
Online or onsite, instructor-led live Networking training courses demonstrate through interactive discussion and hands-on practice the fundamentals and advanced topics of Networking.
Networking training is available as "online live training" or "onsite live training". Online live training (aka "remote live training") is carried out by way of an interactive, remote desktop. The UK onsite live Networking trainings can be carried out locally on customer premises or in NobleProg corporate training centres.
NobleProg -- Your Local Training Provider.
Testimonials
Richard was very knowledgable, clearly knew the subject area extremely well. Broke all of the complicated parts down into easier to understand chunks, and had great rapport with the group. He made a potentially tough and dry subject interesting. As a complete novice, I really enjoyed and found it very helpful for my role.
Capita Business Services Ltd
Course: Understanding Modern Information Communications Technology
For a very intense course, Richard gave a good high level overview for people who work in an IT Department but not actually undertaking the IT aspects of a job e.g. Cloud solutions, platforming, architecture...
Capita Business Services Ltd
Course: Understanding Modern Information Communications Technology
Trainer was very engaging.
Ryan Goddard - Capita Business Services Ltd
Course: Understanding Modern Information Communications Technology
Friendly informative and met objectives.
Capita Business Services Ltd
Course: Understanding Modern Information Communications Technology
The content, very interesting.
Lowri Jones - Capita Business Services Ltd
Course: Understanding Modern Information Communications Technology
Trainer, knowledge of trainer and ability to communicate complicated content and make it understandable.
Capita Business Services Ltd
Course: Understanding Modern Information Communications Technology
reaffirm my knowledge and learn many new things
Vale of glamorgan council; Vale of glamorgan council
Course: Cisco ASA/Pix Operation
Exercises were good, trainer had a good pace and good knowledge
Global Knowledge Networks UK
Course: Certified Kubernetes Application Developer (CKAD) - exam preparation
It was good to get a really good understanding of the subject.
Donna Hodgson - Capita Business Services Ltd
Course: Fundamentals Of Networking and The Internet
The flexibility of the lecturer when responding to questions and adapting the course material and delivery to help the audience take the learning back into our work areas.
Nicola Wellburn - Capita Business Services Ltd
Course: Fundamentals Of Networking and The Internet
Hands on and setup were nicely done and practical knowledge thoroughly imparted. Trainer was really helpful throughout.
B Kishore
Course: SIP protocol in VoIP
I liked the network forensics portion to identify unusual network traffic and possible attacks through investigation of cap files.
MINDEF
Course: Advanced Network Troubleshooting Using Wireshark
The course build up the whole picture and helped me understand in depth how to deal with everyday tasks I perform with Tenable Census Manager.
Konstantinos Papadopoulos
Course: Nessus Manager
I generally was benefit from the whole training.
Tassos Papadopoulos
Course: Nessus Manager
The exercises and analysis portion is very enriching and enlightening.
MINDEF
Course: Advanced Network Troubleshooting Using Wireshark
I really liked the rapport and connection that the trainer was able to achieve with the class. And that, on the fly, he was able to shape the class into the things we needed.
Fredrik Lindlöf - Svenska Spel AB
Course: HAProxy Administration
lots of information, all questions ansered, interesting examples
A1 Telekom Austria AG
Course: Deep Learning for Telecom (with Python)
His huge amount of knowledge.
Mirela Ochia - Deutsche Telekom Pan-Net Romania S.R.L.
Course: Practical SIP Telephony
Very well trained and documented. Every question addressed was very well answered.
Deutsche Telekom Pan-Net Romania S.R.L.
Course: Practical SIP Telephony
Trainer is well prepared and dedicated in making us understand. Well done.
Alan Lye - SBS Transit Ltd
Course: Basic Network Troubleshooting Using Wireshark
the trainer adapted his course to answer questions even if the questions where out of the course scope.
Mario Kuik - Netherlands Army
Course: HAProxy Administration
To get a better understanding about OpenStack.
Jan Gustafsson - Polystar OSIX
Course: OpenStack Architecture and Troubleshooting
It was very easy communication during all the course, got answers and help in very pedagogical manner. The trainer is very experienced, I recommend him anyone who is interested in getting good knowledge in this very complicated area :-)
Polystar OSIX
Course: OpenStack Architecture and Troubleshooting
The broad perspective of Openstack, no chance to dive in to deep to be able to keep schedule, more to where to get information from.
Jörgen Selegran - Polystar OSIX
Course: OpenStack Architecture and Troubleshooting
A good mix of hands on exercises and lectures!
Polystar OSIX
Course: OpenStack Architecture and Troubleshooting
The flexibility to answer questions. Good pdf, good examples
Conny Vigström - Polystar OSIX
Course: OpenStack Architecture and Troubleshooting
Damian, is very skilled, I'm very pleased with everything, no complains, best training session I've participated in for a long time… It's very difficult to have a training course like this, totally remote, you did a great job, It went very well, there were no issues.
