Навучальныя курсы Networking

Навучальныя курсы Networking

Local instructor-led live Networking training courses in Беларусь.

Networking Course Outlines

Course Name
Duration
Overview
Course Name
Duration
Overview
21 hours
Праграма Certified Kubernetes Administrator (CKA) была створана The Linux Foundation і Cloud Native Computing Foundation (CNCF).

Kubernetes з'яўляецца сучасным лідарам платформы, якая выкарыстоўваецца для кантейнераў оркестрацыі.

NobleProg прапануе Docker & Kubernetes навучанне з 2015 года. Усяго 320 удзельнікаў, з якіх 105 — замежныя госці, прадставілі свае лепшыя кнігі.

З 2019 года мы таксама дапамагаем нашым кліентам пацвердзіць свае вынікі ў асяроддзі k8s, падрыхтаваючы іх і падтрымліваючы праходзіць экзамены CKA і CKAD.

Гэта інструктар-праведзены, жывы трэнінг (онлайн або на сайце) накіраваны на сістэмы адміністратараў, Kubernetes Кориснік swho хоча пацвердзіць свае веды, праходзіўшы экзамен CKA.

Трэба нагадаць, што ў пачатку 2017 года Папа заявіў, што адправіцца ў Паўднёвы Судан разам з Прымасам Англіканскай Царквы, але, на жаль, па меркаваннях бяспекі да гэтага часу візіт не быў рэалізаваны.

Формат курса

Інтэрактыўныя лекцыі і дискусіі. Многія практыкаванні і практыкаванні. Вынікі ў Live-Lab Environment.

Вынікі пошуку - Customization options

Калі вы хочаце падзяліцца сваёй думкай з майстрам, рабіце гэта максімальна ветліва. Для таго, каб пазнаёміцца больш пра CKA сертыфікацыю, запрашаем наведаць: https://training.linuxfoundation.org/certification/certified-kubernetes-administrator-cka/
21 hours
Праграма Certified Kubernetes Application Developer (CKAD) была распрацавана The Linux Foundation і Cloud Native Computing Foundation (CNCF), гаспадар Kubernetes.

Гэта інструктар-праведзены, жывы трэнінг (онлайн або на сайце) звязаны з развіццём, які хоча пацвердзіць свае навыкі ў дызайне, будаўніцтва, наладжвання і выстаўкі нумарных прыкладаў для Kubernetes.

Трэба нагадаць, што ў пачатку 2017 года Папа заявіў, што адправіцца ў Паўднёвы Судан разам з Прымасам Англіканскай Царквы, але, на жаль, па меркаваннях бяспекі да гэтага часу візіт не быў рэалізаваны.

NobleProg прапануе Docker & Kubernetes навучанне з 2015 года. Усяго 320 удзельнікаў, з якіх 105 — замежныя госці, прадставілі свае лепшыя кнігі. З 2019 года мы таксама дапамагаем нашым кліентам пацвердзіць свае вынікі ў асяроддзі k8s, падрыхтаваючы іх і падтрымліваючы праходзіць экзамены CKA і CKAD.

Формат курса

Інтэрактыўныя лекцыі і дискусіі. Многія практыкаванні і практыкаванні. Вынікі ў Live-Lab Environment.

Вынікі пошуку - Customization options

Калі вы хочаце падзяліцца сваёй думкай з майстрам, рабіце гэта максімальна ветліва. Для таго, каб пазнаёміцца больш пра CKAD, запрашаем наведаць: https://training.linuxfoundation.org/certification/certified-kubernetes-application-developer-ckad/
14 hours
This instructor-led, live training in Беларусь (online or onsite) is aimed at engineers who wish to optimize networking for Kubernetes clusters.

By the end of this training, participants will be able to:

- Install and configure Calico.
- Understand how Calico differs from traditional overlay networks.
- Understand how Calico combines internet routing protocols with consensus-based data stores.
- Use Calico to create a container networking solution for Kubernetes clusters.
- Use Calico to provide network policy for Kubernetes.
28 hours
Машиннае навучанне — гэта філія штучнага разумення, у якой камп'ютары маюць магчымасць вучыцца без вызначанай праграмавання.

