Upload
ngodan
View
214
Download
0
Embed Size (px)
Citation preview
ICTD STAFF DEVELOPMENT PROGRAMME Information and Communication Technology Division July 2012 – June 2013
2
TABLE OF CONTENTS ICT INFRASTRUCTURE ................................................................................................................ 4 NETWORK ......................................................................................................................................................................... 6
CISCO WIDE‐AREA APPLICATION SERVICE (CWAAS) ................................................................................................................................... 6
CIPT1 8 ‐ IMPLEMENTING CISCO UNIFIED COMMUNICATIONS MANAGER – PART 1 ................................................................................. 7
CIPT1 8 ‐ IMPLEMENTING CISCO UNIFIED COMMUNICATIONS MANAGER – PART 2 ................................................................................. 8
IUWMS – IMPLEMENTING CISCO UNIFIED WIRELESSMOBILITY SERVICES ................................................................................................. 9
IUWMS – IMPLEMENTING CISCO UNIFIED WIRELESS VOICE NETWORKS ................................................................................................ 10
RADIO ............................................................................................................................................................................. 11 TOWER ERECTING ..................................................................................................................................................................................... 11
RE‐CERTIFICATION RIGGING REFRESHER .................................................................................................................................................. 12
HEIGHT SAFETY AND TELECOMMUNICATIONS RIGGING .......................................................................................................................... 13
SATELLITE ........................................................................................................................................................................ 15 VSAT ADVANCED INSTALLATION CERTIFICATION PROGRAM ................................................................................................................... 15
VIDEOCONFERENCE ......................................................................................................................................................... 16 VIDEOCONFERENCE ESSENTIALS 2.0 ......................................................................................................................................................... 16
SYSTEMS.......................................................................................................................................................................... 17 DATA CENTER DESIGN, MANAGEMENT AND AUDIT ................................................................................................................................. 17
SYMANTEC ENTERPRISE VAULT 10.X FOR EXCHANGE: ............................................................................................................................. 18
ADMINISTRATION ..................................................................................................................................................................................... 18
SYMANTEC ENTERPRISE VAULT 9.X FOR EXCHANGE: ............................................................................................................................... 19
ADMINISTRATION ..................................................................................................................................................................................... 19
SYMANTEC ENTERPRISE VAULT 9.X FOR FILE SYSTEM .............................................................................................................................. 20
ARCHIVING:ADMINISTRATION .................................................................................................................................................................. 20
LEGAL DISCOVERY USING SYMANTEC ENTERPRISE VAULT 9 DISCOVERY ACCELERATOR ......................................................................... 21
UPGRADING TO SYMANTEC NETBACKUP 7.0 FOR UNIX AND WINDOWS ................................................................................................ 22
SYMANTEC NETBACKUP 7.5 FOR WINDOWS: ADMINISTRATION ............................................................................................................. 24
COURSE 10747 ‐ ADMINISTERING MS SYSTEM CENTER 2012 CON‐FIGURATION MANAGER .................................................................. 25
VMWARE VSPHERE: OPTIMIZE AND SCALE ‐ BETA [V5.0] ......................................................................................................................... 27
COURSE 6436B: DESIGNING WINDOWS SERVER 2008 ACTIVE DIRECTORY INFRASTRUCTURE AND SERVICES ........................................ 28
COURSE 6425C: CONFIGURING AND TROUBLESHOOTING WINDOWS SERVER 2008 ACTIVE DIRECTORY DOMAIN SERVICES ................ 30
ICT MANAGEMENT .................................................................................................................. 32 GOVERNANCE .................................................................................................................................................................. 33
VMWARE VSPHERE: OPTIMIZE AND SCALE ‐ BETA [V5.0] ................................................................... ERROR! BOOKMARK NOT DEFINED.
PERSONAL DEVELOPMENT ............................................................................................................................................... 34 ICTD MANAGEMENT CERTIFICATION PROGRAM ...................................................................................................................................... 34
SUPERVISORY SKILLS FOR NEW CITS MANAGERS ..................................................................................................................................... 35
PROJECT MANAGEMENT ................................................................................................................................................. 36 PRINCE2 FOUNDATION ............................................................................................................................................................................. 36
3
PRINCE2 PRACTITIONER ............................................................................................................................................................................ 37
SERVICE MANAGEMENT .................................................................................................................................................. 38 ITIL FOUNDATION V3 ................................................................................................................................................................................ 38
ICT SECURITY ........................................................................................................................... 41 NETWORK SECURITY ........................................................................................................................................................ 42
HACKER TECHNIQUES AND EXPLOITATION ............................................................................................................................................... 42
FUNDAMENTALS OF VIRTUALIZATION SECURITY ..................................................................................................................................... 43
CLOUD SECURITY ....................................................................................................................................................................................... 44
CISCO FIREWALL ‐ DEPLOYING CISCO ASA FIREWALL SOLUTIONS V2.0 ................................................................................................... 46
VULNERABILITY ASSESSMENT ................................................................................................................................................................... 47
CISCO SECURE ‐ SECURING NETWORKS WITH CISCO ROUTERS AND SWITCHES ...................................................................................... 48
CHECK POINT SECURITY ADMINISTRATOR ................................................................................................................................................ 49
SECURITY MANAGEMENT ................................................................................................................................................ 50 IMPLEMENTING AND AUDITING THE TWENTY CRITICAL SECURITY CONTROLS ....................................................................................... 50
LOG MANAGEMENT .................................................................................................................................................................................. 52
SECURITY SYSTEMS .......................................................................................................................................................... 54 SYMANTECENDPOINT PROTECTION 11.0 MR4: ADMINISTRATION .......................................................................................................... 54
SYMANTEC ENDPOINT PROTECTION 12.1: ADMINISTRATION .................................................................................................................. 55
SYMANTEC NETWORK ACCESS CONTROL 11.X ......................................................................................................................................... 57
SYMANTEC ENDPOINT PROTECTION 11.0 MR4: INSTALL, CONFIGURE & DEPLOY ................................................................................... 58
SYMANTEC ENDPOINT PROTECTION 11.0 MR4: MANAGE AND ADMINISTER .......................................................................................... 59
SYMANTEC ENDOPINT PROTECTION 11.0 MR4: MAINTAIN AND TROUBLESHOOT.................................................................................. 60
4
NETWORK TITLE VENUE DATE DURATION
CISCO WIDE‐AREA APPLICATION SERVICE (CWAAS) UNGSC‐B 10/12 ‐ 14/12/2012 5 Days
CIPT1 8 ‐ IMPLEMENTING CISCO UNIFIED COMMUNICATIONS MANAGER ‐ Part 1 UNSB‐V 14/1 ‐ 18/1/2013 5 Days
CIPT2 8 ‐ IMPLEMENTING CISCO UNIFIED COMMUNICATIONS MANAGER ‐ Part 2 UNSB‐V 21/1 ‐ 25/1/2013 5 Days
IUWMS ‐ IMPLEMENTING CISCO UNIFIED WIRELESS MOBILITY SERVICES UNGSC‐B 8/4 ‐ 12/4/2013 5 Days
IUWVN ‐ IMPLEMENTING CISCO UNIFIED WIRELESS VOICE NETWORKS UNGSC‐B 15/4 ‐ 19/4/2013 5 Days
RAD IO TITLE VENUE DATE DURATION
TOWER ERECTING In Mission Upon Request 5 Days
RE‐CERTIFICATION RIGGING REFRESHER In Mission Upon Request 2 Days
HEIGHT SAFETY AND TELECOMMUNICATIONS RIGGING In Mission Upon Request 10 Days
SA T E L L I T E TITLE VENUE DATE DURATION
VSAT INSTALLATION CERTIFICATION PROGRAM In Mission Upon Request 5‐15 Hrs. of online study + Classroom‐based test
V ID EOCONF ER ENCE TITLE VENUE DATE DURATION
VIDEO CONFERENCE ESSENTIALS 2.0 UNSB‐V 15/10 ‐ 19/10/2012 5 Days
S Y S T EMS
ICT INFRASTRUCTURE
5
TITLE VENUE DATE DURATION
DATA CENTER DESIGN, MANAGEMENT AND AUDIT In Mission Upon Request 5 Days
SYMANTEC ENTERPRISE VAULT 10.x FOR EXCHANGE: ADMINISTRATION In Mission Upon Request 5 Days
SYMANTEC ENTERPRISE VAULT 9.x FOR EXCHANGE: ADMINISTRATION In Mission Upon Request 5 Days
SYMANTEC ENTERPRISE VAULT 9.x FOR FILE SYSTEM ARCHIVING: ADMINISTRATION In Mission Upon Request 5 Days
LEGAL DISCOVERY USING SYMANTEC ENTERPRISE VAULT 9 DISCOVERY ACCELERATOR
In Mission Upon Request 3 Days
UPGRADING TO SYMANTEC NETBACKUP 7.0 FOR UNIX AND WINDOWS In Mission Upon Request 2 Days
SYMANTEC NETBACKUP 7.5 FOR WINDOWS: ADMINISTRATION UNGSC‐B 1/10 ‐ 5/10/2012 5 Days
COURSE 10747 ‐ ADMINISTERING MS SYSTEM CENTER 2012 CONFIGURATION MANAGER
RTCC‐Entebbe 18/3 ‐ 22/3/2013 5 Days
VMWARE vSPHERE: OPTIMIZE AND SCALE ‐ BETA [V5.0] UNGSC‐B 11/2 ‐ 15/2/2013 5 Days
COURSE 6436B: DESIGNING WINDOWS SERVER 2008 ACTIVE DIRECTORY INFRASTRUCTURE AND SERVICES
UNGSC‐B 6/5 ‐ 10/5/2013 5 Days
COURSE 6425C: CONFIGURING AND TROUBLESHOOTING WINDOWS SERVER 2008 ACTIVE DIRECTORY DOMAIN SERVICES
UNGSC‐B 13/5 ‐ 17/5/2013 5 Days
NETWORK CISCO WIDE‐AREA APPLICATION SERVICE (CWAAS) 5 Days Classroom‐based
VENUE DATE
UNGSC‐B 10/12 ‐ 14/12/2012
Category:
ICT Infrastructure/Network
Objectives: This course will teach how to design and deploy a solution using Cisco WAAS that improves application performance over the WAN while enabling infrastructure consolidation. Students will also understand Cisco WAAS optimization technology, design considerations, network integration, and system troubleshooting aspects.
