Networking Training Courses

Networking Training Courses

Local, instructor-led live Networking training courses demonstrate through interactive discussion and hands-on practice the fundamentals and advanced topics of Networking. Networking training is available as "onsite live training" or "remote live training". Onsite live Networking training can be carried out locally on customer premises in South Africa or in NobleProg corporate training centers in South Africa. Remote live training is carried out by way of an interactive, remote desktop. NobleProg -- Your Local Training Provider.

Testimonials

★★★★★
★★★★★

Networking Course Outlines

CodeNameDurationOverview
tcpippracPractical TCP/IP28 hoursThis 4 day course involves a mixture of expository based (utilising protocol analyser traces where appropriate) and practical experiments to test and verify the operation of TCP/IP networks. The major aspects of the TCP/IP protocol stack are covered, including subnetting, supernetting and running dynamic routing protocols. TCP and UDP will be compared and contrasted, covering the end-to-end reliability and congestion avoidance capabilities of the TCP/IP stack. Some application layer protocols (HTTP, TLS, DNS, DHCP etc) will be investigated during the course. Network security in the form of TLS will be covered both from a theoretical and practical standpoint. The practical exercises are designed to augment the theory and enhance both the understanding of the underlying protocols and also the problem solving abilities of the delegates.

Audience:

Suitable for anyone looking for an understanding of TCP/IP.

Course is approximately 50% practical.
nessusadminNessus Manager28 hoursThe Nessus vulnerability scanner is a very versatile platform for detecting and managing vulnerabilities. They can even do so much more than vulnerability detection. They can also do baseline auditing. In which case you system configuration is being compared with the best hardening standard

In this Instructor led course, we will introduce the components of the solution and the different t functionalities, each module in the application will be explained and its use case laid out.

At the end of the course, participants will be able to carry out vulnerability (authenticated and unauthenticated) scans on almost all IP based systems and analyze the results of the scan to eliminate false positives. The participants will learn to carry out risk based prioritization of findings and recommend compensating controls. This course will help the participants determine the security posture of their systems using Nessus and decide on the best course of action for remediation.

Audience:

- Infrastructure managers
- System administrators
- System Auditors
- System compliance officers
- vulnerability managers
- cybersecurity managers

Format:

Part Lecture, part discussion and hands on practice
HPAHAProxy Administration14 hoursHAProxy is a fast and lightweight open source load balancer and proxy server.
beyondcorpBeyondCorp: Implementing Zero Trust Security14 hoursBeyondCorp is an open source Zero Trust security framework that allows employees to work securely from any location without the need for a traditional VPN.

In this instructor-led, live training, participants will learn hands-on how to set up a Zero Security system as they set up and deploy BeyondCorop in a live-lab environment.

By the end of this training, participants will be able to:

- Assess their organization's existing security model.
- Shift access controls from the perimeter to individual devices and users.
- Deploy applications using a user and device-centric authentication and authorization workflow.
- Understand, plan and implement a Zero Trust network within their organization.

Audience

- Network engineers
- Cyber security professionals
- System architects
- IT managers

Format of the Course

- Part lecture, part discussion, exercises and heavy hands-on practice

Note

- To request a customized training for this course, please contact us to arrange.
wiresharkadvAdvanced Network Troubleshooting with Wireshark21 hoursWireshark is a free open source packet analyzer used for troubleshooting network issues. Network packet analysis is a technique used to view, in real time, the raw data sent and received over a network interface. This is useful for troubleshooting network configuration and network application problems.

In this instructor-led, live training (onsite or remote), participants will learn advanced techniques for troubleshooting the functionality and performance of a network and its applications. This course is an extension of "Network Troubleshooting with Wireshark", which focuses primarily on common HTTP applications. In this training, we consider protocols and connection mediums such as Wi-Fi, HTTPS, SMTP, enterprise applications and more.

