The educational programming at Interop Digital is developed by vetted experts, ensuring we stay up to date on the industry’s hot topics. Certifications & Trainings will be held on Monday, October 5 and Tuesday, October 6.
Certification Courses will be held on Monday, October 5 and Tuesday, October 6. Please note, the courses will be running concurrently, therefore you will only be able to select one certification course to attend; DevOps Foundation Certification Course or Site Reliability Engineering (SRE) Foundation Certification Course. Please note, participation in both days of either course selected is mandatory to be eligible to take the test.
Certification Courses are available to the following pass holders: Certification + Conference pass and Certification Only pass.
Jayne Groll CEO of DevOps Institue previews the Devops Certifications and Track
Site Reliability Engineering (SRE) Foundation℠ Certification
The SRE Foundation℠ course is an introduction to the principles & practices that enable an organization to reliably and economically scale critical services. Introducing a site-reliability dimension requires organizational re-alignment, a new focus on engineering & automation, and the adoption of a range of new working paradigms.
The course highlights the evolution of SRE and its future direction, and equips participants with the practices, methods, and tools to engage people across the organization involved in reliability and stability evidenced through the use of real-life scenarios and case stories. Upon completion of the course, participants will have tangible takeaways to leverage when back in the office such as understanding, setting and tracking Service Level Objectives (SLO's).
DevOps Foundation® Certification
Take advantage of this two-day program, presented by the DevOps Institute, which allows attendees to earn a DevOps Foundation Certification at no additional cost. The course provides an introduction to DevOps, the cultural and professional movement that stresses communication, collaboration, integration, and automation in order to improve the flow of work between software developers and IT operations professionals. At the end of the course, attendees will receive a code allowing them to take the online test free of charge, on their own time. Please note that students must attend both full days of the course in order to be eligible to take the test.
Interop Digital will include 2, 2-day comprehensive training programs to choose from: Network Automation Summit presented by Network to Code and the Cybersecurity Crash Course, presented by Dark Reading. These trainings are available to the following pass holders: Training + Conference pass and the Training Only pass.
The 2-day training programs will be held on Monday & Tuesday from 9:00am – 2:00pm PT. Please note that space is limited. If you purchase one of the passes which provides access to the 2-day trainings, you will be prompted within registration to select if you wish to participate.
Network Automation Summit
Whether you’re a novice or an expert; whether you’re looking to increase reliability or speed, or drive down cost, this year’s Network Automation Summit aims to provide greater insight into the trends within the network automation industry, breaking down concepts and tools while also looking at how organizations have been able to transform culturally to fully embrace change and automation. The summit will provide practical next steps on getting started with network automation, compare and contrast many common network automation tools, but also dive deep into the nuts and bolts of development strategies while covering network automation architecture and design.
Cybersecurity Crash Course
Today's cyber attackers are developing new tactics and exploits at light speed. With so many other responsibilities to manage, it’s difficult for many IT professionals to keep up with the latest threats – and even tougher to learn the latest tools and processes for enterprise defense.
The Dark Reading Cybersecurity Crash Course is designed to help you with the latest developments in cybersecurity attacks, emerging threats, and methods for protecting your enterprise data. In a two-day series of sessions – each taught by a top expert in the topic – you’ll learn the latest developments in key areas of security operations. You'll get insights into the key steps every organization should take to protect critical data, as well as a detailed look at how to respond when your systems have been compromised. Our goal is to make you "security savvy" by giving you the basics you need to understand the threats and exploits, while at the same time updating you on the latest thinking around enterprise defense.
Interop Digital will host full-day training sessions providing in-depth instruction to attendees on a particular skill or subject on Monday, October 5 and Tuesday, October 6. Please note, the courses will be running concurrently, therefore you will only be able to select one course to attend per day. 1 day training courses are available to Training + Conference pass holders and Training Only pass holders.
The Technical Leader's Guide to Rapid Cloud Adoption
Ed Horley (Co-Founder and CEO, Hexabuild)
This class provides a no-nonsense road map on how to survive - and thrive - as you move to the public cloud, specifically AWS and Azure. We'll help you figure out what makes sense to move and explain the common challenges you will run into and some options on how to address them. We will focus on AWS, but the rules of the road are the same for Azure and the services it provides. We'll also discuss the decisions you will have to make to operate effectively in AWS.
Finally, we will cover what to continue to operate on-premises vs. what to switch to cloud and provide pointers for running both at the same time. Congratulations, you have a hybrid cloud - just wait until they ask for a cloud native! Get more info.