Upon completing this course, students will be able to meet these overall objectives:
• Explain the business value of WAN optimization and application acceleration technologies and understand the technologies employed by Cisco WAAS to enable consolidation while improving application performance over the WAN
• Describe the basic configuration steps required for Cisco WAAS deployment and provide a high‐level overview of Cisco WAAS deployment options
• Describe Cisco WAAS implementation, integration and management
• Implement each of the Cisco WAAS application optimizers for maximum performance
• Describe how to design and troubleshoot Cisco WAAS installations, including considerations and issues associated with platform and network connectivity, network interception and WAN optimization
• Describe and deploy the Cisco WAAS Mobile Client solution
Target Audience: This course is intended for Network designers, network administrators, network engineers, Server and system administrators, systems engineers and network managers.
Prerequisites: Students attending this class should have attended the Interconnecting Cisco Networking Devices Part 1 (ICND1) or have fundamental knowledge of TCP/IP and associated TCP/IP applications as well as operational knowledge of Cisco routers.
6
NETWORK CIPT1 8 ‐ IMPLEMENTING CISCO UNIFIED COMMUNICATIONS MANAGER – PART 1 5 Days
Classroom‐based
VENUE DATE
UNSB‐V 14/01 ‐ 18/1/2013
Category:
ICT Infrastructure/Network
Objectives: This 5 days course prepares students for implementing a Cisco Unified Communications Manager solution at a single‐site environment. This course focuses primarily on Cisco Unified Communications Manager version 8.0, which is the call routing and signaling component for the Cisco Unified Communications solution.
Students will perform post‐installation tasks, configure Cisco Unified Communications Manager, implement Media Gateway Control Protocol (MGCP) and H.323 gateways, and build dial plans to place on‐net and off‐net phone calls.
Students will also implement media resources, IP Phone Services, Cisco Unified Communications Manager native presence, and Cisco Unified Mobility.
Upon completing this course, the learner will be able to meet these overall objectives:
• Describe Cisco Unified Communications Manager, including its functions, architecture, deployment and redundancy options, and how to install or upgrade
• Perform Cisco Unified Communications Manager initial configuration and user management
• Configure Cisco Unified Communications Manager to support on‐cluster calling
• Implement PSTN access in Cisco Unified Communications Manager and build a dial plan in a single‐site Cisco
• Implement Cisco Unified Communications Manager media resources
• Implement Cisco Unified Communications Manager features and applications
Target Audience: This course is designed for network and voice technicians responsible for implementing and configuring Cisco Unified Communications Manager within the mission area.
Prerequisites: Students attending this course should have working knowledge of converged voice and data networks and ability to configure and operate Cisco routers and switches.
Note: This course will be held in conjunction with CIPT2 ‐ Implementing Cisco Unified Communications Manager ‐ Part 2 training course.
7
NETWORK CIPT1 8 ‐ IMPLEMENTING CISCO UNIFIED COMMUNICATIONS MANAGER – PART 2 5 Days
Classroom‐based
VENUE DATE
UNSB‐V 21/1 ‐ 25/1/2013
Category:
ICT Infrastructure/Network
Objectives: This course will prepare students for implementing Cisco Unified Communications solution in a multisite environment. It covers globalized call routing, Cisco Service Advertisement Framework (SAF) and Call Control Discovery (CCD), tail‐end hop‐off (TEHO), Cisco Unified Survivable Remote Site Telephony (SRST), and mobility features such as Cisco Device Mobility and Cisco Extension Mobility. Participants will apply a dial plan for a multisite environment including TEHO, configure survivability for remote sites during WAN failure and implement solutions to reduce bandwidth requirements in the IP WAN. They will also enable Call Admission Control (CAC) including Session Initiation Protocol (SIP) Preconditions and automated alternate routing (AAR).
Upon completing this course, students will be able to meet these overall objectives:
• Describe multisite deployment issues and solutions, and describe and configure required dial plan elements
• Implement call‐processing resiliency in remote sites by using Cisco Unified SRST, MGCP fallback, and Cisco Unified Communications Manager Express in Cisco Unified SRST mode
• Implement bandwidth management and CAC to prevent oversubscription of the IP WAN
• Implement Device Mobility and Cisco Extension Mobility
• Describe and implement CCD deployments
Target Audience: This course is designed for network and voice technicians responsible for implementing and configuring Cisco Unified Communications Manager within the mission area.
Prerequisites: Students attending this course should have working knowledge of voice and data networks, ability to configure and operate Cisco routers and switches, and should have attended the CIPT1 8 Implementing Cisco Unified Communications Manager training course.
Note: This course will be held in conjunction with CIPT1 8 ‐ Implementing Cisco Unified Communications Manager ‐ Part 1 training course.
8
NETWORK IUWMS – IMPLEMENTING CISCO UNIFIED WIRELESS MOBILITY SERVICES 5 Days
Classroom‐based
VENUE DATE
UNGSC‐B 8/4 ‐ 12/4/2013
Category:
ICT Infrastructure/Network
Objectives: The goal of this 5‐day course is to provide students with information needed to integrate mobility services into the network, tune and troubleshoot the WLAN and implement indoor enterprise mesh networks.
Upon completion of this course students should be able to:
• Design WLAN Infrastructure for Mobility
• Implement Advanced Services and Manage with WCS and WCS Navigator
• Implement Cisco 2700 Series Appliance Location‐Based Services
• Implement MSE Architecture
• Describe Outdoor Wireless
• Implement and Manage an Enterprise Mesh
• Optimize and troubleshoot the WLAN
Target Audience: This course is intended for network administrators who will be required to integrate VoWLAN services into the WLAN.
Prerequisites: Students in this course should have attended the ICND 1 & 2 and IUWNE training courses or have equivalent knowledge.
Note: This course will be held in conjunction with IUWVN ‐ Cisco Unified Wireless Voice Network training course.
9
NETWORK IUWMN – IMPLEMENTING CISCO UNIFIED WIRELESS VOICE NETWORKS 5 Days
Classroom‐based
VENUE DATE
UNGSC‐B 15/4 ‐ 19/4/2013
Category:
ICT Infrastructure/Network
Objectives: The goal of this 5‐day course is to provide students with information and practice activities to prepare them to integrate VoWLAN services into the wireless network, implement QoS, as well as support multicast, video and high bandwidth applications into the wireless network.
Upon completing this course students should be able to:
• Describe the overall architecture that makes up a VoWLAN
• Configure infrastructure devices to implement a voice over wireless LAN
• Implement QoS in a Cisco Unified Wireless Network
• Implement multicast in a Cisco Unified Wireless Network
• Describe how to prepare the wireless network for video and high‐bandwidth applications
Target Audience: This course is intended for network administrators who will be required to integrate VoWLAN services into the WLAN.
Prerequisites: Students in this course should have attended the ICND 1 & 2, the IUWNE and IUWMS training courses or have equivalent knowledge.
Note: This course will be held in conjunction with IUWMS ‐ Cisco Unified Wireless Mobility Services training course.
10
RADIO TOWER ERECTING 5 Days
Classroom‐based
VENUE DATE
In Mission Upon Request
Category:
ICT Infrastructure/Radio
Objectives: This specialist course will cover the following topics:
• Personal Protective Equipment for rigging at height
• Risk assessment / method statements for mast building
• Inspection of PPE
• Mast / tower access on Rohn 45 guyed masts
• Lifting systems for guyed masts
• Mast base specifications
• Grounding systems
• Use of tower jack & jib pole
• Tensioning & placing of temporary guys
• Tensioning & placing of guys
• Grounding of completed mast
• Disassembling guyed mast using tower jack & jib pole
Target Audience: This technical training course is intended for communications technicians responsible for building wireless communications towers.