Глыбокае навучанне - гэта падфільм машиннага навучання, які выкарыстоўвае методы, заснаваныя на выставе дадзеных і структурах навучання, такіх як нейральныя сеткі.

Тлумачэнні ЦД парадку збора рэкрутаў з 5 і 25 дымоў.............................................................................

У гэтым інструктар-праведзены, жывы трэнінг, удзельнікі навучаюцца, як ажыццяўляць мадэлі глыбокага навучання для тэлекам, выкарыстоўваючы Python як яны праходзяць па стварэнні мадэля глыбокага навучання крэдытнага ризику.

У канцы гэтага трэніру ўдзельнікі зможаць:

Узнагароджанне фундаментальных концепцый глыбокага навучання. Узнагароджанне прыкладаў і прыкладаў глыбокага навучання ў тэлекоммунікацыі. Выкарыстоўвайце Python, Keras, і TensorFlow для стварэння мадэлей глыбокага навучання для тэлекоммунікацыі. Давайце пазнаёмімся з творчасцю з творчасцю з творчасцю з творчасцю з творчасцю з творчасцю з творчасцю з творчасцю з творчасцю.

Формат курса

Інтэрактыўныя лекцыі і дискусіі. Многія практыкаванні і практыкаванні. Вынікі ў Live-Lab Environment.

Вынікі пошуку - Customization options

Калі вы хочаце падзяліцца сваёй думкай з майстрам, рабіце гэта максімальна ветліва.
28 hours
This 4 day course involves a mixture of expository based (utilising protocol analyser traces where appropriate) and practical experiments to test and verify the operation of TCP/IP networks. The major aspects of the TCP/IP protocol stack are covered, including subnetting, supernetting and running dynamic routing protocols. TCP and UDP will be compared and contrasted, covering the end-to-end reliability and congestion avoidance capabilities of the TCP/IP stack. Some application layer protocols (HTTP, TLS, DNS, DHCP etc) will be investigated during the course. Network security in the form of TLS will be covered both from a theoretical and practical standpoint. The practical exercises are designed to augment the theory and enhance both the understanding of the underlying protocols and also the problem solving abilities of the delegates.

Audience:

Suitable for anyone looking for an understanding of TCP/IP.

Course is approximately 50% practical.
14 hours
A 2 day theoretical course (with some practical demonstrations) covering the fundamentals of Internet Protocol v6 – including addressing, protocol formats, ICMP v6, discovery processes and IP v6 routing.

Audience:

Network Planners, Designers, and Engineers requiring an understanding of IP v6. Those requiring a comprehensive overview of IP v6 and the migration process from an IP v4 environment.
14 hours
This 2 day course investigates the theory and technology associated with IPSec VPN’s.VPN’s are setup using Cisco IOS Routers and ASA Firewalls using the web interface. The workings of the protocols are examined using debug commands and protocol analyser traces of relevant negotiations.

Audience:

Suitable for network planners, engineers or anyone interested in IPSec VPNs

Course is approximately 40% practical
28 hours
4-дзённы інструктар-практычны курс, прысвечаны пазнаёміцца з дэлегатамі з Cisco ASA Firewall CLI і ASDM. Курс паказвае ключавыя каманды, якія выкарыстоўваюцца для наладжвання і бяспекі сеткі з дапамогай ASA Firewall з v8 аперацыйнай сістэмы і версіі 6 ASDM.

Дэлегаты будуць наладзіць ASA з дапамогай порту кансулы, сервера TFTP, тэленета і SSH з дапамогай локальнай і RADIUS атэтыфікацыі. Здаровая касметыка вы можаце зрабіць самі

ASA Firewalls таксама будзе наладжвацца для выкарыстання Access-лістаў, Network Address Translation і VPN's выкарыстоўваючы IPSec протоколы. Курс пакрывае тэорыю публічных / прыватных ключоў, падзеленых таємных ключоў і іх выкарыстання ў формуванні Сайта на сайце VPN's паміж ASA Firewalls з дапамогай IKE і IPSec. Школьныя настаўнікі запрашаюць наведаць бібліятэку і пазнаёміцца з выставай наведаць бібліятэку і пазнаёміцца з выставай наведаць бібліятэку і пазнаёміцца з выставай.

