TCP/IP Networking Training Courses

TCP/IP Networking Training

TCP/IP Networking courses

Client Testimonials

TCP/IP Networking Course Outlines

Code Name Duration Overview
plcladder PLC Ladder Programming 14 hours Automation Engineers, Passionates who would like to create their own intelligent home etc.
411 Information Safety and Network Security 7 hours
sipvoip SIP protocol in VoIP 21 hours The course consists of two complementary parts – a theoretical and a practical one. The first is a one day introduction covering motivation, philosophy, fundamentals and rules of operation of the SIP protocol and ways it is used to implement telecom services with focus on IP telephony and VoIP. The second two-day part enables participants to learn practical aspects of service operation within a framework of hand-on laboratory exercises giving detailed insight into configuration of components of SIP telephony architecture, SIP signalling at both message sequence chart and internal message structure levels, and assists in understanding of typical problems and troubleshooting including security and telecom fraud aspects. The trainers will share their experience in launching, operation and management of SIP telephony covering also virtualization and cloud based solutions. Practical part is presented using both SIP hardphones and softphones and IP telephony servers (Asterisk and Freeswitch). Participants can take advantage of the fact trainers have got rich technical and business experience in IP telephony and submit their own problems and questions. They will be included in the agenda at wrap-up as a supplement to the training to meet current urgent needs of clients. Training is addressed to participants with basic knowledge and experience in telecom services – specifically in VoIP and IP networking.
tcpipprac Practical TCP/IP 28 hours This 4 day course involves a mixture of expository based (utilising protocol analyser traces where appropriate) and practical experiments to test and verify the operation of TCP/IP networks. The major aspects of the TCP/IP protocol stack are covered, including subnetting, supernetting and running dynamic routing protocols. TCP and UDP will be compared and contrasted, covering the end-to-end reliability and congestion avoidance capabilities of the TCP/IP stack. Some application layer protocols (HTTP, TLS, DNS, DHCP etc) will be investigated during the course. Network security in the form of TLS will be covered both from a theoretical and practical standpoint. The practical exercises are designed to augment the theory and enhance both the understanding of the underlying protocols and also the problem solving abilities of the delegates. Audience: Suitable for anyone looking for an understanding of TCP/IP. Course is approximately 50% practical.
Munin Monitoring your resources with Munin 7 hours Munin is an open-source monitoring tool that helps system administrators monitor resources such as servers, workstations, networks, SANs, applications, network devices, etc. It shows resource trends and provides insights to into questions such as "what just happened to kill our performance?" It includes visualization tools and is available on various flavors of Linux and FreeBSD. Audience System administrators Network administrators Network engineers IT managers IT administrators Format of the course Heavy emphasis on hands-on practice. Most of the concepts are learned through samples, exercises and hands-on development.
ipv6und Understanding IPv6 14 hours A 2 day theoretical course (with some practical demonstrations) covering the fundamentals of Internet Protocol v6 – including addressing, protocol formats, ICMP v6, discovery processes and IP v6 routing. Audience: Network Planners, Designers, and Engineers requiring an understanding of IP v6. Those requiring a comprehensive overview of IP v6 and the migration process from an IP v4 environment.
muipv4 Understanding Multicast using IPv4 21 hours Transport of baseband audio and video streams across IP networks using multicast signalling protocols is becoming increasingly used in broadcast networks. This 3 day course/workshop covers the theory and practice of implementing these protocols within IP and Ethernet networks. The practical element of the course will use Cisco L3 switches and the multicast streamers and receivers will use the cross -platform VLC application. It is not necessary to have any expertise in the Cisco command line as the configuration of the devices can be instructor-led if required. However the course is intended to have at least 50% practical content and can be customised or even lengthened (to examine the protocols in more detail) if run as a single company event.
vvoip Practical Voice and Video over IP 21 hours A 3 day practical course covering the fundamentals of the various voice protocols used to carry voice (and video) over a packet switched network. This course is a mixture of theory and practice (utilising Wireshark where appropriate for explanation and troubleshooting) with practical VoIP configured using IP telephones, softphones and voice capable Cisco routers. This is primarily a ‘generic’ VoIP course – but uses Cisco equipment to provide an IP backbone and voice gateways. We can also provide Cisco specific voice training courses. The course also covers call setup between circuit switched and packet switched networks. The course is approximately 40% practical.
varnish Varnish: Speeding up your website with HTTP reverse proxy caching 7 hours Varnish is a reverse proxy for content-heavy dynamic web sites. Unlike Squid, which was originally a client-side cache, or Apache and nginx, which are web servers, Varnish was designed as an HTTP accelerator. Varnish is focused exclusively on HTTP, unlike other proxy servers that support FTP, SMTP and other network protocols. Varnish is used by Wikipedia, The New York Times, Facebook and Twitter, among other high-profile websites. In this course, participants will learn about Varnish's features and caching approach while practicing in the setup and configuration of a Varnish proxy on Linux. The course starts with a refresher on key networking principles, then digs into setup and configuration topics and moves steadily towards complex implementations. By the end of the training participants will understand when and where it makes sense to deploy Varnish and will have the necessary practice to deploy their own Varnish proxy solutions. Audience     Network technicians     Network designers     System administrators Format of the course     Part lecture, part discussion, heavy hands-on practice and implementation, occasional quizing to measure progress
