Oracle Essbase is the market leading online analytical processing (OLAP) server for enterprise performance management (EPM) applications. Designed specifically for business users, Oracle Essbase supports forecasting, variance analysis, root cause identification, scenario planning and whatif modeling for both custom and packaged applications. It can be tightly integrated with multiple data sources and the information generated can be delivered through a wide variety of reporting options. Engineered for scalability, security, and rapidresponse, Oracle Essbase brings advanced analytics to the business user to enable greater understanding of the business, alignment of resources and improved business results.


What you will learn:

This Oracle Essbase 11.1.2 training teaches you the principal techniques and theories to design Essbase block storage databases. Block storage databases are deployed independently for budgeting, forecasting and planning, and as the underlying data storage and analytic engine for Hyperion Planning applications.

Course Objective

Create block storage databases
Create dimensions using rules files
Load data using rules files
Analyze data with Smart View
Describe multidimensional calculation
Create basic database calculations
Analyze dimension attributes
Analyze non-numeric data

Course Topics

Essbase Overview

Multidimensional Analysis
Oracle’s Enterprise Performance Management System
Oracle BI Foundation Suite
Essbase Production Environment Components

Designing Applications and Databases

Essbase Implementation Process
Analyzing and Planning Implementations
Creating Applications and Databases
Creating Outlines

Block Storage Databases

Describe block storage calculations
Describe the default database calculation order
Describe data blocks

Aggregate Storage Databases

Describe when to deploy aggregate storage, block storage, or a combined solution
Convert block storage to aggregate storage
Create, load, and pre-aggregate aggregate storage databases
Employ database partitioning in combined block/aggregate storage solutions
Write member formulas using MDX
Perform management tasks for aggregate storage databases
Partition block and aggregate storage databases
Describe and implement aggregate storage design best practices
Describe multiple hierarchies and the use of Shared Members

Designing Data Descriptor Dimensions

Data Descriptor Dimensions Overview
Designing Time Dimensions
Designing Scenario Dimensions
Outline Calculations
Designing Accounts Dimensions
Testing Outline Calculations

Optimizing Data Descriptor Dimensions

Creating Member Aliases
Dimension Types
Creating Period-to-Date Totals
Dynamic Calc Members
Enhancing Accounts Dimensions
Optimizing Data Storage

Developing Dimension Designs

Business View Dimensions Overview
Attributes in Database Design
Combining Business Views
Developing Label Outlines

Creating Basic Dimension Build Rules Files

Rules Files Overview
Creating Dimension Build Rules Files
Configuring Dimension Maintenance Settings

Creating Advanced Dimension Build Rules Files

Advanced Dimension Build Rules Files Overview
Creating Shared Members
Manipulating Fields
Creating User-Defined Attributes
Creating Attribute Dimensions with Rules Files

Loading Data

Data Load Overview
Creating Data Load Rules Files
Selecting and Rejecting Records
Capturing New Members

Getting Started with Smart View

Navigating Smart View
Connecting to Data Sources
Creating Ad Hoc Grids
Setting the Point of View
Associating Data Sources with Worksheets
Creating Free-Form Grids

Creating Reports with Smart View

Updating Essbase Data
Integrating Essbase Data with Microsoft Office
Creating Shared Database Perspectives
Creating Custom Reports

Data Storage and Calculation

Calculation Overview
Database Calculation Order
Data Block Fundamentals
Data Blocks and the Index System
Interpreting Database Statistics
Data Block Creation
Database Calculation Process

Creating Calculation Scripts

Calculation Script Organization
Returning Correct Calculation Results
Troubleshooting CALC DIM Processes

Controlling the Calculation Process

Top-Down Calculation
Focusing Calculations with FIX Statements
Calculating Conditionally with IF Statements
Performance Considerations

Referencing Members in Calculations

Referencing Members Explicitly
Referencing Members Dynamically
Creating Calculation Variables

Developing and Testing Complex Calculation Scripts

Implementing a Script Development Process
Upper-Level Data Loads
Intelligent Calculation

Normalizing Data

Allocating Data
Planning Data Normalization
Normalizing Rates and Drivers
Copying and Clearing Data

Creating Attribute Dimensions

Attribute Dimensions Overview
Adding Attribute Dimensions to Outlines
Design Considerations

Analyzing Varying Attributes

Varying Attributes Overview
Creating Varying Attributes
Viewing Varying Attribute Data

Analyzing Text and Dates

Typed Measures Overview
Enabling Typed Measures
Creating Text Measures
Creating Date Measures
Viewing Typed Measures
Calculations Based on Typed Measures

Essbase Administration

Describe the file Essbase.cfg and its settings
Describe the file Essbase.sec and its settings
Identify and interpret Essbase log files
Manage Essbase security via Administration Services
Manage Essbase security via Shared Services
Back up and recover Block Storage Databases
Automate database processes with MaxL
Describe and use substitution variables and location aliases


Related Courses
  • UIPath Course Syllabus

    The user Interface

    • Start
    • Design
    • Execute
    • Setup

    Workflow Designer Panel

    • Main Panel
    • Activities Panel
    • Library Panel
    • Project Panel
    • Properties Panel
    • Outline Panel
    • Output Panel


    Types of Workflows

    • Sequences
    • Flowcharts
    • State Machines


    • Managing Variables
    • Variable panel
    • Types of variable


    • Managing Arguments
    • Arguments panel
    • Using Arguments

    Imported namespaces

    • Importing New Namespaces

    Controlled Activities

    • Assign Activity
    • Delay Activity
    • Do while Activity
    • If activity
    • Switch Activity
    • While Activity
    • For Each activity
    • Exception and Debugging


    • Basic
    • Desktop
    • Web
    • Citrix

    UI Elements

    • Input Method
    • Output/ Screen Scraping

    Data Scraping

    • Example of using Data scraping
    • PDF and Email


    • Wildcards
    • Full Versus partial selectors
    • UIPath Explorer

    Image and Text Automation

    • Mouse and keyboard activities
    • Text activities
    • OCR Activities
    • Image Activities

    Automating Terminals and Mainframes

    • Introduction
    • Terminal wizard
    • Terminal activities
    • Advanced activities
    • Supported providers

    Databases Connections


    The user Interface

    • Start
    • Design
    • Execute
    • Setup

    Workflow Designer Panel

    • Main Panel
    • Activities Panel
    • Library Panel
    • Project Panel
    • Properties Panel
    • Outline Panel
    • Output Panel


    Types of Workflows

    • Sequences
    • Flowcharts
    • State Machines


    • Managing Variables
    • Variable panel
    • Types of variable


    • Managing Arguments
    • Arguments panel
    • Using Arguments

    Imported namespaces

    • Importing New Namespaces

    Controlled Activities

    • Assign Activity
    • Delay Activity
    • Do while Activity
    • If activity
    • Switch Activity
    • While Activity
    • For Each activity
    • Exception and Debugging


    • Basic
    • Desktop
    • Web
    • Citrix

    UI Elements

    • Input Method
    • Output/ Screen Scraping

    Data Scraping

    • Example of using Data scraping
    • PDF and Email


    • Wildcards
    • Full Versus partial selectors
    • UIPath Explorer

    Image and Text Automation

    • Mouse and keyboard activities
    • Text activities
    • OCR Activities
    • Image Activities

    Automating Terminals and Mainframes

    • Introduction
    • Terminal wizard
    • Terminal activities
    • Advanced activities
    • Supported providers

    Databases Connections


    + -

    Blue Prism course syllabus

     Process Studio

    • Running a process
    • Basic skills
    • Process Validation
    • Decision Stage
    • Calculation Stage
    • Data Items

    Process Flow

    • Circular paths
    • Controlling Play
    • Set Next Stage
    • Breakpoints
    • Collections and loops
    • Layers of logic
    • Pages for organisation


    Process Inputs and Outputs

    • Input Parameters
    • Stepping and Pages
    • Data Item
    • Data Types
    • Output Parameters
    • Start Up parameters
    • Control Room
    • Process output

    Business Objects

    • Object Studio
    • Business Objects
    • Action Stage
    • Inputs and Outputs
    • The Process Layer

    Object Studio

    • Creating a BO
    • Application Modeller
    • Spying Elements
    • Attributes
    • Launch
    • Wait
    • Timeouts
    • Terminate
    • Write
    • Press
    • Attach and Detach
    • Read
    • Actions
    • Inputs and Outputs
    • Data Items

    Overview of Error and case Management

    • Error Management
    • Exception Handling
    • Recover and Resume
    • Throwing Exceptions
    • Preserving the current exception
    • Exception bubbling
    • Exception Blocks
    • Exception Handling in practice

    Case Management

    • Work Queues
    • Queue Items
    • Work Queue Configuration
    • Defer
    • Attempts
    • Pause and Resume
    • Filters
    • Reports

