Download PDF
of this course

PASESA - Cisco Channel Partner-Securing Email with Cisco Email Security Appliance 2.0 (PASESA)

  • Overview
  • Who Should Attend
  • Certifications
  • Prerequisites
  • Objectives
  • Content
  • Schedule
Course Overview

Duration: 2 days
 
The Course Introduction provides learners with the course objectives and prerequisite learner skills and knowledge. The Course Introduction presents the course flow diagram and the icons that are used in the course illustrations and figures. This course component also describes the curriculum for this course, providing learners with the information that they need to make decisions regarding their specific learning path.

Who Should Attend

  • This course is for Channel Partners seeking to acquire knowledge about how to maintain, optimize, and troubleshoot a Cisco Email Security Appliance.
 
  • The primary target theaters for the course are:
    • Cisco Channel Partners seeking to maintain, optimize, and troubleshoot a Cisco Email Security Appliance.
    • Channel Partner engineers that are seeking to prepare for the Cisco Email Security Field Engineer (#700-280 ESFE) exam
 
  • Secondary target theaters are:
    • There is no secondary audience for this course.
    The primary target geographies for the course are:
    • US and Canada
    • Europe
    • Asia Pacific
    • Japan
    • Emerging markets

Course Certifications

This course is part of the following Certifications:

Prerequisites

This section lists the skills and knowledge that learners must possess to benefit fully from the course. It includes recommended Cisco learning offerings that the learner may complete to benefit fully from this course.
 
The knowledge and skills that a learner must have before attending this course are as follows:
• Basic computer literacy, including the use of general office software, such as Microsoft Office
• Basic Microsoft Windows navigation and keyboard proficiency skills
• Basic Internet usage skills, including use of a browser and search tools
• Basic email usage skills
• Moderate knowledge of TCP/IP fundamentals
• Experience with Internet-based messaging, including SMTP, Internet message formats, and MIME message formats

Course Objectives

The objective of this course is to:

  • Provide students with information and practical reinforcement activities that will prepare them to configure, administer, monitor and conduct basic troubleshooting tasks of the Cisco Email Security Appliance in small to medium-sized businesses and enterprise installations.

Course Content

Module 1: Reviewing the Cisco Email Security Appliance
Objective: Articulate the Cisco ESA product, including management series, SMTP conversation, terms and definitions, pipeline, and licensing
 
Lesson 1: Reviewing the Cisco Security Management Appliance
Objective: Review the Cisco Security Management Appliance
This lesson includes these topics:
• The Cisco Security Management Appliance
• Features and Benefits of the Cisco Security Management Appliance
• Centralized Reporting
• Advanced Message Tracking
• Cisco Security Management Appliance Benefits
• Model Specifications
• Cisco Security Management Appliance Deployment
 
Lesson 2: Defining an SMTP Conversation
Objective: Define how an SMTP conversation takes place
This lesson includes these topics:
• SMTP Conversation Overview
• Example: SMTP Conversation
 
Lesson 3: Identifying Terms and Definitions
Objective: Identify key terms and definitions
This lesson includes these topics:
• Terms and Definitions
 
Lesson 4: Examining the Pipeline
Objective: Examine the email pipeline and how incoming and outgoing email is processed
This lesson includes these topics:
• Processing Incoming Mail
• Process Outgoing Mail
The Email Pipeline
• Cisco Email Pipeline
 
Lesson 5: Describing Cisco Email Security Appliance Models and Licensing
Objective: Describe Cisco Email Security Appliance packaging and licensing options
This lesson includes these topics:
• Model Specifications for Large Enterprises
• Model Specifications for Midsize Enterprises and Small-to-Midsize Enterprises or Branch Offices
• Cisco Email Security Appliance Model Specifications for Virtual Appliances
• Packages and Licenses
 
