Course Overview

Managing Industrial Networks for Manufacturing with Cisco Technologies (IMINS2024) is a lab-intensive course, which helps you with the skills required to successfully implement and troubleshoot the most common industry standard protocols while leveraging best practices needed in security and Wireless technologies for today’s industrial networks. The IMINS2024 course helps plant administrators, control system engineers and traditional network engineers in the manufacturing, process control, and oil and gas industries, who will be involved with the convergence of IT and Industrial networks.

This course is job-role specific and enables you to achieve competency and skills to configure, maintain, and troubleshoot industry-standard network protocols as well as wireless and security technologies to ensure that current infrastructures are maximized while developing a converged platform for flexibility to support future business outcomes. Students will be exposed to multiple industrial network technologies as well as products from Cisco and other industrial suppliers.

Virtual Learning

This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins.

Course Objectives

Upon completing this course, the learner will be able to meet these overall objectives:

  • Upon completing this course, you will be able to meet these objectives:
  • Understand the functions of the OSI Layers and TCP/IP Model
  • Recognize the differences between Enterprise and Industrial Networks
  • Troubleshoot common issues found in Layers 1, 2, 3 of the OSI Model
  • Describe the functions and components of Ethernet/IP Protocols
  • Configure and troubleshoot CIP on Cisco
  • Describe the functions and components of the PROFINET protocol
  • Configure PROFINET Protocols on Cisco Industrial Ethernet Devices
  • Troubleshoot common PROFINET Issues
  • Identify common network threats and resolutions and configure basic security components (Access Lists and AAA Features)
  • Configure a wireless network within an industrial environment

Course Content

Module 1: Industrial Networking Concepts and Components

  • Contrasting Enterprise and Industrial Environments
  • Configuration Tools for Industrial Ethernet Switches
  • Exploring Layer 2 Considerations
  • Layer 2 Resiliency Using Spanning-tree Protocol
  • Layer 2 Resiliency Considerations
  • Layer 2 Multicast Control and QoS
  • Exploring Layer 3 Considerations

Module 2: General Troubleshooting Issues

  • Troubleshooting Methodologies
  • Troubleshooting Layer 1
  • Troubleshooting Layer 2 Issues
  • Troubleshooting Layer 3 Issues

Module 3: Ethernet/IP

  • Exploring Ethernet/IP Communications
  • Exploring Hardware Capabilities
  • Exploring CIP Sync, CIP Motion, and CIP Safety
  • Exploring Embedded Switch Technology

Module 4: Troubleshooting EtherNet/IP

  • Identifying Common EtherNet/IP Issues
  • EtherNet/IP Troubleshooting Methods and Tools

Module 5: PROFINET

  • Describe PROFINET Functionality and Connection Method
  • Describing Basic PROFINET Devices

Module 6: Configuring PROFINET

  • Enabling and Prioritizing PROFINET at L2
  • Integrating Cisco Industrial Ethernet Switches

Module 7: Troubleshooting PROFINET

  • Identifying PROFINET Troubleshooting Methods
  • Exploring PROFINET Troubleshooting Tools

Module 8: Exploring Security Concerns

  • Overview Of Defense-in-Depth Strategy
  • Controlling Access and Network Traffic

Module 9: 802.11 Industrial Ethernet Wireless Networking

  • Understanding 802.11 Networks
  • Industrial WLAN Design Considerations

Lab Outline:

Labs are designed to assure learners a whole practical experience, through the following practical activities:

  • Connecting to the remote Lab environment
  • Configuring 802.1q Trunks
  • Configuring and Applying Custom Smartports Macros
  • Configuring and Applying EtherChannel
  • Configuring Resilient Ethernet Protocol
  • Configuring Resilient Ethernet Protocol Features
  • Configuring & Verifying Storm Control
  • Verify IP IGMP Snooping
  • Configure QoS settings
  • Using IOS Troubleshooting Tools
  • Troubleshooting Layer 2 Endpoint Device Connectivity
  • Troubleshooting Layer 2 Inter-Switch Connectivity
  • Troubleshooting Broken REP Segment
  • Troubleshooting Layer 3
  • Perform a Packet Capture
  • Troubleshoot Network Issues
  • Configure CIP on Industrial Switches
  • Troubleshooting EtherNet/IP Communication Issues
  • Configuring PROFINET Support
  • Troubleshoot PROFINET Communication Issues
  • Configure Port Security Mechanisms
  • Configure AAA Authentication using Cisco ISE and 802.1x

Course Overview

The Implementing Cisco Enterprise Wireless Networks course gives you the knowledge and skills needed to implement a secure wireless network infrastructure and troubleshoot any related issues. You’ll learn how to implement and secure a wireless network infrastructure and use Cisco Identity Service Engine (ISE), Cisco Prime Infrastructure (PI), Cisco DNA Center, Cisco Spaces and Cisco Connect Mobile Experience to monitor and troubleshoot network issues.

The course provides hands-on labs to reinforce concepts including deploying Cisco Catalyst 9800 Wireless Controller Release IOS XE Bengaluru 17.6.3, Cisco Digital Network Architecture (DNA) Center Release 2.3.3, Cisco Prime Infrastructure Release 3.5, Cisco Spaces, Cisco CMX Release 10.5 and Cisco Identity Services Engine (ISE) Release 3.0.

This course also helps you prepare to take the Implementing Cisco Enterprise Wireless Networks (300-430 ENWLSI) exam, which is part of the CCNP Enterprise certification. Passing the exam will also provide you with the Cisco Certified Specialist – Enterprise Wireless Implementation certification.

Course Objectives

After completing this course you should be able to:

  • Explain how to secure the wireless network infrastructure
  • Describe how to monitor and troubleshoot a wireless network
  • Explain how to monitor wireless networks with Cisco Prime Infrastructure
  • Explain how to observe wireless network with Cisco DNA Center
  • Implement 802.1x authentication
  • Configure FlexConnect
  • Implement guest access
  • Describe how to monitor and troubleshoot client connectivity
  • Describe how to implement QoS in wireless networks
  • Implement Cisco AVC in wireless networks
  • Implement multicast services
  • Explain the QoS troubleshooting process
  • Describe how to deploy Cisco Spaces and Cisco CMX
  • Explain how to implement location services
  • Describe how to monitor a wireless network with Cisco Spaces and Cisco CMX

Course Content

Secure the Wireless Network Infrastructure

  • Device Administration
  • Security Best Practices for Administrative Access to Cisco WLC
  • TACACS+ Overview
  • Cisco WLC Configuration for TACACS+
  • Role-Based Access Control on Cisco ISE
  • AP Configuration for Management
  • 802.1X Authentication
  • AP Configuration for 802.1X Authentication
  • Cisco ISE Configuration for AP 802.1X Authentication 

Monitor and Troubleshoot Wireless Network

  • Defining Network Troubleshooting Techniques
  • Structured Troubleshooting Methodologies
  • Troubleshooting Acces Point Join Issues
  • Troubleshooting CAPWAP Access Point Discovery Issues
  • Troubleshooting CAPWAP Access Point DTLS Issues
  • Troubleshooting CAPWAP Access Point Join Issues
  • Tools for Troubleshooting Access Point Issues
  • Monitoring Wireless Network for Rogue Devices
  • Monitoring and Managing RF Interferers on Cisco WLC