    Additional Features

    • Collections Actions
    • Choice Stage
    • Logging
    • Log Viewer
    • System Manager
    • Process Grouping
    • Export and Imports
    • Release Manager – Packages and Releases

    Consolidation Exercise

    • Order System Process
    • Consolidation Exercise Checklist
    • Submitting your Completed Solution

    Advance Features

    • Undefined Collections
    • Data Item Initialisation
    • Data Item Exposure
    • Casting
    • Code Stage
    • Run Mode
    • Initialise and Clean-up
    • Attribute Match Types
    • Dynamic Attributes
    • Active Accessibility
    • Application Manager Mode
    • Global Clicks and keys
    • credentials

    Application Types

    • Mainframes Applications
    • Java Applications
    • Match Index and Match Reverse
    • Surface Automation

    + -
  • Architecture

    Dashboard and Task Editor

    • Client registration with Control Room
    • Features of Task Editor
    • Different sections in AA tools


    Types of Bots

    • Task Bots
    • Meta Bots
    • IQ Bots

    Task Bots and Recording

    • Recording Task
      • Web Recorder
      • Smart Recorder / Object Recorder
      • Screen Recorder
      • Task Creation

    Types of Automation

    • UI Layer or Regular Automation
    • Surface Automation


    • App Integration
    • Active Directory
    • Citrix Automation
    • Clipboard
    • Database
    • Delay
    • Email Automation
    • Error-Handling
    • Excel and Excel Session
    • Files and Folder Handling Mechanism
    • IF Condition
    • Image recognization
    • Insert Key Strokes
    • Insert Mouse Click
    • Insert Mouse Move
    • Insert Mouse Scroll
    • Insert Mouse Scroll
    • Internet Connection
    • Launch Website
    • Log To File
    • Loop command
    • Manage Windows Controls
    • Message Box
    • OCR
    • Open Program/file
    • Objects Cloning
    • PDF integration
    • Reading Form Fields
    • PGP Command: Security types i.e. Passphrase, Public key mechanism
    • Printers
    • Prompt Mechanism
    • Read from CSV / Text: Different and benefit of this Command from Excel command
    • Run Scripts
    • Calling Scripts and Capturing output
    • Screen Capture
    • Send Mail
    • Services
    • String Operation
    • System command Features
    • Task Command
    • Run Task: Sub Task Calling and Mapping Variable
    • Terminal Automation
    • Variable Command
    • Wait Command and Different from Delay Command
    • Web Actions/Recording
    • Web Services
    • RESTL web services
    • SOAP Web services
    • Window Actions
    • XML

    Advanced Features

    • Meta Bot
    • IQ Bot
    • Web Control Room

    Control Room

    • Upload/Download Task and Deploy Project
    • Add Clients
    • User Management
    • Operations Room
    • Repository

    Other Features

    • Assisted Automation
    • Auto Trigger Automation
      • Scheduling
      • Event Trigger

    Plug-In and Settings

    • Java Settings
    • IE settings
    • Flex/Silver Light Settings

    + -
  • Hyperion planning Course Syllabus

    Introduction to Planning

    Oracle Hyperion Planning
    Planning Architecture
    Planning Business Process
    Planning Business Scenario

    Navigating Planning

    Interface: Overview
    Launching the Simplified Interface

    Introduction to Applications and Dimensions

    Planning Application: Overview
    Application Framework
    Planning Dimensions
    Aggregate Storage Databases
    Data Block Creation Process
    Aggregation, Storage, and Calculation Options

    Creating Planning Applications

    Application Creation Process
    Managing Data Sources
    Creating Simple Applications
    Creating Advanced Applications
    Refreshing Essbase Databases
    Adding Plan Types

    Managing Dimensions

    Building Dimension Hierarchies
    Performance Settings and Data Type Evaluation Order
    Accessing Dimensions Information
    Managing Dimensions in the Simplified Interface
    Managing Dimensions in EPM Workspace
    Managing Dimensions in Smart View

    Setting Up Aliases, Currencies, Years, and Periods

    Creating Aliases
    Adding Currencies
    Customizing Time Periods

    Setting Up Scenarios and Versions

    Scenarios and Versions
    Creating Scenarios
    Creating Versions

    Setting Up the Entity and Account Dimensions

    Entities: Overview
    Adding Entities
    Deleting Entities
    Accounts: Overview
    Account Types and Time Balance Properties
    Saved Assumptions
    Data Types and Exchange Rate Types
    Adding and Aggregating Accounts

    Loading Metadata

    Metadata Load Options
    Creating Metadata Load Files
    Exporting Metadata
    Importing Metadata
    DRM Metadata Load Process
    Application Management

    Creating User-Defined Elements

    Creating Member Formulas
    User-Defined Dimensions
    Attribute Dimensions
    Adding User-Defined Attributes
    Smart Lists: Overview
    Enabling the Simplified Interface
    Customizing Interface Appearance

    Setting Up Exchange Rates

    Currencies and Exchange Rates
    Creating Exchange Rate Tables
    Currency Conversion Calculation Scripts

    Loading and Calculating Data

    Data Load Options
    Managing Planning Data
    Exporting Data
    Importing Data
    FDMEE Data Load Process
    Data Calculations

    Setting Up Planning Security

    Planning Security: Overview
    User and Group Provisioning in Shared Services
    Specifying Advanced Settings
    Assigning Access Permissions

    Creating Forms

    Forms: Overview
    Form Components
    Creating Simple Forms
    Creating Composite Forms
    Exporting and Importing Forms

    Enhancing Forms

    Creating Complex Forms
    Specifying Application Settings
    Specifying User Variables
    Setting Individual Display Options
    Creating Menus
    Creating Formula Rows and Columns
    Building Validation Rules

    Entering Data in Planning

    Navigating Forms
    Submitting Data in Forms
    Filtering Data
    Sorting Data
    Spreading Data
    Adjusting Plan Data

    Annotating and Analyzing Data

    Adding Annotations to Plan Data
    Clearing Cell Details
    Working with Ad Hoc Grids

    Managing Business Rules

    Business Rules: Overview
    Determining Calculation Requirements
    Launching Calculation Manager and Rule Components
    Managing Views
    Creating Business Rules and Rule Sets
    Validating and Deploying Rules
    Assigning Business Rule Security
    Launching Business Rules

    Setting Up the Approval Process

    Approvals: Overview
    Creating Planning Unit Hierarchies
    Assigning Scenario and Version Combinations
    Synchronizing Planning Unit Hierarchies
    Exporting and Importing Planning Unit Hierarchies
    Updating the Promotional Path with Validation Rules

    Managing the Approval Process

    Approvals Dashboard
    Planning Unit Approval States
    Reviewer Actions
    Impact of Entity Hierarchy on the Review Process
    Managing the Review Cycle
    Viewing and Resolving Validation Errors
    Copying Data Between Versions
    Copying Data

    Creating Task Lists

    Task Lists: Overview
    Navigating Task Lists
    Task List Creation Process


    A: Creating Applications in Performance Management Architect
    Case Study

    + -
  • Oracle FDMEE Course Syllabus

    Production Orientation

    FDMEE Overview Key
    Benefits and Features of FDMEE
    FDMEE Integration Process
    Processing Data Overview
    Accessing and Navigating in FDMEE

    Preparing FDMEE Integrations

    Integration Setup Overview
    Setting Up the Application Root Folder
    Defining Profiles
    Setting Up Source Systems
    Registering Target Applications

    Setting Up Import Formats for File Systems

    Import Formats Overview
    Creating Import Formats
    Defining Import Format Mappings
    Skipping Lines in Import Files
    Concatenating Fields
    Adding Import Expressions

    Completing the Integration Setup

    Locations Overview
    Adding Locations
    Setting Location Details and Integration Options
    Periods and Categories Overview
    Defining Period Mappings
    Defining Category Mappings
    Point of View Overview

    Setting Up Data Load Mappings

    Data Load Mappings Overview
    Defining Data Load Mappings
    Explicit Mappings
    Mapping Rules
    Processing Order
    Building Maps Externally
    Importing Mappings
    Sharing Mappings

    Defining and Executing Data Load Rules

    Data Load Rules Overview
    Defining Data Load Rules for File-Based Data Loads
    Loading Data into Multiple Periods
    Running Data Rules and Checking Rule Status
    Viewing Imported Data
    Scheduling Data Load Rules

    Processing Data in Data Load Workbench

    Processing Data Overview
    Importing Source Data
    Validating Dimension Mappings
    Fixing Validation Errors
    Intersection Check Reports
    Managing Data
    Loading Data to Target Applications
    Drilling Through from Target Applications

    Setting Up Check Rules and Check Entities

    Check Rules and Reports Overview
    Creating Check Rule Groups and Check Rules
    Assigning Check Rules to Locations
    Verifying Check Rules
    Check Entities Overview
    Creating Check Entity Groups
    Verifying Consolidations

