the data center.
  • Identify the security elements of the data center.
  • Explain how to simplify security in the data center.
  • Discuss the security enforcement layers in the data center.
  • Summarize and discuss the purpose of SDN.
  • Explain the function of Contrail.
  • Summarize and discuss the purpose of NFV.
  • Discuss the purpose and function of vSRX and vMX.
  • Discuss the importance of understanding the baseline behaviors in your data center.
  • List the characteristics of the Junos Space Network Management Platform and describe its deployment options.
  • Describe the importance of analytics.
  • Discuss automation in the data center.
  • Discuss the benefits of QoS and CoS.
  • State the benefits of a converged network.
  • Identify general aspects of data center migration.
  • Summarize and discuss best practices for migration planning.
  • Outline some common migration scenarios.
  • Summarize high availability design considerations in the data center.
  • Provide an overview of high availability offerings and solutions in the data center
Global Knowledge
Cloud Automation Using ContrailPar Global Knowledge

After successfully completing this course, you should be able to:

  • Explain the role of Contrail SDN Controller.
  • List available Contrail solutions.
  • Describe the purpose of an orchestrator.
  • Describe the basics of Kubernetes.
  • Identify the function of each of the main OpenStack Projects.
  • Describe the purpose of Contrail.
  • Explain how the versions of Contrail differ.
  • Discuss Contrail related solutions.
  • Describe the functions of the Contrail vRouter and Contrail Controller.
  • Explain the role of the control, configuration, and analytic nodes.
  • Configure and deploy virtual DNS and IPAMs.
  • Create virtual networks.
  • Create policies to control the flow of traffic.
  • Explain the routing behavior of an IP Fabric
  • Describe the steps to onboard a Brownfield IP Fabric.
  • Describe the steps to onboard a Greenfield IP Fabric.
  • Describe the various commands to troubleshoot the onboarding of an IP Fabric.
  • Explain the benefits of VXLAN in the data center.
  • Describe EVPN signaling for VXLAN.
  • Describe how CEM can bridge between a VM and a BMS.
  • Implement bridging between VMs and BMSs using VXLAN and EVPN signaling.
  • Describe EVPN signaling for VXLAN routing in the Spine.
  • Describe how to enable central routing using CEM.
  • Describe EVPN signaling for DCI.
  • Describe how to enable DCI using CEM.
  • Create physical gateways.
  • Describe architecture and capabilities of Contrail Security.
  • Configure main Contrail Security features.
  • Explain the benefits of AppFormix.
  • Explain the operation and use of AppFormix.
  • Explain how to setup and install AppFormix in different environments.
  • Explain the purpose and use of the different AppFormix features.
  • Understand the purpose of the Clusters feature.
  • Describe how to use the dashboard to examine the state of the network.
  • Understand the purpose and use of the Charts feature.
  • Explain the benefits of capacity planning.
  • Explain how to setup the chargeback functionality.
  • Explain how to use AppFormix charts.
  • Explain how to use AppFormix heat maps.
  • Describe the benefits of reports and service monitoring functionalities.
  • Explain the purpose and use of AppFormix alarms.
  • Explain the purpose and use of AppFormix Composite Alarms.
  • Explain the purpose of JTI.
  • Discuss native sensors.
  • Explain OpenConfig and gRPC sensors.
  • Describe best practices for JTI.
  • Explain how to use JTI with AppFormix.
Nous utilisons les cookies afin de fournir les services et fonctionnalités proposés sur notre site et afin d’améliorer l’expérience de nos utilisateurs. En cliquant sur ”J’ai compris”, vous acceptez l’utilisation de ces cookies.