Prerequisites: Participants should have attended Height Safety and Telecommunications Rigging training course.
Note: This course can be arranged upon request at the mission level.
11
RADIO RE‐CERTIFICATION RIGGING REFRESHER 2 Days
Classroom‐based
VENUE DATE
In Mission Upon Request
Category:
ICT Infrastructure/Radio
Objectives: This training needs to be completed by all certified riggers every 3 years.
Course agenda will cover the following topics:
• Personal Protective Equipment for telecommunications rigging update
• Risk assessment and method statements for rigging update
• Inspection of PPE refresher
• High structure rescue and self‐evacuation reassessment
Target Audience: Course is intended for certified riggers whose credential is going to expire.
Prerequisites: This course can be arranged upon request at the mission level.
12
RADIO HEIGHT SAFETY AND TELECOMMUNICATIONS RIGGING 10 Days
Classroom‐based
VENUE DATE
In Mission Upon Request
Category:
ICT Infrastructure/Radio
Objectives: At the end of this course and upon successful completion of the exam, participants will become Certified Riggers and will receive an ID card.
This course will introduce participants to the equipment tools and safety techniques required to climb a tower and will provide an overview of the issues of constructing and maintaining wireless communications sites.
During the course participants will acquire the required knowledge on:
• Relevant law and regulations pertaining work at height
• Assessment and management of risk for work at height
• Selection and correct usage of safe systems and suitable Personal Protective Equipment
• Tower climbing
• Fixed and temporary fall arrest systems
• Lanyard and work positioning systems
• Rescue from height
• RF hazards and its effects on people
• Regulations governing lifting and lowering activities
• Selection of suitable equipment
• Safe systems for raising and lowering loads
• Use of load directional control systems
• Principles and practice on tower building
• Principles and practice on feeders installation
• Lifting of antennas
• Correct installation orientation of common antennas
• Grounding principles
• Earthing fundamentals and theory
• Practical systems for structures and communication equipment and testing
13
14
Target Audience: This training course is intended for communications technicians who are required to climb wireless communication installations and are responsible for building, inspecting, monitoring and maintaining wireless communications towers
Note: This course can be arranged upon request at the mission level.
SATELLITE VSAT ADVANCED INSTALLATION CERTIFICATION PROGRAM 5‐15 hours online study per course + classroom‐based test
Self‐Paced
VENUE DATE
In Mission Upon Request
Category:
ICT Infrastructure/Satellite
Objectives: The VSat Advanced Certification Program is delivered via a combination of the online courses GVF 510 Core skills for Satellite Installers, GVF520 Satcom Fundamentals, GVF521 Practical Technique for VSat Installers and the onsite GVF Basic HOST Hands on skills Test.
Students who successfully complete the entire path will receive the GVF Advanced VSAT Installer Certification.
• The online course GVF 510 will teach the core skills required by all satellite technicians for accurate antenna alignment and prevention of major sources of uplink interference, regardless of the type of equipment they install.
• The online course GVF520, the second in a series of three online courses leading to GVF Advanced VSAT Installer Certification, provides students with a thorough understanding of the fundamental theories of VSAT communications. This knowledge is essential for every skilled and effective satellite ground equipment terminal field technician.
• The GVF 521 online course completes the knowledge training requirements for GVF Advanced VSAT Installer Certification. The course covers issues that field technicians face such as using a compass, calculating levels in dB, voltage drops, cable lengths, using a spectrum analyzer, grounding, basic IP networking, safety issues and troubleshooting.
During the GVF Basic hands on skills test (HOST), instructors will verify through a test the student’s ability to use the core skills learnt in the online courses in a hands‐on environment.
Target Audience: This course is intended for field technicians involved in the satellite area who may be responsible for activating any type of VSAT terminal.
15
VIDEOCONFERENCE VIDEOCONFERENCE ESSENTIALS 2.0 5 Days
Classroom‐based
VENUE DATE
UNSB‐V 15/10 – 19/10/2012
Category:
ICT Infrastructure/Videoconference
Objectives: This course will provide delegates with an understanding of the essentials behind video conferencing and will help them improve performance in this field of expertise.
Students will learn how to implement a strong and reliable videoconference network, solve issues related to network (ISDN and IP) or to equipment (System settings, tracing).
The course will include theory and hands‐on sessions. The end‐user, under the instructor's guidelines, will learn how to operate faultfinding and eventually solve the problem.
Course agenda will include:
• Introduction to the DFS VC guidelines
• VC scheduling (VCMS ins and outs)
• Cisco VC products (from C‐ series to EX)
• C‐series setup and installation overview
• Cisco service contracts (SmartNet)
• Importance of Software upgrades
• How to upgrade endpoint (MXP, C‐ series and EX)
• Advantages of Permanent Convergent Satellite links (Video‐Voice‐Data)
• IP setup
• Cisco VCS‐control basics: registration requirements
• Cisco TelePresence Management System ‐ managing VC equipment from a single point
• Preparation before, during and after a VC
• Web based, Telnet and SSH into your MXP or C‐series VC unit
• Conference room setup and improvement
Target Audience: Thiscourse is intended for communications field staff who will be responsible for Videoconferencing equipment as well as for the installation, support and management of VC technology in field missions.
16
SYSTEMS DATA CENTER DESIGN, MANAGEMENT AND AUDIT 5 Days
Classroom‐based
VENUE DATE
In Mission Upon Request
Category:
ICT Infrastructure/Systems
Objectives: This training course is aimed at providing CIT staff with the required knowledge and skills to implement the consolidation plan of data centres in field missions as well as with the tools to identify issues and improve UN data centre facilities in line with ICTD initiative.
Course agenda combines a session in data centre design and management with a session in data centre audit.
The design and management part covers the elements that should be incorporated and applied into the management practices for Data Centres, in order to ensure consistency and adherence to procedures especially with reference to health and safety issues. It is also aimed at teaching best practice design and operational principles as well as at transferring knowledge of data centre management issues and methods that will enable students to make critical decisions in order to promote sustainability and reliability.
The auditing part consists of a physical study of a specific UN data centre facility to be carried out by the students and the instructor by reviewing the existing power distribution, cooling, earthing and bonding, cabling, safety and security as well as lighting, by measuring the facility key components, by discussing and practicing in the class to identify issues and improvements.
The program, which primarily complies with TIA 942 and BICSI international standards, will include a final exam leading to the achievement of the BICSI‐recognized Data Centre Designer (DCD) certification as well as a final audit report.
Target Audience: The course is intended for communications and IT field staff involved in the design, construction and maintenance of data centers of different size in field missions.
Note: Dedicated sessions of this course can be organized upon request at the mission level.
17
SYSTEMS
SYMANTEC ENTERPRISE VAULT 10.X FOR EXCHANGE: ADMINISTRATION 5 Days
Classroom‐based Virtual
VENUE DATE
In Mission Upon Request
Category:
ICT Infrastructure/Systems
Objectives: This course covers how to configure and use Enterprise Vault. Students will learn about the product functionality and Enterprise Vault operations and features. Additional topics include using reports, basic management, backing up and restoring the components of Enterprise Vault and an introduction to troubleshooting.
By the end of this course students will be able to:
• Describe the purpose and benefits of Enterprise Vault
• Describe the components of Enterprise Vault
• Configure Enterprise Vault
• Configure and customize Enterprise Vault client tools for Outlook, Outlook Web Access/App (OWA) and mobile clients
• Enable Vault Cache and Virtual Vault for client access
• Archive Exchange user and journal mailboxes
• Update and manage indexes
• Archive the contents of personal store (PST) files
• Monitor and maintain the Enterprise Vault implementation
• Backup and restore Enterprise Vault data
• Perform basic troubleshooting.
Target Audience: The Symantec Enterprise Vault 10.x for Exchange: Administration course is designed for system administrators tasked with operating, integrating and monitoring the day‐to‐day performance of Enterprise Vault within their Exchange environments.
Prerequisites: Students attending this course should have working knowledge of Windows with some system administration experience.
Note: This course can be arranged upon request in classroom‐based and virtual formats.
18
SYSTEMS
SYMANTEC ENTERPRISE VAULT 9.X FOR EXCHANGE: ADMINISTRATION 5 Days
Classroom‐based Virtual
VENUE DATE
In Missio Upon Request
Category:
ICT Infrastructure/Systems
Objectives: This course covers how to install, configure and use Enterprise Vault. Students will learn about the product functionality and Enterprise Vault operations and features. Additional topics include using reports, basic management, backing up and restoring the components of Enterprise Vault and an introduction to file system and SharePoint archiving. After completing this course students will know how to install, configure, manage, monitor and maintain Enterprise Vault.
