Airwave Wireless Management Suite Installation, Configuration And Use (AICU) Training

In this AICU training, you will gain experience along with knowledge in installing and utilizing the AirWave Wireless Management Suite.

Category : Aruba

Course Price : $1695 Per Participant

Course Details

500+

Courses

20+

Years of Experience

95K+

Global Learners

Training Exclusives

  • Live instructor-led interactive sessions with Microsoft Certified Trainers (MCT).
  • Access to Microsoft Official Courseware (MOC).
  • Real-time Virtual Lab Environment.
  • Experience 24*7 Learner Support.
  • Self-paced learning and flexible schedules.

Course Description

In this AICU training, you will gain experience along with knowledge in installing and utilizing the AirWave Wireless Management Suite.

Additionally, you will also learn in the management suite covering RAPIDS, client troubleshooting, Visual RF, reporting, and troubleshooting network health.

The training also provides knowledge about AirWave’s potential utilized to troubleshoot network health along with client status through the several stages of authentication and association. 

What you will learn

Schedules

Oops! For this course, there are currently no public schedules available. Clicking on “Notify Me” will allow you to express your interest.

For dates, times, and location customization of this course, get in touch with us.

You can also speak with a learning consultant by calling 800-961-0337.

 

Who should attend this course?

Ideal Participants for This Course

The program is aimed at IT professionals seeking to broaden their expertise by learning to load, configure, deploy, and manage SharePoint 2016 on the cloud or data center.

Individuals with at least one year of working experience in planning and maintenance of SharePoint and nearly two years of hands-on experience in core tech such as Windows Server 2012 R2 or later, Microsoft SQL Server 2014 or later, networking infrastructure services, Internet Information Services (IIS), Active Directory Services (AD DS).

What You Receive at Probot Learning:

Global IT Certification

Customized Training Solutions

Expert Industry Trainers

Practical Learning Approach

Flexible Training Modes

Authorized Course Materials

Career-Enhancing Skills

PPP-Based Pricing Model

Workshops for Skill Gaps

Recognition and Growth

Learning Modules

What Exam Do I Need To Get Certified?

  • 312-50 CEH : EC-Council Certified Ethical Hacker
 

About the Certifications

CEH – Certified Ethical Hacker Certification empowers a person in a certain network security area of Ethical Hacking through a vendor-neutral perspective. This certification will strengthen the application knowledge of security officers, auditors, security professionals, site administrators and anybody who is apprehensive about the virtue of the network infrastructure. A CEH is an individual who is trained to understand and know how to locate for shortcomings and susceptibilities in target systems and utilizes the knowledge and tools for the same as a malicious hacker.

Certification Details

Step 1: Review the skills and knowledge required to certify.

Step 2: Recommended training for EC-Council Certified Ethical Hacker (CEH) Certification:

  • CEH – Certified Ethical Hacker v12

Step 3: Take this exam and get certified.

  • Exam 312-50 CEH

Who Should Attend?

Individual who wants to strengthen the application knowledge of security officers, auditors, security professionals, site administrators and anybody who is concerned about the uprightness of the network infrastructure.

Skills Measured

This CEH – Certified Ethical Hacker Certification is an entry level training certification course where professionals having basic idea about networking and familiarity with Linux OS can join this course.

Certification Latest Updates

This Certified Ethical Hacker Certification is valid for three years staring from the certification date. You must renew your certification before expiry date.

FAQs

What qualifications are needed to obtain this certification in ethical hacking?

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Module 1: Introduction to AWMS
  • Airwave Platform
  • Features and Benefits of AMP RAPIDS and Visual RF
  • Airwave products; Basic operations using AWMS
  • Installing AMP; Hardware requirements
  • Cent OS and AWMS software
  • Basic configuration steps; Upgrade AWMS software
  • Licensing AWMS; AWMS documentation
  • Folders and Groups
  • Adding devices general process; Manually adding devices
  • Device discovery and managing device discovery
  • Moving a device to a folder; Troubleshooting
  • Overview of IAP
  • Airwave integration; Golden configuration
  • IAP Organization options; IAP White list
  • Searching for users and Diagnostics tab
  • Client issues; Network issues; AP issues
  • Switch/Controller issues; General Issues

This module explains how to install SharePoint 2016 in different topologies, script the installation, and configure a SharePoint 2016 environment. This module also explains how to configure the core farm-level settings in a SharePoint 2016 deployment.

  • Installing SharePoint 2016
  • Scripting installation and configuration of SharePoint
  • Configuring SharePoint 2016 farm settings

Lab: Deploying and configuring SharePoint 2016 – Part one

  • Provisioning a SharePoint 2016 farm

Lab: Deploying and configuring SharePoint 2016 – Part two

  • Configuring incoming email
  • Configuring outgoing email
  • Configuring integration with Office Online Server

After completing this module, students will be able to:

  • Install SharePoint 2016.
  • Deploy and configure SharePoint 2016.
  • Script the installation and configuration of SharePoint 2016.
  • Configure SharePoint 2016 farm settings.
  • Diagnostics page indicators; Network performance tabs
  • Source of issues; Network issues
  • Why use RAPIDS; Threat Detection Methods
  • Rules; Classifications; IDS Events Report
  • New Rogue Devices Report; Visualization
  • PCI Compliance; WMS Offload
  • Configure role-based administrative use access to the AMP system
  • Triggers; Alerts
  • Define and generate reports
  • VM Redundancy; Failover for Redundancy
  • Master Console for large deployments
  • Multiple AMP Server deployments; Deployment example

AMP Maintenance; Device Maintenance

  • Wired device port and interface information
  • Monitoring wired devices in AWMS
  • Wired device bandwith statistics & counters
  • Managing & configuring wired devices via AWMS templates
  • How AWMS configures devices
  • Creating and controlling groups to control policies
  • Basic Group Design; Configuration Audits
  • Configuring Aruba Devices via AWMS GUI
  • Auditing and Configuration; Managing AWMS Profiles
  • Pushing Configurations to Controllers; Visibility
  • Additional Troubleshooting
  • Fetching a Template; Template Variables
  • Templates Configuration
  • Golden configuration; GUI mode
  • GUI configuration
  • AWMS configure to devices; Groups to control policies
  • Create and control groups; Basic group design
  • Configuration audits
  • Configuring groups for CISCO IOS devices
  • Configuring group templates for Cisco IOS devices
  • Making required changes using template variables 

Cisco Wireless LAN controllers; Cisco WLC configuration

Talk to Learning Advisor