Networking Počítačové Kurzy

Networking Počítačové Kurzy

Lokální instruktorem vedené Networking školení České republice.

Reference

★★★★★
★★★★★

Networking Návrh Školení

Název školení
Doba trvání
Přehled
Název školení
Doba trvání
Přehled
21 hodin
Přehled
The Certified Kubernetes Application Developer (CKAD) program has been developed by The Linux Foundation and the Cloud Native Computing Foundation (CNCF), the host of Kubernetes.

This instructor-led, live training (online or onsite) is aimed at Developers who wish to confirm their skills in design, build, configure, and expose cloud native applications for Kubernetes.

On the other hand, training is also focused on gaining practical experience in Kubernetes application development, so we recommend taking part in it, even if you don't intend to take CKAD exam.

NobleProg have been delivering Docker & Kubernetes training from 2015. With more than 360 successfully completed training projects, we became one of the best known training company worldwide in field of containerization. Since 2019 we are also helping our customers to confirm their performance in k8s environment by preparing them and encouraging to pass CKA and CKAD exams.

Format of the Course

- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.

Course Customization Options

- To request a customized training for this course, please contact us to arrange.
- To learn more about CKAD, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-application-developer-ckad/
21 hodin
Přehled
The Certified Kubernetes Administrator (CKA) program was created by The Linux Foundation and the Cloud Native Computing Foundation (CNCF).

Kubernetes is nowadys a leading platform used for containers orchestration.

NobleProg have been delivering Docker & Kubernetes training from 2015. With more than 360 successfully completed training projects, we became one of the best known training companyworldwide in field of containerization.

Since 2019 we are also helping our customers to confirm their performance in k8s environment by preparing them and encouraging to pass CKA and CKAD exams.

This instructor-led, live training (online or onsite) is aimed at System Administrators, Kubernetes User swho wish to confirm their knowledge by passing CKA exam.

On the other hand, training is focused also on gaining practical experience in Kubernetes Administration, so we recommend taking part in it, even if you don't intend to take CKA exam.

Format of the Course

- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.

Course Customization Options

- To request a customized training for this course, please contact us to arrange.
- To learn more about CKA certification, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-administrator-cka/
7 hodin
Přehled
5G is the latest mobile network technology designed to connect billions of devices for running virtual reality (VR), IoT, and Artificial Intelligence (AI). 5G is expected to have an enormous impact on people's lives and business.

This instructor-led, live training (online or onsite) is aimed at business managers who wish to learn only the critical information needed to make important decisions about the adoption of 5G. This course is not a technical course but rather a course on the strategic thinking needed to prepare for the arrival of 5G. The technical coverage and industry coverage will be adapted to the audience.

By the end of this training, participants will be able to:

- Identify the opportunities that 5G brings to the organization.
- Identify the risks that 5G poses to business and industry.
- Understand and distinguish the different technologies and standards underlying 5G.
- Understand the role that 5G will play in the further development of AI and IoT.
- Head up 5G initiatives that lead to improvements in customer service and operational efficiency.
- Initiate a strategy for adopting 5G products and services within the organization as well as across external partner organizations.

Format of the Course

- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.

Course Customization Options

- To request a customized training for this course, please contact us to arrange.
14 hodin
Přehled
Samba is an Open Source / Free Software suite that provides file and print services to all manner of SMB/CIFS clients, including Linux and the numerous versions of Microsoft Windows operating systems.

Audience

This course is suitable for developers and engineers who work with preexisting Samba instances, or who intend to integrate Samba into their work flow.

No two courses are delivered the same. Each course is tailored to your specific requirements.
21 hodin
Přehled
The purpose of the course is to provide the participant with basic knowledge of the Wireshark protocol analyzer. The course focuses on deep understanding of the tool, as the basics for using it for network troubleshooting. The course starts with packet capturing, capture and display filters, statistical features and the basics of the expert system. By the end of the course the participant will be able to perform basic troubleshooting in small to medium size networks. The course is based on theory, class exercise and labs.
21 hodin
Přehled
This course is a continuation of the "Basic Network Troubleshooting Using Wireshark" course, and comes to provide the participants with advanced capabilities for network troubleshooting. The course provides an in-depth knowledge of network behaviour and problems, along with the capabilities to isolate and solve security and advanced applications problems. The course is based on theory, class exercise and labs.
21 hodin
Přehled
Networking Fundamentals refers to the foundational concepts needed to understand networking, as well as the practical skills to implement networking in a lab environment. Linux will be used in this course as it offers the necessary tools and features for setting up the various aspects of a network.

