OpenUEM Intermediate: Agent Deployment, Inventory & Policy Management Training Course
OpenUEM serves as an open-source endpoint management platform, enabling organisations to efficiently deploy agents, maintain precise device inventories, and enforce endpoint policies.
This instructor-led, live training (available online or onsite) targets intermediate-level IT professionals seeking to acquire practical skills in deploying agents, managing inventories, and implementing policies across endpoint devices using OpenUEM.
Upon completion of this training, participants will be able to:
- Efficiently deploy OpenUEM agents across various endpoint platforms.
- Maintain and manage accurate asset inventories for all managed devices.
- Create, assign, and enforce policies to ensure compliance and security.
- Effectively distribute software, updates, and patches to endpoints.
Format of the Course
- Interactive lecture and discussion.
- Hands-on exercises and practice scenarios.
- Implementation in a lab environment with real endpoints.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
Course Outline
OpenUEM Agent Deployment
- Strategies for mass deployment across Windows, macOS, and Linux endpoints
- Agent configuration and connectivity verification
- Best practices for secure and scalable deployment
Device Inventory Management
- Collecting and maintaining accurate hardware and software inventory
- Using OpenUEM reporting and dashboard tools for visibility
- Identifying and reconciling discrepancies in endpoint data
Policy Management Fundamentals
- Creating, assigning, and enforcing endpoint policies
- Configuring compliance settings and security standards
- Policy testing and validation in live environments
Software Distribution & Update Management
- Deploying software and application updates to endpoints
- Scheduling patches and monitoring installation success
- Handling version control and rollback procedures
Monitoring & Reporting
- Tracking agent status, policy compliance, and software deployment
- Generating reports for IT operations and management
- Integrating monitoring data for proactive endpoint management
Practical Lab Exercises
- Hands-on deployment of agents and policy enforcement
- Inventory auditing and report generation
- Software deployment and update scenario exercises
Summary and Next Steps
Requirements
- An understanding of endpoint management fundamentals
- Experience with device administration and software deployment
- Familiarity with OpenUEM basics or completion of OpenUEM Fundamentals course
Audience
- Device management teams
- System administrators
- Endpoint security specialists
Need help picking the right course?
southafrica@nobleprog.co.za or +27 (0)10 005 5793
OpenUEM Intermediate: Agent Deployment, Inventory & Policy Management Training Course - Enquiry
Testimonials (2)
How trainer deliver knowledge so effectively
Vu Thoai Le - Reply Polska sp. z o. o.
Course - Certified Kubernetes Administrator (CKA) - exam preparation
Interesting labs, help from trainer
Alexey - Tink Poland sp. z o. o.
Course - Certified Kubernetes Application Developer (CKAD) - exam preparation
Related Courses
Akraino
14 HoursThis instructor-led, live training in Botswana (online or onsite) is designed for programmers who wish to download, install, and configure Akraino Edge Stack blueprints to manage their edge systems.
Upon completion of this training, participants will be able to install, deploy, manage, and support end-to-end Akraino Edge Stack solutions to improve and organise their edge systems, services, and devices.
Certified Kubernetes Administrator (CKA) - exam preparation
21 HoursThe Certified Kubernetes Administrator (CKA) programme was established by The Linux Foundation and the Cloud Native Computing Foundation (CNCF).
Kubernetes has emerged as the premier platform for container orchestration.
NobleProg has been providing Docker and Kubernetes training since 2015. With over 360 successfully completed training projects, we have become one of the most recognised training companies globally in the field of containerisation.
Since 2019, we have also assisted our customers in validating their skills within Kubernetes environments by preparing them to pass the CKA and CKAD exams.
This instructor-led, live training (available online or onsite) is designed for System Administrators and Kubernetes users who wish to validate their knowledge by passing the CKA exam.
Furthermore, the training focuses on gaining practical experience in Kubernetes Administration; therefore, we recommend participating even if you do not intend to sit for the CKA exam.
Course Format
- Interactive lectures and discussions.
- Extensive exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customisation Options
- To request customised training for this course, please contact us to arrange.
- To learn more about the CKA certification, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-administrator-cka
Certified Kubernetes Application Developer (CKAD) - exam preparation
21 HoursThe Certified Kubernetes Application Developer (CKAD) programme has been developed by The Linux Foundation and the Cloud Native Computing Foundation (CNCF), the host of Kubernetes.
This instructor-led, live training (online or onsite) is aimed at Developers who wish to confirm their skills in design, build, configure, and expose cloud native applications for Kubernetes.
On the other hand, training is also focused on gaining practical experience in Kubernetes application development, so we recommend taking part in it, even if you don't intend to take CKAD exam.
NobleProg have been delivering Docker & Kubernetes training from 2015. With more than 360 successfully completed training projects, we became one of the best known training company worldwide in field of containerization. Since 2019 we are also helping our customers to confirm their performance in k8s environment by preparing them and encouraging to pass CKA and CKAD exams.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
- To learn more about CKAD, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-application-developer-ckad/
CompTIA Network+ N10-008 exam prep with Exam (accredited training course with exam)
35 HoursIn this course, you will describe the major networking technologies and systems of modern networks and configure, manage, and troubleshoot modern networks.
- You will:
- Explain the OSI and TCP/IP Models.
- Explain properties of network traffic.
- Install and configure switched networks.
- Configure IP networks.
- Install and configure routed networks.
- Configure and monitor ports and protocols.
- Explain network application and storage issues.
- Monitor and troubleshoot networks.
- Explain network attacks and mitigations.
- Install and configure security devices.
- Explain authentication and access controls.
- Deploy and troubleshoot cabling solutions.
- Implement and troubleshoot wireless technologies.
- Compare and contrast WAN technologies.
- Use remote access methods.
- Identify site policies and best practices.
Jitsi Meet: Self-Hosted Video Conferencing Replacing Zoom and Microsoft Teams
14 HoursJitsi Meet is a completely open-source, fully encrypted video conferencing platform that you can host on your own servers. It offers high-definition video, screen sharing, collaborative editing, and live streaming capabilities, all without requiring user accounts or exposing meeting data to third-party services.
This instructor-led, live training session (available online or onsite) is designed for intermediate DevOps engineers and system administrators who wish to deploy Jitsi Meet as a secure alternative to Zoom, Microsoft Teams, and Google Meet.
Upon completion of this training, participants will be equipped to:
- Install and configure Jitsi Meet using either Docker or Debian packages.
- Configure Prosody, Jicofo, and Jitsi Videobridge to ensure optimal performance.
- Set up TURN servers to facilitate NAT traversal and ensure firewall compatibility.
- Secure meetings through passwords, lobby rooms, and end-to-end encryption.
- Integrate Jitsi with LDAP, SSO, and calendar systems.
Course Format
- Interactive lectures and discussions.
- Ample exercises and practice opportunities.
- Hands-on implementation within a live lab environment.
Course Customization Options
- To request customized training for this course, please contact us to make arrangements.
LEDE: Set Up a Linux Wireless Router
7 HoursThe LEDE Project (Linux Embedded Development Environment) is a Linux operating system built upon OpenWrt. It serves as a comprehensive substitute for the firmware provided by vendors across a broad spectrum of wireless routers and non-network devices.
During this instructor-led live training, participants will acquire the skills necessary to configure a wireless router using LEDE.
Audience
- Network administrators and technicians
Course Format
- A combination of lectures, discussions, exercises, and extensive hands-on practice
Matrix + Element: Decentralized Enterprise Chat to Replace Slack and Teams
14 HoursMatrix serves as an open protocol enabling secure, decentralized, and real-time communication. Organizations are increasingly adopting Matrix combined with the Element client as a viable alternative to Slack and Microsoft Teams, allowing them to preserve end-to-end encryption, maintain on-premise data residency, and establish federation with trusted external partners.
Nessus Manager
28 HoursThe Nessus vulnerability scanner is a highly adaptable platform designed for detecting and managing security weaknesses. Its capabilities extend well beyond simple vulnerability detection, including baseline auditing, where system configurations are evaluated against established hardening standards.
During this instructor-led course, we will introduce the core components of the solution and explore its various functionalities. Each module within the application will be explained in detail, with its specific use cases outlined.
By the end of the course, participants will be equipped to conduct both authenticated and unauthenticated vulnerability scans on a wide range of IP-based systems. They will learn to analyze scan results to identify and eliminate false positives, prioritize findings based on risk, and recommend appropriate compensating controls. This training will enable participants to assess the security posture of their systems using Nessus and determine the most effective remediation strategies.
Audience:
- Infrastructure managers
- System administrators
- System auditors
- System compliance officers
- Vulnerability managers
- Cybersecurity managers
Format:
The course combines lectures, discussions, and hands-on practical exercises.
Network Monitoring Without Vendor Lock-in: LibreNMS and Zabbix
28 HoursThis instructor-led, live training in Botswana (online or onsite) is aimed at network and system administrators who wish to implement enterprise-grade network monitoring using open-source tools without vendor dependencies.
By the end of this training, participants will be able to deploy LibreNMS and Zabbix, monitor network devices, create dashboards and alerts, implement distributed monitoring, and integrate with external systems.
Network Security Administrator
35 HoursAudience:
This course is designed for System Administrators and Network Administrators, as well as any individual with an interest in defensive network security technologies.
ONAP for Network Orchestration and Automation
28 HoursIn this instructor-led, live training in Botswana (online or onsite), participants will learn how to use ONAP to automate networking services.
By the end of this training, participants will be able to:
- Understand, install and configure the various components in the ONAP ecosystem.
- Carry out real-time, policy-driven orchestration and automation of physical and virtual network functions.
- Design, create, orchestrate, and monitor VNFs, SDNs and other network services.
- Efficiently manage the entire networking lifecycle using a software-driven approach.
- Develop, deploy, and scale a network using the latest open source technologies and practices.
OpenUEM Advanced: Automation, Security & Compliance
14 HoursOpenUEM is an open-source endpoint management platform that enables advanced automation, endpoint hardening, and compliance reporting to secure and streamline enterprise operations.
This instructor-led, live training (online or onsite) is aimed at advanced-level IT and security professionals who wish to leverage OpenUEM for automation, security hardening, compliance management, and integration with enterprise monitoring tools.
By the end of this training, participants will be able to:
- Automate endpoint management tasks including software deployment, updates, and reporting.
- Apply security hardening policies and ensure endpoint compliance.
- Integrate OpenUEM with enterprise security and monitoring tools for centralized visibility.
- Generate compliance reports and enforce regulatory or organizational standards.
Format of the Course
- Interactive lecture and discussion.
- Hands-on exercises and practice scenarios.
- Implementation in a lab environment with real endpoints.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
OpenUEM Fundamentals: Endpoint Management Essentials
14 HoursOpenUEM is an open-source unified endpoint management platform that empowers organisations to deploy, configure, and maintain endpoint devices with efficiency.
This instructor-led, live training (available online or onsite) is designed for beginner-level IT professionals who wish to gain foundational skills in managing endpoints using OpenUEM, including installation, configuration, and basic device management.
By the end of this training, participants will be able to:
- Install and configure OpenUEM server and agents across multiple endpoint platforms.
- Enrol, organise, and manage endpoints efficiently within the OpenUEM console.
- Deploy software, patches, and updates to managed devices.
- Monitor device health, generate reports, and perform basic troubleshooting tasks.
Format of the Course
- Interactive lecture and discussion.
- Hands-on exercises and practice scenarios.
- Implementation in a lab environment with real endpoints.
Course Customisation Options
- To request a customised training for this course, please contact us to arrange.
OpenStack and NFV (with OVN and OpenFlow)
21 HoursThis course offers in-depth training on OpenStack networking. It begins by introducing OpenStack and its architecture, then clarifies core OpenStack projects such as the Identity service (Keystone), Image service (Glance), Compute service (Nova), and Block storage (Cinder) to describe the network surroundings within OpenStack, mainly focusing on the Networking project (Neutron). The virtual network infrastructure is described, focusing on the Open Virtual Network project, Open vSwitch, and OpenFlow. The goal of the course is to understand the basic operations and architecture of OpenStack as well as to familiarize participants with various networking technologies behind OpenStack, extending information about OVN and underlying flows, resources and tools.
Customization options
The training can be contracted to 2 days, focusing on core aspects relevant for the customer. The training can be also extended regarding administrative, design, networking and/or troubleshooting topics concerning OpenStack deployments. It is possible to describe other underlying SDN solutions like Linux Bridge or OvS.
Software-Defined Wide Area Network (SD-WAN) Management and Operation
7 HoursThis instructor-led, live training in Botswana (online or onsite) is aimed at intermediate-level network professionals who wish to effectively manage and operate SD-WAN networks, including design, configuration, troubleshooting, and optimization.
By the end of this training, participants will be able to:
- Understand the fundamental concepts, benefits, and challenges associated with SD-WAN technologies.
- Design an SD-WAN architecture tailored to organizational needs and deploy SD-WAN solutions effectively.
- Implement and manage security features within an SD-WAN.
- Monitor, manage, and troubleshoot SD-WAN environments.