By the end of this training, participants will be able to:

- Isolate and solve network security issues using the Wireshark CLI
- Troubleshoot applications that use protocols beyond HTTP, including HTTPS, FTP, mail, DNS, etc.
- Troubleshoot network connection problems in enterprise applications such as databases, RPC, etc.
- Troubleshoot connection problems in media applications such as VoIP and streaming
- Use network forensics to trace and detect security issues

Audience

- Network engineers
- Network and computer technicians

Format of the Course

- Part lecture, part discussion, exercises and heavy hands-on practice

Note

- To request a customized training for this course, please contact us to arrange.
wiresharkNetwork Troubleshooting with Wireshark21 hoursNetwork packet analysis is a technique used to view, in real time, the raw data sent and received over a network interface. This is useful for troubleshooting network configuration and network application problems. Wireshark is a free open source packet analyzer used for troubleshooting such network issues.

In this instructor-led, live training, participants will learn how to use Wireshark to troubleshoot the functionality of a network as well as the performance of differente networked applications. Participants will learn network troubleshooting principles and practice techniques for capturing and analyzing TCP/IP request and response traffic between different clients and the servers.

By the end of this training, participants will be able to:

- Analyze network functionality and performance in various environments under different conditions
- Determine whether instances of different server applications are performing acceptably
- Identify the primary sources of network performance problems
- Identify and troubleshoot the most common causes of performance problems in TCP/IP communications

Audience

- Network engineers
- Network and computer technicians

Format of the Course

- Part lecture, part discussion, exercises and heavy hands-on practice

Note

- To request a customized training for this course, please contact us to arrange.
openvasOpenVAS14 hoursOpenVAS is an advanced open source framework which consists of several services and tools for network vulnerability scanning and management.

In this instructor-led, live training, participants will learn how to use OpenVAS for network vulnerability scanning.

By the end of this training, participants will be able to:

- Install and configure OpenVAS
- Learn the fundamental features and components of OpenVAS
- Configure and implement network vulnerability scans with OpenVAS
- Review and interpret OpenVAS scan results

Audience

- Network engineers
- Network administrators

Format of the course

- Part lecture, part discussion, exercises and heavy hands-on practice

Note

- To request a customized training for this course, please contact us to arrange.
tincvpnTinc VPN14 hoursTinc VPN is an open source peer-to-peer virtual private network (VPN) daemon that is compatible with most operating systems. Tinc VPN makes use of tunneling and encryption to build a secure private network between hosts.

In this instructor-led, live training, participants will learn the fundamentals of working with Tinc VPN.

By the end of this training, participants will be able to:

- Install, configure, run, test, and troubleshoot Tinc VPN on any operating system
- Deploy a Tinc Mesh VPN
- Use Tinc VPN for Centralized Cloud Interconnection

Audience

- Developers
- Network engineers

Format of the course

- Part lecture, part discussion, exercises and heavy hands-on practice

Note

- To request a customized training for this course, please contact us to arrange.
voipcmeVoIP with Cisco CallManager Express35 hoursVoIP (Voice over Internet Protocol) is a technology that makes it possible for users to make voice calls over an Internet connection instead of through a regular phone line.

In this instructor-led, live training, participants will learn how to set up a VoIP system using Cisco CallManager Express.

By the end of this training, participants will be able to:

- Understand fundamental VoIP concepts
- Learn how to use VoIP equipment
- Configure CISCO routers for VoIP
- Implement VoIP and CallManager Express into their network
- Configure CME features for SIP, SCCP, and soft phones
- Work with advanced configuration settings and features of CME

Audience

- Managers
- System administrators
- Software and support system developers
- Technicians
- Network engineers

Format of the course

- Part lecture, part discussion, exercises and heavy hands-on practice
netnoradNetNORAD7 hoursNetNORAD is a system built by Facebook to troubleshoot network problems via end-to-end probing, independent of device polling.

In this instructor-led, live training, participants will learn how NetNORAD and active path testing can help them improve their network troubleshooting methods.

By the end of this training, participants will be able to:

- Understand how NetNORAD works
- Learn the design principles behind NetNORAD
- Use open-source NetNORAD tools with their own code to implement a fault detection system

Audience

- Network engineers
- Developers
- System engineers

Format of the course

- Part lecture, part discussion, exercises and heavy hands-on practice
ledeLEDE: Set Up a Linux Wireless Router7 hoursThe LEDE Project (Linux Embedded Development Environment) is a Linux operating system based on OpenWrt. It is a complete replacement for the vendor-supplied firmware of a wide range of wireless routers and non-network devices.

