Module 1: Layer 2 Switching and VLANs
Switching concepts and operations. Configuring and managing VLANs.
Switching concepts and operations. Configuring and managing VLANs.
Understanding routing policies and their applications. Configuring and applying firewall
Overview of static and dynamic routing concepts. Configuring and monitoring
Monitoring device performance and traffic statistics. Performing system maintenance and
Initial device setup and configuration. Managing user accounts and authentication
Navigating the Junos CLI. Understanding CLI modes and navigation. Utilizing
Introduction to Juniper Networks and Junos OS. Junos software architecture
Understanding network layers and protocols. Differentiating between collision and broadcast
Real-world case studies Hands-on project execution
Leading cross-functional teams Change management strategies
Frameworks for effective digital governance Strategic alignment of IT and
Principles of complex system architecture Integration of multi-platform solutions
Collaborative case study activities. Real-world scenario simulations.
Implementing security best practices. Ensuring compliance with industry standards.
Designing scalable and efficient solutions. Integrating ServiceNow with external systems.
Understanding core architecture components. Exploring platform capabilities and limitations.
Exam structure and question formats. Study resources and tips. Practice
Approaches for upgradability and scalability. Maintaining application functionality. Case studies
Configuration of ITSM applications. Customization to meet business requirements. Integration
Key tables and their relationships. Roles and access controls. Primary
Overview of ServiceNow ITSM solutions. Key features and functionalities. Understanding
Ans: edForce offers a wide range of courses across fields such
Automating repetitive HR tasks Integrating with third-party tools for seamless
Generating HR metrics and reports Analyzing data for continuous improvement
Configuring HR service portals Empowering employees with AI-driven tools
Creating and maintaining HR knowledge articles Using knowledge bases for
Managing HR cases and requests Configuring workflows for case resolution
Overview of Human Resources Service Delivery Key features and capabilities
Review of key concepts Practice exam questions Tips for successful
Integrating CSM with other ServiceNow applications Managing data imports and
Creating CSM reports Designing dashboards for customer service metrics Utilizing
Defining SLAs for customer service Monitoring SLA performance Configuring SLA
Linking knowledge articles to cases Managing the knowledge base Enhancing
Creating and managing cases Implementing case assignment and escalation rules
Installing the CSM plugin Configuring account and contact management Setting
Overview of CSM Key features and benefits Understanding the CSM
Review of key concepts Practice questions and scenarios
Upgradability and scalability considerations Maintaining application functionality
Key tables and relationships Roles and access controls
Baseline and advanced features State model and process flows
Overview of ITSM applications Key features and benefits
Reviewing key concepts and best practices. Preparing for the Certified
Working on real-world scenarios with cohort members. Applying theoretical knowledge
Implementing security measures within the ServiceNow platform. Ensuring compliance with
Integrating ServiceNow with external systems and data sources. Utilizing APIs
Designing scalable and efficient ServiceNow solutions. Implementing best practices for
Understanding the core architecture of ServiceNow. Exploring the platform's capabilities
Creating and implementing custom apps in ServiceNow Building complex workflows
Performance optimization techniques Understanding multi-tenant and multi-instance architecture Planning disaster
Analyzing business needs Translating business needs into ServiceNow solutions Stakeholder
ServiceNow integration capabilities and patterns Integrating middleware and enterprise architectures
Understanding the ServiceNow data model Learning ServiceNow schema design Customizing
Developing principles for performance and scalability Design principles for availability
Overview of the ServiceNow platform Understanding ServiceNow architecture components Configuring
Implementing UI policies and business rules Managing update sets for
Creating knowledge base articles Developing service catalog items Automating workflows
Understanding tables, records, and fields Implementing access control rules Using
Accessing the service portal Submitting and managing incidents Utilizing work
Navigating applications and modules Configuring list and form views Personalizing
UI policies Business rules System update sets Scripting in ServiceNow
Data schema Application/access control Importing data CMDB and CSDM
Knowledge management Service catalog Flow Designer Virtual Agent
Lists, filters, and tags List and form anatomy Form configuration
Installing applications and plugins Personalizing/customizing the instance Common user interfaces
ServiceNow platform overview Platform capabilities and services The ServiceNow instance
Real-world disaster recovery examples Hands-on exercises
Continuous monitoring and improvement Training and awareness programs
Selecting and deploying appropriate tools Testing and validating the recovery
Components of a disaster recovery plan Frameworks and methodologies
Identifying potential risks Assessing impacts and prioritizing recovery needs
Importance of disaster recovery Key terminologies and concepts
Strategic Planning Aligning security initiatives with business objectives Developing a
Access Control Management Implementing identity and access management systems Monitoring
Developing an Information Security Program Defining program objectives and requirements
Designing Security Controls Control lifecycle management Monitoring and maintaining security
Information Security Governance Establishing an information security management structure Defining
Deployment best practices Patch management and updates Monitoring and incident
Static Application Security Testing (SAST) Dynamic Application Security Testing (DAST)
Input validation techniques Secure authentication and authorization Implementing cryptography securely
Principles of secure design Architectural patterns for security Threat modeling
Identifying security requirements Integrating security into the SDLC Tools and
Overview of application security Common threats and vulnerabilities Case studies
Applying learned skills in practical scenarios.