    Processing Batches

    Batch Processing Overview
    Adding Batch Definitions
    Defining Batch Parameters
    Executing Batches
    Creating and Executing Open Batches
    Scheduling Batches
    Executing Batch Scripts

    Reporting in FDMEE

    FDMEE Reports Overview
    Running Reports
    Reviewing and Adding Query Definitions
    Generating XML Files
    Creating Report Templates
    Adding Report Definition

    Setting up Security

    FDMEE Security Overview
    Setting Up FDMEE Security
    Defining Role, Report, and Batch Security
    Location Security
    Assigning Users to Groups in Shared Services
    Provisioning Users in Shared Services

    Defining Import Scripts

    Scripting in FDMEE Overview
    Accessing Script Editor
    Creating Import Scripts
    Assigning Import Scripts to Import Formats
    Applying Import Script Functions
    Using Temporary Variables in Import Scripts

    Defining Mapping and Event Scripts

    Mapping Scripts Overview
    Setting Up Mapping Scripts
    Event Scripts Overview
    Creating Event Scripts
    Changing Import Formats Dynamically
    Using the File System Object in Event Scripts

    FDMEE Integration with Other Source Systems

    GL Integration Overview
    Registering ERP Source Systems
    Selecting Source Accounting Entities
    Creating Import Formats for Accounting Entities
    Setting Up the Integration for Source Systems
    Drilling Through to Source Data
    Importing Source Data from the Open Interface Table

    + -
  • What you will learn:

    This course teaches you how to to set up and manage the Account Reconciliation Manager module of Financial Close Management.

    You create reconciliation formats and account profiles, create periods, load account balances and currency rates intoperiods, perform account reconciliations, and monitor account reconciliation workflow.

    Learn to:
    Create reconciliations formats
    Create account profiles
    Define reconciliation workflow
    Create periods and load balances
    Perform reconciliations and monitor the reconciliation process
    Configure system settings for account reconciliations

    A Live Virtual Class (LVC) is exclusively for registered students; unregistered individuals may not view an LVC at any time. Registered students must view the class from the country listed in the registration form. Unauthorized recording,copying, or transmission of LVC content may not be made.

    Course Objectives

    Configure system settings for account reconciliations
    Create reconciliations formats
    Define reconciliation workflow
    Create periods
    Load account balances
    Perform reconciliations
    Monitor reconciliation workflow using the dashboard and list views
    Create report binders

    Course Topics

    Setting Up The System

    Creating Frequencies
    Setting Up Currency Translation
    Setting Up Account Profile Segments
    Setting Up Aging Profiles
    Setting Up System Attributes
    Life cycle Management

    Setting Up Security

    Users and Groups
    Assigning Security Roles
    Viewing Provisioning Reports
    Configuring Power User Security
    Enabling Security Auditing

    Setting Up Reconciliation Formats

    Reconciliation Methods
    Creating Custom Attributes
    Creating Reconciliation Formats
    Adding Instructions
    Adding Questions

    Setting Up Account Profiles

    Setting Profile Properties
    Adding Instructions
    Setting Up Workflow
    Setting up Currency
    Adding Commentators and Viewers

    Importing, Exporting, and Updating Account Profiles

    Importing and Exporting Account Profiles
    Creating Basic and Advanced Filters
    Bulk Updating of Account Profiles

    Setting Up Periods

    Creating Periods
    Copying Account Profiles into Periods
    Identifying Missing Profiles
    Identifying Invalid Profiles
    Updating Reconciliations
    Deleting Periods

    Loading Balances and Currency Rates

    About ERPi and Account Reconciliation Manager
    Data Load Sources
    Drill Through and Summarization
    ERPi Locations
    Data Load Process
    Running Data Loads
    Viewing Warnings
    Entering Currency Rates

    Managing Reconciliations

    Opening Periods
    Adding Transactions to Reconciliations
    Submitting Reconciliations
    Reviewing and Approving Reconciliations
    Closing and Locking Periods

    Monitoring Reconciliations

    Viewing Reconciliations and Transactions in List Views
    Viewing Reconciliations in the Dashboard
    Customizing the Dashboard
    Creating Report Binders
    Viewing Report Binders

    + -
  • Part I Administering Reconciliation Compliance

    1. Learning About The Reconciliation Process

    Understanding the process
    Overview of ARCS

    2. Managing Reconciliations

    Creating Reconciliations 
    Checking for Missing Reconciliations
    Preparing Account Reconciliations
    Viewing Reconciliation Summary Headers
    Creating Filters and Saving Views
    Importing Data Using Data Management
    Importing Pre-mapped Data
    Amortizing or Accreting Transactions
    Editing, Copying, and Deleting Transactions
    Changing a Period's Status
    Closing and Locking Periods
    Submitting, Approving or Rejecting Reconciliations
    Performing Team Reconciliations
    Performing Summary Reconciliations

    3. Using Reports

    Generating Predefined Reports
    Generating Custom Reports
    Creating a Query
    Creating a Template
    Setting Up A Report Group
    Setting Up a Report Definition
    Generating the Report
    Using Report Binders
    Generating Report Binders
    Viewing Report Binders

    4. Updating Reconciliations

    Managing Reassignment Requests
    Requesting Reassignments
    Requesting a Reassignment for One Reconciliation
    Requesting a Reassignment for Multiple Reconciliations
    Reassigning Preparers and Reviewers
    Updating Reconciliation Attributes
    Reopening Reconciliations

    5. Migrating to the Same or a Different Environment

    Migrating Using EPM Automate Utility

    6. Using EPM Automate for Administrative Tasks

    Part II - Administering Transaction Matching

    7. Setting Up Transaction Matching

    Creating Calendars
    Creating Reconciliation Types
    Defining Data Sources
    Defining the Match Process

    8. Creating Reconciliations

    9. Perform Other Tasks

    Using EPM Automate for Administrative Tasks
    Migrating to the Same or a Different Environment
    Migrating Using EPM Automate Utility