In this instructor-led, live training, participants will learn how to set up a LEDE based wireless router.

Audience

- Network administrators and technicians

Format of the course

- Part lecture, part discussion, exercises and heavy hands-on practice
netsecadmNetwork Security Administrator35 hoursAudience:

System Administrators and Network Administrators as well as anyone who is interested in defensive network security technologies.
shadowsocksShadowsocks: Set Up a Proxy Server7 hoursShadowsocks is an open-source, secure socks5 proxy.

In this instructor-led, live training, participants will learn how to secure an internet connection through a Shadowsocks proxy.

By the end of this training, participants will be able to:

- Install and configure Shadowsocks on any of a number of supported platforms, including Windows, Linux, Mac, Android, iOS, and OpenWrt.
- Deploy Shadosocks with package manager systems, such as pip, aur, freshports and others.
- Run Shadowsocks on mobile devices and wireless networks.
- Understand how Shadowsocks encrypts messages and ensures integrity and authenticity.
- Optimize a Shadowsocks server

Audience

- Network engineers
- System Administrators
- Computer technicians

Format of the course

- Part lecture, part discussion, exercises and heavy hands-on practice
varnishVarnish: Speeding Up Your Website with HTTP Reverse Proxy Caching7 hoursVarnish is a reverse proxy for content-heavy dynamic web sites. Unlike Squid, which was originally a client-side cache, or Apache and nginx, which are web servers, Varnish was designed as an HTTP accelerator. Varnish is focused exclusively on HTTP, unlike other proxy servers that support FTP, SMTP and other network protocols. Varnish is used by Wikipedia, The New York Times, Facebook and Twitter, among other high-profile websites.

In this course, participants will learn about Varnish's features and caching approach while practicing in the setup and configuration of a Varnish proxy on Linux. The course starts with a refresher on key networking principles, then digs into setup and configuration topics and moves steadily towards complex implementations. By the end of the training participants will understand when and where it makes sense to deploy Varnish and will have the necessary practice to deploy their own Varnish proxy solutions.

Audience

- Network technicians
- Network designers
- System administrators

Format of the course

- Part lecture, part discussion, heavy hands-on practice and implementation, occasional quizing to measure progress
ipv6undUnderstanding IPv614 hoursA 2 day theoretical course (with some practical demonstrations) covering the fundamentals of Internet Protocol v6 – including addressing, protocol formats, ICMP v6, discovery processes and IP v6 routing.

Audience:

Network Planners, Designers, and Engineers requiring an understanding of IP v6. Those requiring a comprehensive overview of IP v6 and the migration process from an IP v4 environment.
dnsandbindDNS and BIND: Setting Up, Managing and Securing Your DNS Server14 hoursDNS (domain name system) is the "phone book" of the internet, providing a directory of computer names and their IP addresses. BIND is the most common Linux implementation of DNS. When you open a website or send and receive an email, a DNS server somewhere is quietly addressing your message to its intended recipient.

In this training, participants will learn the critical features of DNS while carrying out exercises in the setup and configuration of a BIND DNS server on Linux. The course starts with a refresher on key networking principles, then digs into hands-on practice with setup and configuration. Steadily, the discussion and practices move towards more complex topics such as security, availability, debugging and troubleshooting.

Audience

- Network technicians
- Network designers
- System administrators

Format of the course

- Part lecture, part discussion, heavy hands-on practice and implementation, occasional quizing to measure progress
muipv4Understanding Multicast using IPv421 hoursTransport of baseband audio and video streams across IP networks using multicast signalling protocols is becoming increasingly used in broadcast networks.