By the end of this course students will be able to:
• Describe the purpose and benefits of Enterprise Vault
• Describe the components of Enterprise Vault
• Install and configure Enterprise Vault
• Configure and customize Enterprise Vault client tools for Outlook and Outlook Web Access/App (OWA)
• Enable Vault Cache and Virtual Vault for client access
• Archive Exchange user and journal mailboxes as well as public folders
• Archive the contents of personal store (PST) files
• Update, rebuild and manage indexes
• Use Enterprise Vault monitoring and reporting tools
• Backup and restore Enterprise Vault data
• Understand File System and SharePoint Archiving
Target Audience: The Symantec Enterprise Vault 10.x for Exchange: Administration course is designed for system administrators tasked with operating, integrating and monitoring the day‐to‐day performance of Enterprise Vault within their Exchange environments.
Prerequisites: Students attending this course should have working knowledge of Windows with some system administration experience.
Note: This course can be arranged upon request in classroom‐based and virtual formats.
19
SYSTEMS
SYMANTEC ENTERPRISE VAULT 9.X FOR FILE SYSTEM ARCHIVING:ADMINISTRATION 5 Days
Classroom‐based Virtual
VENUE DATE
In Mission Upon Request
Category:
ICT Infrastructure/Systems
Objectives: This course covers how to install, configure, manage and troubleshoot Enterprise Vault from the File System Archiving perspective and helps better understand the product functionality and features.
By the end of this course students will be able to:
• Explain the purpose and functionality of Enterprise Vault 9.x for File System Archiving
• Install and configure Enterprise Vault for File System Archiving in a Windows file server
• Describe File System Archiving architecture
• Manage client access to archived items and indexing
• Configure File System Archiving for a Netapp filer
• Configure File System Archiving for retention folders, file blocking and reporting
• Backup and restore Enterprise Vault
• Maintain file server targets for File System Archiving
• Troubleshoot File System Archiving issues
Target Audience: The course is designed primarily for system administrators responsible for installing, operating, integrating and monitoring the day‐to‐day performance of Enterprise Vault within their File System Archiving environments.
Prerequisites: Students must have a working knowledge of Windows with some system administration experience.
Note: This course can be arranged upon request in classroom‐based and virtual formats.
20
SYSTEMS
LEGAL DISCOVERY USING SYMANTEC ENTERPRISE VAULT 9 DISCOVERY ACCELERATOR 3 Days
Classroom‐based Virtual
VENUE DATE
In Mission Upon Request
Category:
ICT Infrastructure/Systems
Objectives: This course goes through the steps involved in setting up discovery searches and how to review, analyze, and ex‐port the search results using research folders and setting up marks and tags.
By the end of this course students will be able to:
• Define how Discovery Accelerator meets an organization Discovery demands
• Set up research folders to perform pro‐active investigation
• Use marks to indicate the status of an item
• Use tags to pose a question in a case
• Search, review, export and produce items
• Turn on and use Analytics, Automatic Categorization and Conversation View
• Run Discovery Accelerator reports
Target Audience: The course is designed for those who use Discovery Accelerator to search, review and prepare archived items in support of information requests.
Note: This course can be arranged upon request in classroom‐based and virtual formats.
21
SYSTEMS
UPGRADING TO SYMANTEC NETBACKUP 7.0 FOR UNIX AND WINDOWS 2 Days
Classroom‐based Virtual
VENUE DATE
In Mission Upon Request
Category:
ICT Infrastructure/Systems
Objectives: This course provides details about the new features of NetBackup 7.0 and covers how to install or upgrade, configure and administer NetBackup 7.0.
After attending this course students will be able to:
• Identify all features and changes that are new in NetBackup 7.0
• List available reference material locations for NetBackup 7.0
• Identify UNIX and Windows proliferation changes in NetBackup 7.0
• Upgrade an existing UNIX NetBackup 6.x installation to NetBackup 7.0
• Upgrade an existing Windows NetBackup 6.x installation to NetBackup 7.0
• Use the provided tool to validate the upgrade of the NetBackup relational databases to the new SA11 format
• Outline the layout of the new NetBackup 7.0 distribution DVDs
• Explain how UNIX packages have been consolidated in NetBackup 7.0
• Perform a new NetBackup 7.0 UNIX Master Server installation
• Perform a new NetBackup 7.0 Windows Media Server installation
• Summarize changes to the NetBackup 7.0 Agent for protection of Enterprise Vault 8.0
• Outline how NetBackup 7.0 protects Exchange 2010, including backing up database availability groups
• Summarize how NetBackup 7.0 protects different environments that use Hyper‐V virtual machines
• Explain how NetBackup 7.0 protects VMware environments using vStorage APIs
• Describe the purpose of OpsCenter in NetBackup 7.0 and its basic operations
Target Audience: This course is designed for Symantec customers with prior NetBackup experience who are tasked with supporting environments that are upgrading from NetBackup 6.x to NetBackup 7.0 on UNIX or Windows.
Prerequisites: Students attending this course should have completed one of the following course combinations or have equivalent working knowledge: NetBackup 6.0 – Core (TTE) and NetBackup 6.5 – Differences (TTE) or NetBackup 6.5 Administration Fundamentals I and II (SES)
22
SYSTEMS
SYMANTEC NETBACKUP 7.5 FOR WINDOWS: ADMINISTRATION 5 Days
Classroom‐based Virtual
Self‐pacedVENUE DATE
UNGSC‐B 1/10 – 5/10/2012
Category:
ICT Infrastructure/Systems
Objectives: This course provides the IT professional with instruction on the functionality of Symantec NetBackup 7.5 soft‐ware. This course covers the general principles of using NetBackup to develop and implement a storage management strategy.
Course agenda will include:
• Install, configure and operate NetBackup 7.5
• Manage NetBackup using the graphical interfaces, commands and scripts
• Provide service protection and recovery
• Use the NetBackup Activity Monitor, NetBackup reports and OpsCenter to monitor NetBackup activity
Target Audience: This course is designed for system administrators who are responsible for the installation, configuration, design, operation, monitoring and performance optimization of NetBackup.
Prerequisites: Students attending this course should be familiar with the administration and configuration of the platforms covered by the course.
Note: This course can be also arranged within mission area in classroom‐based, virtual and self‐paced formats.
SYSTEMS
COURSE 10747 ‐ ADMINISTERING MS SYSTEM CENTER 2012 CON‐FIGURATION MANAGER 5 Days
Classroom‐based Virtual
Self‐pacedVENUE DATE
RTCC-Entebbe 18/3 – 22/3/2013
Category:
ICT Infrastructure/Systems
Objectives: This 5‐day instructor‐led course provides students with the knowledge and skills to configure and manage a System Center 2012 Configuration Manager site and its associated site systems in the role of Configuration Manager Administrators.
After completing this course students will be able to perform the following tasks:
• Describe the System Center 2012 Configuration Manager feature set
• Discover and organize resources
• Manage the Configuration Manager client
• Manage inventory and software metering
• Query and report data
• Manage software deployments by using packages and programs
• Create and deploy applications
• Manage application deployment
• Deploy and manage software updates
• Implement System Center 2012 Endpoint Protection
• Deploy operating systems by using System Center 2012 Configuration Manager
• Manage Compliance Settings on devices
• Manage mobile devices
• Configure Wake On LAN, power management and Remote Control
Target Audience: This course is intended for system administrators who are responsible for configuring and managing one or more System Center 2012 Configuration Manager sites and all supporting systems.
Prerequisites: Students attending this course should have working knowledge of:
• Networking fundamentals, including TCP/IP, and Domain Name System (DNS)
• Active Directory principles and management
26
• Windows Server management including Windows Server 2008 and Windows Server 2008 R2
• Microsoft Windows client fundamentals
• Deployment, configuration and troubleshooting for Windows‐based personal computers
• Microsoft SQL Server 2008 including Reporting Services
• Basic Public Key Infrastructure (PKI concepts)
Note: This course can be also arranged within mission area in classroom‐based, virtual and self‐paced formats.
SYSTEMS
VMWARE VSPHERE: OPTIMIZE AND SCALE ‐ BETA [V5.0] 5 Days
Classroom‐based
VENUE DATE
UNGSC‐B 11/2 – 15/2/2013
Category:
ICT Infrastructure/Systems
Objectives: This training course teaches advanced skills for configuring and maintaining a highly available and scalable virtual infrastructure. The course is based on VMware vSphere® ESXi™ 5.0 and VMware® vCenter™ Server 5.0.
This course prepares the student for the VMware Certified Advanced Professional – Data Center Administration [V5] certification (VCAP5‐DCA).
Upon completion of this course students will be able to perform the following tasks:
• Configure and manage ESXi networking and storage for a large and sophisticated enterprise
• Manage changes to the vSphere environment
• Optimize the performance of all vSphere components
• Troubleshoot operational faults and identify their root causes
• Use VMware vSphere® ESXi™ Shell and VMware vSphere® Management Assistant to manage vSphere
• Use VMware vSphere® Auto Deploy to provision ESXi hosts
Target Audience: This course is designed for experienced system administrators involved in the setup of VMWare technology at the mission level.