Monitor Wireless Networks with Cisco Prime Infrastructure

  • Cisco WLC Configuration for Cisco Prime Infrastructure
  • Add New Devices to Cisco Prime Infrastructure
  • Add Access Points to Maps
  • Monitor Wireless Clients
  • Reports in Cisco Prime Infrastructure
  • Enhanced Client Information with Cisco ISE
  • Location Details with Cisco CMX
  • Monitor Wireless Networks for Rogue Devices with Cisco Prime Infrastructure
  • Monitor and Manage RF Interferers on Cisco Prime Infrastructure

Monitor Wirless Network with Cisco DNA Center

  • Adding Devices to Cisco DNA Center
  • Adding Access Points to Maps
  • Monitoring Wireless Clients
  • Enhanced Client Information with Cisco ISE
  • Location Details with Cisco Spaces or Cisco CMX
  • Troubleshooting Access Point and WLC Issues with Cisco DNA Center Assurance
  • Enhanced Network Insights with Cisco AI Network Analytics
  • Reports in Cisco DNA Center
  • Monitoring the Wireless Network for Rogue Devices with Cisco DNA Center
  • Monitoring Radio Frequency Interferers on Cisco DNA Center

Implementing Cisco 802.1X Authentication

  • IEEE 802.1X Overview
  • AAA-Based Wireless Security on Cisco WLC
  • AAA-Based Wireless Security on Cisco ISE
  • WLAN for 802.1X on Cisco WLC
  • Wireless Client for 802.1X Authentication
  • AAA Override
  • AAA Override on Cisco WLC
  • AAA Override on Cisco ISE

Configure Cisco FlexConnect

  • Cisco FlexConnect Overview
  • Cisco FlexConnect Configuration on Cisco WLC
  • Cisco FlexConnect Authentication Configuration
  • Cisco FlexConnect Identity-Based Networking
  • Split Tunneling Configuration for Cisco FlexConnect
  • OfficeExtend Configuration

Implement Guest Access

  • Guest Services in the Wireless Network
  • Defining Guest Users
  • Central Web Authentication
  • Cisco WLC Configuration for Centralized Web Authentication
  • Cisco ISE Configuration for Centralized Web Authentication
  • BYOD Overview
  • BYOD Device Onboarding
  • Cisco ISE Configuration for BYOD

Monitor and Troubleshoot Client Connectivity

  • Troubleshooting Client Connectivity
  • Troubleshooting Client Authentication Issues
  • Troubleshooting Client Connectivity on Cisco WLC
  • Tools for Troubleshooting Client Connectivity on Cisco WLC
  • Issues That Affect Client Performance
  • Wireless Coverage and Capacity
  • Enhancing Client Performance
  • Troubleshooting Client Throughput and Data Rate Issues

Implement QoS in Wireless Network

  • QoS in Wirless Networks
  • Traffic Classification and Marking
  • Congestion in the Wireless World
  • IEEE 802.11 QoS Fundamentals
  • Cisco WLC Configuration to Support Voice Traffic
  • Wireless Utilization Optimization with Cisco Air Time Fairness
  • Wireless Utilization Optimization with QoS Profiles
  • Wireless Utilization Optimization with Cisco Fastlane

Implement Cisco AVC in Wireless Network

  • Application Visibility and Control
  • Cisco AVC on Cisco WLC
  • Cisco AVC Configuration on Cisco WLC

Implement Multicast Services

  • Multicast Services on Cisco WLC
  • Multicast Forwarding on Cisco WLC
  • Multicast Configuration on Cisco WLC
  • Multicast DNS Service
  • mDNS Configuration
  • Cisco DNA Center Service for Bonjour
  • Cisco Media Stream
  • Cisco Media Stream Configuration

Troubleshoot QoS

  • QoS Issues in the Wireless Network
  • Qos Verification and Troubleshooting on Cisco WLC
  • Issue Identification with Cisco AVC
  • Cisco AVC Data in Cisco DNA Center
  • mDNS Verification and Troubleshooting on Cisco WLC
  • Media Stream Verification and Troubleshooting on Cisco WLC

Deploy Cisco Spaces and Cisco CMX

  • Location Services Overview
  • Location Services Design
  • Deploying Cisco Spaces
  • Integrating Cisco Spaces with Cisco DNA Center
  • Deploying Cisco CMX
  • Integrating Cisco CMX with Cisco Prime Infrastructure
  • Integrating Cisco CMX with Cisco DNA Center
  • Cisco Hyperlocation Overview
  • Deploying Cisco Hyperlocation
  • Configuring Cisco Hyperlocation

Implement Location Services

  • Detect and Locate Services in Cisco Spaces
  • Prepare Maps for Location Services in Cisco DNA Center
  • Detect and Locate Services on Cisco CMX
  • Analytics Services in Cisco Spaces
  • Analytics on Cisco CMX
  • Presence Services on Cisco CMX
  • Guest Services Implementation in Cisco Spaces
  • Guest Services Configuration in Cisco Spaces
  • Guest Services Implementation with Facebook on Cisco CMX

Monitor Wireless Network with Cisco Spaces and Cisco CMX

  • Monitoring and Detecting Wireless Clients with Cisco Spaces
  • Monitoring and Detecting Wireless Clients with Cisco CMX
  • Monitoring and Locating Rogue Devices and Interferers with Cisco Spaces
  • Monitoring and Locating Rogue Devices and Interferers with Cisco CMX
  • Running Analytics on Wireless Clients with Cisco Spaces
  • Running Analytics on Wireless Clients with Cisco CMX
  • Troubleshooting Location Accuracy

Labs

  • Discovery Lab 1: Lab Familiarization (Base Learning Lab)
  • Discovery Lab 2: Configure Secure Management Access for WLCs and APs
  • Discovery Lab 3: Capture a Successful AP Authentication
  • Discovery Lab 4: Network Monitoring with Cisco Prime Infrastructure
  • Discovery Lab 5: Add Network Devices to Cisco DNA Center
  • Discovery Lab 6: Integrate Cisco DNA Center with External Resources
  • Discovery Lab 7: Use Cisco DNA Center for Network Monitoring
  • Discovery Lab 8: Use Cisco DNA Center Reports
  • Discovery Lab 9: Configure Cisco WLC for AAA Services
  • Discovery Lab 10: Configure Cisco ISE for AAA Services
  • Discovery Lab 11: Configure AAA Services for Cisco FlexConnect
  • Discovery Lab 12: Configure Cisco WLC for Guest Services
  • Discovery Lab 13: Configure Cisco ISE  for Guest Services
  • Discovery Lab 14: Configure BYOD in the Wireless Network
  • Discovery Lab 15: Capture a Successful Client Authentication Using Radioactive Trace
  • Discovery Lab 16: Capture a Successful Client Authentication Using Cisco ISE
  • Discovery Lab 17: Configure QoS in the Wireless Network for Voice and Video Services
  • Discovery Lab 18: Configure Cisco AVC in the Wireless Network

Course Overview

The Engineering Cisco Meraki Solutions course helps you gain the core knowledge and skills needed to deploy, plan, design, implement, and operate complex Cisco Meraki solutions. This course combines Engineering Cisco Meraki Solutions Part 1 and 2 trainings. Prepare for roles focused on implementing, securing, and managing Cisco Meraki™ based networks from a centralized dashboard. Topics covered include Cisco Meraki’s cloud-based solutions, understanding of network security protocols, design of scalable architectures, and application of troubleshooting strategies.

