OpenUEM Intermediate: Agent Deployment, Inventory & Policy Management Training Course
OpenUEM is an open-source endpoint management platform designed to help organizations efficiently deploy agents, maintain precise device inventories, and enforce endpoint policies.
This instructor-led, live training (available online or on-site) is aimed at intermediate-level IT professionals who want to acquire practical skills in deploying agents, managing inventories, and implementing policies across endpoint devices using OpenUEM.
By the end of this training, participants will be able to:
- Efficiently deploy OpenUEM agents across various endpoint platforms.
- Maintain and manage accurate asset inventories for all managed devices.
- Create, assign, and enforce policies to ensure compliance and security.
- Distribute software, updates, and patches to endpoints effectively.
Format of the Course
- Interactive lecture and discussion.
- Hands-on exercises and practice scenarios.
- Implementation in a lab environment with real endpoints.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
Course Outline
OpenUEM Agent Deployment
- Strategies for mass deployment across Windows, macOS, and Linux endpoints
- Agent configuration and connectivity verification
- Best practices for secure and scalable deployment
Device Inventory Management
- Collecting and maintaining accurate hardware and software inventory
- Using OpenUEM reporting and dashboard tools for visibility
- Identifying and reconciling discrepancies in endpoint data
Policy Management Fundamentals
- Creating, assigning, and enforcing endpoint policies
- Configuring compliance settings and security standards
- Policy testing and validation in live environments
Software Distribution & Update Management
- Deploying software and application updates to endpoints
- Scheduling patches and monitoring installation success
- Handling version control and rollback procedures
Monitoring & Reporting
- Tracking agent status, policy compliance, and software deployment
- Generating reports for IT operations and management
- Integrating monitoring data for proactive endpoint management
Practical Lab Exercises
- Hands-on deployment of agents and policy enforcement
- Inventory auditing and report generation
- Software deployment and update scenario exercises
Summary and Next Steps
Requirements
- An understanding of endpoint management fundamentals
- Experience with device administration and software deployment
- Familiarity with OpenUEM basics or completion of OpenUEM Fundamentals course
Audience
- Device management teams
- System administrators
- Endpoint security specialists
Open Training Courses require 5+ participants.
OpenUEM Intermediate: Agent Deployment, Inventory & Policy Management Training Course - Booking
OpenUEM Intermediate: Agent Deployment, Inventory & Policy Management Training Course - Enquiry
OpenUEM Intermediate: Agent Deployment, Inventory & Policy Management - Consultancy Enquiry
Testimonials (2)
How trainer deliver knowledge so effectively
Vu Thoai Le - Reply Polska sp. z o. o.
Course - Certified Kubernetes Administrator (CKA) - exam preparation
knowledge of the instructor
Grzegorz - Centrum Informatyki Resortu Finansow
Course - Network Troubleshooting with Wireshark
Upcoming Courses
Related Courses
Akraino
14 HoursThis instructor-led, live training in Serbia (online or onsite) is aimed at programmers who wish to download, install, and set up Akraino Edge Stack blueprints to manage their edge systems.
By the end of this training, participants will be able to install, deploy, manage, and support end-to-end Akraino Edge Stack solutions to improve and organize their edge systems, services, and devices.
Certified Kubernetes Administrator (CKA) - exam preparation
21 HoursThe Certified Kubernetes Administrator (CKA) program was established by The Linux Foundation and the Cloud Native Computing Foundation (CNCF).
Kubernetes is currently a leading platform for container orchestration.
NobleProg has been providing Docker and Kubernetes training since 2015. With over 360 successfully completed training projects, we have become one of the most recognized training companies globally in the field of containerization.
Since 2019, we have also been assisting our clients in validating their performance in k8s environments by preparing them and encouraging them to pass the CKA and CKAD exams.
This instructor-led, live training (available online or onsite) is designed for System Administrators and Kubernetes users who wish to confirm their expertise by passing the CKA exam.
Additionally, the training focuses on gaining practical experience in Kubernetes Administration, making it valuable even if you do not plan to take the CKA exam.
Format of the Course
- Interactive lectures and discussions.
- Plenty of exercises and practice sessions.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
- To learn more about CKA certification, visit: https://training.linuxfoundation.org/certification/certified-kubernetes-administrator-cka
Certified Kubernetes Application Developer (CKAD) - exam preparation
21 HoursThe Certified Kubernetes Application Developer (CKAD) program has been developed by The Linux Foundation and the Cloud Native Computing Foundation (CNCF), which hosts Kubernetes.
This instructor-led, live training (available online or onsite) is designed for Developers who wish to validate their skills in designing, building, configuring, and exposing cloud-native applications for Kubernetes.