This instructor-led, live training (online or onsite) is aimed at anyone who wish to understand and implement a network and various types of servers under Linux.

By the end of this training, participants will be able to:

- Understand how networking works under Linux.
- Set up a sample LAN.
- Understand the various protocols used on the internet and implement each one under Linux.
- Secure a network and various types of servers, such as a webs server.

Format of the Course

- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.

Course Customization Options

- To request a customized training for this course, please contact us to arrange.
14 hodin
Přehled
Nmap je skener portů používaný k pronikání a testování sítě. Porty pro skenery, například nmap, zjišťují, že komunikace v počítačových sítích je ohrožena.

Tento instruktor vedený, živý trénink (na pracovišti nebo vzdáleně) je zaměřen na softwarové výrobce, kteří chtějí chránit síť své organizace pomocí nmap.

Na konci tohoto školení budou účastníci moci:

- Nastavte potřebné testovací prostředí pro začátek použití nmap.
- Prohledat síťové systémy kvůli bezpečnostním chybám.
- Objevte aktivní a ohrožené hostitele.

Formát kurzu

- Interaktivní přednáška a diskuse.
- Hodně cvičení a cviku.
- Praktická implementace v prostředí živé laboratoře.

Možnosti přizpůsobení kurzu

- Chcete-li požádat o vlastní školení pro tento kurz, kontaktujte nás prosím.
14 hodin
Přehled
ONAP (Open Networking Automation Platform) is an open source platform for orchestrating and automating physical and virtual network elements. ONAP originated from OpenECOMP and Open-Orchestrator (Open-O) and is managed by The Linux Foundation.

In this instructor-led, live training (onsite or remote), participants will learn how to use ONAP to automate networking services.

By the end of this training, participants will be able to:

- Understand, install and configure the various components in the ONAP ecosystem
- Carry out real-time, policy-driven orchestration and automation of physical and virtual network functions
- Design, create, orchestrate, and monitor VNFs, SDNs and other network services
- Efficiently manage the entire networking lifecycle using a software-driven approach
- Develop, deploy, and scale a network using the latest open source technologies and practices

Audience

- IT engineers
- Network engineers
- Developers

Format of the Course

- Interactive lecture and discussion
- Lots of exercises and practice
- Hands-on implementation in a live-lab environment

Course Customization Options

- This training is based on the latest version of ONAP
- To request a customized training for this course, please contact us to arrange.
- To learn more about ONAP, please visit: https://www.onap.org/
28 hodin
Přehled
ONAP (Open Networking Automation Platform) is an open source platform for orchestrating and automating physical and virtual network elements. ONAP originated from OpenECOMP and Open-Orchestrator (Open-O) and is managed by The Linux Foundation.
14 hodin
Přehled
OpenStack is an open source IaaS (Infrastructure as a Service) software stack. It is popular among Telecom providers who wish to optimize their network stack through Network Functions Virtualization (NFV).

This instructor-led, live training (online or onsite) is aimed at engineers, architects and managers who wish to deploy an OpenStack cloud to manage their Telecom infrastructure.

By the end of this training, participants will be able to:

- Plan, deploy, and administer OpenStack as a private cloud.
- Understand IaaS architecture and its implementation under OpenStack.
- Replace physical routers and servers with virtual machines running in a private cloud.
- Reduce infrastructure and maintenance costs through virtualization and cloud computing.
- Expedite the rollout of new services to customers.

Format of the course

- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.

Course Customization Options

- To request a customized training for this course, please contact us to arrange.
14 hodin
Přehled
OpenVAS is an advanced open source framework which consists of several services and tools for network vulnerability scanning and management.

In this instructor-led, live training, participants will learn how to use OpenVAS for network vulnerability scanning.

By the end of this training, participants will be able to:

- Install and configure OpenVAS
- Learn the fundamental features and components of OpenVAS
- Configure and implement network vulnerability scans with OpenVAS
- Review and interpret OpenVAS scan results

Audience

- Network engineers
- Network administrators

Format of the course

- Part lecture, part discussion, exercises and heavy hands-on practice

Note

- To request a customized training for this course, please contact us to arrange.
21 hodin
Přehled
Introduction:

OSS/BSS is at the heart of operation of any Telecom operator. Given growth of Big Data in recent time,
area of OSS/BSS has undergone disruptive changes specially with virtualization of the OSS/BSS and given
the fact, many of the new OTT ( Over the top) services are newly developed web/mobile based services
that do not fit into legacy OSS. In this current course, which consists of 4 days, first 3 days are spent
extensively to develop background in legacy OSS/BSS, while last 5 modules, are dedicated to explain
emerging Big Data analytics application in OSS/BSS layer

Target Audience:

- Telecom/Cellular Operation People
- Telecom Sales professionals
- Telecom Operation vendors/contractors
- CXO, VP, Director level managers in TELECOM
21 hodin
Přehled
Palo Alto Networks nabízí platformu, která zahrnuje pokročilé firewally a cloudové rozšíření. Firewall Palo Alto brání vniknutí malwaru automatizovaným přístupem, který poskytuje konzistentní zabezpečení.

