OpenUEM Advanced: Automation, Security & Compliance Training Course
OpenUEM is an open-source endpoint management platform that facilitates advanced automation, endpoint hardening, and compliance reporting to secure and streamline enterprise operations.
This instructor-led live training (available online or on-site) is designed for advanced IT and security professionals seeking to leverage OpenUEM for automation, security hardening, compliance management, and integration with enterprise monitoring tools.
Upon completion of this training, participants will be capable of:
- Automating endpoint management tasks, including software deployment, updates, and reporting.
- Implementing security hardening policies and ensuring endpoint compliance.
- Integrating OpenUEM with enterprise security and monitoring tools for centralized visibility.
- Generating compliance reports and enforcing regulatory or organizational standards.
Course Format
- Interactive lectures and discussions.
- Hands-on exercises and practical scenarios.
- Implementation in a lab environment using real endpoints.
Course Customization Options
- To request customized training for this course, please contact us to make arrangements.
Course Outline
Advanced OpenUEM Automation
- Automating routine endpoint management tasks and workflows
- Utilizing scripts and built-in automation features
- Scheduling updates, software deployments, and maintenance tasks
Endpoint Security Hardening
- Applying security baselines and policy templates
- Configuring endpoint protection settings and access controls
- Monitoring compliance with security standards
Policy Enforcement & Compliance
- Defining compliance rules and regulatory requirements
- Auditing and reporting endpoint compliance status
- Remediating non-compliant devices
Software Deployment & Update Automation
- Automating patch management and software updates
- Managing version control and rollback procedures
- Integrating with inventory and monitoring tools for deployment validation
Integration with Security & Monitoring Tools
- Connecting OpenUEM with SIEM, SOAR, or monitoring platforms
- Correlating events and setting up alerts for endpoint security incidents
- Creating dashboards for centralized security visibility
Advanced Reporting & Analytics
- Generating compliance and operational reports
- Analyzing endpoint performance and security trends
- Using analytics to optimize automation and policy effectiveness
Capstone Lab & Practical Exercises
- Hands-on lab covering automation, policy enforcement, and security hardening scenarios
- Integration exercises with enterprise monitoring tools
- Review and discussion of lab results and best practices
Summary and Next Steps
Requirements
- Understanding of endpoint management and policy enforcement
- Experience with device administration and IT security best practices
- Familiarity with OpenUEM Intermediate concepts or completion of the OpenUEM Intermediate course
Audience
- Security engineers
- Compliance officers
- Senior infrastructure engineers
Need help picking the right course?
southafrica@nobleprog.co.za or +27 (0)10 005 5793
OpenUEM Advanced: Automation, Security & Compliance Training Course - Enquiry
Testimonials (2)
How trainer deliver knowledge so effectively
Vu Thoai Le - Reply Polska sp. z o. o.
Course - Certified Kubernetes Administrator (CKA) - exam preparation
Interesting labs, help from trainer
Alexey - Tink Poland sp. z o. o.
Course - Certified Kubernetes Application Developer (CKAD) - exam preparation
Related Courses
Akraino
14 HoursThis instructor-led, live training in Kenya (online or onsite) targets programmers keen to download, install, and configure Akraino Edge Stack blueprints to oversee their edge systems.
Upon completing this training, participants will be equipped to install, deploy, manage, and support end-to-end Akraino Edge Stack solutions, thereby improving and organizing their edge systems, services, and devices.
Certified Kubernetes Administrator (CKA) - exam preparation
21 HoursThe Certified Kubernetes Administrator (CKA) certification was established by The Linux Foundation in collaboration with the Cloud Native Computing Foundation (CNCF).
Today, Kubernetes stands as a premier platform for container orchestration.
NobleProg has been delivering Docker and Kubernetes training since 2015. With over 360 successfully completed training projects, we have become one of the most recognized training providers globally in the field of containerization.
Since 2019, we have also been assisting our customers in validating their performance in Kubernetes environments by preparing them and encouraging them to take the CKA and CKAD exams.
This instructor-led live training (available online or onsite) is designed for System Administrators and Kubernetes users who wish to validate their knowledge by passing the CKA exam.
Additionally, the training emphasizes gaining practical experience in Kubernetes Administration; therefore, we recommend participating even if you do not plan to take the CKA exam.
Course Format
- Interactive lectures and discussions.
- Ample exercises and practice sessions.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request customized training for this course, please contact us to arrange it.
- For more information about CKA certification, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-administrator-cka
Certified Kubernetes Application Developer (CKAD) - exam preparation
21 HoursThe Certified Kubernetes Application Developer (CKAD) programme was developed by The Linux Foundation and the Cloud Native Computing Foundation (CNCF), the host organisation of Kubernetes.