Peter Erlandsson - Polystar OSIX
Course: OpenStack Architecture and Troubleshooting
The virtual desktop in a browser feature was kind of neat.
Mikael Karlsson - Polystar OSIX
Course: OpenStack Architecture and Troubleshooting
The network parts.
Polystar OSIX
Course: OpenStack Architecture and Troubleshooting
The varied topics
Daniel Lindh - Tele 2 Sverige AB
Course: OpenStack for Telecom
I like that we before the training had some meetings to discuss what parts we should focus on, and what is interesting for us at Tele2.
Tele 2 Sverige AB
Course: OpenStack for Telecom
The paste, all the information I got.
Tele 2 Sverige AB
Course: OpenStack for Telecom
Playing around in a non production environment.
Tele 2 Sverige AB
Course: OpenStack for Telecom
The trainer explains very well and he has a lot of patience and dedication to explain the subject.
Course: SIP protocol in VoIP
The trainer explains very well and he has a lot of patience and dedication to explain the subject.
Course: SIP protocol in VoIP
very engaging trainer context related excercises managed well to integrated different start/knowledge levels
Procter&Gamble Polska Sp. z o.o.
Course: Certified Kubernetes Administrator (CKA) - exam preparation
Quiz
Maxis Broadband Sdn Bhd
Course: SIP protocol in VoIP
the tools and the contents of the slide.
Kak Khen Man - Maxis Broadband Sdn Bhd
Course: SIP protocol in VoIP
Very informative and detail explanation
Syahrifendi Lukmanilhakim - Maxis Broadband Sdn Bhd
Course: SIP protocol in VoIP
Alot of example for on how protocol works
Maxis Broadband Sdn Bhd
Course: SIP protocol in VoIP
The trainer explains very well and he has a lot of patience and dedication to explain the subject.
Course: SIP protocol in VoIP
The trainer explains very well and he has a lot of patience and dedication to explain the subject.
Course: SIP protocol in VoIP
Networking Course Outlines
Kubernetes is nowadys a leading platform used for containers orchestration.
NobleProg have been delivering Docker & Kubernetes training from 2015. With more than 360 successfully completed training projects, we became one of the best known training companyworldwide in field of containerization.
Since 2019 we are also helping our customers to confirm their performance in k8s environment by preparing them and encouraging to pass CKA and CKAD exams.
This instructor-led, live training (online or onsite) is aimed at System Administrators, Kubernetes User swho wish to confirm their knowledge by passing CKA exam.
On the other hand, training is focused also on gaining practical experience in Kubernetes Administration, so we recommend taking part in it, even if you don't intend to take CKA exam.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
- To learn more about CKA certification, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-administrator-cka/
This instructor-led, live training (online or onsite) is aimed at Developers who wish to confirm their skills in design, build, configure, and expose cloud native applications for Kubernetes.
On the other hand, training is also focused on gaining practical experience in Kubernetes application development, so we recommend taking part in it, even if you don't intend to take CKAD exam.
NobleProg have been delivering Docker & Kubernetes training from 2015. With more than 360 successfully completed training projects, we became one of the best known training company worldwide in field of containerization. Since 2019 we are also helping our customers to confirm their performance in k8s environment by preparing them and encouraging to pass CKA and CKAD exams.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
- To learn more about CKAD, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-application-developer-ckad/
By the end of this training, participants will be able to:
- Install and configure Calico.
- Understand how Calico differs from traditional overlay networks.
- Understand how Calico combines internet routing protocols with consensus-based data stores.
- Use Calico to create a container networking solution for Kubernetes clusters.
- Use Calico to provide network policy for Kubernetes.
By the end of this training, participants will be able to:
- Understand the fundamental concepts of deep learning.
- Learn the applications and uses of deep learning in telecom.
- Use Python, Keras, and TensorFlow to create deep learning models for telecom.
- Build their own deep learning customer churn prediction model using Python.
Audience:
Suitable for anyone looking for an understanding of TCP/IP.
Course is approximately 50% practical.
Audience:
Network Planners, Designers, and Engineers requiring an understanding of IP v6. Those requiring a comprehensive overview of IP v6 and the migration process from an IP v4 environment.
Audience:
Suitable for network planners, engineers or anyone interested in IPSec VPNs
Course is approximately 40% practical
Delegates will configure the ASA using the console port, TFTP server, telnet and SSH using local and RADIUS authentication. The device will be configured to utilise Syslog and SNMP.
ASA Firewalls will also be configured to use Access-Lists, Network Address Translation and VPN's utilising IPSec protocols. The course will cover the theory of Public/Private Keys, shared secret keys and their use in forming Site to site VPN's between ASA Firewalls using IKE and IPSec. Students will configure the units to create site to site VPN's, remote access VPN's using the Cisco Secure VPN Client and Web VPN's. The course will cover the theory of failover and delegates will configure Active/Standby failover on the ASA.