Prerequisites: Required prerequisites include completion of VMware vSphere: Install, Configure, Manage [V5], VMware vSphere: What’s New [V5] and VMware vSphere: Fast Track [V5] training courses.
27
SYSTEMS
COURSE 6436B: DESIGNING WINDOWS SERVER 2008 ACTIVE DIRECTORY INFRASTRUCTURE AND SERVICES 5 Days
Classroom‐based
VENUE DATE
UNGSC‐B 6/5 – 10/5/2013
Category:
ICT Infrastructure/Systems
Objectives: During this 5‐day course, students will learn how to design an Active Directory infrastructure in the Windows Server 2008 and Windows Server 2008 R2 operating systems. Students will learn how to design Active Directory forests, domain infrastructure, sites and replication, administrative structures, Group Policy and Public Key Infra‐structures (PKIs). They will also learn how to design for security, high availability, disaster recovery and migrations.
After completing this course, students will be able to:
• Provide an overview of the lab scenario
• Create a design for the Active Directory Domain Services (AD DS) forest and forest trust deployment
• Design an AD DS domain and Domain Name Service (DNS) integration design
• Design AD DS sites and AD DS replication
• Create an AD DS domain controller deployment plan
• Create an AD DS domain administration design and partially implement the design
• Create an AD DS Group Policy design and implement some components of that design
• Design and implement AD DS security policies that meet security requirements
• Design and implement a PKI deployment by using Active Directory Certificate Services (AD CS)
• Design an Active Directory Rights Management Services (AD RMS) solution and deploy RMS for internal users
• Create and implement an Active Directory Light‐weight Directory Services (AD LDS) design
• Review and validate a Federated Web single sign‐on (SSO) deployment
• Design and implement a domain restructure
Target Audience: This course is intended for system administrators who will be involved in the migration to Windows Server 2008 Enterprise.
Prerequisites: Students should have attended the following training courses: • Course 6425C: Configuring and Troubleshooting Windows Server 2008 Active Di‐rectory Domain Services,
28
29
• Course 6426C: Configuring and Troubleshooting Identity and Access Solutions with Windows Server 2008 Active Directory and
• Course 6433A: Planning and Implementing Windows Server 2008 Servers or have equivalent knowledge.
Note: This course will be held in conjunction with Course 6425C: Configuring and Troubleshooting Win Server 2008 AD Domain Services.
SYSTEMS COURSE 6425C: CONFIGURING AND TROUBLESHOOTING WINDOWS SERVER 2008 ACTIVE DIRECTORY DOMAIN SERVICES 5 Days
Classroom‐based
VENUE DATE
UNGSC‐B 13/05 – 17/5/2013
Category:
ICT Infrastructure/Systems
Objectives: This five‐day instructor‐led course provides in‐depth knowledge on implementing, configuring, managing and troubleshooting Active Directory Domain Services (AD DS) in Windows Server 2008 and Windows Server 2008 R2 environments. It covers core AD DS concepts and functionality as well as implementing Group Policies, performing backup and restore and monitoring and troubleshooting Active Directory related issues.
After completing this course, students will be able to:
• Configure AD DS in their Windows Server 2008 and Windows server 2008 R2 environments.
• Describe the features and functionality of Active Directory Domain Services
• Perform secure and efficient administration of Active Directory
• Manage users and service accounts
• Manage groups
• Manage computer accounts
• Implement a Group Policy infrastructure
• Manage User Desktops with Group Policy
• Manage enterprise security and configuration by using Group Policy settings
• Secure administration
• Improve the security of authentication in an AD DS Domain
• Configure Domain Name System
• Administer AD DS domain controllers
• Manage sites and Active Directory Replication
• Monitor, maintain and back up directory Service to ensure Directory Service continuity
• Manage multiple domains and forests
Target Audience: This course is intended for system administrators involved in the implementation of Active Directory Domain Services in Windows Server 2008 environment.
30
31
Prerequisites: Students attending this course should have the following knowledge:
• Basic understanding of networking
• Intermediate understanding of network operating systems
• An awareness of security best practices
• Basic knowledge of server hardware
• Some experience creating objects in Active Directory
• Basic concepts of backup and recovery in a Windows Server environment
• A good knowledge of Windows Client operating systems such as Windows Vista or Windows 7
Note: This course will be held in conjunction with Course 6436B: Designing Win Server 2008 AD Infrastructure and Services.
32
ICT MANAGEMENT
GOVERNANCE TITLE VENUE DATE DURATION
ALTERNATE ENERGY WORKSHOP UNGSC‐B 10/12‐14/12/2012 5 Days
P ER SONAL DEVE LOPMENT TITLE VENUE DATE DURATION
ICTD MANAGEMENT CERTIFICATION PROGRAM To be advised To be advised To be advised
SUPERVISORY SKILLS FOR NEW CIT MANAGERS UNGSC‐B 25/2‐8/3/2013 10 Days
PRO J E C T MANAGEMENT TITLE VENUE DATE DURATION
PRINCE2 FOUNDATION In Mission Upon request 3 Days
PRINCE2 PRACTITIONER In Mission Upon request 2 Days
S ERV I C E MANAGEMENT TITLE VENUE DATE DURATION
ITIL FOUNDATION v3 In Mission Upon request 3 Days
ITIL v3 INTERMEDIATE LEVEL – SERVICE LIFECYCLE In Mission Upon request 5 Days each module
ITIL v3 INTERMEDIATE LEVEL – SERVICE CAPABILITY STREAMS In Mission Upon request 3 Days each module
GOVERNANCE
ALTERNATE ENERGY WORKSHOP 5 Days
Classroom‐based
VENUE DATE
UNGSC‐B 10/12 – 14/12/2012
Category:
ICT Management/Governance
Objectives: Scope of this workshop is to bring together those field staff members who have actively participated in the planning and procuring of Alternate Energy equipment to gather that knowledge and produce a common plan for procurement specifications and guidelines for standard installation.
During the workshop, an external trainer will guide the members along proven work practices and will provide instructions on analyzing requirements by use of calculations on current devices and those supplied by the missions in their submissions.
The workshop will cover the following points:
• Types of components used and their results (either positive or negative)
• Use of systems contracts
• Integration of components and lessons learnt
• Individual training conducted at mission level
• Anti theft and security measures used
• Problems with delivery schedules (dangerous goods etc)
• Storage of devices (on site and at warehouse)
Target Audience: This workshop is intended for ICT focal points, supervisors and/or installers involved in alternate energy and experienced in the purchasing and/or installation of this technology.
Prerequisites: Delegates should have knowledge and experience in planning and designing PV networks.
Note: Prior to the workshop, a survey/questionnaire will be distributed to gather as much information as possible on current systems in place. Staff attending the workshop will be required to prepare and submit a presentation covering set points.
33
PERSONAL DEVELOPMENT
ICTD MANAGEMENT CERTIFICATION PROGRAM Classroom‐based
VENUE DATE
To be advised To be advised
Category:
ICT Management/Personal Development
Objectives: The goal of this year‐long program is to provide current mid‐level CITS staff with guided opportunities in professional development to improve their leadership, managerial skills and competencies required to be considered for managerial positions.
The programme will provide participants with managerial knowledge aimed at:
• Increasing the understanding of their role within the organization
• Familiarising them with management tools from various disciplines while using critical thinking
• Providing them with the tools to develop staff capability and effective business strategy in order to enable them to work more effectively with their associates, colleagues and partners
• Improving their managerial work performance and their ability to handle daily work challenges
• Participants will also attend Prince2 Foundation and Prince2 Practitioner training courses and take final certification exams.
Target Audience: This course is designed for mid‐level CITS Staff in Field Missions who will eventually assume chief CITS position.
Prerequisites: Participants should have the following criteria:
• Grade Level FS‐5, FS‐6 or P‐3 (note that FS‐6 and P‐3 candidates will be given priority)
• At least three years experience within the UN
• Preferably with experience at three or more different Missions
• Experience at a supervisory level
• At least five years left before retirement
• Successful completion of Supervisory Skill for New ICT Managers training course
PERSONAL DEVELOPMENT
SUPERVISORY SKILLS FOR NEW CITS MANAGERS 10 Days
Classroom‐based
VENUE DATE
UNGSC‐B 25/2 – 8/3/2013
Category:
ICT Management/Personal Development
Objectives: The aim of this 10‐day training course is to provide Communications and Information Technology field staff new to the supervisory roles within CITS with the core and managerial competencies required to conduct their daily work as unit supervisors. It is also aimed at assisting them in transitioning from the technical to the managerial position.
The current program encompasses the following:
• People Management – 4‐day outsourced training aimed at developing the skills required to effectively manage people
• Competency‐based Performance Management ‐ 1 ½ ‐day in‐house workshop aimed at reinforcing the supervisors’ skills on the principles of performance management, i.e. work planning, on‐going feedback, mid‐point review, end‐of‐cycle appraisal against agreed expectations
• ICT Governance – 4 ½ days in‐house workshop conducted by an ICTD/DFS Officer and focusing on procurement process and ICT contract administration and management, CITS Assets management, results‐based budget, billing administration for CITS services, ICT infrastructure management and services in the field and ICTD governance and policies.