    + -
  • At Course Completion After completing this course, students will be able to:
    • Install and configure Windows Server 2008.
    • Add and configure Windows Server Core roles.
    • Explain the new backup infrastructure, including Volume Shadow Copy Service.
    • Identify new and improved networking features with Windows Server 2008.
    • Configure Hyper-V virtual machines.
    • Identify considerations when upgrading from a Windows Server 2003 to a Windows Server 2008 Active
    Directory infrastructure.
    • Install and configure Active Directory Federation Services, Active Directory Lightweight Directory Services,
    and Active Directory Rights Management Services.
    • Configure Windows Server 2008 Failover Clustering.
    • Configure Windows Server 2008 Network Load Balancing.
    Module 1: Installing and Configuring Windows Server 2008
    This module explains how to install and configure Windows Server 2008. It also explores using Server Manager
    to work with roles, features, PowerShell and other aspects of server configuration like Automatic Updates.
    Server Manager Roles
    Windows Server 2008 Features
    Active Directory Improvements Lab: Configuring Windows Server 2008
    Initial Configuration Tasks
    Server Manager Console
    Server Manager Wizards
    Windows PowerShell After completing this module,
    Module 2: Windows Deployment Services This module explains how to use benefits and components of
    Windows Deployment Services, including image capture and management.
    Introducing Windows Deployment Services
    WDS Components Lab: Working With Windows Deployment Services
    Install and Configure Windows Deployment Services
    Working with Images
    Creating Images
    Using Unattend Files
    Module 3: Windows Server 2008 Server Core
    This module explains how to use key functionality and benefits of a Server Core installation, including adding
    and configuring roles.
    Server Core Introduction
    Configuring and Managing Server Core Lab: Server Core
    Installing Windows Server Core
    Configure Server Core
    Add and Configure Server Roles
    Add Backup Feature
    Managing Server Core
    Module 4: Windows Backup This module provides an overview of the new backup infrastructure in Windows
    Server 2008, including Volume Shadow Copy service, scheduled vs. manual backups, media, the Universal
    Disk Format (UDF), and restoring data.
    Backup Infrastructure
    Optical Media
    Restore Utilities Lab: Backup and Restore System Data
    Perform Installation Tasks
    Schedule a Backup
    Create a Manual Backup
    Schedule Daily AD DS Backup via Command Line
    Backup and Recovery with Vista Client
    Restore Files and Folders
    Perform Windows RE Tasks
    Module 5: Windows Server 2008 Updates to Networking This module explains how to use new and improved
    networking features in Windows Server 2008, including server and domain isolation, IPv6, and DNS. Lessons
    Networking with Windows Server 2008
    New Networking Features
    DNS with Windows Server 2008
    Configuring Routing
    Configuring Wireless Settings in Server 2008
    Lab 1: Reviewing Networking Defaults and Settings
    Review the Network Center
    Creating Domain Isolation Policies
    Create a Centralized QoS Policy
    Communicate with Link-Local Addresses Lab 2: DNS Management Settings
    Creating Zones in Windows Server 2008
    Create Resource Records Configure Zone Transfers
    Module 6: Hyper-V This module explains how to use new capabilities and architecture in Hyper-V, including
    integrated management functions for physical and virtual environments.
    Introducing Hyper-V
    Configuring Hyper-V Lab: Configuring Hyper-V
    Install and Configure Hyper-V
    Configure Virtual Networks
    Add Virtual Machines
    Monitoring and Optimization
    Module 7: Planning for Windows Server 2008 Active Directory Services This module explains how to install
    and configure the Active Directory Domain Services (ADDS) server role and administering it with Server
    Manager. It also explores planning for deploying an Active Directory Domain Services infrastructure.
    Planning for AD DS Deployment
    Upgrade Considerations Lab 1: Installing a Windows Server 2008 Forest
    Install a New Forest Lab 2: Installing Windows Server 2008 in an Existing Forest
    Install a Windows Server 2008 DC in an Existing Forest
    Verify Active Directory Installation
    Module 8: Active Directory Domain Services This module explains how to create and manage accounts,
    subnets, Site-Links, and Group Policy with new features in Active Directory Domain Services.
    What’s New in AD DS
    Manageability and Reliability Lab: Exploring Active Directory Domain Services Course Outline
    Updating your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008
    Create Accounts
    Review Operations Masters Role
    Review Sites
    Working with Subnets
    Working with Site-Links
    AD DS and Group Policy
    Review DNS Configuration
    Module 9: Identity and Access Services in Windows Server 2008 Active Directory
    This module introduces Windows Server 2008's new Active Directory Services:
    Active Directory Federation Services for identity access solution
    Active Directory Lightweight Directory Services (replaces Active Directory Account Management with
    Windows Server 2003), providing directory services for applications.
    Active Directory Right Management Services, enabling the creation of informationprotection solutions.
    Active Directory Federation Services
    Active Directory Lightweight Directory Services
    Active Directory Rights Management Services Lab 1: Active Directory Federation Services
    Install AD FS
    Configure Certificates
    Configure Web Server
    Configure the Account Federation Server
    Configure the Resource Federation Server
    Access Application from Client Computer
    Module 10: High Availability Features This module explains how to use failover clustering and network load
    Failover Clustering
    Network Load Balancing Lab: High Availability Features
    Installing a Two-Node File Server Cluster
    Configure Network Load Balancing with IIS After completing this module, students will be able to:
    Configure Windows Server 2008 Failover Clustering.
    Configure Windows Server 2008 Network Load Balancing.
    Module 11: Performance Monitoring and Optimization This module explains how to use Windows Server
    2008's performance monitoring tools, including using Windows System Resource Manager to implement server
    resource controls.
    Windows Reliability and Performance Monitor
    Microsoft Windows System Resource Manager
    Monitoring Events Lab: Performance Monitoring and Optimization
    Reviewing Performance and Reliability Monitoring
    Key Scenarios for Monitoring Performance and Reliability
    Add Windows System Resource Manager Feature
    Windows System Resource Manager Scenarios
    Configure Windows System Resource Manager for Terminal Services
    Module 11: Software Maintenance Using Windows Server Update Services This module introduces
    Microsoft® Windows Server Update Services (WSUS), a tool for managing and distributing software updates
    that resolve known security vulnerabilities and other stability issues in Microsoft Windows® 2000 and newer
    operating systems, as well as other Microsoft applications. This module also describes how to install the client
    and server components of WSUS. It also provides necessary information about managing the WSUS
    infrastructure. Lessons
    Introduction to Windows Server Update Services
    Installing and Configuring Windows Server Update Services
    Managing Windows Server Update Services

    + -
  • Overview:
    Learn how to configure, manage, and maintain Windows Server 2012 R2 Hyper-V and System Center 2012
    R2 Virtual Machine Manager including networking and storage services. Also learn how to configure key
    Microsoft Server Virtualization features such as Generation 2 Virtual Machines, Replication Extension,
    Online Export, Cross-Version Live Migration, Online VHDX Resizing, Live Migration Performance tuning as
    well as Dynamic Virtual Switch Load Balancing and virtual Receive Side Scaling (vRSS).
    Understanding of TCP/IP and networking concepts, different storage technologies and concepts, and
    Windows Powershell; ability to work in a team/virtual team
    This course is intended for IT professionals who are responsible for designing, implementing, managing,
    and maintaining a virtualization infrastructure or are interested in learning about current Microsoft
    Virtualization technologies. The secondary audience for this course includes IT decision makers who will
    determine which virtualization product to implement in their data centers.

    Lesson 1 : Evaluating the Environment for Virtualization
    Overview of Microsoft Virtualization
    Overview of System Center 2012 R2 Components
    Evaluating Current Environment for Virtualization
    Extending Virtualization to the Cloud
    Lesson 2 : Installing and Configuring the Hyper-V Server Role
    Installing the Hyper-V Server Role
    Managing Hyper-V
    Configuring Hyper-V Settings
    Hyper-V Host Storage and Networking
    Lesson 3 : Creating and Managing Virtual Hard Disks, Virtual Machines, and Checkpoints
    Creating and Configuring Virtual Hard Disks
    Creating and Configuring Virtual Machines
    Installing and Importing Virtual Machines
    Managing Virtual Machine Checkpoints
    Monitoring Hyper-V
    Designing and Managing Virtual Machines
    Lesson 4 : Creating and Configuring Virtual Machine Networks
    Creating and Using Hyper-V Virtual Switches
    Advanced Hyper-V Networking Features
    Configuring and Using Hyper-V Network Virtualization

    Lesson 5 : Virtual Machine Movement and Hyper-V Replica
    Providing High Availability and Redundancy for Virtualization
    Implementing Virtual Machine Movement
    Implementing and Managing Hyper-V Replica
    Lesson 6 : Implementing Failover Clustering with Hyper-V
    Overview of Failover Clustering
    Configuring and Using Shared Storage
    Implementing and Managing Failover Clustering with Hyper-V
    Lesson 7 : Installing and Configuring System Center 2012 R2 Virtual Machine Manager
    Integrating System Center and Server Virtualization
    Overview of System Center 2012 Virtual Machine Manager
    Installing System Center 2012 R2 Virtual Machine Manager
    Adding Hosts and Managing Host Groups
    Lesson 8 : Managing the Networking and Storage Infrastructure in System Center 2012 R2
    Virtual Machine Manager
    Managing Networking Infrastructure
    Managing Storage Infrastructure
    Managing Infrastructure Updates
    Lesson 9 : Creating and Managing Virtual Machines by Using Microsoft System Center 2012 R2
    Virtual Machine Manager
    Virtual Machine Management Tasks in VMM
    Creating, Cloning, and Converting Virtual Machines
    Overview of Virtual Machine Updating
    Lesson 10 : Configuring and Managing the System Center 2012 R2 Virtual Machine
    Overview of the Virtual Machine Manager Library
    Working With Profiles and Templates
    Lesson 11 : Managing Clouds in System Center 2012 R2 Virtual Machine Manager
    Introduction to Clouds
    Creating and Managing a Cloud
    Working With User Roles in Virtual Machine Manager
    Lesson 12 : Managing Services in System Center 2012 R2 Virtual Machine Manager and App
    Understanding Services in System Center 2012 R2 Virtual Machine Manager
    Creating and Managing Services in VMM
    Using System Center 2012 R2 App Controller
    Lesson 13 : Protecting and Monitoring Virtualization Infrastructure
    Overview of Backup and Restore Options for Virtual Machines
    Protecting Virtualization Infrastructure by Using Data Protection Manager
    Using System Center Operations Manager for Monitoring and Reporting
    Integrating Virtual Machine Manager with Operations Manager

    + -
  • -> Implementing Firewall Technologies,
    What is firewall, Difference between stateful and stateless firewall
    how a session is formed
    what is a session
    -> Securing network devices:-
    Basics of management access
    secure using restricted LAN IP
    restrict per VLAN
    -> Implementing intrusion preventions,
    Threat Signature Match
    Application control
    -> Cryptography,
    Asymmetric and Symmetric keys
    SSL handshake,
    Basic concepts of PKI.
    -> Implementing VPN:-
    Site to Site VPN
    Dynamic VPN, SSL VPN
    -> Managing a secure network:-
    Attack prenvtion
    network DOS
    Device DOS
    Flooding attacks
    Preventive measures
    Device to be used : Paloalto / Fortinet