Privileged commands and protocol analyser traces will be used, where necessary, to debug protocols and ensure proper operation of the ASA Firewall. Students will also perform password recovery operations.
This course will involve interfacing the ASA with other network equipment, such as routers and switches, as would be expected in a network environment.
Audience:
Course is suitable for anyone involved in ASA firewall configuration and network security
Course is approximately 50% practical
In this instructor-led, live training, participants will learn how to secure an internet connection through a Shadowsocks proxy.
By the end of this training, participants will be able to:
- Install and configure Shadowsocks on any of a number of supported platforms, including Windows, Linux, Mac, Android, iOS, and OpenWrt.
- Deploy Shadosocks with package manager systems, such as pip, aur, freshports and others.
- Run Shadowsocks on mobile devices and wireless networks.
- Understand how Shadowsocks encrypts messages and ensures integrity and authenticity.
- Optimize a Shadowsocks server
Audience
- Network engineers
- System Administrators
- Computer technicians
Format of the course
- Part lecture, part discussion, exercises and heavy hands-on practice
have to maintain MetroEthernet services across the globe. The course introduces all the
prevailing standards, Troubleshooting guides, vendor options and evolving technologies in
Metro Ethernet domain.
In this instructor-led, live training, participants will learn how to set up a VoIP system using Cisco CallManager Express.
By the end of this training, participants will be able to:
- Understand fundamental VoIP concepts
- Learn how to use VoIP equipment
- Configure CISCO routers for VoIP
- Implement VoIP and CallManager Express into their network
- Configure CME features for SIP, SCCP, and soft phones
- Work with advanced configuration settings and features of CME
Audience
- Managers
- System administrators
- Software and support system developers
- Technicians
- Network engineers
Format of the course
- Part lecture, part discussion, exercises and heavy hands-on practice
In this instructor-led, live training, participants will learn the fundamentals of working with Tinc VPN.
By the end of this training, participants will be able to:
- Install, configure, run, test, and troubleshoot Tinc VPN on any operating system
- Deploy a Tinc Mesh VPN
- Use Tinc VPN for Centralized Cloud Interconnection
Audience
- Developers
- Network engineers
Format of the course
- Part lecture, part discussion, exercises and heavy hands-on practice
Note
- To request a customized training for this course, please contact us to arrange.
By the end of this training, participants will be able to:
- Optimize and leverage Paramiko, Netmiko, Napalm, Telnet, and pyntc for network automation with Python.
- Master multi-threading and multiprocessing in network automation.
- Use GNS3 and Python for network programming.
By the end of this training, participants will be able to:
- Perform configurations of SAN and NAS storage on a storage system.
- Connect to storage systems and devices from a client.
- Compare SAN and NAS solutions for centralized storage.
By the end of this training, participants will be able to:
- Understand how networking works under Linux.
- Set up a sample LAN.
- Understand the various protocols used on the internet and implement each one under Linux.
- Secure a networking and various types of servers, such as a webs server.
Students will inter-connect networks by implementing static routes, distance-vector and link-state based dynamic routing protocols.
The devices will be configured to route traffic across LAN/VLAN//WAN boundaries, by encapsulating datagrams across serial data links using various WAN protocols, such as HDLC, Frame Relay, ISDN and PPP (with CHAP authentication). VLAN encapsulation/tagging will be via IEEE802.1Q/P.
Standard and Extended Access Control Lists will be configured and applied to router interfaces to filter traffic based on IP address and/or traffic type.
Students will configure static and dynamic NAT to route between private and public networks and cover the theory of Virtual Private Networks (VPN's)
Students will copy router configurations and IOS images to/from a TFTP Server. Privileged commands will be used to debug TCP/IP protocols to ensure proper operation of the routers. Students will also perform password recovery operations.
The course is primarily aimed at IP v4 but does give an overview of IP v6 addressing and covers migration from an IP v4 to an IP v6 network. Other protocols and technologies (VPN's / Wireless) may be demonstrated if time permits.
Course can be customised to precise requirements of customer.
Audience:
This course is suitable for anyone looking for a basic understanding of internetworking with Cisco devices and covers the CCNA syllabus.
Course is approximately 50% practical
This instructor-led, live training (online or onsite) is aimed at engineers who wish to use Cisco SD-WAN products to set up and operate a software defined network.
By the end of this training, participants will be able to:
- Install and configure a Cisco SD-WAN.
- Create policies to control network traffic.
- Understand and implement overlay routing.
- Simplify the management of the network used for public cloud applications.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
- What is denial of service attacks, Flooding, Sniffing, MIM?
- How to break from the network to the server?
- How to watch packets on the network (also running on switches)?
- Do you watch any combination of the world?
