Detailed Course Outline
Chapter 1: Course overview
- Identify the content and objectives of the course.
 - Define the class schedule and class logistics.
 - Identify the related courses and next steps.
 - Discuss lab environment details.
 
Chapter 2: Introduction to NOM on OMT
- Describe the concept of Network Operations Management (NOM)
 - Explain the operation of OPTIC data lake (ODL) and its role in NOM
 - Describe the concept of the Optic Management Toolkit and its role in the deployment of ODL and NOM
 - Explain the high-level architecture of NOM and its deployment modes
 - Describe how NOM can operate in the OpenText cloud
 - Explain the reporting capabilities of NOM and ODL working together
 - Describe the reporting technologies that can be used for dashboarding and reporting
 
Chapter 3: SNMP data collection
- Explain the concepts of :
 - Quality of Service (QoS)
 - IP Service Level Agreements (IP SLAs)
 - Virtual Routing and Forwarding (VRF)
 - Describe the following NNMi intelligent Smart Plug-Ins (iSPIs):
 - 3a. Quality Assurance (QA) iSPI and Intelligent Response Agent (iRA)
 - 3b. Multiprotocol Label Switching (MPLS) iSPI
 - 3c. Traffic iSPI
 - 3d. IP Telephony (IPT) iSPI
 - 3e. Multicast iSPI
 
Chapter 4: Non-SNMP data collection
This chapter is comprised of the following sub-modules:
- 4a. Custom Poller
- Define a MIB expression
 - Configure a collection policy
 - Define a collection threshold
 - Export collected data to a CSV file
 - Define MIB expressions and collections using the CLI
 
 - 4b. Open Data Ingestion (ODI)
- Describe the value proposition of ODI
 - Explain the process inserting data using ODI
 - Understand the concepts of Authentication, Data Set definition, and data insertion using the REST API
 - Explain how raw, aggregation and forecast data sets are created
 - Describe the licensing nuances of using ODI
 
 - 4c. Webhook
- Explain the value of the Webhook mechanism and its purpose
 - Discuss the principles of operation of Webhook
 - Explain how Webhook works in an application failover or HA environment
 - Use the Webhook CLI commands
 - Understand the Webhook mapping rules
 
 - 4d. Telemetry
- Explain the concept of telemetry
 - Describe the differences between MIN and YANG model
 
 - 4e. Deep Monitoring
- Discuss the concept of Deep Monitoring as defined by OpenText
 - Explain the NNM use case for Wireless Deep Monitoring
 - Explain the NNM use case for Firewall Deep Monitoring
 - Discuss the licensing scheme for deep monitoring
 
 
Chapter 5: NOM and OPTIC Data Lake
- Describe the main feature of Optic reporting
 - Enumerate the different types of reports and dashboards available in the NOM UI
 - Navigate the NOM UI
 - Describe some of the available stakeholder dashboards
 - Explain how to create a FLEX report
 - Describe how to navigate the Performance Troubleshooting console
 - Use the Performance Maps
 
Chapter 6: Overlay support
- Explain the concept of an overlay
 - Describe the Cisco ACI overlay
 - Explain the Firewall virtual system overlay
 - Describe the SDWAN overlay support
 
Chapter 7: Application failover
- Summarize the NNMi application failover functionality
 - Configure application failover
 - Use cluster administration commands
 
Chapter 8: NNM Global Network Management
- List the functions and features of Global Network Management (GNM)
 - List the two main components of GNM
 - Analyze use case scenarios for GNM
 - Outline different deployment scenarios for GNM
 - List prerequisites for GNM deployment
 - Analyze GNM-iSPI relations
 - Identify high-level GNM architecture
 - Plan and configure GNM for NNM
 
Chapter 9: Network Edge Observer
- Explain the value proposition and purpose of the Network Edge Observer (NEO)
 - Describe the configuration of NEO with NNM
 - Explain the similarities and differences between NEO, RNM and GNM
 
Chapter 10: Security and certificates
- Explain the importance of secure communications
 - Discuss the basics of secure communications such as encryption, certificates, certificate authority (CA)
 - Explain what secure communications adds to NOM
 - Discuss where secure communications are used in NOM
 
Chapter 11: Integrating NNM, LDAP and NA
- Describe the products that integrate with NNM
 - Discuss the integration of NNM with Network Automation (NA)
 - Integrate NNM with Lightweight Directory Access Protocol (LDAP)
 
Chapter 12: NOM REST API
- Explain the APIs available with NNM
 - Describe the concept of a REST API
 - Explain the benefits of a REST API
 - Describe the flow of a REST API
 - Explain the details of a REST API request
 - Describe the NNM data model
 
Chapter 13: Managing virtualization
- Identify the hypervisor (ESXi Server) hosting a Virtual Machine (VM)
 - Use a loom map to identify the hosting hypervisor's Network Interface Card (NIC) that the VM is connected
 - Use a wheel map to identify the hosting hypervisor's NIC to whom the VM is connected
 
Chapter 14: NNM licensing
- Describe the NOM license structure across different capabilities
 
Chapter 15: Advanced protocols
This module is comprised of the following sub-modules:
- 15a. IPv6
- Specify the types of IPv6 addresses
 - Identify the notation used in writing IPv6 addresses
 - Describe how NNMi supports IPv6
 - Locate and manage IPv6 and IPv4 devices
 - List the prerequisites for deploying IPv6
 
 - 15b SNMPv3
- List the components and architecture of SNMPv3
 - Analyze how SNMPv3 security works
 - List the general steps for configuring a network device for SNMPv3
 - Identify the main design goals for SNMPv3
 - Configure NNM to manage SNMPv3-enabled devices
 
 
Chapter 16: Advanced incident configuration
- Define a node and interface group specific to trap handling
 - Use the following event correlation features:
 - Dampening
 - Payload filtering
 - Pairwise
 - Rate
 - Deduplication
 - Custom correlation
 - Causal rules
 
Chapter 17: Pseudo objects
- Explain the concept of a pseudo object
 - Create pseudo nodes
 - Create pseudo interfaces
 - Create pseudo connections
 - Display a Layer 2 connectivity diagram with pseudo-objects
 
Chapter 18: Custom attributes
- Add custom attributes to nodes
 - Add custom attributes to interfaces
 - Populate custom attributes from the CLI
 
Chapter 19: User interface customization
- Create a menu
 - Create a menu item
 - Create a launch action
 - Create a line graph action