Analyzing and resolving kernel-related problems.
Identifying and mitigating security vulnerabilities.
Debugging and resolving application errors.
Diagnosing and resolving network connectivity problems.
Fixing issues related to software package installations and updates.
Resolving storage device and filesystem issues.
Identifying and addressing hardware-related problems.
Diagnosing and resolving boot failures.
Implementing preventive measures to avoid system issues.
Understanding structured troubleshooting methodologies.
Applying skills to install, optimize, and configure Ansible for network
Automating common network administration tasks Best practices for cross-vendor automation
Developing Playbooks using Ansible Roles Reusing code with Ansible Content
Managing task execution and error handling in Playbooks
Utilizing variables in Playbooks Referencing node information with facts
Version control of automation code Running Playbooks using automation controllers
Creating an inventory of managed nodes Writing and executing simple
Overview of Ansible concepts Installation of Ansible development tools
Diagnosing common OpenStack issues Enhancing OpenStack security
Configuring OpenStack for high availability Monitoring and optimizing OpenStack environments
Using Heat templates for orchestration Implementing auto-scaling policies
Configuring Cinder for block storage Managing Swift object storage
Configuring Neutron for advanced networking scenarios Implementing load balancers and
Update an OpenShift cluster while minimizing disruption to deployed applications.
Run applications requiring elevated or special privileges from the host
Install and update Operators managed by the Operator Lifecycle Manager
Configure clusters for safe self-service by developers from multiple teams.
Expose applications to external access without using an Ingress controller.
Protect network traffic between applications inside and outside the cluster.
Configure authentication with the HTPasswd identity provider. Assign roles to
Utilize manifests packaged for sharing and distribution.
Deploy and update applications from parameterized resource manifests.
Implementing high availability strategies Scaling the automation platform effectively
Performing routine maintenance tasks Troubleshooting common issues
Setting up automation mesh for scalability Managing remote execution nodes
Building and managing job workflows Automating complex tasks
Implementing advanced job features Optimizing job performance
Creating projects and job templates Launching and monitoring Ansible jobs
Managing machine inventories Configuring access credentials
Creating user accounts and teams Assigning permissions and roles
Setting up automation controllers Configuring private automation hubs
Overview of platform architecture Key components and their functions
Enforcing compliance with security policies. Managing and auditing system configurations.
Monitoring system performance and health. Troubleshooting common issues in a
Managing patches and updates across systems. Testing and deploying patches
Automating provisioning with Kickstart files. Customizing system configurations using templates.
Setting up repositories and managing software lifecycle environments. Configuring and
Overview of Red Hat Satellite 6 features and architecture. Installation
Securing and responding to threats on endpoint devices. Endpoint detection
Identifying and mitigating risks from within the organization. Strategies to
Understanding cloud-specific security challenges. Incident response in cloud environments.
Addressing vulnerabilities in web applications. Response techniques for web-based attacks.
Detecting and responding to network intrusions. Network traffic analysis and
Recognizing phishing and email-based attacks. Implementing response strategies for email
Identifying and analyzing malware threats. Containment, eradication, and recovery from
Importance of first response in incident handling. Procedures for evidence
Steps involved in the incident response lifecycle. Planning and preparation
Understanding the fundamentals of incident handling. Importance and objectives of
Creating actionable threat intelligence reports. Dissemination strategies and best practices.
Techniques for analyzing threat data. Identifying patterns and indicators of
Types of threat intelligence feeds and sources. Data collection methods,
Steps to planning a threat intelligence program. Setting requirements and
Overview of Advanced Persistent Threats (APTs). Understanding the Cyber Kill
Definition and essential terminology. Intelligence vs. information vs. data. Integrating
Practical use of tools like Wireshark, Nmap, and Metasploit. Configuring
Detecting and mitigating network attacks. Steps for effective incident management
Firewalls and intrusion prevention systems. Best practices for securing wired
Tools for identifying vulnerabilities. Risk analysis and prioritization techniques.
OSI model and its relevance to security. TCP/IP protocols and
Importance of network security in modern environments. Overview of cyber
Hands-on simulation of a complete penetration test. Evaluation and feedback
Crafting professional penetration testing reports. Communicating findings to stakeholders effectively.