This 3 day course/workshop covers the theory and practice of implementing these protocols within IP and Ethernet networks. The practical element of the course will use Cisco L3 switches and the multicast streamers and receivers will use the cross -platform VLC application. It is not necessary to have any expertise in the Cisco command line as the configuration of the devices can be instructor-led if required. However the course is intended to have at least 50% practical content and can be customised or even lengthened (to examine the protocols in more detail) if run as a single company event.
sambadvSamba 14 hoursSamba is an Open Source / Free Software suite that provides file and print services to all manner of SMB/CIFS clients, including Linux and the numerous versions of Microsoft Windows operating systems.

Audience

This course is suitable for developers and engineers who work with preexisting Samba instances, or who intend to integrate Samba into their work flow.

No two courses are delivered the same. Each course is tailored to your specific requirements.
sipvoipSIP protocol in VoIP21 hoursThe course consists of two complementary parts – a theoretical and a practical one. The first is a one day introduction covering motivation, philosophy, fundamentals and rules of operation of the SIP protocol and ways it is used to implement telecom services with focus on IP telephony and VoIP. The second two-day part enables participants to learn practical aspects of service operation within a framework of hand-on laboratory exercises giving detailed insight into configuration of components of SIP telephony architecture, SIP signalling at both message sequence chart and internal message structure levels, and assists in understanding of typical problems and troubleshooting including security and telecom fraud aspects. The trainers will share their experience in launching, operation and management of SIP telephony covering also virtualization and cloud based solutions. Practical part is presented using both SIP hardphones and softphones and IP telephony servers (Asterisk and Freeswitch). Participants can take advantage of the fact trainers have got rich technical and business experience in IP telephony and submit their own problems and questions. They will be included in the agenda at wrap-up as a supplement to the training to meet current urgent needs of clients. Training is addressed to participants with basic knowledge and experience in telecom services – specifically in VoIP and IP networking.
datacomnetData Communications Networks - Theory and Practice21 hoursThe Data Communications Course presents the basic theory of operation os data communications networks, starting from the OSI-RM, LANs, WANs, TCP/IP and basic network security and network applications. The course provides the student with general knowledge of the architecture, hardware components, software configuration, and structure of data communications networks.
nettbswsadvAdvanced Network Troubleshooting Using Wireshark21 hoursThis course is a continuation of the "Basic Network Troubleshooting Using Wireshark" course, and comes to provide the participants with advanced capabilities for network troubleshooting. The course provides an in-depth knowledge of network behaviour and problems, along with the capabilities to isolate and solve security and advanced applications problems. The course is based on theory, class exercise and labs.
nettbswsBasic Network Troubleshooting Using Wireshark21 hoursThe purpose of the course is to provide the participant with basic knowledge of the Wireshark protocol analyzer. The course focuses on deep understanding of the tool, as the basics for using it for network troubleshooting. The course starts with packet capturing, capture and display filters, statistical features and the basics of the expert system. By the end of the course the participant will be able to perform basic troubleshooting in small to medium size networks. The course is based on theory, class exercise and labs.
casapixoCisco ASA/Pix Operation28 hoursA 4 day instructor-led practical course designed to familiarise delegates with the Cisco ASA Firewall CLI and ASDM. The course details the key commands used to configure and secure networks using the ASA Firewall with v8 of the operating system and version 6 of the ASDM.

Delegates will configure the ASA using the console port, TFTP server, telnet and SSH using local and RADIUS authentication. The device will be configured to utilise Syslog and SNMP.

ASA Firewalls will also be configured to use Access-Lists, Network Address Translation and VPN's utilising IPSec protocols. The course will cover the theory of Public/Private Keys, shared secret keys and their use in forming Site to site VPN's between ASA Firewalls using IKE and IPSec. Students will configure the units to create site to site VPN's, remote access VPN's using the Cisco Secure VPN Client and Web VPN's. The course will cover the theory of failover and delegates will configure Active/Standby failover on the ASA.

Privileged commands and protocol analyser traces will be used, where necessary, to debug protocols and ensure proper operation of the ASA Firewall. Students will also perform password recovery operations.

This course will involve interfacing the ASA with other network equipment, such as routers and switches, as would be expected in a network environment.

