
Lokální instruktorem vedené Networking školení České republice.
Reference
spousta informací, zodpovězené všechny otázky, zajímavé příklady
A1 Telekom Austria AG
Kurz: Deep Learning for Telecom (with Python)
Machine Translated
Příprava školitele, znalostní a technický přístup k tématu, způsob překládání lidí připravených na školení
PGNiG Serwis sp. z o.o.
Kurz: Basic Network Troubleshooting Using Wireshark
Machine Translated
Jak se převádí znalosti
Adam Drabek - Gmina Miejska Kraków
Kurz: Network Security
Machine Translated
praaktyka
Gmina Miejska Kraków
Kurz: Network Security
Machine Translated
řešení běžných problémů, prezentace zajímavých aplikací
Marcin Kowalczyk
Kurz: Certified Kubernetes Administrator (CKA) - exam preparation
Machine Translated
Praktické rady a jejich aplikace.
Kurz: Certified Kubernetes Administrator (CKA) - exam preparation
Machine Translated
a způsob, jakým
NetWorkS! Sp. z o.o.
Kurz: AI Awareness for Telecom
Machine Translated
Praktické příklady analýzy poškození.
Orange Szkolenia Sp. z o.o.
Kurz: OpenStack Bootcamp
Machine Translated
Experimentální demonstrace
石 正洋 - 易广电信技术(北京)有限公司
Kurz: Palo Alto Firewalls
Machine Translated
Praktické rady a jejich aplikace.
Kurz: Certified Kubernetes Administrator (CKA) - exam preparation
Machine Translated
Networking Návrh Školení
This instructor-led, live training (online or onsite) is aimed at Developers who wish to confirm their skills in design, build, configure, and expose cloud native applications for Kubernetes.
On the other hand, training is also focused on gaining practical experience in Kubernetes application development, so we recommend taking part in it, even if you don't intend to take CKAD exam.
NobleProg have been delivering Docker & Kubernetes training from 2015. With more than 360 successfully completed training projects, we became one of the best known training company worldwide in field of containerization. Since 2019 we are also helping our customers to confirm their performance in k8s environment by preparing them and encouraging to pass CKA and CKAD exams.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
- To learn more about CKAD, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-application-developer-ckad/
Kubernetes is nowadys a leading platform used for containers orchestration.
NobleProg have been delivering Docker & Kubernetes training from 2015. With more than 360 successfully completed training projects, we became one of the best known training companyworldwide in field of containerization.
Since 2019 we are also helping our customers to confirm their performance in k8s environment by preparing them and encouraging to pass CKA and CKAD exams.
This instructor-led, live training (online or onsite) is aimed at System Administrators, Kubernetes User swho wish to confirm their knowledge by passing CKA exam.
On the other hand, training is focused also on gaining practical experience in Kubernetes Administration, so we recommend taking part in it, even if you don't intend to take CKA exam.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
- To learn more about CKA certification, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-administrator-cka/
In this course we examine the various technologies that make up AI and the skill sets required to put them to use. Throughout the course, we examine AI's specific applications within the Telecom industry.
Audience
- Network engineers
- Network operations personnel
- Telecom technical managers
Format of the course
- Part lecture, part discussion, hands-on exercises
Audience
This course is suitable for developers and engineers who work with preexisting Samba instances, or who intend to integrate Samba into their work flow.
No two courses are delivered the same. Each course is tailored to your specific requirements.
In this instructor-led, live training (onsite or remote), participants will learn how to use ONAP to automate networking services.
By the end of this training, participants will be able to:
- Understand, install and configure the various components in the ONAP ecosystem
- Carry out real-time, policy-driven orchestration and automation of physical and virtual network functions
- Design, create, orchestrate, and monitor VNFs, SDNs and other network services
- Efficiently manage the entire networking lifecycle using a software-driven approach
- Develop, deploy, and scale a network using the latest open source technologies and practices
Audience
- IT engineers
- Network engineers
- Developers
Format of the Course
- Interactive lecture and discussion
- Lots of exercises and practice
- Hands-on implementation in a live-lab environment
Course Customization Options
- This training is based on the latest version of ONAP
- To request a customized training for this course, please contact us to arrange.
- To learn more about ONAP, please visit: https://www.onap.org/
This instructor-led, live training (online or onsite) is aimed at telecom engineers, developers, and IT personnel who wish to use ONAP and optimize telecommunication network functions.