Moreover, the training also emphasizes gaining practical experience in Kubernetes application development. We highly recommend participating in this course, even if you do not plan to take the CKAD exam.
NobleProg has been offering Docker & Kubernetes training since 2015. With over 360 successfully completed training projects, we have become one of the most renowned training companies in the field of containerization worldwide. Since 2019, we have also been assisting our clients in confirming their proficiency in k8s environments by preparing them and encouraging them to pass the CKA and CKAD exams.
Format of the Course
- Interactive lecture and discussion.
- Plenty of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
- To learn more about CKAD, visit: https://training.linuxfoundation.org/certification/certified-kubernetes-application-developer-ckad/
CompTIA Network+ N10-008 exam prep with Exam (accredited training course with exam)
35 HoursIn this course, you will describe the major networking technologies and systems of modern networks and configure, manage, and troubleshoot modern networks.
- You will:
- Explain the OSI and TCP/IP Models.
- Explain properties of network traffic.
- Install and configure switched networks.
- Configure IP networks.
- Install and configure routed networks.
- Configure and monitor ports and protocols.
- Explain network application and storage issues.
- Monitor and troubleshoot networks.
- Explain network attacks and mitigations.
- Install and configure security devices.
- Explain authentication and access controls.
- Deploy and troubleshoot cabling solutions.
- Implement and troubleshoot wireless technologies.
- Compare and contrast WAN technologies.
- Use remote access methods.
- Identify site policies and best practices.
LEDE: Set Up a Linux Wireless Router
7 HoursThe LEDE Project (Linux Embedded Development Environment) is a Linux operating system derived from OpenWrt. It serves as a comprehensive replacement for the factory-installed firmware on a broad spectrum of wireless routers and non-network devices.
In this instructor-led, live training session, participants will learn how to configure a wireless router using LEDE.
Audience
- Network administrators and technicians
Course Format
- A blend of lecture, discussion, practical exercises, and extensive hands-on practice
Nessus Manager
28 HoursThe Nessus vulnerability scanner is a highly versatile platform designed for detecting and managing vulnerabilities. It can do much more than just identify vulnerabilities; it also performs baseline auditing by comparing your system configuration with the best hardening standards.
In this instructor-led course, we will introduce you to the various components of the solution and their different functionalities. Each module in the application will be thoroughly explained, along with its specific use case.
By the end of the course, participants will be able to conduct both authenticated and unauthenticated vulnerability scans on nearly all IP-based systems. They will also learn how to analyze scan results to eliminate false positives, prioritize findings based on risk, and recommend appropriate compensating controls. This course will equip participants with the skills to assess the security posture of their systems using Nessus and determine the best remediation actions.
Audience:
- Infrastructure managers
- System administrators
- System auditors
- System compliance officers
- Vulnerability managers
- Cybersecurity managers
Format:
The course combines lectures, discussions, and hands-on practice.
Network Security Administrator
35 HoursAudience:
This course is designed for System Administrators, Network Administrators, and anyone with an interest in defensive network security technologies.
ONAP for Network Orchestration and Automation
28 HoursIn this instructor-led, live training in Serbia (online or onsite), participants will learn how to use ONAP to automate networking services.
By the end of this training, participants will be able to:
- Understand, install and configure the various components in the ONAP ecosystem.
- Carry out real-time, policy-driven orchestration and automation of physical and virtual network functions.
- Design, create, orchestrate, and monitor VNFs, SDNs and other network services.
- Efficiently manage the entire networking lifecycle using a software-driven approach.
- Develop, deploy, and scale a network using the latest open source technologies and practices.
OpenUEM Advanced: Automation, Security & Compliance
14 HoursOpenUEM is an open-source endpoint management platform designed to facilitate advanced automation, enhance endpoint security, and provide comprehensive compliance reporting to secure and optimize enterprise operations.
This instructor-led, live training (available online or on-site) is tailored for advanced IT and security professionals who want to harness OpenUEM's capabilities for automation, security hardening, compliance management, and integration with existing enterprise monitoring tools.
By the end of this training, participants will be able to:
- Automate various endpoint management tasks such as software deployment, updates, and reporting.
- Implement security hardening policies and ensure that endpoints meet compliance requirements.
- Integrate OpenUEM with enterprise security and monitoring tools for a centralized view of the network.
- Produce compliance reports and enforce regulatory or organizational standards effectively.
Format of the Course
- Interactive lectures and discussions.
- Practical exercises and real-world scenarios.
- Hands-on implementation in a lab environment with actual endpoints.
Course Customization Options
- To request a customized training for this course, please contact us to arrange the details.