Maintaining access and establishing persistence. Data exfiltration methods.
Identifying vulnerabilities in complex IT infrastructures. Exploiting security flaws using
Advanced techniques in information gathering. Utilizing tools for reconnaissance and
Understanding penetration testing methodologies. Legal and ethical considerations.
Overview of Cybersecurity Roles and Certifications Pathways to Advanced Security
Protecting Data and Systems Basics of Encryption and Cryptography Implementing
Role of Forensics in Incident Response Basics of Evidence Collection
Introduction to Networking Basics Common Network Attacks and Defenses Configuring
Importance of Information Security Overview of Threats and Vulnerabilities Basic
Documenting findings and forensic reports Presenting evidence in a legal
Extracting data from mobile devices Analyzing SMS, call logs, and
Analyzing network traffic and logs Investigating email headers and attachments
Investigating Windows and Linux systems Recovering deleted files and partitions
Steps in forensic investigation Securing and collecting digital evidence
Understanding the need for digital forensics Types of investigations and
Laws governing ethical hacking Understanding the code of conduct for
Introduction to emerging cybersecurity tools Overview of penetration testing frameworks
Clearing logs and removing traces Counter-detection techniques
Techniques to maintain access to compromised systems Post-exploitation strategies
Exploiting vulnerabilities to gain system access Malware threats and countermeasures
Network scanning methodologies Vulnerability identification and analysis
Gathering intelligence through open-source tools Identifying vulnerabilities in systems
Basics of cybersecurity and ethical hacking Understanding attack vectors and
Leveraging technology and tools for efficient project delivery. Real-world case
Engaging and managing stakeholders effectively. Allocating and optimizing resources.
Identifying and mitigating risks. Ensuring compliance with safety and regulatory
Scope, time, cost, and quality management. Integration of project management
Overview of construction and infrastructure projects. Industry-specific challenges and opportunities.
PMI-PBA Exam Format and Question Types Tips for Success and
Evaluating Solution Performance Recommending Improvements
Aligning Business Analysis with Organizational Goals Strategy Implementation
Elicitation Techniques Requirements Analysis and Management
Business Analysis Planning Monitoring Business Performance
Identifying and Assessing Business Needs Developing Business Cases
Overview of Business Analysis Importance in Project Success
Overview of the PMI-RMP exam structure Tips and techniques for
Tracking and reporting project risks Adaptive responses to emerging risks
Developing effective risk mitigation strategies Contingency planning and fallback measures
Prioritizing risks using qualitative methods Performing quantitative risk analysis
Tools and techniques for identifying risks Documentation of risk register
PMI Risk Management Framework Risk management planning
Key concepts of risk management Importance of risk management in
Real-world PMO implementations. Lessons learned and key success factors.
Leadership and team-building skills. Overcoming challenges in PMO management.
Project and portfolio management tools. Performance measurement and reporting metrics.
Governance models and their applications. Aligning PMO goals with business
Key elements of PMO design. Tailoring frameworks to organizational needs.
Definition and types of PMOs. Role of PMOs in organizational
Exam format and strategies. Mock exams and practice questions.
Identifying and mitigating risks early. Promoting continuous improvement.
Creating flexible project plans. Responding to changes effectively.
Promoting collaboration and feedback. Building trust with stakeholders.
Prioritizing work based on value. Incremental delivery for faster results.
Overview of Scrum, Kanban, Lean, and XP. Choosing the right
Understanding Agile values and principles. Adopting an Agile mindset for
Exam structure and format. Key topics and focus areas. Tips
Identifying potential risks across portfolios. Developing risk mitigation and contingency
Establishing performance metrics. Monitoring, analyzing, and reporting performance. Continuous improvement
Aligning portfolios with organizational goals. Identifying and prioritizing portfolio components.
Definition and benefits of portfolio management. Components of the portfolio
PgMP exam format and question breakdown Mock tests and exam-taking
Effective communication strategies for program success Managing stakeholder expectations
Phases of the program life cycle Managing interdependencies and risks
Developing governance structures Defining program policies and processes
Identifying and managing program benefits Planning and tracking benefits realization
Aligning program goals with organizational objectives Stakeholder identification and engagement
Understanding the PgMP certification Overview of program management frameworks
PMP exam tips and study strategies Practice questions and mock
Understanding Agile principles and methodologies Implementing hybrid approaches for flexibility
Aligning projects with organizational goals Measuring project success and ROI
Scope, time, and cost management Risk identification, assessment, and mitigation
Leadership and team-building skills Conflict management and problem-solving Collaboration with
Project lifecycle and phases The 5 process groups: Initiating, Planning,
Overview of PMP Certification and exam structure Introduction to the
Exam structure, format, and tips. Practice questions and test-taking strategies.