Lesson 6: Installing and Verifying the Cisco Email Security Appliance
Objective: Describe the Email Security Appliance installation process
This lesson includes these topics:
• AsyncOS Architecture
• Describing the Listener
• One-Armed Deployment with Private Address
• Multiple Listeners
• Initial Cisco Email Security Appliance Configuration
• NIC Pairing
• Describing VLANs
• Cisco Email Security Appliance Management
Hardware Challenge Lab 1: Access the Cisco Remote Lab
This activity includes these tasks:
• Connect to the Remote Lab
Hardware Challenge Lab 2: Install Your Cisco Email Security Appliance
This activity includes these tasks:
• Install Your Cisco Email Security Appliance
 
Module 2: Performing an Evaluation
Objective: Recognize system architecture, explain the concept of the listener, describe various network topologies, and list the steps required to perform an evaluation life cycle
 
Lesson 1: Describing Cisco AsyncOS
Objective: Describe the Cisco AsyncOS platform
This lesson includes these topics:
• AsyncOS Platform
 
Lesson 2: Describing the Listener
Objective: Describe the listener
This lesson includes these topics:
• Listener Overview
• One-Armed Deployment with Private Address
• Two-Armed Deployment with DMZ
• Multiple Listeners
Hardware Challenge Lab 3: Plan the Cisco Email Security Appliance
 
Module 3: Administering the Cisco Email Security Appliance
Objective: Administer the Cisco Email Security Appliance
 
Lesson 1: Configuring Localized Message Tracking and Reporting
Objective: Configure and use localized message tracking and reporting
This lesson includes these topics:
• Localized Message Tracking and Reporting
• Local Message Tracking
• Using Local Message Tracking
• Search for Email with Message Tracking
• Message Tracking
• Localized Reporting
• Scheduling CSV or PDF Reports via Email
• Change Locale for Web GUI
• Choose Language for Generated Report
 
Lesson 2: Configuring Centralized Tracking and Reporting
Objective: Configure and use centralized email tracking and reporting
This lesson includes these topics:
• Addressing the Need for Multiple Cisco Email Security Appliances
• Centralizing Reporting and Tracking Data
• Place the Cisco Security Management Appliance in Your Network
• Access Centralized Reporting Data
• DLP Incident Summary
• Report Details on Large Enterprises: Domain-Based Overview Report
• Domain-Based Executive Summary
• Reporting Traffic in a Global Enterprise: Reporting by Appliance Groups
• Report by Appliance Groups
• Message Tracking with Cisco Security Management Appliance
 
Lesson 3: Tracking and Reporting Messages
Objective: Configure the Cisco Content Security Management Appliance to track and report messages
This lesson includes these topics:
• Configuring the Cisco Security Management Appliance for Email Applications
 
Lesson 4: Administering the Cisco Email Security Appliance
Objective: Administer the Cisco Email Security Appliance
This lesson includes these topics:
• System Administration Overview
• Upgrading the System
• Configuring Upgrade Settings
• Suspend and Resume Listeners
• Suspending and Resuming Listeners Using the GUI
• Display System Status over the Web
• Monitor System Status with SNMP
• Monitor System Status with the Web User Interface
 
Lesson 5: Managing Log Files
Objective: Manage log files
This lesson includes these topics:
• Access Logs
• Review Commit Comments in the System Log
• Sample Error Logs
 
Lesson 6: Creating and Using Administrator Accounts
Objective: Create and use administrator accounts
This lesson includes these topics:
• Predefined Administrative Users
• Administrator Password Controls
• Local User Account and Password Settings Page
• Account Locking
• The Basics of Custom User Roles
• User Role Creation
• Assigning a User to a Role
Hardware Challenge Lab 4: Perform Administration
This activity includes these tasks:
• Set Up Administration for the Cisco Email Security Appliance
 
 
Module 4: Controlling Sender and Recipient Domains
Objective: Explain the differences between the HAT and the RAT
 
Lesson 1: Configuring Public and Private Listeners
Objective: Configure public and private listeners
This lesson includes these topics:
• Public and Private Listeners
 