    + -

    Unit 1 Implement an EIGRP Network
    Determine network resources needed for implementing EIGRP in a network
    Create an EIGRP implementation plan
    Create an EIGRP verification plan
    Configure EIGRP routing
    Verify an EIGRP solution was implemented properly using show and debug commands
    Unit 2 Implement a multi-area OSPF Network
    Determine network resources needed for implementing OSPF on a network
    Create an OSPF implementation plan
    Create an OSPF verification plan
    Configure OSPF routing
    Verify OSPF solution was implemented properly using show and debug commands
    Unit 3 Implement an eBGP on a Network
    Determine network resources needed for implementing eBGP on a network
    Create an eBGP implementation plan
    Create an eBGP verification plan
    Configure eBGP routing
    Verify eBGP solution was implemented properly using show and debug commands
    Unit 4 Implement an IPv6 on a Network
    Determine network resources needed for implementing IPv6 on a network
    Create an IPv6 implementation plan
    Create an IPv6 verification plan
    Configure IPv6 routing
    Configure IPv6 interoperation with IPv4
    Verify IPv6 solution was implemented properly using show and debug commands
    Unit 5 Implement an IPv4 or IPv6 based redistribution solution
    Create a redistribution implementation plan based upon the results from a redistribution analysis
    Create a redistribution verification plan
    Configure a redistribution solution
    Verify that redistribution was implemented
    Document results of a redistribution implementation and verification plan
    Identify the differences between implementing an IPv4 and IPv6 redistribution solution
    Unit 5 Implement Layer 3 Path Control Solution
    Create a Layer 3 path control implementation plan based upon the results of the redistribution
    Create a Layer 3 path control verification plan
    Configure Layer 3 path control
    Verify that a Layer 3 path control was implemented
    Document results of a Layer 3 path control implementation and verification plan
    Implement basic teleworker and branch services
    Describe broadband technologies
    Configure basic broadband connections
    Describe basic VPN technologies
    Configure GRE
    Describe branch access technologies
    Unit 1 Implement VLAN based solution on Network
    Determine network resources needed for implementing a VLAN based solution on a network
    Create a VLAN based implementation plan
    Create a VLAN based verification plan
    Configure switch-to-switch connectivity for the VLAN based solution
    Configure loop prevention for the VLAN based solution
    Configure Access Ports for the VLAN based solution
    Verify the VLAN based solution was implemented properly using show and debug commands
    Unit 2 Implement a Security Extension of a Layer 2 solution
    Determine network resources needed for implementing a Security solution
    Create a implementation plan for the Security solution
    Create a verification plan for the Security solution
    Configure port security features
    Configure general switch security features
    Configure private VLANs
    Configure VACL and PACL
    Verify the Security based solution was implemented properly using show and debug commands
    Unit 3 Implement Switch based Layer 3 solutions
    Determine network resources needed for implementing a Switch based Layer 3 solution
    Create an implementation plan for the Switch based Layer 3 solution
    Create a verification plan for the Switch based Layer 3 solution
    Configure routing interfaces
    Configure Layer 3 Security
    Verify the Switch based Layer 3 solution was implemented properly using show and debug
    Unit 4 Prepare infrastructure to support advanced services
    Implement a Wireless Extension of a Layer 2 solution
    Implement a VoIP support solution
    Implement video support solution
    Unit 5 Implement High Availability on Network
    Determine network resources needed for implementing High Availability on a network
    Create a High Availability implementation plan
    Create a High Availability verification plan
    Implement first hop redundancy protocols
    Implement switch supervisor redundancy
    Verify High Availability solution was implemented properly using show and debug commands

    + -

  • Course Detail:
    Operation of IP Data Networks
    Recognize the purpose and functions of various network devices such as Routers, Switches,
    Bridges and Hubs.
    Select the components required to meet a given network specification.
    Identify common applications and their impact on the network
    Describe the purpose and basic operation of the protocols in the OSI and TCP/IP models.
    Predict the data flow between two hosts across a network.
    Identify the appropriate media, cables, ports, and connectors to connect Cisco Network Devices to
    other network devices and hosts in a
    LAN Switching Technologies
    Determine the technology and media access control method for Ethernet networks
    Identify basic switching concepts and the operation of Cisco switches.
    Configure and verify initial switch configuration including remote access management.
    Verify network status and switch operation using basic utilities such as ping, telnet and ssh.
    Identify enhanced switching technologies
    Describe how VLANs create logically separate networks and the need for routing between them.
    Configure and verify VLANs
    Configure and verify Trunking on Cisco switches
    Configure and verify PVSTP operation
    IP addressing (IPv4 / IPv6)
    Describe the operation and necessity of using private and public IP addresses for IPv4
    Identify the appropriate IPv6 addressing scheme to satisfy addressing requirements in
    LAN/WAN environment.
    Identify the appropriate IPv4 addressing scheme using VLSM and summarization to satisfy
    addressing requirements in a
    LAN/WAN environment.
    Describe the technological requirements for running IPv6 in conjunction with IPv4 such as dual
    Describe IPv6 addresses
    IP Routing Technologies
    Describe basic routing concepts
    Describe the boot process of Cisco IOS routers
    Configure and verify utilizing the CLI to set basic Router configuration
    Configure and verify operation status of a device interface, both serial and Ethernet
    Verify router configuration and network connectivity
    Configure and verify routing configuration for a static or default route given specific routing
    Manage Cisco IOS Files
    Differentiate methods of routing and routing protocols
    Configure and verify OSPF (single area)
    Configure and verify EIGRP (single AS)
    Configure and verify interVLAN routing (Router on a stick)
    Configure SVI interfaces
    IP Services
    Configure and verify DHCP (IOS Router)
    Describe the types, features, and applications of ACLs
    Configure and verify ACLs in a network environment
    Identify the basic operation of NAT
    Configure and verify NAT for given network requirements
    Configure and verify NTP as a client
    Recognize High availability (FHRP)
    Configure and verify Syslog
    Describe SNMP v2 & v3
    Network Device Security
    Configure and verify network device security features
    Configure and verify Switch Port Security features
    Configure and verify ACLs to filter network traffic
    Configure and verify an ACLs to limit telnet and SSH access to the route
    WAN Technologies
    Identify different WAN Technologies
    Configure and verify a basic WAN serial connection
    Configure and verify a PPP connection between Cisco routers
    Configure and verify Frame Relay on Cisco routers
    Implement and troubleshoot PPPoE