Target Audience: This training course is intended for Communications and Information Technology new supervisors of all field missions who are moving from technical to managerial positions within CITS.
35
PROJECT MANAGEMENT
PRINCE2 FOUNDATION 3 Days
Classroom‐based Virtual
Self‐paced
VENUE DATE
In Mission Upon request
Category:
ICT Management/Project Management
Objectives: The Prince2 Foundation qualification is the first of two PRINCE2 qualifications required to become a PRINCE2 Practitioner.
The PRINCE2 Foundation examination is aiming to measure whether a candidate would be able to act as an informed member of a project management team using the PRINCE2 methodology within a project environment supporting PRINCE2.
To this end they need to show they understand the principles and terminology of the method.
Specifically, candidates must be able to:
• Describe the purpose and major content of all roles, the eight components, the eight processes and the sub‐processes, and the techniques
• State which management products are input to and output from the eight processes
• State the main purpose and key contents of the major management products
• State the relationships between processes, deliverables, roles and the management dimensions of a project
Target Audience: This course is intended for field staff working in project environments.
Note: This training course can be arranged upon request within the mission area in classroom‐based, online and virtual formats.
36
PROJECT MANAGEMENT
PRINCE2 PRACTITIONER 2 Days
Classroom‐based Virtual
Self‐paced
VENUE DATE
In Mission Upon request
Category:
ICT Management/Project Management
Objectives: The Prince2 Practitioner is the second of the two PRINCE2 examinations students are required to pass to become a PRINCE2 Practitioner.
This PRINCE2 examination is aiming to measure whether a candidate would be able to apply PRINCE2 to the running and managing of a project within an environment supporting PRINCE2.
To this end they need to exhibit the competence required for the Foundation qualification, and show that they can apply and tune PRINCE2 to address the needs and problems of a specific project scenario.
Specifically, candidates must be able to:
• Produce detailed explanations of all processes, components and techniques, and worked examples of all PRINCE2 products as they might be applied to address the particular circumstances of a given project scenario
• Show they understand the relationships between processes, components, techniques and PRINCE2 products and can apply this understanding
• Demonstrate that they understand the reasons behind the processes, components and techniques of PRINCE2, and that they understand the principles underpinning these elements
• Demonstrate their ability to tune PRINCE2 to different project circumstances
Target Audience: This course is intended for CIT field managers and team members working in project environments.
Prerequisites: Participants attending this course should have passed the PRINCE2 Foundation exam.
Note: This training course can be arranged upon request within the mission area in classroom‐based, online and virtual formats.
37
SERVICE MANAGEMENT
ITIL FOUNDATION V3 3 Days
Classroom‐based Virtual
Self‐paced
VENUE DATE
In Mission Upon request
Category:
ICT Management/Service Management
Objectives: This course provides comprehensive first‐level training for field staff involved in the provision, support, and delivery of IT Services. It is a 3‐day training course leading to the v3 Foundation Certificate in IT Service Management. During the course, delegates will gain knowledge of best practice terminology, the structure and basic concepts of ITIL v3 Service Management.
The course syllabus will focus on the following topics:
• Service Management as a practice
• The service lifecycle
• Key concepts and definitions
• Key principles and models: service strategy; service design; service transition; service operation
• Functions
• Roles
• Technology and architecture
Target Audience: This course is intended for CIT staff holding support roles and who need a basic understanding of the ITIL frame‐work.
Note: This training course can be arranged upon request within the mission area in classroom‐based, online and virtual formats.
38
Category:
ITIL v3 INTERMEDIATE LEVEL – SERVICE LIFECYCLE 5 Days each module
Classroom‐based Virtual
Self‐paced
VENUE DATE
In Mission Upon request
ICT Management/Service Management
Objectives: The ITIL v3 Intermediate Lifecycle stream consists of five individual certifications or modules; each module covers an introduction to the Service Lifecycle, the principles, processes, functions and activities within that stage of the ITIL Service Management Lifecycle, along with technology and implementation considerations.
The Service Lifecycle modules are:
• Service Strategy
• Service Design
• Service Transition
• Service Operation
• Continual Service Improvement
At the end of each module participants are expected to take a final certification exam.
Target Audience: These courses are intended to those participants who need to get the knowledge, skills and competencies required to apply or manage the application of specific areas of ITIL Best Practice in a Service Management environment.
Prerequisites: Participants must hold the ITIL Foundation Certificate v3.
Note: Any of the modules mentioned above can be arranged upon request within the mission area in classroom‐based, online and virtual formats.
39
SERVICE MANAGEMENT
ITIL v3 INTERMEDIATE LEVEL – SERVICE CAPABILITY STREAMS 3 Days each module
Classroom‐based Virtual
Self‐paced
VENUE DATE
In Mission Upon request
Category:
ICT Management/Service Management
Objectives: The ITIL Capability stream consists of four individual certifications which focus on a series of clustered process activities, their execution and use throughout specific phases of the ITIL Service Lifecycle. Each module of the Capability series covers an introduction to the Service Lifecycle and provides extensive detailed coverage of the processes, functions, roles and responsibilities and activities pertaining to the specific cluster grouping along with technology and implementation considerations.
The Service Capability modules are:
• Service Offerings and Agreements
• Release Control and Validation
• Operational Support and Analysis
• Planning, Protection and Optimization
At the end of each module participants are expected to take a final certification exam.
Target Audience: These courses are intended to those participants who need to get the knowledge, skills and competencies required to apply or manage the application of specific areas of ITIL Best Practice in a Service Management environment.
Prerequisites: Participants must hold the ITIL Foundation Certificate v3.
Note: Any of the modules mentioned above can be arranged upon request within the mission area in classroom‐based, online and virtual formats.
40
41
ICT SECURITY
NETWORK S E CUR I T Y TITLE VENUE DATE DURATION
HACKER TECHNIQUES AND EXPLOITATION In Mission Upon Request 5 Days
FUNDAMENTALS OF VIRTUALIZATION SECURITY UNSB‐V 26/11 ‐ 27/11/2012 2 Days
CLOUD SECURITY UNSB‐V 28/11 ‐ 30/11/2012 3 Days
CISCO FIREWALL ‐ DEPLOYING CISCO ASA FIREWALL SOLUTIONS v2.0 UNGSC‐B 28/01 ‐ 1/2/2013 5 Days
VULNERABILITY ASSESSMENT UNGSC‐B To be advised 5 Days
CISCO SECURE ‐ SECURING NETWORKS WITH CISCO ROUTERS AND SWITCHES UNGSC‐B 3/6 ‐ 7/6/2013 5 Days
CHECK POINT SECURITY ADMINISTRATOR UNGSC‐B Cancelled 3 Days
S E CUR I T Y MANAGEMENT TITLE VENUE DATE DURATION
IMPLEMENTING AND AUDITING THE TWENTY CRITICAL SECURITY CONTROLS In Mission Upon Request 5 Days
LOG MANAGEMENT In Mission Upon Request 5 Days
S E CUR I T Y S Y S T EMS TITLE VENUE DATE DURATION
SYMANTEC ENDPOINT PROTECTION 11.0 MR4: ADMINISTRATION In Mission Upon Request 5 Days
SYMANTEC ENDPOINT PROTECTION 12.1: ADMINISTRATION In Mission Upon Request 5 Days
SYMANTEC NETWORK ACCESS CONTROL 11.x In Mission Upon Request 2 Days
SYMANTEC ENDPOINT PROTECTION 11.0 MR4: INSTALL, CONFIGURE & DEPLOY In Mission Upon Request 3 Days
SYMANTEC ENDPOINT PROTECTION 11.0 MR4: MANAGE AND ADMINISTER In Mission Upon Request 2 Days
SYMANTEC ENDOPINT PROTECTION 11.0 MR4: MAINTAIN AND TROUBLESHOOT In Mission Upon Request 2 Days
NETWORK SECURITY
HACKER TECHNIQUES AND EXPLOITATION 5 Days
Classroom‐based
VENUE DATE
In Mission Upon request
Category:
ICT Security /Network Security
Objectives: This intensive course will help students to understand attackers' tactics and strategies in detail and will give them hands‐on experience in finding vulnerabilities and discovering intrusions. It will also equip them with a comprehensive incident handling plan.
The course will cover the following topics:
• Introduction to ethical hacking problem definition
• Service Offerings and Agreements
• Hacking laws
• Foot‐printing visiting reconnaissance
• Google hacking
• Scanning and scanning definition
• Trojans and backdoors effect on business
• Sniffers definition
• Web application vulnerabilities and setup
• Web‐based password cracking techniques authentication
• Hacking wireless network
• Cryptography
Target Audience: The course is intended for IT Security Officers and/or system administrators who are on the front lines defending their systems and responding to attacks.
Note: Any of the modules mentioned above can be arranged upon request within the mission area.