Lesson 2: Describing the HAT
Objective: Describe the HAT
This lesson includes these topics:
• Classifying Senders in the HAT
• Controlling the SMTP Connection (Two Listeners)
• Controlling the SMTP Connection (One Listener)
• Define Mail Flow Policies for Each Listener
• Sample Mail Flow Policies
• Edit the HAT
• Edit the HAT on the Public Listener
• Edit the HAT on the Private Listener
 
Lesson 3: Describing the RAT
Objective: Describe RAT
This lesson includes these topics:
• Adding New Domains in the RAT
• Adding Internal Domains to the RAT
• SMTP Routes Overview
• Configuring SMTP Routes
• Configure Prioritized SMTP Routes
• Configuring IP Routes
 
Lesson 4: Describing Email Authentication Methods
Objective: Describe email authentication methods
This lesson includes these topics:
• DomainKeys and DKIM
• Email Authentication with DomainKeys and DKIM
• Configuring DomainKeys and DKIM
• Enabling DKIM for Mail Flow Policies
• SPF and SIDF Verification
• Enabling SPF and SDIF for Mail Flow Policies
• SPF and SDIF Results in Message and Content Filters
 
Lesson 5: Defining Domain-Based Message Authentication
Objective: Define domain-based message authentication
This lesson includes these topics:
• What Is DMARC?
• DMARC Verification
• DMARC Resource Records
• DMARC Verification Profiles
• Configuring DMARC Verification Profiles
• Applying DMARC Profiles to Mail Flows
• Configuring DMARC Global Settings
• DMARC Reporting Options
• DMARC Reporting
 
Lesson 6: Troubleshooting with Mail Logs
Objective: Use troubleshooting tools to monitor mail that is sent through the Cisco Email Security Appliance
This lesson includes these topics:
• Using Debugging Tools
• Troubleshoot with Log Files
• Using Mail Logs
• Tracking Mail Messages with the tail mail_logs Command
• Use the findevent Command
• Use the grep Command
Hardware Challenge Lab 5: Test Your Listener Settings
This activity includes these tasks:
• Test Your Listener Settings
Hardware Challenge Lab 6: Prevent Domain Spoofing with DMARC
This activity includes these tasks:
• Prevent Domain Spoofing with DMARC
 
Module 5: Controlling Spam with Cisco SensorBase and Antispam
Objective: Discuss SensorBase and the antispam engine, make adjustments to the HAT and the antispam policies, and manage the spam quarantine both locally or using the management series
 
Lesson 1: Describing SensorBase
Objective: Describe the SensorBase network
This lesson includes these topics:
• Antispam Overview
• SensorBase Network
• Interpret SensorBase Scores
• Reputation Score Ranges per Sender Group (Default)
• Assigning SBRS Ranges per Sender Group
 
Lesson 2: Configuring Antispam
Objective: Configure and use antispam settings
This lesson includes these topics:
• Controlling Antispam Behavior in the Pipeline
• Spam Analysis by CASE
• Best Practices for Managing Spam
• Configure Mail Policy Spam Settings
• Marketing Message Detection: The Problem
• Detecting and Reporting Marketing Messages
• Detecting and Reporting Spam
• Microsoft Outlook
• Lotus Notes
• Outlook Express 6
• Entourage (Apple Mac)
• Apple Mail.app
• Mozilla Thunderbird
• Netscape Messenger
• Windows Live Mail
• Antispam Best Practices
 
Lesson 3: Quarantining Spam on the Cisco Email Security Appliance
Objective: Quarantine spam on the Cisco Email Security Appliance
This lesson includes these topics:
• Configure Spam Quarantine
• Accessing Quarantined Spam on the Cisco Email Security Appliance
• Configuring End-User Authentication
• Configuring Spam Notification Messages
 
Lesson 4: Describing Safelist and Blocklist
Objective: Describe and use safelist and blocklist
This lesson includes these topics:
• Overview of Safelists and Blocklists
• Configuring Safelists and Blocklists
• End-User List Management
• Safelist and Blocklist Deployment Details
• Use Headers to Track and Test Spam
 