Choosing Your SD-WAN Provider
Dr. Jim Metzler (VP, Ashton, Metzler & Associates)
There are many SD-WAN solutions currently available on the market. These solutions vary significantly based on their architecture, the types of end points they support, how easily they enable multi-cloud access, their ability to ensure acceptable application performance, the security they provide and the ability of these solutions to be effectively managed. This half-day workshop will explore the differences in SD-WAN solutions and position you to choose the most appropriate solution for your organization. Click here for more info.
Migrating From IaaS to Containers
Eric Wright (Technology Evangelist, Turbonomic)
Successful migration from Infrastructure-as-a-Service to a containerized infrastructure needs a special set of skills. You will learn how to use a combination of technology know-how, collaboration skills and business requirements to bring today's IaaS applications into a containerized world.
Part 1 - Practical Steps for Moving from IaaS to Containers and PaaS
What are the most effective practical steps that have been proven out in real-world environments as organizations and teams make the transition to a more cloud-native deployment using containers and Platform-as-a-Service? We walk through tried and tested processes in order to prepare you to successfully make the transition for you and your organization in an interactive workshop.
Part 2 - Defining the Requirements - Enterprise Architecture in Practice
You will be guided through architecting an application from its current single-server implementation to break out the components, design for resiliency, and understand the advantages and challenges of each decision as we refactor the design for a cloud-native architecture. All code will be shared and you get a complete guided hands-on experience. Labs will be fully online and will also have offline components so that you can keep learning beyond the event.
Offensive Security Operations: Introduction to Red and Purple Teams
John Sawyer (Director of Services, Red Team, IOActive, Inc.)
More and more companies are relying on red and purple teams to identify gaps in their security controls, monitoring capabilities, and response process. This morning workshop will focus on performing your own operations to move laterally, escalate privileges, and exfiltrate data. Our goal is to show where visibility needs to be built into our networks and endpoints by understanding how real attackers break into modern networks. Labs will center around Windows and Linux tools that have a variety of offensive and defensive applications to demonstrate common attack paths.
Couch to Cloud-Native: How to Successfully Evolve from IaaS to Cloud-Native Architectures
Eric Wright (Technology Evangelist, Turbonomic)
Making the jump from traditional IaaS (Infrastructure-as-a-Service) to cloud services and cloud-native practices requires many new techniques and methodologies. Your organizational and personal approach to cloud as an infrastructure choice requires you to rethink much of what is “standard operating procedure” today.
This session will provide an extensive and industry-tested set of practices, tips, and methodologies that take your current operating model to the next generation in preparation for successful cloud adoption. Cloud-native is a methodology and an architectural approach. Attendees will come away with a proven set of processes to take your teams and your technology practices into a cloud environment to ensure successful adoption.
Computing From Cloud to Edge
To meet the needs of new latency-sensitive applications that include large data sets, workloads are becoming highly distributed, expanding the compute ecosystem to be closer to the user. There are many "edges" and exciting use cases emerging, driven by new vendors looking to take market share during market disruptions. This workshop, led by Omdia experts, will provide a definition for edge computing, look at new edge-enabled use cases including IoT and 5G, and highlight emerging vendors that might disrupt the market.
Edge Computing: What and Where Is It?
Cliff Grossner, Ph.D. (Executive Director Research & Technology Fellow, Cloud and Data Centre Research Practice, Omdia | Informa Tech)
Top Edge Computing Use Cases and Disruptive Vendors
Lucas Beran (Principal Analyst, Cloud and Data Center, Omdia | Informa Tech)
The Service Provider Enabled Edge
Brian Washburn (Practice Leader, Network Transformation & Cloud, Omdia | Informa Tech)
The IoT Edge
Julian Watson (Principal Analyst, IoT, Omdia | Informa Tech)
Wrap-Up Panel Discussion
Moderator: Cliff Grossner
Panelists: David Shacochis (Vice President of Enterprise Technology and Field CTO, CenturyLink)
Bill Carter (Chief Technology Officer, Open Compute Project Foundation)
Deep Dive Packet Analytis Using Wireshark
Mike Pennacchi (Owner, Network Protocol Specialists, LLC)
Every day, companies struggle with finger pointing when it comes to resolving application performance and security issues. Time after time, it comes down to digging through the data packets traveling across the network to find out exactly what is happening. This workshop will focus on how to capture the right packets using the free and open source packet analyzer Wireshark, and what to do with those packets once they are captured.