- How to monitor the network?
- How to configure a firewall?
- How to use encrypted connections?
- How to create tunnels?
- How to log packets?
- How to scan ports?
- How to reduce the number of unnecessary services on the server?
This course focuses on network security with a software security viewpoint, and discusses common network attacks and defenses on different OSI layers, with an emphasis on application layer issues, tackling topics like session management or denial of service.
As cryptography is a critical aspect of network security, the most important cryptographic algorithms in symmetric cryptography, hashing, asymmetric cryptography, and key agreement are also discussed. Instead of presenting an in-depth mathematical and theoretical background, these elements are discussed from a merely practical, engineering perspective, showing typical use-case examples and practical considerations related to the use of crypto, such as public key infrastructures. Security protocols in many areas of secure communication are introduced, with an in-depth discussion on the most widely-used protocol families such as IPSEC and SSL/TLS.
Finally, typical crypto vulnerabilities are discussed – both related to certain crypto algorithms and cryptographic protocols, such as BEAST, CRIME, TIME, BREACH, FREAK, Logjam, Padding oracle, Lucky Thirteen, POODLE and similar, as well as the RSA timing attack. In each case, the practical considerations and potential consequences are described for each problem, again, without going into deep mathematical details.
Participants attending this course will
- Understand basic concepts of security, IT security and secure coding
- Learn about network attacks and defenses at different OSI layers
- Have a practical understanding of cryptography
- Understand essential security protocols
- Understand some recent attacks against cryptosystems
- Get information about some recent related vulnerabilities
- Get sources and further readings on secure coding practices
Audience
Developers, Professionals
System Administrators and Network Administrators as well as anyone who is interested in defensive network security technologies.
In this instructor-led, live training, participants will learn hands-on how to set up a Zero Security system as they set up and deploy BeyondCorop in a live-lab environment.
By the end of this training, participants will be able to:
- Assess their organization's existing security model.
- Shift access controls from the perimeter to individual devices and users.
- Deploy applications using a user and device-centric authentication and authorization workflow.
- Understand, plan and implement a Zero Trust network within their organization.
Audience
- Network engineers
- Cyber security professionals
- System architects
- IT managers
Format of the Course
- Part lecture, part discussion, exercises and heavy hands-on practice
Note
- To request a customized training for this course, please contact us to arrange.
The Certified Lead Ethical Hacker training course enables you to develop the necessary expertise to perform information system penetration tests by applying recognized principles, procedures and penetration testing techniques, in order to identify potential threats on a computer network. During this training course, you will gain the knowledge and skills to manage a penetration testing project or team, as well as plan and perform internal and external pentests, in accordance with various standards such as the Penetration Testing Execution Standard (PTES) and the Open Source Security Testing Methodology Manual (OSSTMM). Moreover, you will also gain a thorough understanding on how to draft reports and countermeasure proposals. Additionally, through practical exercises, you will be able to master penetration testing techniques and acquire the skills needed to manage a pentest team, as well as customer communication and conflict resolution.
The Certified Lead Ethical Hacking training course provides a technical vision of information security through ethical hacking, using common techniques such as information gathering and vulnerability detection, both inside and outside of a business network.
The training is also compatible with the NICE (The National Initiative for Cybersecurity Education) Protect and Defend framework.
After mastering the necessary knowledge and skills in ethical hacking, you can take the exam and apply for the "PECB Certified Lead Ethical Hacker" credential. By holding a PECB Lead Ethical Hacker certificate, you will be able to demonstrate that you have acquired the practical skills for performing and managing penetration tests according to best practices.
Who should attend?
- Individuals interested in IT Security, and particularly in Ethical Hacking, to either learn more about the topic or to start a process of professional reorientation.
- Information security officers and professionals seeking to master ethical hacking and penetration testing techniques.
- Managers or consultants wishing to learn how to control the penetration testing process.
- Auditors wishing to perform and conduct professional penetration tests.
- Persons responsible for maintaining the security of information systems in an organization.
- Technical experts who want to learn how to prepare a pentest.
- Cybersecurity professionals and information security team members.
In this instructor-led, live training, participants will learn how to use OpenVAS for network vulnerability scanning.
By the end of this training, participants will be able to:
- Install and configure OpenVAS
- Learn the fundamental features and components of OpenVAS
- Configure and implement network vulnerability scans with OpenVAS
- Review and interpret OpenVAS scan results
Audience
- Network engineers
- Network administrators
Format of the course
- Part lecture, part discussion, exercises and heavy hands-on practice
Note
- To request a customized training for this course, please contact us to arrange.
By the end of this training, participants will be able to:
- Set up the necessary development environment to start developing firewalls.
- Deploy a Palo Alto firewall in a cloud server.
- Manage packet flow through Palo Alto firewalls.
- Interpret QoS classifications and types.
Last Updated: