• Classroom
  • Online, Instructor-Led
Course Description

This 3-day class is intended to prepare technical consultants for their first customer deployment projects. Students work from a backlog of stories (requirements) to complete configurations common to 80% of customer deployments while learning about implementation best practices and exploring newer features of the platform. The course weaves a scenario throughout each module to present real world, relevant lab exercises. The class features lecture and group activities, as well as extensive hands-on practice and reinforcement delivered in a variety of labs.

Learning Objectives

Upon completion of this course students will be able to: Judge accuracy, clarity, feasibility, and size of customer requirements. Recognize, understand, and apply the primary platform building blocks to satisfy common requirements. Examine the architecture – regardless of the product lines, the platform building blocks are the same. Design solutions that are supportable, maintainable, and upgradable. Become familiar with common design patterns and configuration principles that maximize supportability, maintainability, and upgradability for long-term customer success. Practice developing design solutions for customers that comply with common ServiceNow application design patterns and technical best practices. Implement common tasks included as part of the initial setup of customer instances, including loading foundational data, CMDB and integrating with LDAP Directory Servers. Apply experiences working as part of a scrum team in classroom simulations to accelerate the process of assimilating within actual ServiceNow implementation teams.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Defense Analysis
  • Cyber Defense Infrastructure Support
  • Cyber Investigation
  • Digital Forensics
  • Exploitation Analysis
  • Network Services
  • Risk Management
  • Software Development
  • Test and Evaluation
  • Threat Analysis
  • Training, Education, and Awareness
  • Vulnerability Assessment and Management