By the end of this training, participants will be able to:
- Install Open Network Automation Platform and configure the necessary frameworks.
- Understand the components and concepts foundational to the ONAP environment.
- Build and automate physical and virtual telecommunication network functions.
- Manage and optimize the life cycles of systems and operations executed through ONAP.
- Leverage the features of ONAP and overcome the challenges to telecommunication applications.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
This instructor-led, live training (online or onsite) is aimed at engineers, architects and managers who wish to deploy an OpenStack cloud to manage their Telecom infrastructure.
By the end of this training, participants will be able to:
- Plan, deploy, and administer OpenStack as a private cloud.
- Understand IaaS architecture and its implementation under OpenStack.
- Replace physical routers and servers with virtual machines running in a private cloud.
- Reduce infrastructure and maintenance costs through virtualization and cloud computing.
- Expedite the rollout of new services to customers.
Format of the course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
In this instructor-led, live training, participants will learn how to use OpenVAS for network vulnerability scanning.
By the end of this training, participants will be able to:
- Install and configure OpenVAS
- Learn the fundamental features and components of OpenVAS
- Configure and implement network vulnerability scans with OpenVAS
- Review and interpret OpenVAS scan results
Audience
- Network engineers
- Network administrators
Format of the course
- Part lecture, part discussion, exercises and heavy hands-on practice
Note
- To request a customized training for this course, please contact us to arrange.
OSS/BSS is at the heart of operation of any Telecom operator. Given growth of Big Data in recent time,
area of OSS/BSS has undergone disruptive changes specially with virtualization of the OSS/BSS and given
the fact, many of the new OTT ( Over the top) services are newly developed web/mobile based services
that do not fit into legacy OSS. In this current course, which consists of 4 days, first 3 days are spent
extensively to develop background in legacy OSS/BSS, while last 5 modules, are dedicated to explain
emerging Big Data analytics application in OSS/BSS layer
Target Audience:
- Telecom/Cellular Operation People
- Telecom Sales professionals
- Telecom Operation vendors/contractors
- CXO, VP, Director level managers in TELECOM
This instructor-led, live training (online or onsite) is aimed at networking engineers and developers who wish to configure, execute and manage programmable networking resources using P4.
By the end of this training, participants will be able to:
- Learn the fundamentals of the P4 language.
- Program network devices.
- Set up a server for traffic management.
- Compile and execute a P4 program to control plane applications.
- Manage network congestion using monitoring and debugging methods.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
Toto školení vedené instruktorem (na místě nebo na dálku) je zaměřeno na vývojáře, kteří chtějí zabránit vniknutí škodlivého softwaru do sítě Palo Alto Networks.
Na konci tohoto školení budou účastníci schopni:
- Vytvořte nezbytné vývojové prostředí, abyste mohli začít vyvíjet brány firewall.
- Nasazení brány Palo Alto na cloudovém serveru.
- Spravujte tok paketů firewallem Palo Alto.
- Interpretace klasifikací a typů QoS.
Formát kurzu
- Interaktivní přednáška a diskuse.
- Spousta cvičení a cvičení.
- Praktická implementace v prostředí živé laboratoře.
Možnosti přizpůsobení kurzu
- Chcete-li požádat o přizpůsobené školení pro tento kurz, kontaktujte nás a domluvte se.
This instructor-led, live training (online or onsite) is aimed at engineers who wish to use a proxy approach to ensure high availability for MySQL based databases.
By the end of this training, participants will be able to:
- Install and configure ProxySQL.
- Enable thousands of concurrent database connections over multiple backend servers.
- Deploy multiple proxies spanning numerous database instances.
- Optimize the performance of a MySQL cluster, without altering the querying applications.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
- To learn more about ProxySQL, please visit: https://proxysql.com/
This instructor-led, live training (online or onsite) is aimed at system administrators, network engineers, and developers who wish to install, configure, and manage controllers, applications, and networking devices under an SDN.
By the end of this training, participants will be able to:
- Set up a virtual network.
- Create applications.
- Use controllers to operate a software-defined network.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
This instructor-led, live training (online or onsite) is aimed at network engineers who wish to converge storage infrastructures with SAN and NAS.
By the end of this training, participants will be able to:
- Perform configurations of SAN and NAS storage on a storage system.
- Connect to storage systems and devices from a client.
- Compare SAN and NAS solutions for centralized storage.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
This instructor-led, live training (online or onsite) is aimed at anyone who wish to understand and implement a network and various types of servers under Linux.