This instructor-led, live training (available online or onsite) is designed for Developers who wish to validate their skills in designing, building, configuring, and exposing cloud native applications on Kubernetes.
Furthermore, the training emphasises gaining practical experience in Kubernetes application development. Therefore, we recommend participating even if you do not intend to sit for the CKAD exam.
NobleProg has been delivering Docker & Kubernetes training since 2015. With over 360 successfully completed training projects, we have become one of the most recognised training companies globally in the field of containerisation. Since 2019, we have also assisted our customers in validating their performance in k8s environments by preparing them and encouraging them to pass the CKA and CKAD exams.
Format of the Course
- Interactive lectures and discussions.
- Extensive exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request customized training for this course, please contact us to arrange.
- To learn more about CKAD, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-application-developer-ckad/
CompTIA Network+ N10-008 exam prep with Exam (accredited training course with exam)
35 HoursIn this course, you will explore the primary networking technologies and systems of modern networks, learning to configure, manage, and troubleshoot them effectively.
- You will:
- Explain the OSI and TCP/IP Models.
- Describe properties of network traffic.
- Install and configure switched networks.
- Configure IP networks.
- Install and configure routed networks.
- Configure and monitor ports and protocols.
- Explain network application and storage issues.
- Monitor and troubleshoot networks.
- Describe network attacks and mitigations.
- Install and configure security devices.
- Explain authentication and access controls.
- Deploy and troubleshoot cabling solutions.
- Implement and troubleshoot wireless technologies.
- Compare and contrast WAN technologies.
- Use remote access methods.
- Identify site policies and best practices.
Jitsi Meet: Self-Hosted Video Conferencing Replacing Zoom and Microsoft Teams
14 HoursJitsi Meet is a fully encrypted, 100% open-source video conferencing solution that you can self-host on your own servers. It supports HD video, screen sharing, collaborative editing, and live streaming without requiring accounts or exposing meeting data to third-party platforms.
This instructor-led, live training (online or onsite) is aimed at intermediate DevOps and system administrators who wish to deploy Jitsi Meet as a replacement for Zoom, Microsoft Teams, and Google Meet.
By the end of this training, participants will be able to:
- Install and configure Jitsi Meet using Docker or Debian packages.
- Configure Prosody, Jicofo, and Jitsi Videobridge for optimal performance.
- Set up TURN servers for NAT traversal and firewall compatibility.
- Secure meetings with passwords, lobby rooms, and end-to-end encryption.
- Integrate Jitsi with LDAP, SSO, and calendar systems.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
LEDE: Set Up a Linux Wireless Router
7 HoursThe LEDE Project (Linux Embedded Development Environment) is a Linux operating system rooted in OpenWrt. It serves as a comprehensive alternative to the default firmware provided by manufacturers for a broad spectrum of wireless routers and non-networking devices.
In this instructor-led live training, attendees will acquire the skills needed to configure a LEDE-based wireless router.
Audience
- Network administrators and technicians
Course Format
- A blend of lectures, discussions, exercises, and extensive hands-on practice
Matrix + Element: Decentralized Enterprise Chat to Replace Slack and Teams
14 HoursMatrix is an open protocol for secure, decentralized, real-time communication. Organizations are increasingly adopting Matrix with the Element client as an alternative to Slack and Microsoft Teams to maintain end-to-end encryption, on-premise data residency, and federation with external trusted partners.
Nessus Manager
28 HoursNessus is a highly adaptable platform designed for the detection and management of vulnerabilities. Its capabilities extend beyond standard vulnerability identification, offering robust baseline auditing features. This involves comparing your system configurations against established hardening standards to ensure optimal security settings.
In this instructor-led course, we will explore the core components of the solution and its diverse functionalities. Each module within the application will be thoroughly explained, with practical use cases outlined to demonstrate its value.
By the end of the course, participants will be equipped to perform both authenticated and unauthenticated vulnerability scans across virtually all IP-based systems. You will learn to analyze scan results effectively to eliminate false positives, prioritize findings based on risk, and recommend appropriate compensating controls. This training will empower you to assess the security posture of your systems using Nessus and determine the most effective remediation strategies.
Target Audience:
- Infrastructure Managers
- System Administrators
- System Auditors
- System Compliance Officers
- Vulnerability Managers
- Cybersecurity Managers
Course Format:
A balanced mix of lectures, discussions, and hands-on practical exercises.