Lesson 5: Quarantining Spam on the Cisco Security Management Appliance
Objective: Quarantine spam on the Cisco Content Security Management Appliance
This lesson includes these topics:
• External Spam Quarantine
• Configure the Spam Quarantine on the Cisco Security Management Appliance
• Accessing the Spam Quarantine
• Configuring the Cisco Security Management Appliance External Spam Quarantine
 
Lesson 6: Configuring Bounce Verification
Objective: Configure bounce verification
This lesson includes these topics:
• Bounce Verification
• Configuring Bounce Verification Address Tagging
 
Lesson 7: Describing Web Reputation Filters
Objective: Describe the function of web reputation filters
This lesson includes these topics:
• Web Reputation Applications
• Web Reputation in the Mail Flow
• Antispam Configuration
• Web Reputation Content Filter Conditions
• Web Reputation Content Filter Actions
• Web Reputation Message Filters
 
Lesson 8: Defining Outbreak Filters
Objective: Define outbreak filters
This lesson includes these topics:
• Outbreak Filters
• Configure Outbreak Filters
• Outbreak Filters Applied to Mail Policies
• Outbreak Filter Features
• Customize Outbreak Filters
• Monitor Outbreak Filters
• Monitor Outbreak Quarantines
Hardware Challenge Lab 7: Defend Against Spam with SensorBase and Antispam
This activity includes these tasks:
• Defend Against Spam
 
 
Module 6: Using Antivirus, Advanced Malware Protection, and Virus Outbreak Filter
Objective: Enable one or both antivirus engines, use one or both antivirus engines in mail policies, and identify best practices for managing antivirus
 
Lesson 1: Enabling Antivirus Engines
Objective: Enable one or both antivirus engines, use one or both antivirus engines in mail policies, and identify best practices for managing antivirus
This lesson includes these topics:
• Antivirus Overview
• Configuring Global Antivirus Settings (Enabling Sophos or McAfee)
• Dual Antivirus Scanning
• Recommended Antivirus Practices
• Configuring Antivirus Behavior on a Mail Policy
• Configuring the Antivirus Settings Page
• Track Virus Activity in the Mail Logs
• Check Logs for Virus Updates
• Control Antivirus Behavior in the Pipeline
• Virus Type Reports
 
Lesson 2: Using Outbreak Filters
Objective: Use outbreak filters to preemptively drop traffic and provide zero-hour protection
This lesson includes these topics:
• Outbreak Filters Overview
• Outbreak Rules vs. Adaptive Rules
• Taking Action with Outbreak Filters
• Working with Outbreak Filter Updates
• Listing and Updating Outbreak Filter Rules
• Configuring Outbreak Filters for a Mail Policy
• Managing an Outbreak Quarantine
• Creating Outbreak Reports
 
Lesson 3: Using Advanced Malware Protection
Objective: Configure Cisco SourceFire Advanced Malware Protection integration using file reputation and analysis services
This lesson includes these topics:
• Cisco SourceFire Advanced Malware Protection
• Advanced Malware Protection Enhances Cisco Email Security
• Cisco Zero-Hour Malware Protection
• File Reputation and Analysis
• File Processing Overview
• Enabling Advanced Malware Protection
• File Reputation and Analysis Settings
• Advanced Malware Protection Mail Policy
• File Analysis and Reputation Results as Conditions
• Monitor Advanced Malware Protection
Hardware Challenge Lab 8: Defend Against Viruses
This activity includes these tasks:
• Defend Against Viruses
Hardware Challenge Lab 9: Prevent Advanced Persistent Threats with Advanced Malware Protection
This activity includes these tasks:
• Prevent Advanced Persistent Threats with Advanced Malware Protection
 
 
Module 7: Using Mail Policies
Objective: Separate enterprise groups with different filtering requirements
 
Lesson 1: Describing Email Security Manager
Objective: Describe the application of Cisco Email Security Manager
This lesson includes these topics:
• Email Security Manager Overview
• Email Security Manager
• Mail Policies Overview
• Separate Incoming and Outgoing Mail Policies
• Match on Different Users with Mail Policies
 
Lesson 2: Creating User-Based Mail Policies
Objective: Create user-based mail policies
This lesson includes these topics:
• Define User-Based Policies
• Mail Policies Determine What Happens to Mail Messages
• Use Email Security Manager to Maintain Mail Policies
• Matching Users to a Policy
• Build Mail Policies by Changing Defaults
 
Lesson 3: Using Message Splintering
Objective: Use message tracking to monitor message splintering
This lesson includes these topics:
• Message Splintering Concepts
• Track Splintered Messages
• Finding Messages in Policy, Virus, and Outbreak Quarantines
• Mail Policy Matching Exercise
• Order of Mail Policies Make a Difference
Hardware Challenge Lab 10: Customize Mail Policies for Your End Users
This activity includes these tasks:
• Customize Mail Policies for Your End Users
 
 
Module 8: Using Content Filters
Objective: Describe content filters
 
Lesson 1: Describing Content Filtering
Objective: Describe content filtering
This lesson includes these topics:
• Use Content Filters
• Planning Your Content Filter Deployment
 
Lesson 2: Configuring Basic Content Filtering
Objective: Configure basic content filtering
This lesson includes these topics:
• Looking for Confidential Content in Outgoing Mail
• Creating a Content Filter
• Choosing Conditions and Actions
• Applying the Content Filter to a Mail Policy
• Testing with the Trace Tool
 
Lesson 3: Applying Content Filter Applications
Objective: Apply content filtering
This lesson includes these topics:
• Match on File Analysis by Advanced Malware Protection
• Match on File Attachments
• Detect Password-Protected Attachments
• Using Image Analysis
• Apply Content Dictionaries
• Give Weights to Dictionary Terms
• Import a Dictionary
• Editing the Imported Dictionary
• Apply the Dictionary with a Filter
• Track Matched Content
• Applying Content Dictionaries
• Remove Attachments with Keywords
Detect High-Volume Mail Attacks
 
Lesson 4: Describing and Configuring Message Filtering
Objective: Describe and configure message filtering to detect high-volume mail attacks
This lesson includes these topics:
• URL Filtering Applications
• URL Filtering Using Content Conditions
• Content Filter Actions
• URL Filtering Used with Message Filters
Hardware Challenge Lab 11: Enforce Your Business Policies in Email Delivery
This activity includes these tasks:
• Enforce Your Business Policies in Email Delivery
Hardware Challenge Lab 12: Manage High-Volume Mail Flow
This activity includes these tasks:
• Manage High-Volume Mail Flow
 
Module 9: Preventing Data Loss
Objective: Describe the RSA DLP engine, and prevent the loss of sensitive data in outbound email through the use of the RSA DLP engine
 
Lesson 1: Identifying the Data Loss Problem
Objective: Identify conditions where you may be held accountable for loss of data through email
This lesson includes these topics:
• Intellectual Property Leakage
• Protect Sensitive Data
 
Lesson 2: Choosing a Cisco DLP Solution
Objective: Choose a Cisco DLP solution
This lesson includes these topics:
• DLP Is Applied in Outgoing Mail Policies
• Identify DLP Violations
• List of International ID Numbers Covered in DLP
 
Lesson 3: Implementing DLP Configuration
Objective: Implement the DLP solution in an outgoing mail policy
This lesson includes these topics:
• Enable the DLP Feature
• Enabling DLP Policies
• Add a DLP Template from the Category
• Configure DLP Actions
• Configuring DLP Policy Customization
• Configuring Secondary Actions of DLP Policy
• Enable DLP in Outgoing Mail Policies
• DLP Is Tracked in the Mail Logs
• Troubleshoot with Trace
 