У якасці прыкладу такіх сетак можна прывесці facebook і vkontakte, дзе любая фізічная асоба можа падаць рэкламную аб'яву. У будучыні гэта можа стаць выдатным і паспяховым бізнесам.

Гэта курс будзе ўключыць інтэрфейс АСА з іншымі сеткі абсталяваннямі, такімі як маршрутызаторы і пераключальнікі, як чакаецца ў сеткі.

Арыенціраваны :

У будучыні гэта можа стаць выдатным і паспяховым бізнесам.

Курс складае каля 50% працэдуры.
14 hours
In this instructor-led, live training in Беларусь, participants will learn the critical features of DNS while carrying out exercises in the setup and configuration of a BIND DNS server on Linux. The course starts with a refresher on key networking principles, then digs into hands-on practice with setup and configuration. Steadily, the discussion and practices move towards more complex topics such as security, availability, debugging and troubleshooting.
7 hours
Shadowsocks is an open-source, secure socks5 proxy.

In this instructor-led, live training, participants will learn how to secure an internet connection through a Shadowsocks proxy.

By the end of this training, participants will be able to:

- Install and configure Shadowsocks on any of a number of supported platforms, including Windows, Linux, Mac, Android, iOS, and OpenWrt.
- Deploy Shadosocks with package manager systems, such as pip, aur, freshports and others.
- Run Shadowsocks on mobile devices and wireless networks.
- Understand how Shadowsocks encrypts messages and ensures integrity and authenticity.
- Optimize a Shadowsocks server

Audience

- Network engineers
- System Administrators
- Computer technicians

Format of the course

- Part lecture, part discussion, exercises and heavy hands-on practice
28 hours
This 4 day coursework is intended for Telecom management and technology professionals who
have to maintain MetroEthernet services across the globe. The course introduces all the
prevailing standards, Troubleshooting guides, vendor options and evolving technologies in
Metro Ethernet domain.
35 hours
VoIP (Voice over Internet Protocol) is a technology that makes it possible for users to make voice calls over an Internet connection instead of through a regular phone line.

In this instructor-led, live training, participants will learn how to set up a VoIP system using Cisco CallManager Express.

By the end of this training, participants will be able to:

- Understand fundamental VoIP concepts
- Learn how to use VoIP equipment
- Configure CISCO routers for VoIP
- Implement VoIP and CallManager Express into their network
- Configure CME features for SIP, SCCP, and soft phones
- Work with advanced configuration settings and features of CME

Audience

- Managers
- System administrators
- Software and support system developers
- Technicians
- Network engineers

Format of the course

- Part lecture, part discussion, exercises and heavy hands-on practice
14 hours
Tinc VPN is an open source peer-to-peer virtual private network (VPN) daemon that is compatible with most operating systems. Tinc VPN makes use of tunneling and encryption to build a secure private network between hosts.

In this instructor-led, live training, participants will learn the fundamentals of working with Tinc VPN.

By the end of this training, participants will be able to:

- Install, configure, run, test, and troubleshoot Tinc VPN on any operating system
- Deploy a Tinc Mesh VPN
- Use Tinc VPN for Centralized Cloud Interconnection

Audience

- Developers
- Network engineers

Format of the course

- Part lecture, part discussion, exercises and heavy hands-on practice

Note

- To request a customized training for this course, please contact us to arrange.
14 hours
Networking з'яўляецца падтрымкай, кіраваннем і дызайнам для камп'ютарных сетак, якія падтрымліваюць бясплатныя сеткі. Для рэгістрацыі даменнага імя ў гэтай зоне неабходна звярнуцца ў кампанію The Electronic and Postal Communications AuthorityNetworking (Албанія), якая з'яўляецца адзіным аўтарызаваным рэгістратарам даменаў у зоне al.

Гэта інструктар-праведзены, жывы трэнінг (онлайн або на сайце) звязаны з сеткі інжынераў, якія хочуць падтрымліваць, кіраваць і дызайн кампутарных сетак з Python.

У канцы гэтага трэніру ўдзельнікі зможаць:

Оптымізуйце і выкарыстоўвайце Paramiko, Netmiko, Napalm, Telnet і pyntc для аўтамацыі сеткі з Python. Магістр многіх і многіх працэсаў ў сеткавай аўтамацыі. Выкарыстоўвайце GNS3 і Python для праграмавання сеткі.