siptel Practical SIP Telephony 21 hours A 3 day practical course covering the messages and call flows of the Session Initiation Protocol (SIP) and its use in voice networks. This course is a mixture of theory and practice (utilising protocol analyser traces where appropriate for explanation and troubleshooting) with practical VoIP configured using IP telephones, softphones, voice capable Cisco routers and SIP IP PBX,s (e.g. Trixbox). Audience: Network Planners, Designers, and Engineers requiring an understanding of SIP. The course is around 40% practical.
shadowsocks Shadowsocks: Set up a proxy server 7 hours Shadowsocks is an open-source, secure socks5 proxy. In this instructor-led, live training, participants will learn how to secure an internet connection through a Shadowsocks proxy. By the end of this training, participants will be able to: Install and configure Shadowsocks on any of a number of supported platforms, including Windows, Linux, Mac, Android, iOS, and OpenWRT. Deploy Shadosocks with package manager systems, such as pip, aur, freshports and others. Run Shadowsocks on mobile devices and wireless networks. Understand how Shadowsocks encrypts messages and ensures integrity and authenticity. Optimize a Shadowsocks server Audience Network engineers System Administrators Computer technicians Format of the course Part lecture, part discussion, exercises and heavy hands-on practice
pradtacacs Practical RADIUS and TACACS+ 14 hours A 2 day practical course that covers the theory of RADIUS and TACACS+ protocols. Network Policy Server (NPS) on Windows 2008 Server will be used to implement Connection Request and Network Policies to allow users access to network resources. A windows based TACACS+ server will be used to investigate the operation of this protocol to provide authentication, authorisation and accounting for users accessing network resources. There is an option for an additional one day workshop to configure and test IEEE802.1x authentication using Windows 7 client as the supplicant, a Cisco switch as the authenticator and an NPS server to provide the authentication. Delegates will configure the Cisco switch and NPS server to use the Extensible Authentication Protocol (EAP). Audience: Network Planners, Designers, and Engineers requiring an understanding of RADIUS and TACACS+ operation Course is approximately 40% practical.
voipcme VoIP with Cisco CallManager Express 35 hours VoIP (Voice over Internet Protocol) is a technology that makes it possible for users to make voice calls over an Internet connection instead of through a regular phone line. In this instructor-led, live training, participants will learn how to set up a VoIP system using Cisco CallManager Express. By the end of this training, participants will be able to: Understand fundamental VoIP concepts Learn how to use VoIP equipment Configure CISCO routers for VoIP Implement VoIP and CallManager Express into their network Configure CME features for SIP, SCCP, and soft phones Work with advanced configuration settings and features of CME Audience Managers System administrators Software and support system developers Technicians Network engineers Format of the course Part lecture, part discussion, exercises and heavy hands-on practice
ipsecvpn Understanding IPSec VPNs 14 hours This 2 day course investigates the theory and technology associated with IPSec VPN’s.VPN’s are setup using Cisco IOS Routers and ASA Firewalls using the web interface. The workings of the protocols are examined using debug commands and protocol analyser traces of relevant negotiations. Audience: Suitable for network planners, engineers or anyone interested in IPSec VPNs Course is approximately 40% practical
3712 Cisco CCNA Syllabus in 5 Days 35 hours A 5 day practical networking course designed to familiarise students with Cisco IOS (version 12). The course details the key commands used to configure and secure Cisco routers and switches, and covers the CCNA syllabus - including wired and wireless LAN access. Students will inter-connect networks by implementing static routes, distance-vector and link-state based dynamic routing protocols. The devices will be configured to route traffic across LAN/VLAN//WAN boundaries, by encapsulating datagrams across serial data links using various WAN protocols, such as HDLC, Frame Relay, ISDN and PPP (with CHAP authentication). VLAN encapsulation/tagging will be via IEEE802.1Q/P. Standard and Extended Access Control Lists will be configured and applied to router interfaces to filter traffic based on IP address and/or traffic type. Students will configure static and dynamic NAT to route between private and public networks and cover the theory of Virtual Private Networks (VPN's) Students will copy router configurations and IOS images to/from a TFTP Server. Privileged commands will be used to debug TCP/IP protocols to ensure proper operation of the routers. Students will also perform password recovery operations. The course is primarily aimed at IP v4 but does give an overview of IP v6 addressing and covers migration from an IP v4 to an IP v6 network. Other protocols and technologies (VPN's / Wireless) may be demonstrated if time permits. Course can be customised to precise requirements of customer. Audience: This course is suitable for anyone looking for a basic understanding of internetworking with Cisco devices and covers the CCNA syllabus. Course is approximately 50% practical