Network Monitoring Without Vendor Lock-in: LibreNMS and Zabbix
28 HoursThis instructor-led, live training in Kenya (online or onsite) is aimed at network and system administrators who wish to implement enterprise-grade network monitoring using open-source tools without vendor dependencies.
By the end of this training, participants will be able to deploy LibreNMS and Zabbix, monitor network devices, create dashboards and alerts, implement distributed monitoring, and integrate with external systems.
Network Security Administrator
35 HoursAudience:
This course is designed for system administrators, network administrators, and professionals keen on mastering defensive network security technologies.
ONAP for Network Orchestration and Automation
28 HoursIn this instructor-led, live training in Kenya (online or onsite), participants will learn how to use ONAP to automate networking services.
By the end of this training, participants will be able to:
- Understand, install and configure the various components in the ONAP ecosystem.
- Carry out real-time, policy-driven orchestration and automation of physical and virtual network functions.
- Design, create, orchestrate, and monitor VNFs, SDNs and other network services.
- Efficiently manage the entire networking lifecycle using a software-driven approach.
- Develop, deploy, and scale a network using the latest open source technologies and practices.
OpenUEM Fundamentals: Endpoint Management Essentials
14 HoursOpenUEM is an open-source unified endpoint management platform that empowers organizations to efficiently deploy, configure, and maintain their endpoint devices.
This instructor-led live training, available online or onsite, targets beginner-level IT professionals seeking to build foundational skills in endpoint management using OpenUEM, covering installation, configuration, and fundamental device administration.
Upon completing this training, participants will be able to:
- Install and configure the OpenUEM server and agents across various endpoint platforms.
- Enroll, organize, and manage endpoints effectively within the OpenUEM console.
- Deploy software, patches, and updates to managed devices.
- Monitor device health, generate reports, and perform basic troubleshooting.
Course Format
- Interactive lectures and discussions.
- Hands-on exercises and practical scenarios.
- Implementation in a lab environment using real endpoints.
Customization Options
- To request customized training for this course, please contact us to arrange it.
OpenUEM Intermediate: Agent Deployment, Inventory & Policy Management
14 HoursOpenUEM is an open-source endpoint management solution that empowers organizations to efficiently deploy agents, maintain precise device inventories, and enforce endpoint policies.
This instructor-led, live training (available online or on-site) targets intermediate IT professionals seeking practical expertise in deploying agents, managing inventories, and implementing policies across endpoint devices via OpenUEM.
Upon completion of this training, participants will be able to:
- Deploy OpenUEM agents efficiently across various endpoint platforms.
- Maintain and manage accurate asset inventories for all managed devices.
- Create, assign, and enforce policies to ensure compliance and security.
- Distribute software, updates, and patches to endpoints effectively.
Course Format
- Interactive lectures and discussions.
- Hands-on exercises and practical scenarios.
- Implementation within a lab environment using real endpoints.
Customization Options
- For a customized training version of this course, please contact us to make arrangements.
OpenStack and NFV (with OVN and OpenFlow)
21 HoursThis comprehensive training programme delves into OpenStack networking. It begins by introducing OpenStack and its architectural framework, followed by a detailed examination of key OpenStack projects: Identity (Keystone), Image (Glance), Compute (Nova), and Block Storage (Cinder). These are discussed to contextualize the network environment within OpenStack, with a primary emphasis on the Networking project (Neutron). The course explores virtual network infrastructure, leveraging the Open Virtual Network initiative, Open vSwitch, and OpenFlow. By the end of the course, participants will understand the fundamental operations and architecture of OpenStack and become proficient with the networking technologies that underpin it, including advanced insights into OVN, underlying flows, resources, and management tools.
Customization options
The training can be condensed into a 2-day format, focusing on core aspects most relevant to the client. Alternatively, it can be expanded to cover administrative, design, networking, and troubleshooting topics related to OpenStack deployments. Other software-defined networking (SDN) solutions, such as Linux Bridge or OvS, can also be incorporated into the curriculum.
Software-Defined Wide Area Network (SD-WAN) Management and Operation
7 HoursThis instructor-led, live training in Kenya (online or onsite) is aimed at intermediate-level network professionals who wish to effectively manage and operate SD-WAN networks, including design, configuration, troubleshooting, and optimization.
By the end of this training, participants will be able to:
- Understand the fundamental concepts, benefits, and challenges associated with SD-WAN technologies.
- Design an SD-WAN architecture tailored to organizational needs and deploy SD-WAN solutions effectively.
- Implement and manage security features within an SD-WAN.
- Monitor, manage, and troubleshoot SD-WAN environments.