Lesson 4: Describing the RSA Engine
Objective: Describe the RSA engine
This lesson includes these topics:
In-Depth Analysis
• Weighted Scores
• Accurate Classifiers
• DLP Message Scanning Flow
• Severity Ratings
Hardware Challenge Lab 13: Configure DLP
This activity includes these tasks:
• Configure DLP
 
 
Module 10: Using LDAP
Objective: Configure LDAP to control the flow of email, and configure LDAP to enforce user access polices
 
Lesson 1: Describing LDAP Features
Objective: Describe the features of LDAP
This lesson includes these topics:
• LDAP Overview
• Attributes of LDAP Directories
• LDAP Uses a Hierarchical Namespace
• Using LDAP to Check Recipients
• LDAP and the Pipeline
 
Lesson 2: Describing Query Tokens and Operators
Objective: Describe query tokens and operators
This lesson includes these topics:
• Using Query Tokens and Operators
• Running the Active Directory Wizard
• Configuring Active Directory and Other LDAP Profiles
 
Lesson 3: Configuring LDAP Profiles
Objective: Configure an LDAP profile
This lesson includes these topics:
• Configuring an LDAP Server Profile
• Complete Server Setup
• Enabling the Accept Query on a Listener
• Preventing Harvest Attacks
 
Lesson 4: Configuring SMTP Call-Ahead
Objective: Configure SMTP Call-Ahead
This lesson includes these topics:
• SMTP Call-Ahead
Order of Recipient Validation
• SMTP Call-Ahead Profiles
• SMTP Call-Ahead Configuration
• Assign a Call-Ahead Profile to a Listener
• CLI Test
 
Lesson 5: Reviewing Case Studies
Objective: Apply knowledge to a case study
This lesson includes these topics:
• University Case Study: ABC University
• ABC University: Single Directory
• Accommodating Domains Not in the Directory
• Accommodating for Multiple Directories
• Option A: Separate Listeners
• Option B: Single Listener with Domain Assignments
• Configuring Domain Assignments
• Accommodating Multiple Directories in One Domain
• Configuring a Chained Query
• Review: What to Configure If...
• Routing (Aliasing)
• Masquerading
 
Lesson 6: Using LDAP Group Queries
Objective: Use LDAP group queries
This lesson includes these topics:
• Using Group Queries for Routing
• Using LDAP Group Queries
• LDAP and the Pipeline
• Using Group Queries for Routing: Example
• Configuring LDAP Group Queries
• Configuring Group Queries for Routing
• Review Questions
Hardware Challenge Lab 14: Configure LDAP Accept
This activity includes these tasks:
• Configure LDAP Accept
Hardware Challenge Lab 15: Configure SMTP Call-Ahead
This activity includes these tasks:
• Configure SMTP Call-Ahead
Hardware Challenge Lab 16: Accommodate Multiple Domains Using LDAP Accept Bypass and Domain Assignments
This activity includes these tasks:
• Use LDAP Accept Bypass
• Create Domain Assignments
Hardware Challenge Lab 17: Control Mail Policies with LDAP Group Queries
This activity includes these tasks:
• Create LDAP Group Queries
 
Module 11: Using Authentication and Encryption
Objective: Configure TLS to encrypt email, configure the Cisco Email Security Appliance to work with Cisco Registered Envelope Service to encrypt mail, and use DKIM and SPF to authenticate email
 
Lesson 1: Configuring Cisco Registered Envelope Service
Objective: Configure the Cisco Email Security Appliance to work with Cisco Registered Envelope Service to encrypt mail
This lesson includes these topics:
• Overview of Cisco Registered Envelope Service
• Registering a Recipient with Cisco Registered Envelope Service
• Recipient Receives a Notification Message with Encrypted HTML File
• Setting Up Email Encryption
• Enabling Email Encryption
• Configuring the Encryption Profile: Key Server Settings
• Configuring the Encryption Profile: Envelope Settings
• Configuring the Encryption Profile: Message and Notification
• Committing Your Changes
• Provisioning the Profile with Cisco Registered Envelope Service
• Initiating Encryption with Content Filters
• Defining the Encrypt Condition
• Defining the Encrypt Action
• No Auth Envelope: Encryption
• Multiple Cisco Registered Envelope Service Profiles
• Encrypt on Quarantine Exit
• Controlling Encryption Settings with SMTP Headers
• Guaranteed Secure Delivery
• Guaranteed Secure Delivery When Used with Secure Envelopes
• Outgoing Content Filter Controls Use of TLS
• Verifying TLS Failover in mail_logs
 