casapixo Cisco ASA/Pix Operation 28 hours A 4 day instructor-led practical course designed to familiarise delegates with the Cisco ASA Firewall CLI and ASDM. The course details the key commands used to configure and secure networks using the ASA Firewall with v8 of the operating system and version 6 of the ASDM. Delegates will configure the ASA using the console port, TFTP server, telnet and SSH using local and RADIUS authentication. The device will be configured to utilise Syslog and SNMP. ASA Firewalls will also be configured to use Access-Lists, Network Address Translation and VPN's utilising IPSec protocols. The course will cover the theory of Public/Private Keys, shared secret keys and their use in forming Site to site VPN's between ASA Firewalls using IKE and IPSec. Students will configure the units to create site to site VPN's, remote access VPN's using the Cisco Secure VPN Client and Web VPN's. The course will cover the theory of failover and delegates will configure Active/Standby failover on the ASA. Privileged commands and protocol analyser traces will be used, where necessary, to debug protocols and ensure proper operation of the ASA Firewall. Students will also perform password recovery operations. This course will involve interfacing the ASA with other network equipment, such as routers and switches, as would be expected in a network environment. Audience: Course is suitable for anyone involved in ASA firewall configuration and network security Course is approximately 50% practical
waaacdwtacacs One Day Workshop for AAA of Cisco Devices using a Windows-based TACACS+ Server 7 hours Suitable for network planners, engineers or anyone interested in TACACS+ operation with Cisco IOS devices. Course is almost entirely practical if one day. If extended to 2 days due to lack of pre-reqs it will be around 50% practical.
waaacdwnpsr One Day Workshop for AAA of Cisco Devices using Windows 2008 NPS RADIUS 7 hours This one day workshop covers the configuration and operation of the RADIUS protocol in the authentication, authorisation and accounting of accessing the management software of Cisco IOS devices. The RADIUS server is Network Policy Server (NPS) in Windows 2008 R2. Audience: Suitable for network planners, engineers or anyone interested in RADIUS operation with Cisco IOS Devices and NPS. Workshop is almost all practical. If extended to 2 days it will be approximately 50% practical.
wciosd Workshop for Cisco IOS Devices Implementing IPSec using Certificate Authentication via a Windows 2008 R2 CA 7 hours This one day workshop covers the configuration and operation of negotiating IKE/IPSec Security Association (SA) between Cisco IOS devices. The devices will authenticate using certificates provided through enrollment with a Windows 2008 R2 Certification Authority. The Windows 2008 R2 server will run the Simple Certificate Enrollment Process (SCEP) using the Network Device Enrollment Service (NDES). Audience: Suitable for network planners, engineers or anyone interested in operation of Cisco IOS devices running IPSec using certificate authentication.
wpeapawscw One Day Workshop for PEAP Authentication of Windows 7 Supplicant using a Cisco Switch as Authenticator and Windows 2008 R2 Server 7 hours This one day workshop covers the configuration and operation of the IEEE802.1x protocol in the authentication and authorisation of a wired Windows 7 supplicant. The authenticator is a Cisco Switch and the server is Windows NPS running on Windows 2008 R2 server, operating as a Certification Authority (CA). The EAP protocol is Protected EAP (PEAP) and a successful request will be allocated a VLAN on the switch via RADIUS attributes received from the server following successful authentication. The procedure for a wired supplicant is almost identical to that of a wireless supplicant. Audience: Suitable for network planners, engineers or anyone interested in operation of PEAP with Cisco IOS Devices and NPS.
67525 Cisco Unified Wireless Network (CUWN) 35 hours Overview This course enables a network administrator to deploy a wireless LAN (WLAN) enterprise solution through the identification and successful implementation of site-appropriate hardware and software features in a Cisco Unified Wireless Network. Audience Anyone involved in the deployment of a wireless LAN solution. After you complete this course you will be able to: Identify how the Cisco Unified Wireless Network solution meets the challenges of successful WLAN deployments Select and properly install the Cisco Unified Wireless Network hardware appropriate to site and use requirements Administer the WLAN, 802.11 security policies, and QoS appropriately to protect and optimize performance on the wireless network Configure and implement the key Cisco Unified Wireless Network security features to mitigate WLAN security threats Utilize a recommended troubleshooting methodology and the various tools available to gather and assess system data to isolate equipment failures and security threats

Upcoming Courses

Weekend TCP/IP Networking courses, Evening TCP/IP Networking training, TCP/IP Networking boot camp, TCP/IP Networking instructor-led , TCP/IP Networking trainer , TCP/IP Networking coaching, TCP/IP Networking training courses, TCP/IP Networking private courses, TCP/IP Networking instructor,Weekend TCP/IP Networking training, Evening TCP/IP Networking courses, TCP/IP Networking classes, TCP/IP Networking on-site

Course Discounts

Course Discounts Newsletter

We respect the privacy of your email address. We will not pass on or sell your address to others.
You can always change your preferences or unsubscribe completely.

Some of our clients

Outlines Extract

Tcp/ip networking products with the security and programming and installation management statement the having the service tracks and testers and query and influence of the relational testing and app. And testing comparison management basic case variables the components of an applications and performance to standard language of website to control security the security data deploy. And related to address to an action for data statistical controllers and seminar solutions and the run sort the content types controllers of and content types controllers control c. And methods and other analysis the connectors of controller and model evaluating and operations to information data describe the use of the structure of the layout of the relate. And design and contact us.