    + -

  • Course Objectives:
    By the end of this course, you should be able to:
    Identify the components of a Data ONTAP storage environment
    Install and set up a Data ONTAP cluster
    Perform basic administration on a storage system
    Configure physical and logical storage
    Configure client protocols for a simple environment
    Describe Snapshot copies and space consumption in Data ONTAP
    Discuss backup methods that are available in Data ONTAP
    Describe the process of upgrading Data ONTAP
    Describe NetApp protection technology and the NetApp integrated data-protection
    solutions that are supported in Clustered Data ONTAP 8.3
    Design, implement and manage Snapshot copies
    Design, implement and manage Clustered Data ONTAP 8.3 SnapMirror replication
    Design, implement and manage Clustered Data ONTAP 8.3 SnapVault replication
    Use OnCommand System Manager to set up and manage backup and restore operations
    Understand how to implement the NDMP protocol in Clustered Data ONTAP 8.3
    Detailed Course Outline:
    Module 1: Exploring Data ONTAP Storage Fundamentals
    Overview of clustered Data ONTAP and Data ONTAP 8.3 enhancements
    Scaling Methods
    Administrative User Interfaces
    Module 2: Hardware and Initial Setup
    FAS Hardware
    Setting up the Cluster
    Module 3: Initial Storage System Configuration
    Role-Based Access Control
    Policies and Schedules
    Network Time Protocol
    The AutoSupport Tool
    Module 4: Storage Management
    Data ONTAP Storage Architecture
    Data ONTAP File System
    Virtual Storage Tier
    Data ONTAP Physical Storage Configuration
    Data ONTAP FlexVol Configuration
    Module 5: Network Management
    Network Ports
    Network Interfaces
    Non-disruptive LIF Configuration
    Network Management
    Network Load Balancing
    Module 6: Implementing NAS Protocols
    File System Structure
    Deploying NFS
    Windows File Services
    Module 7: Implementing SAN Protocols
    Basic SAN Implementation
    SAN Configuration and Multi-pathing
    LUN Access
    Module 8: Snapshot Copies
    Defining Snapshot Technology
    Managing Snapshot Space Usage
    Creating Snapshot Copies
    Restoring Data from a Snapshot Copy
    Module 9: Managing Storage Space
    Thin Provisioning
    Deduplication and Compression
    FlexClone Volumes
    Volume Moves in Clustered Data ONTAP
    Growing Aggregates
    Automatic Space Management
    Module 10: Data Protection
    Storage Failover Management
    Netapp Data Protection Interfaces
    Module 11: Monitoring Your Storage System
    Monitor Your Cluster
    Event Management
    Determine System Health
    Display Utilization and Performance Information
    Performance and Statistics Collector
    Manage Logs and Core Files
    Module 12: Upgrading and Transitioning to Clustered Data ONTAP
    Non-Disruptive Upgrades
    Transition Fundamentals
    Module 13: Bonus Material (Optional)
    Infinite Volumes
    Engaging NetApp Support
    Module 14: Data Protection with NetApp Snapshot Copies
    Data Protection with NetApp Snapshot Copies
    Snapshot Copy Design Criteria
    Implementing a Snapshot Copy Solution
    Monitoring and Managing Snapshot Copies
    Restoring Data from Snapshot Copies
    Snapshot Copy Advanced Topics
    Module 15: NetApp Replication Technologies
    Data ONTAP Replication Technology
    Design Criteria for SnapVault and SnapMirror Relationships
    Policies and Volume Types
    Implementing Cluster and SVM Peering
    Initial Transfer and Updates
    Module 16: Using SnapMirror for Data Protection
    SnapMirror Technology
    Implementing SnapMirror Relationships
    SnapMirror Failover and Resync
    SnapMirror Advance Topics
    Module 17: SnapVault Backup and Recovery
    SnapVault Technology
    Implementing SnapVault
    Restoring Data SnapVault
    SnapVault Advanced Topics
    Monitoring and Managing SnapVault and SnapMirror
    Module 18: Data Protection using NDMP
    NDMP Technology
    Design Criteria for NDMP Solutions
    Managing Node-Scoped NDMP
    Managing SVM-Scoped NDMP
    Connect to the ClusterShell
    Connect to the command shell and explore the command hierarchy
    Review Command options
    Compare privilege levels
    Use partial commands and complete commands with the tab key
    Log in to the Cluster2 with OnCommand System Manager
    Explore the resources in the OnCommand System Manager
    Explore package licensing
    Configure time and time zone
    Create a new aggregate
    Add disks to the aggregate
    Use System Manager to create an aggregate
    Create a flexible volume
    Use System Manger to create a flexible volume
    Explore network resources and create an interface group
    Create a VLAN
    Create a new IPspace
    Create a subnet for the default IPspace
    Explore failover groups and policies
    Configure an SVM to serve CIFS and NFS
    Create a NAS data LIF
    Migrate and rehome a NAS data LIF
    Create an export policy
    Export a volume
    Verify and create CIFS shares
    Access your CIFS share from a Windows client
    Access your data volume from an NFS client
    Verify MPIO configuration
    Check the iSCSI software initiator name
    Use NetApp System Manager to create an SVM for iSCSI
    Configure the iSCSI software initiator (in Windows)
    Access the iSCSI-attached LUN on the Windows host
    Explore Snapshot configuration in System Manager
    Navigate the .snapshot directory from an NFS client
    Explore thin provisioning and storage efficiency
    Perform a volume move
    Create and initialize snapmirror replications
    Compare data-protection mirror replication times
    Add volumes and files to a replicated namespace
    Schedule periodic snapmirror replications
    Promote a load-sharing mirror
    Access system logs with a web browser
    Configure AutoSupport messages
    Prepare the storage environment on Cluster1 and Cluster2
    Create a job schedule
    Create a Snapshot policy
    Assign a Snapshot policy to a FlexVol volume
    Restore volume data from Snapshot copies
    Restore previous versions
    Configure network connectivity to allow cluster peering
    Configure Cluster peering
    Create a volume to be used for a SnapMirror source
    Create a SnapMirror relationship
    Verify data transfer
    Simulate a source volume failure
    Break the SnapMirror relationship
    Perform a SnapMirror reverse resynchronization
    Restore the original SnapMirror relationship
    Create a new FlexVol volume on a destination SVM
    Create a new schedule on Cluster2
    Create a SnapShot policy on the source SVM and volume
    Create a SnapVault policy on the destination SVM
    Create the SnapVault relationship and perform an initial transfer
    Confirm the SnapVault data transfer
    Perform a manual SnapVault update
    Restore SnapVault data

    + -

  • Course Objectives:
    By the end of this course you should be able to:
    Identify the various components of a NetApp storage environment
    Install and perform the setup configuration of Data ONTAP
    Perform basic administration on a storage system
    Explain and configure physical and logical storage
    Identify and configure client protocols
    State virtualization techniques available in Data ONTAP
    Describe Snapshot copies and space consumption in Data ONTAP
    Discuss backup methods available in Data ONTAP
    Detailed Course Outline:
    Module 1 The NetApp Storage Environment
    Identify the key features and functions of NetApp storage systems
    Describe the advantages that a NetApp storage system provides
    Distinguish between network-attached storage (NAS) and SAN topologies
    Describe NetApp Unified Storage Architecture
    Access the NetApp Support site to obtain software and hardware documentation
    Module 2 WAFL Simplified
    Describe how data is written to and read from WAFL (Write Anywhere File Layout) file
    system on a volume
    Explain the WAFL file system concepts, including consistency points (CPs), RAID
    management, and storage levels
    Describe how RAID is used to protect disk data
    Explain how the WAFL file system processes write and read requests
    Module 3 Basic Administration
    Connect remotely to a FAS system by using the console and a remote host
    Access NetApp System Manager to administrator a storage system
    Execute commands by using the console, a remote host and NetApp System Manager
    Use commands to analyze a FAS system
    Configure and manage the NetApp AutoSupport tool for a FAS system
    Module 4 Physical Storage
    Describe Data ONTAP RAID technology
    Identify a disk in a disk shelf based on its ID
    Execute commands to determine a disk ID
    Identify a hot-spark disk in a FAS system
    Describe the effects of using multiple disk types
    Create a 32-bit aggregate and a 64-bit aggregate
    Execute aggregate commands in the Data ONTAP operating system
    Calculate usable disk space
    Module 5 Logical Storage
    Explain the concepts related to volumes in the Data ONTAP operating system
    Define and create a flexible volume
    Execute vol commands
    Define and create qtrees
    Module 6 Administration Security
    Restrict administrative access
    Restrict console and NetApp System Manager access
    Configure a client machine as an administration host to manage a storage system
    Module 7 Networking
    Identify the configuration of network settings and components in the Data ONTAP
    operating system
    Explain and configure name resolution services
    Configure routing tables in the Data ONTAP operating system
    Define and create interface groups
    Discuss the operation of virtual LANs (VLANs) and how to route them
    Module 8 NFS
    Explain NFS implementation in the Data ONTAP operating system
    License NFS on a storage system
    Explain the purpose and format of /etc/ exports
    List and define the export specification options
    Describe the use of the exportfs command
    Mount an export on a UNIX host
    Module 9 CIFS
    Describe the CIFS environment
    Configure the storage system to participate in the CIFS environment
    Share a resource on the storage system
    Map a drive from a client to the shared resource on the storage system
    Module 10 NAS Management
    List some security methods for protecting data
    Explain and configure a security style setting for a volume and a qtree
    Describe methods of tracking and restricting storage usage
    Explain, create, and manage quotas
    Explain and configure the Data ONTAP FPolicy file-screening policy
    Module 11 SAN
    Explain the purpose of a SAN
    Identify supported SAN configurations
    Distinguish between Fibre Channel (FC), Fibre Channel over Ethernet (FCoE) and iSCSI
    Define a LUN and explain LUN attributes
    Use the LUN setup command and NetApp System Manager to create iSCSI-attached
    Access and manage a LUN from a Windows host
    Define SnapDrive data management software and its feature
    Module 12 Snapshot Copies
    Describe the function of Snapshot copies
    Explain the benefits of Snapshot copies
    Identify and execute Snapshot commands
    Create and delete Snapshot copies
    Configure and modify Snapshot options
    Explain the importance of the .snapshot directory
    Describe how Snapshot technology allocates disk space for volumes and aggregates
    Schedule Snapshot copies
    Configure and manage the Snapshot copy reserve
    Module 13 Space Management
    List the storage efficiency techniques that are available within the Data ONTAP
    operating system
    Identify the factors that impact space consumption in the Data ONTAP operating system
    Describe how and when a volume consumes space from the aggregate that contains it
    Explain how to guarantee writes for a file
    Explain how the Data ONTAP operating system can provide space to a full volume
    Identify the deduplication and compression techniques that are available in the Data
    ONTAP operating system
    Module 14 High-Availability
    Describe high-availability (HA) solutions
    Discuss how HA increases the reliability of storage
    Define HA controller configuration
    Describe the three modes of HA operation with an HA pair
    Analyze how HA affects clients protocols during failover and giveback operations
    Module 15 Virtualization Solutions
    Describe how to virtualize a storage controller by using MultiStore software
    Configure MultiStore software
    Assign client protocols on MultiStore software
    Module 16 Backup and Recovery Methods
    List the methods available to back up and recover data
    Use ndmpcopy to process full and incremental data transfers
    Discuss dump and restore
    Describe, enable, and configure Network Data Management Protocol (NDMP) on a
    storage system
    Module 17 Data Collection Tools
    Use the sysstat, stats, and statit commands
    Describe the factors that affect RAID performance
    Execute commands to collect data about write and read throughputs
    Execute commands to verify the operation of hardware, software, and network
    Identify commands and options that are used to obtain configuration and status
    Module 18 Data ONTAP Upgrades
    Access the NetApp Support site for the following documents:
    o Data ONTAP Upgrade Guide
    o Data ONTAP Release Notes
    Use a configuration worksheet to collect data for installation
    Describe how to perform Data ONTAP software upgrades and reboots
    Use the setup command to configure a storage system
    Lab Exercises:
    Lab 1-1 Identify the exercise environment
    Lab 1-2 Explore the NetApp support site
    Lab 2-1 Explain how the Data ONTAP operating system writes data
    Lab 2-2 Explain how the Data ONTAP operating system reads data
    Lab 3-1 Log in to the exercise environment
    Lab 3-2 Install System Manager
    Lab 3-3 Add a storage system to NetApp System Manager
    Lab 3-4 Use the CLI to access a storage system
    Lab 3-5 Explore the Help command and privilege levels
    Lab 3-6 List the options on a storage system
    Lab 3-7 From the CLI, examine the system configuration of a storage system
    Lab 3-8 Use NetApp System Manager to configure DNS
    Lab 3-9 Use system manager to configure the AutoSupport tool
    Lab 4-1 Exploring the current disk configuration
    Lab 4-2 Understand the impact of disk scrub on a storage system
    Lab 4-3 Run the storage configuration wizard
    Lab 4-4 Use NetApp system manager to create a 64-bit aggregate
    Lab 4-5 Use the CLI to create a 64-bit aggregate
    Lab 4-6 Use the CLI to create a 32-bit aggregate and upgrade to 64-bit
    Lab 4-7 Cause a disk to fail
    Lab 4-8 Add disks to an aggregate
    Lab 5-1 Use system manager to create a volume
    Lab 5-2 Resize a volume
    Lab 5-3 Delete a volume
    Lab 5-4 Create qtrees
    Lab 5-5 Delete qtrees
    Lab 6-1 Create an administrative user account
    Lab 6-2 Use the CLI to configure administrative security
    Lab 6-3 Log in with a new user account
    Lab 7-1 Use the System Manager to configure network settings
    Lab 7-2 Use the CLI to configuration network settings
    Lab 7-3 Use the CLI to create a single-mode interface group
    Lab 7-4 Use the CLI to create a multimode interface group
    Lab 8-1 Use NetApp System Manager to license NFS
    Lab 8-2 Use NetApp System Manager to export a volume
    Lab 8-3 Use the CLI to export a volume
    Lab 8-4 Mount exports from an administration host
    Lab 9-1 Use NetApp System Manager to license CIFS service
    Lab 9-2 Use NetApp System Manager to configure CIFS service
    Lab 9-3 Create a window domain user
    Lab 9-4 Use the CLI and NetApp System Manager to view and create shares
    Lab 9-5 Create a new share with computer management
    Lab 9-6 Map shares to drive letters
    Lab 9-7 Modify user permissions
    Lab 9-8 Display CIFS sessions
    Lab 9-9 Configure SMB 2.0 protocol
    Lab 9-10 Terminate CIFS sessions