This training prepares you for the Cisco Meraki Solutions Specialist (ECMS 500-220) exam. If passed, you earn the Cisco Meraki Solutions Specialist certification.

This course is worth 24 Continuing Education (CE) credits towards recertification.

Course Objectives

After completing this course you should be able to:

  • Describe Cisco Meraki cloud architecture, administration, and licensing 
  • Describe the hardware and features of Cisco Meraki product families 
  • Describe best practices for troubleshooting and when to contact Cisco Meraki support 
  • Plan new Cisco Meraki architectures and expand existing deployments 
  • Design the network for scalable management and high availability 
  • Describe how to automate and scale Cisco Meraki deployments with dashboard tools 
  • Use dynamic routing protocols to expand networks and improve wide-area network (WAN) performance 
  • Describe proper quality of service (QoS), policy, and performance-based routing configurations across a Cisco Meraki network and WAN optimization through traffic shaping 
  • Describe virtual private network (VPN) and WAN topologies and how to integrate them 
  • Secure, expand, and shape the network 
  • Implement switched network concepts and practices, and configure guest networks 
  • Implement wireless configuration practices and concepts 
  • Describe endpoint management concepts and practices using Cisco Meraki Systems Manager 
  • Describe physical security concepts and practices 
  • Gain network insight by monitoring applications 
  • Describe how to prepare monitoring, logging, and alerting services 
  • Set up reporting and auditing capabilities in the Cisco Meraki dashboard 
  • Monitor and troubleshoot issues using Cisco Meraki tools

Course Content

Introducing the Cloud and the Cisco Meraki Dashboard 

  • Single Pane of Glass Management
  • Cisco Meraki Full-Stack Capabilities
  • Cisco Meraki Devices and the Cloud
  • Benefits of a Cloud-Based Solution
  • Cisco Meraki Dashboard Organizational Structure
  • Multiorganizational Structure
  • Licensing
  • Cisco Meraki Dasboard Demo

Introducing Cisco Meraki Products and Administration

  • Cisco Meraki MX Security and SD-WAN Appliance
  • Cisco Meraki MS Switches
  • Cisco Meraki MR Wireless APs
  • Cisco Meraki Systems Manager Endpoint Management
  • Cisco Meraki MV Security Cameras
  • Cisco Meraki Insight Web-Based Application Analytics
  • Advanced Use of Cisco Meraki Dashboard Demo

Introducing Cisco Meraki Troubleshooting

  • Cisco Meraki Dashboard Sync
  • Cisco Meraki Monitoring and Troubleshooting Tools
  • Integration of Cisco Meraki Monitoring and Troubleshooting Tools into existing systems
  • Application Programming Interfaces
  • How to Work with Cisco Meraki Support
  • Cisco Meraki Troubleshooting Demo  

Planning New Cisco Meraki Architectures and Expanding Existing Deployment

  • Cisco Meraki Soluton Sizing
  • Explore Various Dashboard User Interface Features Demo
  • Licensing
  • Reference

Designing for Scalable Management and High Availability

  • Role-Based Access
  • Tag Design and Structure
  • Cisco Meraki MX Security Appliance High-Availability
  • Cisco Meraki MS Switch High Availability
  • High-Density Wireless Design
  • References

Automating and Scaling Cisco Meraki Deployments

  • RBAC with SAML
  • Configure SAML and Create SAML Roles Demo
  • Network Cloning
  • Clone a Network and Synchronize a Configuration Demo
  • Configuration Templates
  • Explore Configuration Template Demo
  • Network Provisioning with APIs
  • Use Google Sheets and Script Editor with the Cisco Meraki Dashboard API Demo
  • References

Designing Routing on the Cisco Meraki Platform

  • Routing Across Cisco Meraki Networks
  • Explore Layer 3 Routing Including Creating, Editing and Moving SVIs Demo
  • Dynamic Routing with OSPF
  • BGP for Scalable WAN Routing and Redundancy

Introducing QoS and Traffic Shaping Design

  • Wireless and Wired QoS Design
  • Prepare the Network for Voice
  • Traffic Shaping and Prioritizing on the Cisco Meraki MX Platform

Building VPN and WAN Topologies

  • Cisco Meraki MX VPN Operation Modes
  • VPN Design and Topologies
  • Auto VPN
  • Design a Scalable VPN Topology
  • Explore the Cisco Meraki MX Sizing Guide Demo
  • Integrate Cisco Meraki vMX into an Auto VPN Architecture
  • SD-WAN Fundamentals
  • SD-WAN Design
  • Explore CIsco Meraki vMX and SD-WAN Configurations in the Dashboard Demo   

Securing, Expanding, and Shaping the Network

  • Cisco Meraki Security Overview
  • Default Behavior and Rule-Processing Order
  • Advanced Security Services
  • Content Filtering
  • Cisco Umbrella Integration

Introducing Switched Network Concepts and Practices

  • Access Policies Using Cisco Meraki Authentication
  • Cloning of Switch Settings
  • Switch Templates and Profiles
  • Explore Switch Profiles Demo
  • LAN and WLAN Guest Access Best Practices
  • References

Implementing Wireless Configuration Practices and Concepts

  • Cisco Meraki Dashboard Maps and Floor Plans
  • RF Profiles
  • Wireless Encryption and Authentication
  • SSID Modes for Client IP Addressing
  • Bluetooth Low Energy
  • BLE Scanning and Bluetooth Clients Demo
  • Wireless Threats

Introducing Endpoint Management Concepts and Practices

  • Cisco Meraki Systems Manager Platform Overview
  • Cisco Meraki Systems Manager Overview Demo
  • Device Deployment Methodologies
  • Deployent of Application and Containerization Profiles
  • Security Policies and Devices Out of Compliance Demo
  • Pairing Network Group Policies with Systems Manager Demo
  • Agentless Onboarding with Trusted Access

Introducing Physical Security Concepts and Practices

  • Cisco Meraki MV Architectures
  • Flexible Camera Deployments with Wireless
  • Cisco Meraki MV Product Portfolio, Features and Functionalities
  • Motion Search, Motion Recap, Motion Heat Maps, and Person Detection Demo
  • Business Intelligence
  •  

Gaining Network Insight by Monitoring Applications

  • Cisco Meraki Insight Overview
  • Cisco Meraki Insight Scaling and Licensing
  • Cisco Meraki Insight Overview: A Closer Look at Tracked Applications and WAN Health Demo

Preparing, Monitoring, Logging, and Alerting Services

  • Logging Capabilities
  • Examine Event, Change, and Video Access Logs Demo
  • Monitoring Tools and Services
  • Examine Monitoring Tools and Features Demo
  • Supported Alerts
  • Cisco Meraki Dashboard API
  • References