By the end of this training, participants will be able to:
- Understand how networking works under Linux.
- Set up a sample LAN.
- Understand the various protocols used on the internet and implement each one under Linux.
- Secure a network and various types of servers, such as a webs server.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
In this instructor-led, live training, participants will learn how to secure an internet connection through a Shadowsocks proxy.
By the end of this training, participants will be able to:
- Install and configure Shadowsocks on any of a number of supported platforms, including Windows, Linux, Mac, Android, iOS, and OpenWrt.
- Deploy Shadosocks with package manager systems, such as pip, aur, freshports and others.
- Run Shadowsocks on mobile devices and wireless networks.
- Understand how Shadowsocks encrypts messages and ensures integrity and authenticity.
- Optimize a Shadowsocks server
Audience
- Network engineers
- System Administrators
- Computer technicians
Format of the course
- Part lecture, part discussion, exercises and heavy hands-on practice
Audience:
Network Planners, Designers, and Engineers requiring an understanding of SIP.
The course is around 40% practical.
Audience:
Suitable for anyone looking for an understanding of TCP/IP.
Course is approximately 50% practical.
In this instructor-led, live training, participants will learn the fundamentals of working with Tinc VPN.
By the end of this training, participants will be able to:
- Install, configure, run, test, and troubleshoot Tinc VPN on any operating system
- Deploy a Tinc Mesh VPN
- Use Tinc VPN for Centralized Cloud Interconnection
Audience
- Developers
- Network engineers
Format of the course
- Part lecture, part discussion, exercises and heavy hands-on practice
Note
- To request a customized training for this course, please contact us to arrange.
In this course, participants will learn about Varnish's features and caching approach while practicing in the setup and configuration of a Varnish proxy on Linux. The course starts with a refresher on key networking principles, then digs into setup and configuration topics and moves steadily towards complex implementations. By the end of the training participants will understand when and where it makes sense to deploy Varnish and will have the necessary practice to deploy their own Varnish proxy solutions.
Audience
- Network technicians
- Network designers
- System administrators
Format of the course
- Part lecture, part discussion, heavy hands-on practice and implementation, occasional quizing to measure progress
In this instructor-led, live training, participants will learn how to set up a VoIP system using Cisco CallManager Express.
By the end of this training, participants will be able to:
- Understand fundamental VoIP concepts
- Learn how to use VoIP equipment
- Configure CISCO routers for VoIP
- Implement VoIP and CallManager Express into their network
- Configure CME features for SIP, SCCP, and soft phones
- Work with advanced configuration settings and features of CME
Audience
- Managers
- System administrators
- Software and support system developers
- Technicians
- Network engineers
Format of the course
- Part lecture, part discussion, exercises and heavy hands-on practice
The course is approximately 40% practical.
This instructor-led, live training (online or onsite) is aimed at technical persons who wish to apply the most suitable tools and techniques to secure both telecom as well as wireless networks.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
In this instructor-led, live training, participants will learn how to use Wireshark to troubleshoot the functionality of a network as well as the performance of differente networked applications. Participants will learn network troubleshooting principles and practice techniques for capturing and analyzing TCP/IP request and response traffic between different clients and the servers.
By the end of this training, participants will be able to:
- Analyze network functionality and performance in various environments under different conditions
- Determine whether instances of different server applications are performing acceptably
- Identify the primary sources of network performance problems
- Identify and troubleshoot the most common causes of performance problems in TCP/IP communications
Audience
- Network engineers
- Network and computer technicians
Format of the Course
- Part lecture, part discussion, exercises and heavy hands-on practice
Note
- To request a customized training for this course, please contact us to arrange.
Tento instruktor vedený, živý trénink (na pracovišti nebo vzdáleně) je zaměřen na softwarové výrobce, kteří chtějí chránit síť své organizace pomocí nmap.
Na konci tohoto školení budou účastníci moci:
- Nastavte potřebné testovací prostředí pro začátek použití nmap.
- Prohledat síťové systémy kvůli bezpečnostním chybám.
- Objevte aktivní a ohrožené hostitele.
Formát kurzu
- Interaktivní přednáška a diskuse.
- Hodně cvičení a cviku.
- Praktická implementace v prostředí živé laboratoře.
Možnosti přizpůsobení kurzu
- Chcete-li požádat o vlastní školení pro tento kurz, kontaktujte nás prosím.