Strategies for engaging and managing stakeholders.
Identifying, analyzing, and mitigating risks. Managing project procurement processes.
Managing project teams and stakeholders. Effective communication strategies for project
Estimating, budgeting, and controlling project costs. Planning and managing project
Understanding project schedules and timelines. Techniques for activity sequencing and
Defining and managing project scope. Creating Work Breakdown Structures (WBS).
Developing project charters. Managing project execution and changes.
Overview of project lifecycle and process groups. Key project management
Understanding project management and the role of a project manager.
Case studies on scalable architectures Integrating data engineering tools into
Data validation, error handling, and recovery strategies Best practices for
Principles of building robust and scalable pipelines Optimizing performance and
Batch processing fundamentals Real-time stream processing principles Data processing tools
Understanding different storage paradigms: Relational vs. Non-relational databases File systems,
Techniques for ingesting data from multiple sources Working with APIs,
Overview of Data Engineering concepts Data lifecycle and key challenges
Testing Reactive Microservices for resiliency and performance CI/CD best practices
Key frameworks and tools for Reactive Microservices (Akka, Play, etc.)
Designing microservices for scalability Horizontal scaling and distributed load balancing
Failure isolation and fault tolerance Circuit breakers, retries, and backpressure
Responsive, Resilient, Elastic, and Message-Driven Systems Event-driven communication in distributed
What are Reactive Systems and Microservices? Key challenges in traditional
Real-world scenarios of monitoring Akka systems. Implementing telemetry in live
Identifying performance bottlenecks. Best practices for maintaining system stability and
Monitoring actors and message queues. Analyzing system health with real-time
Overview of telemetry tools compatible with Akka. Configuration and integration
Importance of monitoring in distributed systems. Key performance indicators for
Real-world use cases of Akka Clusters. Troubleshooting and performance tuning.
Introduction to Akka Sharding. Cluster-aware routers for load balancing. Optimizing
Understanding Akka Distributed Data. Consistency models and CRDTs (Conflict-free Replicated
Handling node failures and split-brain scenarios. Configuring auto-healing and downing
Node discovery and gossip protocol. Membership lifecycle and cluster events.
Key concepts of distributed systems. Overview of Akka Cluster features
Analysis of reactive architectures in production. Hands-on exercise: Design a
Techniques for handling failure gracefully. Optimizing system performance in high-demand
Essential tools and frameworks for reactive system design. Patterns for
Key tenets: responsiveness, resilience, elasticity, and message-driven communication. Real-world applications
Overview of reactive architecture. Benefits of reactive systems in modern
Measuring stream performance and resource utilization Debugging and monitoring stream
Using Graphs and junctions for complex streaming workflows Custom stages
Introduction to backpressure and flow control Strategies to manage high-throughput
Understanding Sources, Sinks, and Flows Building simple streaming pipelines Handling
Overview of Akka Streams and Reactive Streams API Benefits of
Unit testing for Akka Streams. Stream monitoring and performance optimization.
Working with Graphs and Materialized Values. Integrating Akka Streams with
Implementing robust error-handling mechanisms. Resilience patterns in Akka Streams.
Understanding backpressure mechanisms. Strategies for handling demand and flow control.
Designing basic streams. Handling data transformations and filters.
Overview of Akka Streams architecture. Key components: Sources, Sinks, and
Fundamentals of reactive streams. Benefits of asynchronous and non-blocking systems.
Managing state transitions with finite state machines (FSM). Best practices
Effective testing strategies for Akka applications. Configuring and deploying Akka
Fault tolerance and supervision strategies. Routers and dispatchers. The Ask
Creating and managing actors. Actor lifecycle and behavior changes.
Overview of Akka and reactive programming principles. Understanding the Actor
• Add a Custom SNORT Rule • Create and Test
• Analyze Threat Prevention Performance • Create Penalty Box Exceptions
• Verify Recent Updates • Configure Update Settings
• Verify SmartEvent Activation • Generate and Verify Logs for
Introduction to Akka persistence. Implementing event sourcing and CQRS patterns.
Working with Akka remoting and clustering. Designing scalable and distributed
Understanding supervision strategies. Implementing fault-tolerant systems. Handling actor failures effectively.
Actor-based programming fundamentals. Creating and managing actors. Actor lifecycle and
Principles of reactive systems. Overview of the Akka framework. Setting
Real-world use cases of the Actor Model. Performance tuning and
Distributed actor systems. Implementing patterns like routers and aggregators.
Actor supervision and fault recovery. Actor hierarchies and failure isolation.
Creating and managing actors. Actor lifecycle and state management. Message
Historical background and relevance. Understanding concurrency challenges. Benefits of using
Tools and techniques for troubleshooting. Identifying and resolving connectivity issues.