Setting Up Reporting and Auditing Capabilities in the Cisco Meraki Dashboard

  • Cisco Meraki Reports
  • Manage Firmware Through the Dashboard
  • PCI Auditing
  • References

Gaining Visibility and Resolving Issues Using Cisco Meraki Tools

  • Troubleshooting Methods
  • Logging Capabilities
  • Cisco Meraki Security Center Overview Demo
  • Wireless Troubleshooting
  • Explore Wireless Troubleshooting Tools Demo
  • Troubleshoot Cisco Meraki Cloud Application Performance
  • Troubleshoot Cisco Meraki Auto VPN
  • Explore VPN Status, Firewall, and Static Port Forwarding
  • Local Status Page
  • References

Labs

  • Discovery Lab 1; Configure the Cisco Meraki Dashboard
  • Discovery Lab 2: Enable Advanced Features and Optimize Networking
  • Discovery Lab 3: Troubleshoot the Network Using the Cisco Meraki Dashboard 
  • Discovery Lab 4: Configure Tags, Link Aggregation, Port Mirroring, and High-Density SSIDs 
  • Discovery Lab 5: Establish Auto VPN
  • Discovery Lab 6: Configure Virtual Interfaces and Routing on Cisco Meraki MS Switches
  • Discovery Lab 7: Configure Routes and Redistribution
  • Discovery Lab 8: Configure QoS,
  • Discovery Lab 9: Configure Traffic Shaping
  • Discovery Lab 10: Configure Load Balancing
  • Discovery Lab 11: Define Firewall Rules
  • Discovery Lab 12: Enable Advanced Malware Protection
  • Discovery Lab 13: Enable Content Filtering
  • Discovery Lab 14: Configure and Apply Access Policies
  • Discovery Lab 15: Configure Wireless Guest Access
  • Discovery Lab 16: Configure SSIDs
  • Discovery Lab 17: Implement RF Profiles
  • Discovery Lab 18: Implement Air Marshal
  • DIscovery Lab 19: Create Cisco Meraki Systems Manager Configuration Profiles
  • Discovery Lab 20: Define Security Polices
  • Discovery Lab 21: Enforce End-to-End Security
  • Discovery Lab 22: Setup Motion Alerts
  • Discovery Lab 23: Deploy Wireless Cameras
  • Discovery Lab 24: Manage Video Retention
  • Discovery Lab 25: Enable Alerts
  • Discovery Lab 26: Add Monitring and Reporting
  • Discovery Lab 27: Generate and Analyze Summary Reports
  • Discovery Lab 28: Manage Firmware
  • Discovery Lab 29: Generate a PCI Compliance Report
  • Discovery Lab 30: Troubleshoot an Offline Device
  • Discovery Lab 31: Troubleshoot Content Filtering
  • Discovery Lab 32: Troubleshoot Remote Site Connectivity

Course Overview

The Designing Cisco Enterprise Wireless Networks (ENWLSD) course introduces you to the concepts required for planning advanced designs incorporating Cisco wireless products. The training covers design specifics from scenario design concepts, through the installation phase, and onto post-deployment validation.

This course is worth 40 Continuing Education (CE) Credits

Course Objectives

After completing this course you should be able to:

  • Describe a structured wireless design methodology recommended by Cisco
  • Describe wireless industry standards, amendments, certifications, and RFCs
  • Examine the wireless technology
  • Describe and implement Cisco enhanced wireless features
  • Describe Cisco mobility, roaming, and Work Group Bridges
  • Describe the wireless design process
  • Describe and implement specific wireless application designs
  • Describe and implement specific wireless network vertical designs
  • Describe and implement bridge and mesh designs in wireless networks
  • Describe special considerations in advanced wireless designs
  • Understand requirements to adapt a wireless network for Cisco CMX and Cisco Spaces
  • Describe site survey processes
  • Describe third-party wireless network design and planning tools
  • Describe and implement network validation processes
  • Describe and implement the final phases of the design project

Course Content

Structured Wireless Design Methodology

  • Importance of Planning Wireless Design with a Structured Methodology
  • Cisco Design Guides and Cisco Validated Designs for Wireless Networks
  • Role of the Project Manager When Designing Wireless Networks

Wireless Industry Protocols and Standards

  • Wireless Standards
  • Wireless Regulations
  • A History of the IEEE 802.11 Standard
  • Current IEEE 802.11 Amendments
  • Wi-Fi Alliance (WFA) Certifications
  • Wi-Fi Protocols
  • Practice Activity – Review IEEE Standards and Amendments and Their Application

The Science of Wireless Technology

  • Decibel Mathematics
  • Antenna Theory
  • Design Case Study 1: Translate Decibels and Milliwatts
  • Design Case Study 2: Examine Antenna Patterns
  • Design Case Study 3: Review EIRP Calculations

Cisco Enhanced Wireless Features

  • Selecting Hardware and Software for a Wireless Network Design
  • Cisco Infrastructure Settings for Wireless Network Design
  • Cisco Enhanced Wireless Features
  • Practice Activity: Review Cisco Infrastructure Wireless Features

Cisco Mobility and Roaming

  • Roaming Concepts
  • Client Roaming in a Wireless Network
  • Mobility and Intercontroller Mobility in a Wireless Network
  • Cisco Workgroup Bridge (WGB) and WGB Roaming in a Wireless Network

Wireless Design Process

  • Wireless Design Process
  • Predesign Activities
  • Designing the Wireless Network
  • Implementing the Wireless Network
  • Validation and Post Implementation Activities
  • Design Case Study 1: Perform the Wireless Network Design Process

Wireless Network Design for Specific Applications

  • Wireless Application Design
  • Data Application Design
  • Real-Time Application Design
  • Location Design
  • Security and Guest Networking Design
  • Cisco Management Platforms
  • Design Case Study 1: Design a Wireless Network for a Specific Application

Designing Wireless Networks for Specific Vertical Designs

  • Wireless Network Design for an Enterprise
  • Wireless Network Design for Industrial Settings
  • Wireless Network Design in Healthcare and Hospitality Environments
  • Extending Wireless Networks to the Branch Sites
  • Design Case Study 1: Design a Wireless Network for a Specific Vertical
  • Design Case Study 2: Design a Wireless Network that Extends Beyond the Campus

Bridging and Mesh in a Wireless Network

  • Bridging in a Cisco Wireless Network Design
  • Mesh in a Cisco Wireless Network Design

Special Considerations in Advanced Wireless Designs

  • High-Density Designs in Wireless Networks
  • Redundancy in Wireless Networks

Cisco CMX and Cisco Spaces

  • Cisco CMX
  • Cisco Spaces

Site Survey Processes

  • Site Survey Data Collection Types
  • Predeployment Site Surveys
  • Postdeployment Site Surveys
  • Additional Considerations for Site Surveys

Wireless Network Design with Third-Party Tools

  • Third-Party Tools
  • Predictive Design with Ekahau
  • Live Surveys with Ekahau
  • Design Validation and Troubleshooting with Ekahau
  • Discovery 1: Examine Ekahau Site Survey Predictive Fundamentals
  • Discovery 2: Create a Site Survey Report
  • Discovery 3: Design a Data Network in an Enterprise Environment
  • Discovery 4: Design a Voice and Data Network in a Helathcare Environment
  • Discovery 5: Convert and Enterprise Data Design to Include Voice
  • Discovery 6: Design a Voice and Data Network in a Warehouse Environment with Directional Antennas

Wireless Network Validation Processes

  • Post Installation Site Survey Activities
  • Discovery 7: Review a Live Site Survey Using Ekahau Tools
  • Discovery 8: Simulate a Post Installation Network Validation Survey
  • Discovery 9: Analyze Layer 1 Data

Completing the Wireless Design Project

  • Project Documentation
  • Complete the Wireless Design Project
  • Practice Activity: Final Phase Documentation

Course Overview

This four-day course provides students with the knowledge required to work with enterprise wireless technologies and Juniper Driven by Mist AI™ wireless networks. 