    Lab 10-1 Create and manage quotas
    Lab 10-2 Create a quota report
    Lab 10-3 Modify the /etc/quotas file and implement quota changes
    Lab 10-4 Use the CLI to create qtrees and quotas for the qtrees
    Lab 10-5 Create a native file-blocking policy
    Lab 11-1 License and start the iSCSI service
    Lab 11-2 Configure iSCSI on Windows Server 2008 R2
    Lab 11-3 Use NetApp System Manager to create a LUN
    Lab 11-4 Use the CLI to create a LUN
    Lab 11-5 Access LUNs from Windows Server 2008 R2
    Lab 11-6 Nondistributively move a volume that contains a LUN
    Lab 12-1 Use NetApp system manager to create a SnapShot copy
    Lab 12-2 Restore a windows file from a SnapShot copy
    Lab 12-3 Restore a Linux file from a SnapShot copy
    Lab 12-4 Use NetApp system manager to manage SnapShot copies
    Lab 12-5 Restore a file by using the windows previous version tool
    Lab 12-6 License and configure SnapRestore technology
    Lab 12-7 Revert a volume using SnapRestore technology to restore a volume
    Lab 12-8 Use SnapRestore technology to restore a file
    Lab 13-1 Explore volume space consumption
    Lab 13-2 Explore file space consumption
    Lab 13-3 Configure deduplication
    Lab 15-1 Create two MultiStore systems with separate IP aliases
    Lab 15-2 Create a CIFS share on a MultiStore system
    Lab 15-3 Create an iSCSI LUN on a MultiStore system
    Lab 16-1 Copy a volume by using the NDMPCOPY command
    Lab 17-1 Identify the commands that you can use to troubleshoot and solve problems
    Lab 17-2 Run the statit command on a storage system
    Lab 17-3 Run the stats command on a storage system

    + -
  • Audience:
    Microsoft Windows system administrators who need to quickly learn core Red Hat
    Enterprise Linux proficiencies:
    System administrators, network administrators, and other IT professionals who require
    proficiency performing core tasks in Linux Non-Linux IT professionals on the path to becoming
    full-time Linux system administrators
    Previous operating system administration experience is helpful but not required
    Course Content:
    Graphical installation of Linux
    Managing physical storage
    Introduction to the command line
    Learning how to install and configure local components and services
    Establishing network and securing network services
    Managing and securing files
    Administrating users and groups
    Deploying file sharing services
    Network configuration and troubleshooting
    Managing file systems and logical volumes
    Controlling user and file access
    Installing and managing services and processes
    Essential command line operations
    Course Outline:
    Unit 1:
    Get Started with the GNOME Graphical Desktop
    Objective: Get started with GNOME and edit text files with gedit
    Unit 2: Manage Files Graphically with Nautilus
    Objective: Manage files graphically and access remote systems with Nautilus
    Unit 3: Get Help in a Graphical Environment
    Objective: Access documentation, both locally and online
    Unit 4: Configure Local Services
    Objective: configure the date and time and configure a printer
    Unit 5: manage physical storage i
    Objective: Understand basic disk concepts and manage system disks
    Unit 6: Manage Logical Volumes
    Objective: Understand logical volume concepts and manage logical volumes
    Unit 7: Monitor System Resources
    Objective: Manage CPU, memory, and disk utilization
    Unit 8: Manage System Software
    Objective: Manage system software locally and using Red Hat Network (RHN)
    Unit 9: Get Started with Bash
    Objective: Understand basic shell concepts, execute simple commands, and use basic job control

    Unit 10: Get Help in a Textual Environment
    Objective: Use man and info pages and find documentation in /usr/share/doc
    Unit 11: Establish Network Connectivity
    Objective: Understand basic network concepts; configure, manage, and test network
    Unit 12: Administer Users and Groups
    Objective: Manage users and groups
    Unit 13: Manage Files from the Command Line
    Objective: Understand Linux file system hierarchy and pathnames; manage files from the
    command line
    Unit 14: Secure Linux File Access
    Objective: Understand Linux file access mechanisms; manage file access from the GUI and the
    command line
    Unit 15: Administer Remote Systems
    Objective: Share and connect to a desktop; use SSH and rsync
    Unit 16: Configure General Services
    Objective: Manage services; configure SSH and remote desktops
    Unit 17: Manage Physical Storage II
    Objective: Manage file system attributes and swap space
    Unit 18: Install Linux Graphically
    Objective: Install Red Hat Enterprise Linux and configure the system with first boot
    Unit 19: Manage Virtual Machines
    Objective: Understand basic virtualization concepts; install and manage virtual machines
    Unit 20: Control the Boot Process
    Objective: Understand run levels and manage GRUB
    Unit 21: Deploy File Sharing Services
    Objective: Deploy an FTP server and a web server
    Unit 22: Secure Network Services
    Objective: Manage a firewall; understand SE Linux concepts and manage SE Linux
    Unit 23: Comprehensive Review
    Objective: Get a hands-on review of the concepts covered in this course
    Unit 24: Accessing the Command Line
    Objectives: Access the command line locally and remotely; gain administrative privileges from
    the command line
    Unit 25: Intermediate Command Line Tools
    Objectives: Use hardlinks, archives and compression, and vim
    Unit 26: Network Configuration and Troubleshooting
    Objectives: Configure network settings; troubleshoot network issues
    Unit 27: Managing Simple Partitions and File systems
    Unit 28: Access Network File Sharing Services; NFS and CIFS
    Objectives: Implement NFS, CIFS, and autofs
    Unit 29: Managing User Accounts
    Objectives: Manage user accounts including password aging
    Unit 30: Network User Accounts with LDAP
    Objectives: Connect to a central LDAP directory service
    Unit 31: Controlling Access to Files
    Objectives: Manage group memberships, file permissions, and access control lists (ACL)
    Unit 32: Managing SE Linux
    Objectives: Activate and deactivate SE Linux; set file contexts; manage SE Linux booleans;
    analyze SE Linux logs
    Unit 33: Installing and Managing Software
    Objectives: Manage software and query information with yum; configure client-side yum,
    repository files
    Unit 34: Managing Installed Services
    Objectives: Managing services; verify connectivity to a service
    Unit 35: Managing Processes
    Objectives: Identify and terminate processes, change the priority of a process, and use cron and
    at to schedule processes

    + -

  • Course Objectives:
    Upon successful completion of this course, participants should be able to:
    Define the XtremIO hardware components
    Define the various software installation procedures
    Use both the XtremIO GUI and CLI interface for management
    Perform provisioning from an XtremIO array
    Monitor an XtremIO storage array
    Perform basic troubleshooting steps to resolve issues Course Outline
    The content of this course is designed to support the course objectives. The following focus
    areas are included in this course:
    Module 1: EMC XtremIO Hardware
    o Product Overview
    o Hardware Components
    o Rack and Cable
    o External Network Requirements
    Module 2: EMC XtremIO Software Installation and Configuration
    o Storage Controller Installation and Configuration
    o XtremIO Management Server (XMS) Installation
    o XMS Post Installation Verification
    Module 3:EMC XtremIO Management
    o XMS GUI Management
    o XMS CLI Management
    o XMS User Management
    Module 4: EMC XtremIO Provisioning
    o Volume Creation and Sizing
    o Host Connectivity – VMware
    o Host Connectivity – MS Windows
    o Host Connectivity – Solaris
    o Host Connectivity – Linux
    Module 5: EMC XtremIO Monitoring
    o Monitoring Operations Overview
    o Monitor for Performance
    Module 6: EMC XtremIO Troubleshooting
    o High Availability
    o Troubleshooting
    o Field Replaceable Units (FRU)
    o Support Resources and Updates

    + -
  • Course Detail:
    Implementing VNX Security
        a.Implementing Control Station and Storage Processor Auditing
        b.VNX Notification methods and event monitoring options
    Block Storage Provisioning and Management
       a.RAID Groups and Classic LUNs
       b.Pools and Pool LUNs
       c.FAST VP
       d.FAST Cache
    Managing Host Access to Block Storage
        a.Access Logix, LUN masking and mapping, and configuration requirements
        b.Connectivity requirements for host integration
        c.VNX FC, and iSCSI connections to a Microsoft Windows, Linux, and ESXi hosts
    Managing Host Access to File Storage
         a.Data Mover networking
         b.File systems and AVM
         c.Exporting file systems for NFS
         d.Exporting file systems for CIFS
         e.Virtual Data Mover configuration and requirements
         g.Data Mover high availability
    Local Replication
        a.SnapView Snapshots and Clones theory of operations, requirements,configuration, and management
        b.VNX Snapshots theory of operations, requirements, configuration, and management
        c.VNX SnapSure theory of operations, requirements, configuration, and management
        d.MirrorView theory of operations and use cases
        e.VNX Replicator theory of operations and use cases
        f.Functional uses of the Application Protection Suite (Replication Manager,Data Protection Advisor, and AppSync)
        g.Functional uses of the Security and Compliance Suite (Host Encryption, FileLevel Retention, and Event Enabler)
        h.Considerations and best practices for VNX integration with VMware ESXi

    + -
  • Course Details:

    Storage requirements for today’s virtual data center
    Unprecedented performance and scale
    Secure information infrastructure
    – Symmetrix Data at Rest Encryption
    – IPv6 and IPSec support
    – EMC Certified Data Erasure
    – The Symmetrix Audit Log
    – Audit Integration with RSA enVision
    – Symmetrix Service Credential, Secured by RSA
    – Symmetrix Access Control
    The Symmetrix VMAX Architecture
    The symmetrix heritage
    The symmetrix VMAX storage system
    Symmetrix VMAX Hardware architecture
    The symmetrix VMAX engine
    Global memory
    Virtual matrix interconnect
    Supported Drives types
    – Ultra-high performance: Enterprise Flash drives
    – High performance: Fibre Channel and SAS drives
    – High capacity: SATA drives
    Availability and System Integrity
    Symmetrix component-level protection and redundancy
    Symmetrix VMAX series error detection and remote support
    Service processor functionality
    – management integration
    – EMC remote support
    Global memory protection and redundancy
    System-wide error checking and correction code
    Physical memory error correction and error verification
    Data protection and error checking
    – Byte-level error checking
    – Block-level crc error checking
    – Global memory protection from power failure
    The Enginuity Operating Environment
    Tiered storage optimization
    Dynamic cache partitioning
    Symmetrix priority controls
    Enhance LUN Technology
    Symmetrix virtual provisioning
    Business continuity solutions-local and remote replication
    EMC SRDF base products
    Data Migration Options
    Open replicator
    SRDF/Data Mobility (SRDF/DM) and adaptive copy
    EMC powerpath migration enabler (PPME)
    Federated Live migration
    Management and Operations
    Symmetrix Management Console (SMC)
    Symmetrix Performance Analyzer (SPA)
    EMC z/OS Storage Manager (EzSM)
    EMC Virtual Storage Integrator (VSI) for VMware vSphere
    Symmetrix Configuration Management with SMC
    Describe how to set Symmetrix Metrics and Device Attributes, manage Dynamic RDF and Device Pools
    Map and Mask Devices using Autoprovisioning
    Manage Virtual Provisioning with Solutions Enabler
    Use the Symmetrix Management Console to perform Configuration Management
    Configure and Manage FAST using SYMCLI and SMC
    Symmetrix Management Console Fundamentals
    Perform Symmetrix configuration and replication tasks with SMC
    Articulate the differences between SMC and the Solutions Enabler command line interface (SYMCLI)
    Symmetrix Performance Analyzer (SPA) Fundamentals
    Explain the use of gatekeepers and the process of gatekeeper selection
    Describe the purpose of options files and the usage of environment variables
    Describe the function of commonly used Solutions Enabler daemons
    Unisphere for Symmetrix VMAX Implementation and Management
    Describe Unisphere for VMAX (UNIVMAX) functionality and architecture
    Install and configure Unisphere for VMAX
    Navigate the Unisphere for VMAX user interface
    Perform Unisphere for VMAX administration tasks
    Symmetrix VMAXe Administration and Management
    Describe how to create devices, set Symmetrix metrics and device attributes,manage device pools
    Describe virtual provisioning concepts and manage virtual provisioning
    Map and mask devices using autoprovisioning
    Migrate devices non-disruptively using virtual LUN migration
    Configure and manage FAST VP
    Describe and perform SRDF/e operations
    Describe and perform TimeFinder/Clone operations

    + -
  • On the completion of the course, the students will be able to:
    create a Data stage project
    create simple and complex Data stage jobs
    compile and run the jobs
    make use of the job parameters
    manage the partitioning of the parallel processors
    schedule the jobs using data stage sequencer
    use Data stage director to monitor the jobs logs
    debug the data stage jobs
    make use of Datastage parallel processing for real life scenarios

    Course Detail:
    1. ETL Introduction
            a. Role of ETL in Data warehousing
    2. Data stage architecture
             a. Design time architecture
             b. Run time architecture
    3. Creating data stage jobs
             a. Simple job design
             b. Compile and running jobs
             c. View job log and Debugging jobs
             d. Job parameters
    4. Processing stages
             a. Filter
             b. Copy
             c. Modify
             d. Sort
             e. Lookup
             f. Merge
             g. Join
             h. Aggregator
             i. Funnel
             j. Remove Duplicates
             k. Slowly changing dimension
             l. Transformer
    5. Partitioning and collecting
              a. Introduction
              b. Partitioning Methods

                        i. Auto
                        ii. Same
                        iii. Round Robin
                        iv. Hash
                         v. Entire
                         vi. Random
                         vii. Range
                         viii. Modulus
                c. Collecting Methods
                         i. Auto
                         ii. Round Robin
                         iii. Ordered
                         iv. Sort Merge
    6. Debugging stages
              a. Row generator
              b. Column generator
              c. Head
              d. Tail
              e. Peek
    7. File stages
             a. Sequential File
             b. Data Set
             c. File set
    8. Database Stages
             a. Oracle Enterprise
             b. DB2 Enterprise
             c. ODBC
    9. Job Sequencer
             a. Introduction
             b. Job activity
             c. Simple job sequencer
             d. Wait for File activity
             e. Sequencer
             f. Start loop activity
             g. End loop activity
             h. Execute command
              i. User variable activity
    10. Web console administration
               a. Managing users and groups
               b. Managing user credentials

    11. Data Stage administration
               a. Project administration
               b. Setting Environment variables
               c. Managing logs
               d. User roles and permissions
               e. Project creation

    + -