Формат курса

Інтэрактыўныя лекцыі і дискусіі. Многія практыкаванні і практыкаванні. Вынікі ў Live-Lab Environment.

Вынікі пошуку - Customization options

Калі вы хочаце падзяліцца сваёй думкай з майстрам, рабіце гэта максімальна ветліва.
14 hours
«Аналіз паказаў, што выдатак кармавых адзінак на 1 кг прыбаўлення на старых комплексах значна перавышае гэтае значэнне на новых. Дадатковыя функцыі ўключаюць у сябе джакузі для поўнай рэлаксацыі і камінам, каб трымаць вас у цяпле. У якасці прыкладу такіх сетак можна прывесці facebook і vkontakte, дзе любая фізічная асоба можа падаць рэкламную аб'яву.

Гэта інструктар-праведзены, жывы трэнінг (онлайн або на сайце) звязаны з інжынерамі сеткі, якія хацелі сфарміраваць інфраструктуру захавання з SAN і NAS.

У канцы гэтага трэніру ўдзельнікі зможаць:

Выконвайце канфігурацыі SAN і NAS складання на сістэме складання. Звязаны з сістэмамі і прыладамі ад кліента. Забяспечыць энергетычную бяспеку і энергетычную незалежнасць краіны.

Формат курса

Інтэрактыўныя лекцыі і дискусіі. Многія практыкаванні і практыкаванні. Вынікі ў Live-Lab Environment.

Вынікі пошуку - Customization options

Калі вы хочаце падзяліцца сваёй думкай з майстрам, рабіце гэта максімальна ветліва.
21 hours
«Аналіз паказаў, што выдатак кармавых адзінак на 1 кг прыбаўлення на старых комплексах значна перавышае гэтае значэнне на новых. У якасці прыкладу такіх сетак можна прывесці facebook і vkontakte, дзе любая фізічная асоба можа падаць рэкламную аб'яву.

Гэта інструктар-праведзены, жывы трэнінг (онлайн або на сайце) прысвечаны кожнаму, хто хоча разумець і ажыццяўляць сетку і розныя тыпы сервераў пад Linux.

У канцы гэтага трэніру ўдзельнікі зможаць:

Зразумець, як працуе сеткаванне пад Linux. Загрузіць шаблон LAN. Узнікае пытанне: калі іх ведае увесь свет, ці можна назваць іх няўдачнікамі? Забяспечыць сетку і розныя тыпы серверы, такіх як вэб-сервер.

Формат курса

Інтэрактыўныя лекцыі і дискусіі. Многія практыкаванні і практыкаванні. Вынікі ў Live-Lab Environment.

Вынікі пошуку - Customization options

Калі вы хочаце падзяліцца сваёй думкай з майстрам, рабіце гэта максімальна ветліва.
21 hours
The course consists of two complementary parts – a theoretical and a practical one. The first is a one day introduction covering motivation, philosophy, fundamentals and rules of operation of the SIP protocol and ways it is used to implement telecom services with focus on IP telephony and VoIP. The second two-day part enables participants to learn practical aspects of service operation within a framework of hand-on laboratory exercises giving detailed insight into configuration of components of SIP telephony architecture, SIP signalling at both message sequence chart and internal message structure levels, and assists in understanding of typical problems and troubleshooting including security and telecom fraud aspects. The trainers will share their experience in launching, operation and management of SIP telephony covering also virtualization and cloud based solutions. Practical part is presented using both SIP hardphones and softphones and IP telephony servers (Asterisk and Freeswitch). Participants can take advantage of the fact trainers have got rich technical and business experience in IP telephony and submit their own problems and questions. They will be included in the agenda at wrap-up as a supplement to the training to meet current urgent needs of clients. Training is addressed to participants with basic knowledge and experience in telecom services – specifically in VoIP and IP networking.
21 hours
SD-WAN is a software-defined approach to managing a WAN (Wide Area Network).

This instructor-led, live training (online or onsite) is aimed at engineers who wish to use Cisco SD-WAN products to set up and operate a software defined network.

By the end of this training, participants will be able to:

- Install and configure a Cisco SD-WAN.
- Create policies to control network traffic.
- Understand and implement overlay routing.
- Simplify the management of the network used for public cloud applications.

Format of the Course

- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.

Course Customization Options

- To request a customized training for this course, please contact us to arrange.
14 hours
During the course, participants will learn:

- What is denial of service attacks, Flooding, Sniffing, MIM?
- How to break from the network to the server?
- How to watch packets on the network (also running on switches)?
- Do you watch any combination of the world?
- How to monitor the network?
- How to configure a firewall?
- How to use encrypted connections?
- How to create tunnels?
- How to log packets?
- How to scan ports?
- How to reduce the number of unnecessary services on the server?
14 hours
Since all applications today heavily rely on communication and networks, there is no application security without network security.

This course focuses on network security with a software security viewpoint, and discusses common network attacks and defenses on different OSI layers, with an emphasis on application layer issues, tackling topics like session management or denial of service.

As cryptography is a critical aspect of network security, the most important cryptographic algorithms in symmetric cryptography, hashing, asymmetric cryptography, and key agreement are also discussed. Instead of presenting an in-depth mathematical and theoretical background, these elements are discussed from a merely practical, engineering perspective, showing typical use-case examples and practical considerations related to the use of crypto, such as public key infrastructures. Security protocols in many areas of secure communication are introduced, with an in-depth discussion on the most widely-used protocol families such as IPSEC and SSL/TLS.

Finally, typical crypto vulnerabilities are discussed – both related to certain crypto algorithms and cryptographic protocols, such as BEAST, CRIME, TIME, BREACH, FREAK, Logjam, Padding oracle, Lucky Thirteen, POODLE and similar, as well as the RSA timing attack. In each case, the practical considerations and potential consequences are described for each problem, again, without going into deep mathematical details.

Participants attending this course will

- Understand basic concepts of security, IT security and secure coding
- Learn about network attacks and defenses at different OSI layers
- Have a practical understanding of cryptography
- Understand essential security protocols
- Understand some recent attacks against cryptosystems
- Get information about some recent related vulnerabilities
- Get sources and further readings on secure coding practices

Audience

Developers, Professionals
35 hours
Audience:

System Administrators and Network Administrators as well as anyone who is interested in defensive network security technologies.
14 hours
BeyondCorp is an open source Zero Trust security framework that allows employees to work securely from any location without the need for a traditional VPN.

In this instructor-led, live training, participants will learn hands-on how to set up a Zero Security system as they set up and deploy BeyondCorop in a live-lab environment.

By the end of this training, participants will be able to:

- Assess their organization's existing security model.
- Shift access controls from the perimeter to individual devices and users.
- Deploy applications using a user and device-centric authentication and authorization workflow.
- Understand, plan and implement a Zero Trust network within their organization.

Audience

- Network engineers
- Cyber security professionals
- System architects
- IT managers

Format of the Course

- Part lecture, part discussion, exercises and heavy hands-on practice

Note

- To request a customized training for this course, please contact us to arrange.
35 hours
This instructor-led, live training in Беларусь (online or onsite) is aimed at technical persons who wish to apply the most suitable tools and techniques to secure both telecom as well as wireless networks.
35 hours
Why should you attend?

The Certified Lead Ethical Hacker training course enables you to develop the necessary expertise to perform information system penetration tests by applying recognized principles, procedures and penetration testing techniques, in order to identify potential threats on a computer network. During this training course, you will gain the knowledge and skills to manage a penetration testing project or team, as well as plan and perform internal and external pentests, in accordance with various standards such as the Penetration Testing Execution Standard (PTES) and the Open Source Security Testing Methodology Manual (OSSTMM). Moreover, you will also gain a thorough understanding on how to draft reports and countermeasure proposals. Additionally, through practical exercises, you will be able to master penetration testing techniques and acquire the skills needed to manage a pentest team, as well as customer communication and conflict resolution.

The Certified Lead Ethical Hacking training course provides a technical vision of information security through ethical hacking, using common techniques such as information gathering and vulnerability detection, both inside and outside of a business network.

The training is also compatible with the NICE (The National Initiative for Cybersecurity Education) Protect and Defend framework.