Students will gain in-depth knowledge of wireless technologies, Juniper Mist™ technologies, and how to configure and use them. 

Through demonstrations and hands-on labs, students will gain experience with the features and functionalities of Mist AI-driven Wi-Fi.

COURSE LEVEL

Intermediate

RELATED JUNIPER PRODUCT

• Juniper Mist AI

Course Objectives

After successfully completing this course, you should be able to:

• Describe the IEEE 802.11 standard and amendments.

• Describe wireless frequency bands.

• Apply radio frequency (RF) basics in wireless networks.

• Identify how modulation and coding make up wireless networks.

• Describe the interworkings of association and roaming.

• Describe network contention factors.

• Define WLANs.

• Define Juniper Mist.

• Describe Juniper Mist configuration objects for wireless networks.

• Describe Juniper Access Points and their configuration options.

• Describe Juniper Mist’s WLAN configuration objects.

• Describe Juniper Mist™ Edge.

• Describe the Juniper Mist guest options.

• Describe WxLAN policies and how apply them to resources.

• Examine wireless intrusion detection and prevention from Juniper Mist.

• Describe WLAN security threats detected by the Juniper Mist WLAN system.

• Interpret wireless service-level expectations (SLEs) in relation to users.

• Gather events and insights from the Mist™ cloud.

• Summarize Juniper Mist’s radio resource management (RRM).

• Review additional data to create dashboard and reports.

• Evaluate machine learning and artificial intelligence.

• Summarize Marvis queries.

• Extend Mist’s Marvis actions.

• Describe the functions of Marvis Actions and Marvis Minis.

• Compare the concepts and methods of location services.

• Explain Juniper Mist’s approach to user engagement and asset visibility.

Course Content

DAY 1

1 Wi-Fi Standards

• Describe the purpose of the 802.11 standard and its physical later amendments

2 Wi-Fi Radio Frequency Bands

• Describe the 2.4-GHz, 5-GHz, and 6-GHz frequency bands used for WLANs and their channels

3 Applying Radio Frequency Basics to Wi-Fi

• Describe the properties of an RF wave

• Convert dBm to Milliwatts using RF math

• Explain factors that contribute to RF signals and how they relate to WLANs

4 Modulation and Coding for Wireless Networks

• Explain RF modulation and how it relates to WLAN data rates

• Describe the relationship between SNR and MCS

5 Understanding Client Association and Roaming

• Describe the 802.11 state machine and steps required for an 802.11 station to connect to an access point

• Explain the protocols used in a client’s connection to the network

6 Network Contention Factors

• Describe 802.11 contention

7 Wi-Fi Architectures and Life Cycle

• Differentiate WLAN architectures

• Describe the stages of the WLAN life cycle

8 Getting Started with Juniper Mist

• Examine the Juniper Mist architecture

• Create a Juniper Mist account

• Summarize Juniper Mist subscriptions

• Summarize the MSP dashboard

Lab 1: Initial Setup

DAY 2

9 Juniper Mist Configuration Objects

• Explain the difference between organization-level and site-level configuration objects

• Define Juniper Mist configuration objects and their uses

Lab 2: Remote Site and Site Groups and Variables

10 Juniper Access Points

• Summarize access points and connectivity

• Describe the boot procedure for a Juniper Access Point, its requirements, and the process of adding a Juniper Access Point to the Juniper Mist cloud

• Describe common AP configuration settings

• Use the Juniper Access Points dashboard to get information about an Access Point

11 WLANs

• Define a SSIDs, BSSIDs, and their functions

• Review additional WLAN configuration options

• Explain WLAN security options and how they are configured in a Juniper Mist WLAN configuration object

• Describe data rates and how they are configured in Juniper Mist

• Explain SSID strategies for multiband deployments

12 Juniper Mist Edge

• Define the features and benefits

• Identify popular use cases

• Categorize the product options

• Summarize the installation

• Review the Edge management

• Troubleshoot the device and connectivity

DAY 3

13 Guest Portals

• Describe the Juniper Mist guest options

14 Juniper Mist WxLAN Policies

• Explain WLAN policies and how they are configured

Lab 3: WLANs and WxLAN

15 Juniper Mist Wi-Fi Security

• Describe WLAN security threats detected by the Juniper Mist WLAN system

16 Juniper Mist Service-Level Expectations

• List Wi-Fi Assurance SLEs and their classifiers

17 Juniper Mist Events and Insights

• Describe site, AP, and client events

• Explain the packet capture functionality of the Juniper Mist system

• Describe the 802.11 MAC header and list 802.11 MAC frame types

Lab 4: SLE Troubleshooting

18 Juniper Mist Radio Resource Management

• Describe Juniper Mist RRM operations and their purposes

DAY 4

19 Juniper Mist Dashboard and Reports

• Explain custom dashboard and report options

20 Juniper Mist Artificial Intelligence and Troubleshooting Options

• Assess Juniper Mist’s application of artificial intelligence

• Describe the reactive and proactive troubleshooting methodologies

21 Marvis Queries

• Explain the difference between Marvis natural language and Marvis query language

22 Marvis Actions

• Explain the features of Marvis Actions

• Explain the functions of Marvis Minis

Lab 5: Marvis

23 Location-Based Services

• Describe real-time location services

• Explain Wi-Fi components for location services

24 User Engagement and Asset Visibility

• Explain Juniper Mist’s approach to user engagement

• Describe Juniper Mist’s asset visibility capabilities

Course Overview

Configuring Cisco Catalyst 9800 and Intro to WIFI6  is a three day course designed to help students understand how the Catalyst 9800 Series wireless controllers combine the best of RF excellence with IOS XE benefits. This course begins with a description of the Cisco Catalyst 9800 and its benefits while introducing the learner to WIFI6. The configuration, migration, and troubleshooting will also be covered in this instructor-led course.

Virtual Learning

This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins.

Course Objectives

After completing this course you should be able to:

  • Describe Cisco Catalyst 9800
  • Understand the Benefits for Catalyst 9800
  • Configure Catalyst 9800
  • Migrate to the Catalyst 9800
  • Troubleshoot the Catalyst 9800
  • Understand and Discuss WIFI6

Course Content

Introduction

  • Cisco Catalyst 9800 Overview
  • Intent Based Networking (IBN)
  • Cisco Catalyst Next Gen Wireless Architecture
  • Cisco Catalyst 9800 Wireless – Platform Support

Cisco Catalyst 9800 Wireless Controller Appliances

  • Cisco Catalyst 9800 Wireless Controller Series: C9800-80-K9
  • Cisco Catalyst 9800 Wireless Controller Series: C9800-40-K9
  • Cisco Catalyst 9800 Wireless Controller Cloud Series: C9800-CL-K9

Cisco Catalyst 9800 use in Private and Public Cloud Environments

  • Private
  • Public
  • Hybrid

What is WiFi 6 and Why do we need it?