Toto školení vedené instruktorem (na místě nebo na dálku) je zaměřeno na vývojáře, kteří chtějí zabránit vniknutí škodlivého softwaru do sítě Palo Alto Networks.

Na konci tohoto školení budou účastníci schopni:

- Vytvořte nezbytné vývojové prostředí, abyste mohli začít vyvíjet brány firewall.
- Nasazení brány Palo Alto na cloudovém serveru.
- Spravujte tok paketů firewallem Palo Alto.
- Interpretace klasifikací a typů QoS.

Formát kurzu

- Interaktivní přednáška a diskuse.
- Spousta cvičení a cvičení.
- Praktická implementace v prostředí živé laboratoře.

Možnosti přizpůsobení kurzu

- Chcete-li požádat o přizpůsobené školení pro tento kurz, kontaktujte nás a domluvte se.
14 hodin
Přehled
ProxySQL is a proxy for MySQL, Percona Server, and MariaDB.

This instructor-led, live training (online or onsite) is aimed at engineers who wish to use a proxy approach to ensure high availability for MySQL based databases.

By the end of this training, participants will be able to:

- Install and configure ProxySQL.
- Enable thousands of concurrent database connections over multiple backend servers.
- Deploy multiple proxies spanning numerous database instances.
- Optimize the performance of a MySQL cluster, without altering the querying applications.

Format of the Course

- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.

Course Customization Options

- To request a customized training for this course, please contact us to arrange.
- To learn more about ProxySQL, please visit: https://proxysql.com/
7 hodin
Přehled
Shadowsocks is an open-source, secure socks5 proxy.

In this instructor-led, live training, participants will learn how to secure an internet connection through a Shadowsocks proxy.

By the end of this training, participants will be able to:

- Install and configure Shadowsocks on any of a number of supported platforms, including Windows, Linux, Mac, Android, iOS, and OpenWrt.
- Deploy Shadosocks with package manager systems, such as pip, aur, freshports and others.
- Run Shadowsocks on mobile devices and wireless networks.
- Understand how Shadowsocks encrypts messages and ensures integrity and authenticity.
- Optimize a Shadowsocks server

Audience

- Network engineers
- System Administrators
- Computer technicians

Format of the course

- Part lecture, part discussion, exercises and heavy hands-on practice
14 hodin
Přehled
SAN (Storage Area Network) is a consolidated data storage for enhancing the access to storage systems and devices. NAS (Network-Attched Storage) is a network storage device for storing and retrieving data. Together with SAN and NAS, users will be able to configure storage systems, data centers, and cloud environments for converging storage infrastructures.

This instructor-led, live training (online or onsite) is aimed at network engineers who wish to converge storage infrastructures with SAN and NAS.

By the end of this training, participants will be able to:

- Perform configurations of SAN and NAS storage on a storage system.
- Connect to storage systems and devices from a client.
- Compare SAN and NAS solutions for centralized storage.

Format of the Course

- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.

Course Customization Options

- To request a customized training for this course, please contact us to arrange.
7 hodin
Přehled
NetNORAD is a system built by Facebook to troubleshoot network problems via end-to-end probing, independent of device polling.

In this instructor-led, live training, participants will learn how NetNORAD and active path testing can help them improve their network troubleshooting methods.

By the end of this training, participants will be able to:

- Understand how NetNORAD works
- Learn the design principles behind NetNORAD
- Use open-source NetNORAD tools with their own code to implement a fault detection system

Audience

- Network engineers
- Developers
- System engineers

Format of the course

- Part lecture, part discussion, exercises and heavy hands-on practice
21 hodin
Přehled
The 3 day practical course covers the messages and call flows of the Session Initiation Protocol (SIP) and its use in voice networks. This course is a mixture of theory and practice (utilising protocol analyser traces where appropriate for explanation and troubleshooting) with practical VoIP configured using IP telephones, softphones, voice capable Cisco routers and SIP IP PBX,s (e.g. Trixbox).

Audience:

Network Planners, Designers, and Engineers requiring an understanding of SIP.