Audience:

Course is suitable for anyone involved in ASA firewall configuration and network security

Course is approximately 50% practical
ipsecvpnUnderstanding IPSec VPNs14 hoursThis 2 day course investigates the theory and technology associated with IPSec VPN’s.VPN’s are setup using Cisco IOS Routers and ASA Firewalls using the web interface. The workings of the protocols are examined using debug commands and protocol analyser traces of relevant negotiations.

Audience:

Suitable for network planners, engineers or anyone interested in IPSec VPNs

Course is approximately 40% practical
siptelPractical SIP Telephony21 hoursThe 3 day practical course covers the messages and call flows of the Session Initiation Protocol (SIP) and its use in voice networks. This course is a mixture of theory and practice (utilising protocol analyser traces where appropriate for explanation and troubleshooting) with practical VoIP configured using IP telephones, softphones, voice capable Cisco routers and SIP IP PBX,s (e.g. Trixbox).

Audience:

Network Planners, Designers, and Engineers requiring an understanding of SIP.

The course is around 40% practical.
vvoipPractical Voice and Video over IP21 hoursThe 3 day practical course covers the fundamentals of the various voice protocols used to carry voice (and video) over a packet switched network. This course is a mixture of theory and practice (utilising Wireshark where appropriate for explanation and troubleshooting) with practical VoIP configured using IP telephones, softphones and voice capable Cisco routers. This is primarily a 'generic' VoIP course – but uses Cisco equipment to provide an IP backbone and voice gateways. We can also provide Cisco specific voice training courses. The course also covers call setup between circuit switched and packet switched networks.

The course is approximately 40% practical.
onapONAP for Network Orchestration and Automation14 hoursONAP (Open Networking Automation Platform) is an open source platform for orchestrating and automating physical and virtual network elements. ONAP originated from OpenECOMP and Open-Orchestrator (Open-O) and is managed by The Linux Foundation.

In this instructor-led, live training (onsite or remote), participants will learn how to use ONAP to automate networking services.

By the end of this training, participants will be able to:

- Understand, install and configure the various components in the ONAP ecosystem
- Carry out real-time, policy-driven orchestration and automation of physical and virtual network functions
- Design, create, orchestrate, and monitor VNFs, SDNs and other network services
- Efficiently manage the entire networking lifecycle using a software-driven approach
- Develop, deploy, and scale a network using the latest open source technologies and practices

Audience

- IT engineers
- Network engineers
- Developers

Format of the Course

- Interactive lecture and discussion
- Lots of exercises and practice
- Hands-on implementation in a live-lab environment

Course Customization Options

- This training is based on the latest version of ONAP
- To request a customized training for this course, please contact us to arrange.
- To learn more about ONAP, please visit: https://www.onap.org/
Weekend Networking courses, Evening Networking training, Networking boot camp, Networking instructor-led, Weekend Networking training, Evening Networking courses, Networking coaching, Networking instructor, Networking trainer, Networking training courses, Networking classes, Networking on-site, Networking private courses, Networking one on one training

Course Discounts

CourseVenueCourse DateCourse Price [Remote / Classroom]
Apache Tomcat AdministrationJohannesburgMon, 2019-01-14 09:303510USD / 5560USD
Data Mining and Analysis JohannesburgMon, 2019-01-14 09:307000USD / 9400USD
Apache Web Server AdministrationJohannesburgMon, 2019-01-14 14:154680USD / 7080USD
Natural Language Processing - AI/RoboticsCape TownMon, 2019-02-11 09:304725USD / 6775USD
Process MiningJohannesburgMon, 2019-02-18 09:305250USD / 7300USD

Course Discounts Newsletter

We respect the privacy of your email address. We will not pass on or sell your address to others.
You can always change your preferences or unsubscribe completely.

Some of our clients

is growing fast!

We are looking to expand our presence in South Africa!

As a Business Development Manager you will:

  • expand business in South Africa
  • recruit local talent (sales, agents, trainers, consultants)
  • recruit local trainers and consultants

We offer:

  • Artificial Intelligence and Big Data systems to support your local operation
  • high-tech automation
  • continuously upgraded course catalogue and content
  • good fun in international team

If you are interested in running a high-tech, high-quality training and consulting business.

Apply now!