  • Use Cases – how WiFi 6 will change Buisness and Industry
  • WIFI6 technical – a leap from previous WiFi technologies
  • Design Considerations
  • Cisco WiFi6 Portfolio and Interoperability
  • Configure WiFi6 on Cat 9800

Cisco Catalyst 9800 Series Embedded Controller for SDA

  • SD-Access Everywhere
  • Wireless Assurance with DNA Center
  • Catalyst 9800 SD-Access Wireless
  • Catalyst 9800 SD-Access Embedded Wireless Controllers

High Availability

  • Reducing downtime for Upgrades and Unplanned Events
  • High Availability (Client SSO)
  • High Availability (AP & Client SSO)

Software Updates

  • Software Updates
  • SSO
  • Patching
  • Rolling Upgrades
  • Wireless Controller SMU
  • Rolling AP Update
  • Image Upgrade

Programmability and Telemetry

  • Flexible management options with Cisco Catalyst 9800 Wireless Controllers
  • Wireless Programmability “Stack”
  • Config vs Operational YANG data models
  • Model Driven Telemetry
  • Security and Threat Detection
  • Intent-based wireless networks Security
  • Security and Threat Mitigation

Catalyst 9800 Wireless Controller Configuration Model

  • New Configuration Model
  • AireOS vs. Catalyst 9800 Config Model
  • Catalyst 9800 Config Model

Wireless Basic Setup

  • Wireless Basic Configuration Model
  • Adding Local Site
  • Adding Remote Site
  • Provisioning APs to Site
  • Day 0
  • AP PnP

Wireless Advanced

  • Guided UI Configuration Workflow
  • WLAN Profile
  • Policy Profile
  • AP Join profile
  • RF Profile
  • Static and Rule-Based AP Tagging

Migration

  • AireOS Config Translator
  • Using the Tool
  • Migration using Prime
  • AireOS Config Translator on PI 3.5

Troubleshooting

  • IOS-XE logging architecture
  • Packet tracing and packet captures
  • Embedded Packet Capture web interface
  • Useful commands and tools

Lab Outline:

  • Configure Windows 10 Client Access
  • Configure Centralized WLAN Deployment with Catalyst 9800
  • Configure Security in Centralized WLAN Deployment with Catalyst 9800 using ISE
  • Configuring Guest Access using Catalyst 9800 and Anchor AirOS
  • Implement Flex-Connect WLAN Deployment with Catalyst 9800
  • High Availability SSO with Catalyst 9800
  • Migrating Configuration from AireOS to Catalyst 9800 WLC using WebUI and Prime Infrastructure
  • Catalyst 9800 Software Upgrade

Course Overview

The goal of this CWNA course is to add Wi-Fi expertise to a networking professional’s skillset, while covering all CWNA exam topics. The course begins with discussion topics and hands-on lab exercises covering the basic operation of 802.11 Wi-Fi technology. Once a base of Wi-Fi knowledge is established, enterprise relevant topics such as Wi-Fi design, security, and troubleshooting are covered.

Get a head start right out of the gate with a Certified Wireless Network Administrator (CWNA) certification. It is the base certification for Enterprise Wi-Fi within the CWNP family of certifications and a springboard toward earning your security, design, analysis and network expert certifications. Achieving it enhances your networking career profile, providing evidence that you have sought after Wi-Fi knowledge and skills

Course Objectives

After completing this course, you will be able to:

  • Understand and apply the essential concepts of Radio Frequency (RF) technology, including RF planning, RF-related calculations and spread spectrum technologies.
  • Perform RF Spectrum Analysis for the 2.4GHz and 5GHz bands.
  • Describe the rules governing wireless LANs, to comply with local radio regulations for setup and maintenance of WLANs.
  • Describe the fundamental operation of wireless LANs, for effective WLAN problem analysis and troubleshooting.
  • Understand IEEE 802.11b, 802.11g, 802.11a, 802.11n, 802.11ac and 802.11ax (Wi-Fi 6) standards and amendments; and their practical relevance in depth.
  • Correctly install, configure and support Wi-Fi adapters, access points, wireless bridges and WLAN antennas.
  • Understand 802.11 / Wi-Fi WLAN Physical and MAC -layer operation in depth.
  • Describe and troubleshoot WLAN problems including RF coverage, multipath, hidden nodes and interference problems.
  • Understand the essential tools and processes used in WiFi Site Survey.
  • Work with sophisticated WLAN diagnostic tools from Ekahau, AirMagnet, MetaGeek, Savvius, Tamosoft and more.
  • Describe the insecurities inherent in IEEE 802.11 WLANs.
  • Apply best security practices, including WPA2 and WPA3, to secure Wi-Fi networks for small, medium and large organisations.

Course Content

Course Details CWNA-108

Chapter 1 – WLAN and Networking Industry Organizations

o Industry Organizations – IEEE, WFA, IETF
o Regulatory Domains
o IEEE – 802.11 Standard and Amendments
o Wi-Fi Alliance certification
o PoE, EAP, RADIUS

Chapter 2 – RF Characteristics and Behavior

o Spectrum
o Sine Waves – Properties of RF Waves
o Power loss
o RF Propagation
o Free Space path loss – FSPL
o Spread spectrum
o Modulation – QAM
o OFDM 

Chapter 3 – RF Mathematics and Measurements

o Units of RF Measurement
o Power Measurement
o Basic RF Math
o RSSI and Receivcer sensitivity
o Link Budget  

Chaper 4 – RF Antennas and Hardware

o Antenna Fundamentals
o Polarization, Gain, Radiation
o WLAN Antennas Types o Line of Sight and Fresnel zones
o Antenna Mounting, connectors and cables
o Diversity  

Chapter 5 – 802.11 PHYs and Network Types

o 802.11 Frequency Bands
o Physical Layers
o Modulation – OFDM
o Coding and MCS values
o Beamforming
o DFS and TPC
o Use Case Scenarios
o WLAN operating Modes – BSS, ESS,

Chapter 6 – Network Devices

o AP:s and Infrastructure Devices
o Birdge Links
o Clients
o Device Configuration
o Power Over Ethernet

Chapter 7 – 802.11 MAC Operations

o Frame Types
o General Frame Format
o Connection Frame exchange
o State Machine and 4-way Handshake
o EAP Intro
o BSS selection

Chapter 8 – Channel Access Methods

o Requirements
o DCF
o Carrier Sens and Interframes Spaces
o QoS and WMM
o RTS/CTS Protection
o Operation Modes
o Power Management

Chapter 9 – WLAN Network Architectures

o Control, Management, and Data
o Forwarding
o Controllers
o VLANs
o Roaming
o WLAN Models
o AP Placement and Channel Selection

Chapter 10 – WLAN Requirements and Solutions

o Data Access
o Verticals
o Network Types
o BYOD and MDM
o RRM, Band Steering and Airtime Fairness
o Hotspots
o Wired Network Services  

Course Overview

In this two-day course, you learn to investigate, analyze, and determine issues that might occur with all the different components of VMware Workspace ONE® UEM. Troubleshooting is the backbone of service maintenance and management. To effectively troubleshoot product issues, administrators must understand how product services communicate and function. This in turn helps optimize service and software health management.