The course is around 40% practical.
21 hodin
Přehled
The course consists of two complementary parts – a theoretical and a practical one. The first is a one day introduction covering motivation, philosophy, fundamentals and rules of operation of the SIP protocol and ways it is used to implement telecom services with focus on IP telephony and VoIP. The second two-day part enables participants to learn practical aspects of service operation within a framework of hand-on laboratory exercises giving detailed insight into configuration of components of SIP telephony architecture, SIP signalling at both message sequence chart and internal message structure levels, and assists in understanding of typical problems and troubleshooting including security and telecom fraud aspects. The trainers will share their experience in launching, operation and management of SIP telephony covering also virtualization and cloud based solutions. Practical part is presented using both SIP hardphones and softphones and IP telephony servers (Asterisk and Freeswitch). Participants can take advantage of the fact trainers have got rich technical and business experience in IP telephony and submit their own problems and questions. They will be included in the agenda at wrap-up as a supplement to the training to meet current urgent needs of clients. Training is addressed to participants with basic knowledge and experience in telecom services – specifically in VoIP and IP networking.
28 hodin
Přehled
This 4 day course involves a mixture of expository based (utilising protocol analyser traces where appropriate) and practical experiments to test and verify the operation of TCP/IP networks. The major aspects of the TCP/IP protocol stack are covered, including subnetting, supernetting and running dynamic routing protocols. TCP and UDP will be compared and contrasted, covering the end-to-end reliability and congestion avoidance capabilities of the TCP/IP stack. Some application layer protocols (HTTP, TLS, DNS, DHCP etc) will be investigated during the course. Network security in the form of TLS will be covered both from a theoretical and practical standpoint. The practical exercises are designed to augment the theory and enhance both the understanding of the underlying protocols and also the problem solving abilities of the delegates.

Audience:

Suitable for anyone looking for an understanding of TCP/IP.

Course is approximately 50% practical.
14 hodin
Přehled
Tinc VPN is an open source peer-to-peer virtual private network (VPN) daemon that is compatible with most operating systems. Tinc VPN makes use of tunneling and encryption to build a secure private network between hosts.

In this instructor-led, live training, participants will learn the fundamentals of working with Tinc VPN.

By the end of this training, participants will be able to:

- Install, configure, run, test, and troubleshoot Tinc VPN on any operating system
- Deploy a Tinc Mesh VPN
- Use Tinc VPN for Centralized Cloud Interconnection

Audience

- Developers
- Network engineers

Format of the course

- Part lecture, part discussion, exercises and heavy hands-on practice

Note

- To request a customized training for this course, please contact us to arrange.
7 hodin
Přehled
Varnish is a reverse proxy for content-heavy dynamic web sites. Unlike Squid, which was originally a client-side cache, or Apache and nginx, which are web servers, Varnish was designed as an HTTP accelerator. Varnish is focused exclusively on HTTP, unlike other proxy servers that support FTP, SMTP and other network protocols. Varnish is used by Wikipedia, The New York Times, Facebook and Twitter, among other high-profile websites.

In this course, participants will learn about Varnish's features and caching approach while practicing in the setup and configuration of a Varnish proxy on Linux. The course starts with a refresher on key networking principles, then digs into setup and configuration topics and moves steadily towards complex implementations. By the end of the training participants will understand when and where it makes sense to deploy Varnish and will have the necessary practice to deploy their own Varnish proxy solutions.

Audience

- Network technicians
- Network designers
- System administrators

Format of the course

- Part lecture, part discussion, heavy hands-on practice and implementation, occasional quizing to measure progress
35 hodin
Přehled
VoIP (Voice over Internet Protocol) is a technology that makes it possible for users to make voice calls over an Internet connection instead of through a regular phone line.

In this instructor-led, live training, participants will learn how to set up a VoIP system using Cisco CallManager Express.

By the end of this training, participants will be able to:

- Understand fundamental VoIP concepts
- Learn how to use VoIP equipment
- Configure CISCO routers for VoIP
- Implement VoIP and CallManager Express into their network
- Configure CME features for SIP, SCCP, and soft phones
- Work with advanced configuration settings and features of CME

Audience

- Managers
- System administrators
- Software and support system developers
- Technicians
- Network engineers

Format of the course

- Part lecture, part discussion, exercises and heavy hands-on practice
21 hodin
Přehled
The 3 day practical course covers the fundamentals of the various voice protocols used to carry voice (and video) over a packet switched network. This course is a mixture of theory and practice (utilising Wireshark where appropriate for explanation and troubleshooting) with practical VoIP configured using IP telephones, softphones and voice capable Cisco routers. This is primarily a 'generic' VoIP course – but uses Cisco equipment to provide an IP backbone and voice gateways. We can also provide Cisco specific voice training courses. The course also covers call setup between circuit switched and packet switched networks.