OpenUEM Fundamentals: Endpoint Management Essentials
14 HoursOpenUEM is an open-source unified endpoint management platform that allows organizations to deploy, configure, and maintain endpoint devices efficiently.
This instructor-led, live training (available online or on-site) is designed for IT professionals at the beginner level who want to acquire foundational skills in managing endpoints using OpenUEM. The training covers installation, configuration, and basic device management.
By the end of this training, participants will be able to:
- Install and configure the OpenUEM server and agents across various endpoint platforms.
- Efficiently enroll, organize, and manage endpoints within the OpenUEM console.
- Deploy software, patches, and updates to managed devices.
- Monitor device health, generate reports, and perform basic troubleshooting tasks.
Format of the Course
- Interactive lectures and discussions.
- Hands-on exercises and practice scenarios.
- Implementation in a lab environment with real endpoints.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
OpenStack and NFV (with OVN and OpenFlow)
21 HoursThe course provides a deep dive into OpenStack networking. It begins with an introduction to OpenStack and its architecture, then delves into the core OpenStack projects such as the Identity service (Keystone), Image service (Glance), Compute service (Nova), and Block storage (Cinder). This foundational knowledge sets the stage for a detailed exploration of the Networking project (Neutron) within OpenStack. The course also covers virtual network infrastructure, focusing on the Open Virtual Network (OVN) project, Open vSwitch, and OpenFlow. The primary objective is to equip participants with a solid understanding of basic OpenStack operations and architecture, while also familiarizing them with the various networking technologies that underpin OpenStack, including detailed information about OVN, underlying flows, resources, and tools.
Customization Options
The training can be condensed into a 2-day program, focusing on the core aspects most relevant to the customer's needs. Alternatively, it can be extended to cover additional topics such as administrative tasks, design considerations, networking specifics, and troubleshooting related to OpenStack deployments. The course can also include discussions of other underlying SDN solutions like Linux Bridge or OvS.
Software-Defined Wide Area Network (SD-WAN) Management and Operation
7 HoursThis instructor-led, live training in Serbia (online or onsite) is aimed at intermediate-level network professionals who wish to effectively manage and operate SD-WAN networks, including design, configuration, troubleshooting, and optimization.
By the end of this training, participants will be able to:
- Understand the fundamental concepts, benefits, and challenges associated with SD-WAN technologies.
- Design an SD-WAN architecture tailored to organizational needs and deploy SD-WAN solutions effectively.
- Implement and manage security features within an SD-WAN.
- Monitor, manage, and troubleshoot SD-WAN environments.
Varnish: Speeding Up Your Website with HTTP Reverse Proxy Caching
7 HoursVarnish is a reverse proxy designed for content-heavy dynamic websites. Unlike Squid, which was initially developed as a client-side cache, or web servers like Apache and nginx, Varnish is specifically engineered as an HTTP accelerator. Varnish focuses solely on the HTTP protocol, unlike other proxy servers that support FTP, SMTP, and other network protocols. Notable users of Varnish include Wikipedia, The New York Times, Facebook, and Twitter.
In this course, participants will gain a deep understanding of Varnish's features and caching mechanisms while practicing the setup and configuration of a Varnish proxy on Linux. The training begins with a review of essential networking principles, then delves into setup and configuration topics, gradually progressing to more complex implementations. By the end of the course, participants will be able to determine when and where it is appropriate to deploy Varnish and will have hands-on experience in setting up their own Varnish proxy solutions.
Audience
- Network technicians
- Network designers
- System administrators
Format of the course
- A combination of lectures, discussions, extensive hands-on practice and implementation, and periodic quizzes to gauge progress
Network Troubleshooting with Wireshark
21 HoursNetwork packet analysis is a method used to monitor the raw data transmitted and received over a network interface in real time. This technique is valuable for diagnosing issues with network configuration and network application problems. Wireshark, a free and open-source packet analyzer, is commonly used to address such network challenges.
In this instructor-led, live training, participants will learn how to utilize Wireshark to assess the functionality and performance of a network, as well as the performance of various networked applications. Participants will gain an understanding of network troubleshooting principles and practice techniques for capturing and analyzing TCP/IP request and response traffic between different clients and servers.
By the end of this training, participants will be able to:
- Evaluate network functionality and performance in different environments under various conditions
- Determine if instances of different server applications are performing adequately
- Identify the primary sources of network performance issues
- Diagnose and resolve the most common causes of performance problems in TCP/IP communications
Audience
- Network engineers
- Network and computer technicians
Format of the Course
- Part lecture, part discussion, exercises, and extensive hands-on practice
Note
- To request a customized training for this course, please contact us to arrange.