Products

  • VMware Workspace ONE

Course Objectives

By the end of the course, you should be able to meet the following objectives:

• Summarize the basic troubleshooting methodologies

• Outline common troubleshooting techniques in the Workspace ONE UEM console

• Outline common troubleshooting techniques when integrating enterprise solutions in the Workspace ONE UEM console

• Summarize common troubleshooting strategies for Workspace ONE UEM managed devices

• Outline common application management troubleshooting techniques in the Workspace ONE UEM console

• Summarize common troubleshooting techniques for email management in the Workspace ONE UEM console

• Explain common troubleshooting approaches for the VMware Unified Access Gateway™ platform and individual edge services

• Outline useful troubleshooting tools, such as the Self-Service Portal and VMware Workspace ONE®

Course Content

1 Course Introduction

• Introductions and course logistics

• Course objectives

2 Fundamentals of Troubleshooting Workspace ONE UEM

• Outline software troubleshooting logic and support methods

• Summarize the main process flows for the Workspace ONE UEM components

• Explain the importance of Workspace ONE UEM process flows for troubleshooting

• Identify different Workspace ONE UEM log files

3 Workspace ONE UEM Console Troubleshooting

• Outline the best practices for troubleshooting Workspace ONE UEM console issues

• Identify common group management and assignment-related issues

• Outline common issues for Workspace ONE UEM console roles and system settings

• Understand how analytic events can be used to identity platform errors

• Summarize the steps for collecting and analyzing Workspace ONE UEM console logs

4 Integration Troubleshooting

• Outline the common enterprise integrations in Workspace ONE UEM

• Outline common troubleshooting techniques for the VMware AirWatch® Cloud Connector™

• Troubleshoot issues related to Directory Services integration

• Identify directory user and groups synchronization issues

• Troubleshoot issues related to certificate authority integration

• Explain VMware Workspace ONE® Access™ integration and VMware Workspace ONE® Intelligent Hub troubleshooting techniques

5 Endpoint Troubleshooting

• Compare the endpoint connection topologies in Workspace ONE UEM

• Outline useful tools and resources for endpoint troubleshooting

• Summarize the best practices for device enrollment troubleshooting

• Explain device connectivity troubleshooting techniques

• Understand how to identify and resolve profile-related issues

• Identify common compliance policy issues and potential root causes

6 Applications Troubleshooting

• Explain the different scoping questions for troubleshooting applications

• Review application management configurations

• Summarize the general tools and resources for application troubleshooting

• Describe the general logic of troubleshooting public applications

• Understand internal application issues and potential causes

• Explain purchased application troubleshooting techniques

7 Unified Access Gateway And Edge Services Troubleshooting

• Review Unified Access Gateway architecture and edge service workflows

• Understand Unified Access Gateway general configurations

• Explain how to utilize Unified Access Gateway related troubleshooting tools and resources

• Identify and resolve common issues for Content Gateway on Unified Access Gateway

• Summarize troubleshooting techniques for VMware Workspace ONE® Tunnel™ on Unified Access Gateway

 8 Email Troubleshooting

• Review different email architecture and workflows

• Summarize common errors associated with email profiles

• Identify tools and resources for email troubleshooting

• Discuss troubleshooting techniques for VMware AirWatch® Secure Email Gateway™ on Unified Access Gateway

• Outline PowerShell integration issues and techniques to address them

9 Additional Troubleshooting Tools

• Describe how the Self-Service Portal helps administrators and empowers end-users to resolve issues

• Understand how Workspace ONE Assist can help endpoint troubleshooting

Course Overview

In this five-day course, you learn how to apply the fundamental techniques for launching and maintaining an intelligence-driven, multiplatform endpoint management solution with VMware Workspace ONE® UEM. Through a combination of hands-on labs, simulations, and interactive lectures, you will configure and manage the endpoint life cycle. You will also learn to investigate, analyze, and determine issues that might occur with all the different components of Workspace ONE UEM.

By understanding how to effectively troubleshoot product issues, administrators can understand how product services communicate and function, in turn optimizing service and software health management. At the end of five days, you will have the foundational knowledge for effectively managing and conducting basic troubleshooting for Workspace ONE UEM.

Course Objectives

By the end of the course, you should be able to meet the following objectives:

  • Explain and apply the fundamental techniques for launching and maintaining an intelligence-driven, multiplatform endpoint management solution with Workspace ONE UEM
  • Outline the components of Workspace ONE UEM
  • Explain the general features and functionality enabled with Workspace ONE UEM
  • Summarize basic Workspace ONE administrative functions
  • Explain and deploy common Workspace ONE integrations
  • Securely deploy configurations to Workspace ONE UEM managed devices
  • Onboard device endpoints into Workspace ONE UEM
  • Summarize alternative management methodologies for rugged devices
  • Discuss strategies for maintaining environment and device fleet health
  • Configure and deploy applications to Workspace ONE UEM managed devices
  • Analyze a Workspace ONE UEM deployment
  • Enable email access on devices
  • Integrate Workspace ONE UEM with content repositories and corporate file shares
  • Summarize basic troubleshooting methodologies
  • Outline common troubleshooting techniques in the Workspace ONE UEM console
  • Outline common troubleshooting techniques when integrating enterprise solutions in the Workspace ONE UEM console
  • Summarize common troubleshooting strategies for Workspace ONE UEM managed devices
  • Outline common application management troubleshooting techniques in the Workspace ONE UEM console
  • Summarize common troubleshooting techniques for email management in the Workspace ONE UEM console
  • Explain common troubleshooting approaches for the VMware Unified Access Gateway™ platform and individual edge services
  • Outline useful troubleshooting tools, such as the Self-Service Portal and VMware Workspace ONE® Assist™

Course Content

1 Course Introduction

  • Introductions and course logistics
  • Course objectives
  • Online resources and references

2 Platform Architecture

  • Summarize the features and functionality of Workspace ONE UEM
  • Outline the benefits of leveraging Workspace ONE UEM
  • Recognize the core and productivity components that make up the Workspace ONE UEM platform
  • Summarize high availability and disaster recovery for the Workspace ONE solution

3 Administration

  • Navigate and customize the Workspace ONE UEM console
  • Summarize the hierarchical management structure
  • Explain the features and functions of Workspace ONE Hub Services
  • Outline account options and permissions

4 Enterprise Integrations

  • Outline the process and requirements to integrate with directory services
  • Explain certificate authentication and practical implementation with Workspace ONE
  • Explain the benefits of integrating an email SMTP service into the Workspace ONE UEM console
  • Describe VMware Dynamic Environment Manager™ and its architecture