NETWORK SECURITY 42
Category:
FUNDAMENTALS OF VIRTUALIZATION SECURITY 2 Days
Classroom‐based
VENUE DATE
UNSB-V 26/11 – 27/11/2012
ICT Security /Network Security
Objectives: During this course attendees will learn about virtualization security fundamentals with an in‐depth treatment of today's most pressing virtualization security concerns: known attacks and threats, theoretical at‐tack methods and numerous real‐world examples. They will also learn every aspect of locking down ESX and ESXi servers and the vCenter management server, as well as best practices for securing the virtual machine guests that reside on ESX and ESXi platforms; virtualization networking techniques indetail; virtual switching and routing considerations, network access controls and layer 2 policies, as well as how to build virtual DMZs and integrate with existing network infrastructure. The latest vSphere technologies will be covered, including Distributed Virtual Switches, vShield Zones, and Host Profiles. Finally, attendees will learn essential strategies for securing storage interfaces to vSphere, as well as best practices for backup, recovery and redundancy.
Target Audience: The course is intended for field Network/Systems administrators who need to understand how to architect, secure and maintain virtualization technologies.
Note: This course will be held in conjunction with Cloud Security training course. This course can be also arranged upon request at the Mission level.
43
NETWORK SECURITY
CLOUD SECURITY 3 Days
Classroom‐based
VENUE DATE
UNSB-V 28/11 – 30/11/2012
Category:
ICT Security /Network Security
Objectives: This course will focus on how to apply security in a fully hybrid environment, which includes public cloud, private cloud and stand alone servers.
It will look at what legacy security techniques still work as well as which ones require disruptive changes. It will also analyze how to properly assess risks as well as the proper tools needed to leverage hybrid cloud in a secure fashion.
Upon completion of the course, students will be able to meet these overall objectives:
• Introduction and essentials of Cloud computing • Introduction to Cloud Security
• Securing Cloud Environment
• Cloud Governance, Policies & Risks
• Compliance and legal considerations
• Operating System and Network Security
• Audit and assessment for the cloud
• Data security in the cloud
• Identity and Access Management (IAM
• Intrusion detection and incident response
• Compartmentalizing access to protect data confidentiality
• Leveraging provider‐specific security options
• Implementing a plan to sustain availability
• Disaster Recovery and Business Continuity Planning (DR/BCP) in the cloud
Target Audience: The course is intended for field network/systems administrators who need to understand how to architect, secure and maintain virtualization technologies.
45
Note: This course will be held in conjunction with Virtualization Security Fundamentals training course. This course can be also arranged upon request at the Mission level.
NETWORK SECURITY
CISCO FIREWALL ‐ DEPLOYING CISCO ASA FIREWALL SOLUTIONS V2.0 5 Days
Classroom‐based
VENUE DATE
UNGSC-B 28/1 – 1/2/2013
Category:
ICT Security /Network Security
Objectives: This course is part of the curriculum path leading to the Cisco Certified Network Professional Security (CCNP Se‐curity) certification. It is a 5‐day instructor‐led course aimed at providing network security engineers with the knowledge and skills that are needed to implement and maintain perimeter solutions based on Cisco ASA security appliances.
At the end of the course, students will be able to reduce risk to their IT infrastructure and applications using Cisco ASA security appliance features and provide detailed operations support for the ASA appliance.
They will be able to meet these overall objectives: • Evaluate the basic firewall technology, features, hardware models and licensing options of the Cisco ASA security
appliance
• Implement and troubleshoot basic Cisco ASA security appliance connectivity and device management plane fea‐tures
• Configure and verify Cisco ASA security appliance network integration
• Configure and verify Cisco ASA security appliance policy
Target Audience: This course is intended for network security technicians who are required to implement and maintain Cisco ASA Firewalls.
Prerequisites: Students in this course should have attended the ICND training courses or have equivalent knowledge.
Note: This course will be held in conjunction with Vulnerability Assessment training course.
NETWORK SECURITY
VULNERABILITY ASSESSMENT 5 Days
Classroom‐based
VENUE DATE
UNGSC-B To be advised
Category:
ICT Security /Network Security
Objectives: This course will focus on vulnerability assessments and hacking techniques. It will provide hands‐on knowledge to detect vulnerabilities before ICT resources are attacked and compromised. The course will teach how to configure and use vulnerability scanners to detect weaknesses and prevent network exploitation. Acquired knowledge will enable participants to assess the risk to their ICT operations from an array of vulnerabilities and to minimize exposure to security incidents.
Upon completing this course, participants will be able to: • Detect and respond to vulnerabilities that put your organization at risk using scanners
• Employ real‐world exploits and evaluate their effect on your systems
• Configure vulnerability scanners
• Analyze the results of vulnerability scans
• Assess vulnerability alerts and advisories
• Establish a strategy for vulnerability management
Target Audience: This course is designed for ICT Security Operational Functions and ICT Security Tactical Functions.
Prerequisites: Participants must have knowledge and experience with operational aspects of network and systems security.
Note: This course will be held in conjunction with Cisco Firewall ‐ Deploying Cisco ASA Firewall Solutions v2.0 training course.
47
NETWORK SECURITY
CISCO SECURE ‐ SECURING NETWORKS WITH CISCO ROUTERS AND SWITCHES 5 Days
Classroom‐based
VENUE DATE
UNGSC-B 3/6 – 7/6/2013
Category:
ICT Security /Network Security
Objectives: This course aims at providing network security engineers with the knowledge and skills needed to secure Cisco IOS Software router and switch‐based networks and provide security services based on Cisco IOS Software.
Upon completing this course, students will be able to meet these overall objectives:
• Implement and maintain Cisco IOS Software infrastructure protection controls in a Cisco router and switch‐based network infrastructure
• Implement and maintain Cisco IOS Software threat control and containment technologies in a Cisco router‐based perimeter infrastructure
• Implement and maintain Cisco IOS Software VPN technologies in a Cisco router‐based WAN
• Implement and maintain Cisco IOS Software remote access VPN technologies in a Cisco router‐based remote access solution
The course focuses on the implementation and troubleshooting aspects of the lifecycle services approach, adding some elements of the design phase.
Target Audience: This course is intended for ICT technicians involved in IT security operational functions who want to ensure security of mission network using IOS devices.
Prerequisites: Participants should possess skills and knowledge equivalent to those learned as part of the CCNA and CCNA Security certification programs.
Note: This course will be held in conjunction with Check Point Security Administrator Core training course.
48
NETWORK SECURITY
CHECK POINT SECURITY ADMINISTRATOR 3 Days
Classroom‐based
VENUE DATE
UNGSC-B Cancelled
Category:
ICT Security /Network Security
Objectives: This course provides an understanding of the basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades. During this course students will configure a Security Policy and learn about managing and monitoring a secure network. In addition, they will upgrade and configure a Security Gateway to implement a virtual private network for both internal and external remote users.
Course agenda will include the following topics: • Introduction to Check Point Technology
• Deployment Platforms
• Introduction to the Security Policy
• Monitoring Traffic and Connections
• Using Smart Update
• User Management and Authentication
• Identity Awareness
• Introduction to Check Point VPNs
Target Audience: This course is intended for technicians who support, install, deploy or administer Check Point Software.
Prerequisites: Students attending this course should have general knowledge of TCP/IP and working knowledge of Windows, UNIX, network technology and internet.
Note: This course will be held in conjunction with Cisco Secure ‐ Securing Networks with Cisco Routers and Switches training course.
49
SECURITY MANAGEMENT
IMPLEMENTING AND AUDITING THE TWENTY CRITICAL SECURITY CONTROLS 5 days
Classroom‐based
VENUE DATE
In Mission Upon request
Category:
ICT Security /Security Management
Objectives: This intense technical course is designed for security officers and/or experienced system administrators who need to keep abreast of information security issues and developments. Students should better understand how to create a strategy for successfully defending their data, implement controls to prevent their data from being compromised and audit their systems to ensure compliance with the standard. This course helps participants master specific, proven techniques and tools needed to implement and audit the Top Twenty Most Critical Security Controls. These Top 20 Security Controls, listed below, are rapidly becoming accepted as the highest priority list of what must be done and proven before anything else at nearly all‐serious and sensitive organizations. Introduction to Check Point Technology:
• Introduction to security controls
• The process
• Preventing physical intrusions
• Laptop and PC configurations
• SIEM
• IDS/IPS
• Web content protection and filtering
• Email protection and filtering
• VPN security
• Endpoint security
• Penetration test and red team exercises
• Implementing identity and access management
• Creating backups, BCP and DRP
• Compliance
• Security metrics
• Incident responses
• Creating and audit
51
• Conclusions
Target Audience: Course is intended for mission ICT security Officers and/or focal points in the field, as well as for systems and network administrators.
Prerequisites: Students attending this course should have general knowledge of TCP/IP and working knowledge of Windows, UNIX, network technology and internet.
Note: This course can be arranged upon request at the Mission level.