The course is approximately 40% practical.
21 hodin
Přehled
Web and mobile forensics refers to the recovery of evidence from the web or a mobile device under investigation.

This instructor-led, live training (online or onsite) is aimed at technical persons who wish to use digital forensics tools and techniques to detect, extract, decode, analysis, interpret and report evidence recovered from a website or mobile device.

By the end of this training, participants will be able to:

- Understand and apply different forensic acquisition techniques to inspect web and mobile data.
- Select the most effective forensic tools to web and mobile data.
- Understand how to access and decode different types of data structures in web servers, databases, and mobile phones for analysis.
- Methodically extract, reconstruct, and inspect data as potential evidence of cybercrime.
- Understand the legal implications of surrounding digital forensic analysis.

Format of the Course

- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.

Course Customization Options

- To request a customized training for this course, please contact us to arrange.
35 hodin
Přehled
Wireless and telecom network security refers the practices carried out to safeguard communication devices, terminal equipment, routing equipment, servers and Wireless devices and networks against malicious attacks.

This instructor-led, live training (online or onsite) is aimed at technical persons who wish to apply the most suitable tools and techniques to secure both telecom as well as wireless networks.

Format of the Course

- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.

Course Customization Options

- To request a customized training for this course, please contact us to arrange.
21 hodin
Přehled
Network packet analysis is a technique used to view, in real time, the raw data sent and received over a network interface. This is useful for troubleshooting network configuration and network application problems. Wireshark is a free open source packet analyzer used for troubleshooting such network issues.

In this instructor-led, live training, participants will learn how to use Wireshark to troubleshoot the functionality of a network as well as the performance of differente networked applications. Participants will learn network troubleshooting principles and practice techniques for capturing and analyzing TCP/IP request and response traffic between different clients and the servers.

By the end of this training, participants will be able to:

- Analyze network functionality and performance in various environments under different conditions
- Determine whether instances of different server applications are performing acceptably
- Identify the primary sources of network performance problems
- Identify and troubleshoot the most common causes of performance problems in TCP/IP communications

Audience

- Network engineers
- Network and computer technicians

Format of the Course

- Part lecture, part discussion, exercises and heavy hands-on practice

Note

- To request a customized training for this course, please contact us to arrange.
35 hodin
Přehled
Audience:

System Administrators and Network Administrators as well as anyone who is interested in defensive network security technologies.
28 hodin
Přehled
The Nessus vulnerability scanner is a very versatile platform for detecting and managing vulnerabilities. They can even do so much more than vulnerability detection. They can also do baseline auditing. In which case you system configuration is being compared with the best hardening standard

In this Instructor led course, we will introduce the components of the solution and the different t functionalities, each module in the application will be explained and its use case laid out.

At the end of the course, participants will be able to carry out vulnerability (authenticated and unauthenticated) scans on almost all IP based systems and analyze the results of the scan to eliminate false positives. The participants will learn to carry out risk based prioritization of findings and recommend compensating controls. This course will help the participants determine the security posture of their systems using Nessus and decide on the best course of action for remediation.

Audience:

- Infrastructure managers
- System administrators
- System Auditors
- System compliance officers
- vulnerability managers
- cybersecurity managers

Format:

Part Lecture, part discussion and hands on practice

Nadcházející Networking Školení

Víkendové Networking kurzy, Večerní Networking školení, Networking přijímač, Networking vedené školitelem, Víkendové Networking školení, Večerní Networking kurzy, Networking koučování, Networking lektor, Networking školitel, Networking počítačová školení, Networking počítačové kurzy , Networking kurzy, Networking školení, Networking on-site, Networking uzavřená školení, Networking individuální školení

Slevy Kurzů

Informační Bulletin Slev

Respektujeme soukromí vaší e-mailové adresy. Vaši adresu nebudeme předávat ani prodávat ostatním.
Vždy můžete změnit své preference nebo se úplně odhlásit.

Někteří z našich klientů

is growing fast!

We are looking to expand our presence in Czech Republic!

As a Business Development Manager you will:

  • expand business in Czech Republic
  • recruit local talent (sales, agents, trainers, consultants)
  • recruit local trainers and consultants

We offer:

  • Artificial Intelligence and Big Data systems to support your local operation
  • high-tech automation
  • continuously upgraded course catalogue and content
  • good fun in international team

If you are interested in running a high-tech, high-quality training and consulting business.

Apply now!

This site in other countries/regions