5 Onboarding

  • Outline the prerequisite configurations in the Workspace ONE UEM environment for onboarding devices for management
  • Outline the steps for setting up autodiscovery in the Workspace ONE UEM console
  • Enroll an endpoint through the VMware Workspace ONE® Intelligent Hub app
  • Summarize platform onboarding options

6 Managing Endpoints

  • Explain the differences between device and user profiles
  • Describe policy management options for Windows and macOS
  • Describe the functions and benefits of using compliance policies
  • Explain the use case for Freestyle Orchestrator
  • Describe the capabilities that sensors and scripts enable

7 Alternative Management Methods

  • Describe the function and benefits of device staging
  • Configure product provisioning in the Workspace ONE UEM console
  • Understand the benefits of deploying a VMware Workspace ONE® Launcher™ configuration to Android devices
  • List the system and device requirements for Linux device management in Workspace ONE UEM

8 Applications

  • Describe the features, benefits, and capabilities of application management in Workspace ONE UEM
  • Understand and configure deployment settings for public, internal, and paid applications in the Workspace ONE UEM console
  • Describe the benefits of using Apple Business Manager content integration
  • Describe the benefits of using server-to-client software distribution
  • List the functions and benefits of VMware Workspace ONE® SDK

9 Device Email

  • List the email clients supported by Workspace ONE UEM
  • Configure an Exchange Active Sync profile in the Workspace ONE UEM console
  • Configure VMware Workspace ONE® Boxer settings
  • Summarize the available email infrastructure integration models and describe their workflows
  • Configure email compliance policies and notifications services

10 Content Sharing

  • Describe the benefits of using Content Gateway and the Content Gateway workflows
  • Describe the benefits of integrating content repositories with Workspace ONE UEM
  • Configure a repository in the Workspace ONE UEM console

11 Maintenance

  • Manage endpoints from the Device List View and the Device Details View pages
  • Analyze endpoint deployment and compliance data from Monitor Overview page

12 Fundamentals of Troubleshooting Workspace ONE UEM

  • Outline software troubleshooting logic and support methods
  • Summarize the main process flows for the Workspace ONE UEM components
  • Explain the importance of Workspace ONE UEM process flows for troubleshooting
  • Identify different Workspace ONE UEM log files

13 Workspace ONE UEM Console Troubleshooting

  • Outline the best practices for troubleshooting Workspace ONE UEM console issues
  • Identify common group management and assignment-related issues
  • Outline common issues for Workspace ONE UEM console roles and system settings
  • Understand how analytic events can be used to identity platform errors
  • Summarize the steps for collecting and analyzing Workspace ONE UEM console logs

14 Integration Troubleshooting

  • Outline the common enterprise integrations in Workspace ONE UEM
  • Outline common troubleshooting techniques for the VMware AirWatch® Cloud Connector™
  • Troubleshoot issues related to Directory Services integration
  • Identify directory user and groups synchronization issues
  • Troubleshoot issues related to certificate authority integration
  • Explain VMware Workspace ONE® Access™ integration and Workspace ONE Intelligent Hub troubleshooting techniques

15 Endpoint Troubleshooting

  • Compare the endpoint connection topologies in Workspace ONE UEM
  • Outline useful tools and resources for endpoint troubleshooting
  • Summarize the best practices for device enrollment troubleshooting
  • Explain device connectivity troubleshooting techniques
  • Demonstrate how to identify and resolve profile-related issues
  • Identify common compliance policy issues and potential root causes

16 Application Troubleshooting

  • Explain the different scoping questions for troubleshooting applications
  • Review application management configurations
  • Summarize the general tools and resources for application troubleshooting
  • Describe the general logic of troubleshooting public applications
  • Understand internal application issues and potential causes
  • Explain purchased application troubleshooting techniques

17 Unified Access Gateway and Edge Services Troubleshooting

  • Review Unified Access Gateway architecture and edge service workflows
  • Understand Unified Access Gateway general configurations
  • Explain how to utilize Unified Access Gateway related troubleshooting tools and resources
  • Identify and resolve common issues for Content Gateway on Unified Access Gateway
  • Summarize troubleshooting techniques for VMware Workspace ONE® Tunnel™ on Unified Access Gateway

18 Email Troubleshooting

  • Review different email architecture and workflows
  • Summarize common errors associated with email profiles
  • Identify tools and resources for email troubleshooting
  • Discuss troubleshooting techniques for VMware AirWatch® Secure Email Gateway™ on Unified Access Gateway
  • Outline PowerShell integration issues and techniques to address them

19 Additional Troubleshooting Tools

  • Describe how the Self-Service Portal helps administrators and empowers end users to resolve issues
  • Explain how Workspace ONE Assist can help with troubleshooting endpoints

Course Overview

In this two-day course, you learn how to apply the fundamental techniques for integrating VMware Workspace ONE® Access™ with VMware Workspace ONE® UEM to securely distribute business-critical applications from any device and configure access management controls. Through a combination of hands-on labs, simulations, and interactive lectures, you configure system and productivity integrations for Workspace ONE Access and Workspace ONE UEM. The course provides the principles of identity and access management. You will leave with a foundational understanding of how Workspace ONE uses various authentication methods and protocols to determine user access permissions and enable single sign-on.

Course Objectives

By the end of the course, you should be able to meet the following objectives:

  • Explain the general features and functionality that Workspace ONE Access enables
  • Demonstrate how to integrate Workspace ONE UEM with Workspace ONE Access 
  • Summarize and implement Workspace ONE productivity services into the digital workspace environment
  • Explain the methods of enabling mobile single sign-on for mobile endpoints managed in the digital workspace
  • Configure Workspace ONE Access to support SAML 2.0 for federated authentication across the workforce

Course Content

1  Course Introduction

  • Introductions and course logistics
  • Course objectives

2  Workspace ONE Access

  • Summarize the benefits of Workspace ONE Access
  • Outline the core features and functions enabled by Workspace ONE Access
  • Navigate the Workspace ONE Access console
  • Explain the functions of directory integration with Workspace ONE Access
  • Explain the various types of authentication protocols enabled by Workspace ONE Access

3  Integrating Workspace ONE UEM and Workspace ONE Access

  • Explain the rationale for integrating Workspace ONE UEM and Workspace ONE Access
  • Outline the process of connecting Workspace ONE UEM and Workspace ONE Access
  • Examine the workflow of integrations
  • Summarize the key features of an integrated solution

4  Productivity Integrations

  • Identify the functions enabled by VMware Unified Access Gateway™
  • Outline the purpose of the VMware AirWatch® Secure Email Gateway™ edge service
  • Explain the features enabled by the VMware Workspace ONE® Tunnel™ edge service
  • Summarize the capabilities enabled by the Content Gateway edge service

5  SAML 2.0 Authentication

  • Outline authentication methods supported by Workspace ONE Access
  • Summarize the main properties of the SAML protocol
  • Summarize the SAML authentication workflow
  • Explain the application single sign-on authentication workflow with SAML

6  Mobile Single Sign-On

  • Describe the concept of mobile single sign-on
  • Outline mobile single sign-on workflows

7  Intelligence and Automation

  • Summarize the features of Workspace ONE® Intelligence™
  • Outline the benefits of using Workspace ONE Intelligence