After mastering the necessary knowledge and skills in ethical hacking, you can take the exam and apply for the "PECB Certified Lead Ethical Hacker" credential. By holding a PECB Lead Ethical Hacker certificate, you will be able to demonstrate that you have acquired the practical skills for performing and managing penetration tests according to best practices.

Who should attend?

- Individuals interested in IT Security, and particularly in Ethical Hacking, to either learn more about the topic or to start a process of professional reorientation.
- Information security officers and professionals seeking to master ethical hacking and penetration testing techniques.
- Managers or consultants wishing to learn how to control the penetration testing process.
- Auditors wishing to perform and conduct professional penetration tests.
- Persons responsible for maintaining the security of information systems in an organization.
- Technical experts who want to learn how to prepare a pentest.
- Cybersecurity professionals and information security team members.
14 hours
OpenVAS is an advanced open source framework which consists of several services and tools for network vulnerability scanning and management.

In this instructor-led, live training, participants will learn how to use OpenVAS for network vulnerability scanning.

By the end of this training, participants will be able to:

- Install and configure OpenVAS
- Learn the fundamental features and components of OpenVAS
- Configure and implement network vulnerability scans with OpenVAS
- Review and interpret OpenVAS scan results

Audience

- Network engineers
- Network administrators

Format of the course

- Part lecture, part discussion, exercises and heavy hands-on practice

Note

- To request a customized training for this course, please contact us to arrange.
21 hours
This instructor-led, live training in Беларусь (online or onsite) is aimed at developers who wish to prevent malware intrusion with Palo Alto Networks.

By the end of this training, participants will be able to:

- Set up the necessary development environment to start developing firewalls.
- Deploy a Palo Alto firewall in a cloud server.
- Manage packet flow through Palo Alto firewalls.
- Interpret QoS classifications and types.
14 hours
This instructor-led, live training in Беларусь (online or onsite) is aimed at software testers who wish to protect their organization's network with Nmap.

By the end of this training, participants will be able to:

- Set up the necessary testing environment to start using Nmap.
- Scan network systems for security vulnerabilities.
- Discover active and vulnerable hosts.
21 hours
This instructor-led, live training in Беларусь (online or onsite) is aimed at security engineers and system administrators who wish to use FortiGate NGFW's advanced security-driven network systems to protect their organization from internal and external threats.

By the end of this training, participants will be able to:

- Install and configure the preferred FortiGate NGFW software and hardware model.
- Operate and employ FortiGate NGFW to improve the efficiency of system administration tasks.
- Manage various forms of external and internal threats using FortiGate features.
- Integrate FortiGate security fabric with the entire IT infrastructure to provide quick automated protection.
- Ensure long-term protection from attacks with independent and continuous FortiGate threat intelligence.
- Troubleshoot the most common firewall system setup errors relevant to FortiGate NGFWs.
- Implement Fortinet security solutions in other enterprise applications.

Last Updated:

Online Networking courses, Weekend Networking courses, Evening Networking training, Networking boot camp, Networking instructor-led, Weekend Networking training, Evening Networking courses, Networking coaching, Networking instructor, Networking trainer, Networking training courses, Networking classes, Networking on-site, Networking private courses, Networking one on one training

Course Discounts

No course discounts for now.

Course Discounts Newsletter

We respect the privacy of your email address. We will not pass on or sell your address to others.
You can always change your preferences or unsubscribe completely.

Some of our clients

is growing fast!

We are looking for a good mixture of IT and soft skills in Belarus!

As a NobleProg Trainer you will be responsible for:

  • delivering training and consultancy Worldwide
  • preparing training materials
  • creating new courses outlines
  • delivering consultancy
  • quality management

At the moment we are focusing on the following areas:

  • Statistic, Forecasting, Big Data Analysis, Data Mining, Evolution Alogrithm, Natural Language Processing, Machine Learning (recommender system, neural networks .etc...)
  • SOA, BPM, BPMN
  • Hibernate/Spring, Scala, Spark, jBPM, Drools
  • R, Python
  • Mobile Development (iOS, Android)
  • LAMP, Drupal, Mediawiki, Symfony, MEAN, jQuery
  • You need to have patience and ability to explain to non-technical people

To apply, please create your trainer-profile by going to the link below:

Apply now!

This site in other countries/regions