Course Overview: Clear and detailed discussion on the following course content:
- What is the Agile Adaptive Methodology versus the Predictive (waterfall) Methodology?
- The Agile Value Proposition, by explanation of the Agile Manifesto and Agile Principles.
- What is the Scrum Framework by explanation of Scrum Roles, Ceremonies and Artifacts?
- What are the artifacts of Product Planning, Release Planning and Sprint Planning?
- What are the Agile impacts to corporate team structures and stakeholder alignment?
- What are Agile myths and why an Agile transformation will fail?
- What are Agile (hybrid) tailoring considerations?
Attendees to PM-221: Agile Overview for Executives and Leaderswill receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 1 Days
Course Objectives: Are you and executive or leader in your organization and interested in learning about Agile principles? This course details the Agile framework that uses an adaptive life cycle, specifically related to using the Scrum approach.
Upon successful completion of this course, students will be able to:
- Understand an overview of the main aspects that leadership must know to implement strategic opportunities with Agile principles for product quality and on-time product delivery
- Participants will dive into understanding the strategic and tactical elements of implementing Agile and Scrum into their organization
- Receive details on how to understand the organizational impact that the Agile transformation could have on the different aspects of your current business processes
Target Student:
- Designed specifically for leaders and senior managers or anyone wanting to understand the high-level basics of the Agile Framework
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
The Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) gives you the knowledge you need to install, configure, operate, and troubleshoot an enterprise network. This course covers advanced routing and infrastructure technologies, expanding on the topics covered in the N-415: Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR).
Attendees to N-425 : Implementing Cisco Enterprise Advanced Routing and Services ( ENARSI) will receive TechNow approved course materials, expert instruction, and prepare you to take the 300-410 Implementing Cisco® Enterprise Advanced Routing and Services (ENARSI) exam.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Configure classic Enhanced Interior Gateway Routing Protocol (EIGRP) and named EIGRP for IPv4 and IPv6
- Optimize classic EIGRP and named EIGRP for IPv4 and IPv6
- Troubleshoot classic EIGRP and named EIGRP for IPv4 and IPv6
- Configure Open Shortest Path First (OSPF)v2 and OSPFv3 in IPv4 and IPv6 environments
- Optimize OSPFv2 and OSPFv3 behavior
- Troubleshoot OSPFv2 for IPv4 and OSPFv3 for IPv4 and IPv6
- Implement route redistribution using filtering mechanisms
- Troubleshoot redistribution
- Implement path control using Policy-Based Routing (PBR) and IP Service Level Agreement (SLA)
- Configure Multiprotocol-Border Gateway Protocol (MP-BGP) in IPv4 and IPv6 environments
- Optimize MP-BGP in IPv4 and IPv6 environments
- Troubleshoot MP-BGP for IPv4 and IPv6
- Describe the features of Multiprotocol Label Switching (MPLS)
- Describe the major architectural components of an MPLS VPN
- Identify the routing and packet forwarding functionalities for MPLS VPNs
- Explain how packets are forwarded in an MPLS VPN environment
- Implement Cisco Internetwork Operating System (IOS®) Dynamic Multipoint VPNs (DMVPNs)
- Implement Dynamic Host Configuration Protocol (DHCP)
- Describe the tools available to secure the IPV6 first hop
- Troubleshoot Cisco router security features
- Troubleshoot infrastructure security and services
Prerequisites:
Comments
Latest comments from students
Liked the class? Then let everyone know!
Course Overview:
In this course, students learn the IPv6 protocols & processes & describe how IPv6 is supported in the latest versions of Microsoft Windows operating system. Students will also learn how to describe transition technologies that allow you to deploy IPv6 in IPv4 intranets & across the IPv4 Internet.
Attendees to TN-395: Internet Protocol Version 6 (IPv6) will receive TechNow approved course materials and expert instruction.
Dates/Locations:
Duration: 5 Days
Course Objectives:
- Learn how to create IPv6 networks with Cisco Systems products
- Supplement your IPv6 course with a self-study guide based on the course materials
- Understand practical applications of IPv6 through a solutions-oriented writing approach
- Increase comprehension & retention through chapter tools like objectives, summaries, scenarios & review questions
- Features & benefits of IPv6
- IPv6 in the Windows Server2003 Family
- IPv6 addressing & the IPv6 header
- Internet Control Message Protocol for IPv6 (ICMPv6)
- Neighbor & multicast listener discovery
- Address auto configuration
- IPv6 name resolution & routing
- Coexistence & migration
- IPv6 mobility
Prerequisites:
- Students should have a working knowledge of a Windows OR Unix Operating system.
- In addition, the student should also have basic end-user skills in TCP/IP.
Comments
Latest comments from students
Liked the class? Then let everyone know!
TechNow Provides Integrated Solutions
TechNow delivers enterprise hardware, software, and consulting that implements technologies in the areas of virtualization, IP telephony, open source systems, or security. If your company is interested in the benefits of cost effective and secure hardware, software and consulting solutions, please contact us for further information.
TechNow Virtualization Solutions: TechNow delivers virtualization solutions in several virtualization stacks: Microsoft HyperV, Oracle VM, and VMware. TechNow integrates open system RAID NAS storage solutions that enable high availability solutions for all stacks. High performance I/O is critical to virtualized solutions and TechNow delivers the hardware, software, and consulting to make that happen. Mission critical environment and optimized for be both scalable and secure. If you are interested in purchasing a virtualization solution please contact TechNow to setup an appointed to discuss your requirements.
TechNow VoIP Solutions: TechNow delivers VoIP affordable solutions utilizing SIP and integrating desktop softphones, physical handset phones, iPad/iPod clients, cell phones, web status, email, voicemail, extisting landlines, and VoIP SIP Trunks. There are many marketing terms for highly integrated solutions, the term our product is "Great". If you are interested in purchasing a VoIP solution please contact TechNow to setup an appointed to discuss your requirements.
TechNow Security Solutions: TechNow delivers security solutions that are enterprise centric. As organizations grapple with managing security in their infrastructure, TechNow can architect, deliver, and implement hardware, software, and consulting required to insure a responsive and integrated approach to infastructure security.
Working with the TechNow lab for the PA-215: Palo Alto Networks Firewall Essentials FastTrack course has been nothing less than a techie's idea of fun. When students come in we are immediatly configuring the Cisco 3750 switches for access ports, VLANS, and trunks. We then cable the switch to the Palo Alto Networks Firewall. Each student gets their own Palo Alto Firewall Pod of hardware and software. What we find as fun is the VLAN environment, with an array of virtual machines hosted on an ESXi server that can really exercise the abilities of the Palo Alto Firewall. The DMZ VLAN hosts virtual machines that support enterprise services and also potentialy vulnerable web services. The Trust VLAN has Windows and Linux clients. The UnTrust VLAN has Web services and a VM of Kali. The hardware Firewall is additionally connected to a Management VLAN. All those VLANs are trunked into an ESXi server where the student also has a VM-Series Palo Alto Networks Firewall for High Availability.
After configuring all the trunking, VLANs, and network interfaces we learn about the firewall and configure it for the lab environment. Using Metasploitable and Kali/Metasploit nefarious penetration attempts are executed. Using packet captures, custom APP-ID's and custom signatures are generated. Custom logging and reporting are created to similate and enterprise and assist the desired Incident Response. It is always fun in a training environment to learn all about the controls available in a product, even though specific controls may not be used in the operational environment. In the end we have a good understanding of the Palo Alto Networks Firewall.