Integrity Essential Training

Earn your certification

 

 

Integrity Essential Training

We’ve just added four new courses designed to get you up and running in integrity – fast! Managing DNS Deployment, Server Administration, User Access Management, System & Event Monitoring

  • Integrity made simple: Start with the basics and work your way up with engaging step by step instructions
  • Concise content: Modules are 2-5 minutes in length, so you can learn as little or as lot as you like
  • Searchable content: Find what you need to know right when you need it
  • Learn by doing: Watch the video then follow along with lab guide instructions
  • Check out our course samples

 

 

bam model

Get Certified

Become a BlueCat Integrity Certified Associate by taking all 8 Integrity Essential Training courses and passing the BICA exam.

Certification Kits will be awarded to all successful graduates.

Limited Time Offer
Earn your certification on or before October 18th 2021 to receive a special gift from BlueCat!

Register for BlueCat Learning and brush up on your networking skills

with bite-sized courses like our brand new Integrity Essential Training.

  • Choose what you learn, when you learn and, how you learn at your own pace
  • Our Training Curriculum offers comprehensive, interactive and engaging courses on every button, switch, process and part of the BlueCat product suite, as well as content pertaining to DNS + DHCP protocols, and IPAM architecture.
  • Quickly find the content you need with our customized learning paths for network admins, security analysts, dev ops and support providers
  • Become a BlueCat Integrity Certified Associate, Certified Professional, or Advanced Certified Professional
  • Optimize your BlueCat solution and realize its full potential

Introduction to Integrity 

An engaging introduction and step-by-step walkthrough of all that Integrity can do – from IPv4/IPv6 management, DHCP and DNS configuration, data management, automation, security, monitoring, tracking, as well as server management and user access rights.

 

 

 

Module 1: Introduction to Integrity – Overview

IPv4 Address Management 

A quick and easy walkthrough of BlueCat Address Manager’s IP creation and modelling tools. Learn how to architect and manage IP space, and discover tools to help maximize IP space usage.

 

 

 

Module 4: Modelling Blocks and Networks – Overview

DHCP Configuration

Learn to quickly define, modify, deploy and manage DHCP ranges in Address Manager. Learn four easy steps to create and deploy DHCP, and then put it in motion by creating DHCP ranges, setting usage alerts, adding deployment options, and deploying DHCP.

 

 

 

Module 2: DHCP Refresher – Overview

DNS Fundamentals

A quick introduction to DNS concepts and components. Learn to configure DNS views and Zones, and how to read a zone file. Get familiar with adding resource records, SOA records, configuring reverse DNS, PTR records, DNS Redundancy and deployment.

 

 

 

Module 1 – DNS Fundamentals – Overview

Managing DNS Deployment

This course will dive into configuring DNS deployment roles, DNS deployment options, and different methods to deploy data to the server. You will learn how to create and manage access control lists by applying them to DNS options in linked objects. Also included is step by step instruction on configuring and viewing recursive DNS, Global forwarding, forwarding Policies, stub zones, DNS Validation, and DNS Validation logs.

 

 

 

Module 5: Access Control Lists – Overview

Server Administration

This course provides an overview of BlueCat hardware and virtual appliances, and a step-by-step walkthrough of how to install and set-up a BAM appliance. We’ll run through all the initial CLI-based configurations required to get a BAM and BDDS up and running, and then we’ll configure essential services such as iDRAC, SSH, NTP, SMTP and Syslog Redirection. Learn how to customize the BAM with Global settings, and finally how to manage BDDS servers from the BAM UI as your DDI architecture grows and changes.

 

 

 

Module 1: Server Administration – Overview

User Access Management 

This course will demonstrate how to precisely manage user access types, levels, permissions, security and history privileges in all areas of your configuration. Learn to configure Authenticator, LDAP authenticator, local and LDAP groups, and accessing BAM as an LDAP user. You will also get familiar with managing administrative tasks, user sessions, configuring local workflows, audit trails and transaction history.

 

 

Module 1: User Access Management – Overview

System and Event Monitoring

This course will walkthrough 5 simple steps to enable SNMP and configure the monitoring service on BAM, BDDS, and across a configuration. We’ll get familiar with system metrics graphs and server statistics. Dive into SNMP Traps and notification groups to ensure you receive pertinent and useful alerts on all aspects of BAM and BDDS service performance with BlueCat MIBs and OIDs. Finally, we’ll take a good look at the event list, transaction history and reports in Address Manager.

 

 

Module 2: SNMP – Overview

eLearning

All of our courses are housed under a single platform called BlueCat Learning. This is a great choice for those looking for a self-paced interactive learning experience.

If you are an existing eLearning customer:

Click Here

If you would like to purchase our eLearning subscription:

Click Here

Instructor-Led

Instructor-led training provides practical, hands-on instruction that allows you and your team to hit the ground running as soon as the course is completed.

To learn more about our instructor-led courses:

Click Here

To get in touch with the BlueCat Learning Team, please reach out to us at:

[email protected]

Get in Touch

More work, greater risk, increasing costs, and stunted innovation are all consequences of complex networks. With Adaptive DNS, BlueCat changes that.

BlueCat has acquired LiveAction

It’s official! BlueCat has acquired LiveAction’s network observability and intelligence platform, which helps large enterprises optimize the performance, resiliency, and security of their networks.