SECURITY MANAGEMENT
LOG MANAGEMENT 2 Days
Classroom‐based
VENUE DATE
In Mission Upon request
Category:
ICT Security /Security Management
Objectives: Objective of the course is to provide fundamentals and hands‐on/practical knowledge on setting up security logs, log analysis as part of both day‐to‐day technical monitoring and incident response activities, and their overall management. Participants will learn a phased approach to implementing a company‐wide log management program and the necessary skills required to deal with various log types as well as with specific log‐related tasks that need to be done on a daily, weekly and monthly basis in regards to log review and monitoring.
They will also learn to leverage logs for critical tasks related to incident response, forensics and operational monitoring and how to utilize various log types in the frenzy of an incident investigation.
Course agenda will include:
• Introduction to Check Point Technology
• Log management terminology
• Determining organizational requirements
• List/mapping of log generating devices
• System sizing
• Key differentiators
• Complying with laws and regulations
• How to use log files
• Implementing centralized log management systems
• The log management market
• Challenges with log management
• Traditional approach to computer management
• Reacting to events
• Examples of log analysis from several log sources
• Case studies from real business cases
52
53
• Forensics
• Reporting
• Log management in the cloud
• Considerations for in‐house log management
Target Audience: This course is intended for technicians who support, install, deploy or administer Check Point Software.
Prerequisites: The course is intended for ICT security Officers and/or security focal points in the field as well as systems and network administrators.
Note: This course can be arranged upon request at the Mission level.
SECURITY SYSTEMS
SYMANTEC ENDPOINT PROTECTION 11.0 MR4: ADMINISTRATION 5 Days
Classroom‐based Virtual
VENUE DATE
In Mission Upon request
Category:
ICT Security /Security Systems
Objectives: The Symantec Endpoint Protection 11.0 MR4: Administration course will provide the participants with the knowledge on how to design, deploy, install, configure, and monitor Symantec Endpoint Protection as well as how to create and implement client firewall, intrusion prevention and behavioral protection policies.
Target Audience: This course is for network and systems administrators who are involved in the day‐to‐day management of Symantec Endpoint Protection and are responsible for troubleshooting and tuning the performance of this product in their mission environment.
Prerequisites: Students should have working knowledge of TCP/IP networking as well as of Microsoft Windows 2000/XP/2003 operating systems.
Note: This course can be arranged upon request in classroom‐based and virtual.
SECURITY SYSTEMS
SYMANTEC ENDPOINT PROTECTION 12.1: ADMINISTRATION 5 Days
Classroom‐based Virtual
Self‐paced
VENUE DATE
In Mission Upon request
Category:
ICT Security /Security Systems
Objectives: This class covers how to design, deploy, install, configure, manage and monitor Symantec Endpoint Protection 12.1.
Students will learn how to create and implement the client firewall, intrusion prevention, application and device control, and behavioral protection policies that guard the enterprise from viruses and hackers. In addition, students will learn how to perform server and database management, expand the management environment, use virtualization features for virtual clients and interface the Symantec Endpoint Protection Manager with Protection Center.
By the completion of this course, students will be able to:
• Describe Symantec Endpoint Protection products, components, dependencies and system hierarchy
• Install and configure Symantec Endpoint Protection management and client components
• Deploy Symantec Endpoint Protection clients
• Manage the client user interface
• Manage product content updates
• Design a Symantec Endpoint Protection environment
• Manage Virus and Spyware Protection policies
• Manage SONAR scans
• Manage Firewall and Intrusion Prevention policies
• Manage Application and Device Control policies
• Manage virtualized clients
• Configure replication and load balancing
• Monitor and maintain the Symantec Endpoint Protection environment
Target Audience: This course is for network and systems administrators who are responsible for the installation, configuration and day‐to‐day management of Symantec Endpoint Protection in their mission network environment.
56
Prerequisites: Students should have working knowledge of TCP/IP networking as well as of Microsoft Windows 2000/XP/2003 operating systems.
Note: This course can be arranged upon request within the mission area in classroom‐based, virtual and self‐paced formats.
SECURITY SYSTEMS
SYMANTEC NETWORK ACCESS CONTROL 11.X 2 Days
Classroom‐based Virtual
VENUE DATE
In Mission Upon request
Category:
ICT Security /Security Systems
Objectives: This class covers how to design, deploy, install, configure and monitor Symantec Network Access Control.
Students will also learn how to manage enforcer appliances and endpoint enforcement clients.
By the end of this course, students should be able to:
• Describe the Symantec Network Access Control (SNAC) technologies
• Outline the steps to install the SNAC components
• Define how to create and apply Host Integrity (HI) policies
• Describe the available SNAC enforcers
• Outline the steps to configure and manage SNAC enforcers
• Describe how to monitor and maintain the SNAC environment
Target Audience: This course is for network and systems security administrators involved in the installation, configuration and day‐to‐day management of Symantec Network Access Control in mission network environment.
Prerequisites: Students attending this course should have working knowledge of advanced computer terminology, including TCP/IP networking terms and Internet terms, an administrator‐level knowledge of Microsoft Windows 2000/XP/2003 operating systems and in‐depth knowledge of networking and the OSI model.
Note: This course can be arranged upon request within mission area in classroom‐based and virtual formats.
SECURITY SYSTEMS
SYMANTEC ENDPOINT PROTECTION 11.0 MR4: INSTALL, CONFIGURE & DEPLOY 3 Days
Classroom‐based Virtual
VENUE DATE
In Mission Upon request
Category:
ICT Security /Security Systems
Objectives: This class covers how to design, deploy, install, configure and monitor Symantec Endpoint Protection.
Students will also learn how to create and implement client firewall, intrusion prevention and behavioral protection policies that guard the enterprise from viruses, hackers and spam. In addition, they will learn how to troubleshoot Symantec Endpoint Protection managers and clients.
By the completion of this course, students will be able to:
• Describe Symantec Endpoint Protection products, components, product dependencies and the system hierarchy
• Install and configure Symantec Endpoint Protection management and client components
• Deploy Symantec Endpoint Protection clients
• Manage the client UI
• Manage antivirus and antispyware policies
• Configure TruScan proactive threat scans
• Design a Symantec Endpoint Protection environment
Target Audience: This course is designed for the network and systems security administrators tasked with architecting, implementing and monitoring antivirus, antispyware and client firewall solutions.
Prerequisites: Students should have working knowledge of advanced computer terminology, including TCP/IP networking terms and Internet terms, and an administrator‐level knowledge of Microsoft Windows 2000/XP/2003 operating systems.
Note: This course can be arranged upon request within mission area in classroom‐based and virtual formats.
SECURITY SYSTEMS
SYMANTEC ENDPOINT PROTECTION 11.0 MR4: MANAGE AND ADMINISTER 2 Days
Classroom‐based Virtual
VENUE DATE
In Mission Upon request
Category:
ICT Security /Security Systems
Objectives: This class covers how to monitor Symantec Endpoint Protection and implement disaster recovery procedures.
In addition, students will learn how to configure application and device control, add additional protection, perform server and database management and expand the management environment.
By the completion of this course, students will be able to:
• Monitor and maintain the Symantec Endpoint Protection environment
• Configure firewall and intrusion prevention policies
• Customize network threat protection
• Manage the Intrusion Prevention System
• Add additional protection components
• Perform server and database management
Target Audience: This course is designed for the network and system administrators tasked with architecting, implementing and monitoring a client firewall and intrusion prevention system (IPS).
Prerequisites: Students should have working knowledge of advanced computer terminology, including TCP/IP networking terms and Internet terms, and an administrator‐level knowledge of Microsoft Windows 2000/XP/2003 operating systems.
Note: This course can be arranged upon request in classroom‐based and virtual formats.
SECURITY SYSTEMS
SYMANTEC ENDOPINT PROTECTION 11.0 MR4: MAINTAIN AND TROUBLESHOOT 2 Days
Classroom‐based Virtual
VENUE DATE
In Mission Upon request
Category:
ICT Security /Security Systems
Objectives: This class covers ongoing maintenance and troubleshooting from an administrative perspective, including advanced configuration, external reporting, external logging and product maintenance.
By the completion of this course, students will be able to:
• Describe Symantec Endpoint Protection component communications
• Configure replication partners
• Perform advanced database management
• Recover from a SEPM or database failure
• Configure the SEPM for failover and load balancing
• Perform advanced client deployment and client management
• Secure client communications
• Use client debug tools to analyze client log
Target Audience: This course is designed for network and system security administrators tasked with maintaining and troubleshooting a Symantec Endpoint Protection environment.
Prerequisites: Students should have attended the Symantec Endpoint Protection 11.0 MR4: Install, Configure, and Deploy and Symantec Endpoint Protection 11.0: Manage and Administer training courses.
They should also have working knowledge of advanced computer terminology, including TCP/IP networking terms and Internet terms, and administrator‐level knowledge of Microsoft Windows 2000/XP/2003 operating systems.
Note: This course can be arranged upon request within mission area in classroom‐based and virtual formats.