Lesson 2: Describing TLS
Objective: Describe TLS and configure TLS to encrypt email
This lesson includes these topics:
• TLS Overview
• Certificate Management Overview
Configuring TLS on Your Appliance
• Certificate Management
• Certificate Profile Creation
• Certificate Profile Management
• Creating a New Certificate Profile via CLI
• Certificate Profile Usage
• Certificate Authority Management
• CA Usage
• Updating a List of Revoked Certificates
• Choosing TLS Server Settings in the HAT
• Enabling Server TLS in Mail Flow Policies
• Choosing TLS Client Settings
• Enabling Client TLS in Destination Controls
• Outbound TLS Troubleshooting
• Verifying the TLS Connection in mail_logs
• Viewing Reports on TLS Connections
 
Lesson 3: Authenticating Email with SPF
Objective: Use SPF to authenticate email
This lesson includes these topics:
• Authentication Problems
• SPF and SIDF Authentication Features
• Email Fields that Are Checked by SPF and SIDF
• SPF Record Example
• SPF and SIDF Verification
• Implementing SPF
• Enabling SPF and SIDF in the HAT
• Checking Verified Mail with Content Filters
• Testing SPF and SIDF Results
Hardware Challenge Lab 18: Configure Envelope Encryption
This activity includes these tasks:
• Configure Envelope Encryption
Hardware Challenge Lab 19: Encrypt Email with TLS
This activity includes these tasks:
• Encrypt with TLS
 
Module 12: Understanding Clustering
Objective: Create a clustered environment and manage a clustered environment
 
Lesson 1: Creating a Clustered Environment
Objective: Create a clustered environment
This lesson includes these topics:
• Cluster Topology
• Setting Up Clustering
• Checking Required Features
• Creating a New Cluster
 
Lesson 2: Joining an Existing Cluster
Objective: Join an existing cluster
This lesson includes these topics:
• Joining an Existing Cluster
• Joining an Existing Cluster over SSH
 
Lesson 3: Managing a Clustered Environment
Objective: Manage a clustered environment
This lesson includes these topics:
• Centralized Management Overview
• Managing the Cluster from Any Machine
 
Lesson 4: Administering a Cluster from the GUI
Objective: Administer clusters from the GUI
This lesson includes these topics:
• Centralized Management Feature in the GUI
• Creating New Settings
• Centralized Management Best Practices
Hardware Challenge Lab 20: Configure Clusters
This activity includes these tasks:
• Configure Clusters

Course ID: PASESA

2 Days Course
USD 2000.00
 
Singapore (USD)
2 Days Course
USD 1,800.00
or 18 CLC
India (USD)

Show Schedule for 1 Month  3 Months  All 
Date Country Location Register
27 Mar 2017 - 28 Mar 2017 Singapore (USD) Singapore
17 Apr 2017 - 18 Apr 2017 Singapore (USD) Singapore
22 May 2017 - 23 May 2017 Singapore (USD) Singapore
19 Jun 2017 - 20 Jun 2017 Singapore (USD) Singapore
06 Mar 2017 - 07 Mar 2017 India (USD) Bangalore/Chennai
03 Apr 2017 - 04 Apr 2017 India (USD) Bangalore/Chennai
15 May 2017 - 16 May 2017 India (USD) Bangalore/Chennai
05 Jun 2017 - 06 Jun 2017 India (USD) Bangalore/Chennai