Networking Training Courses

Networking Training Courses

Local, instructor-led live Networking training courses demonstrate through interactive discussion and hands-on practice the fundamentals and advanced topics of Networking. Networking training is available as "onsite live training" or "remote live training". Onsite live training can be carried out locally on customer premises in Singapore or in NobleProg corporate training centers in Singapore. Remote live training is carried out by way of an interactive, remote desktop. NobleProg -- Your Local Training Provider.

Testimonials

★★★★★
★★★★★

Networking Course Outlines

CodeNameDurationOverview
casapixoCisco ASA/Pix Operation28 hoursA 4 day instructor-led practical course designed to familiarise delegates with the Cisco ASA Firewall CLI and ASDM. The course details the key commands used to configure and secure networks using the ASA Firewall with v8 of the operating system and version 6 of the ASDM.

Delegates will configure the ASA using the console port, TFTP server, telnet and SSH using local and RADIUS authentication. The device will be configured to utilise Syslog and SNMP.

ASA Firewalls will also be configured to use Access-Lists, Network Address Translation and VPN's utilising IPSec protocols. The course will cover the theory of Public/Private Keys, shared secret keys and their use in forming Site to site VPN's between ASA Firewalls using IKE and IPSec. Students will configure the units to create site to site VPN's, remote access VPN's using the Cisco Secure VPN Client and Web VPN's. The course will cover the theory of failover and delegates will configure Active/Standby failover on the ASA.

Privileged commands and protocol analyser traces will be used, where necessary, to debug protocols and ensure proper operation of the ASA Firewall. Students will also perform password recovery operations.

This course will involve interfacing the ASA with other network equipment, such as routers and switches, as would be expected in a network environment.

Audience:

Course is suitable for anyone involved in ASA firewall configuration and network security

Course is approximately 50% practical
voipcmeVoIP with Cisco CallManager Express35 hoursVoIP (Voice over Internet Protocol) is a technology that makes it possible for users to make voice calls over an Internet connection instead of through a regular phone line.

In this instructor-led, live training, participants will learn how to set up a VoIP system using Cisco CallManager Express.

By the end of this training, participants will be able to:

- Understand fundamental VoIP concepts
- Learn how to use VoIP equipment
- Configure CISCO routers for VoIP
- Implement VoIP and CallManager Express into their network
- Configure CME features for SIP, SCCP, and soft phones
- Work with advanced configuration settings and features of CME

Audience

- Managers
- System administrators
- Software and support system developers
- Technicians
- Network engineers

Format of the course

- Part lecture, part discussion, exercises and heavy hands-on practice
nessusadminNessus Manager28 hoursThe Nessus vulnerability scanner is a very versatile platform for detecting and managing vulnerabilities. They can even do so much more than vulnerability detection. They can also do baseline auditing. In which case you system configuration is being compared with the best hardening standard

In this Instructor led course, we will introduce the components of the solution and the different t functionalities, each module in the application will be explained and its use case laid out.

At the end of the course, participants will be able to carry out vulnerability (authenticated and unauthenticated) scans on almost all IP based systems and analyze the results of the scan to eliminate false positives. The participants will learn to carry out risk based prioritization of findings and recommend compensating controls. This course will help the participants determine the security posture of their systems using Nessus and decide on the best course of action for remediation.

Audience:

- Infrastructure managers
- System administrators
- System Auditors
- System compliance officers
- vulnerability managers
- cybersecurity managers

Format:

Part Lecture, part discussion and hands on practice
varnishVarnish: Speeding Up Your Website with HTTP Reverse Proxy Caching7 hoursVarnish is a reverse proxy for content-heavy dynamic web sites. Unlike Squid, which was originally a client-side cache, or Apache and nginx, which are web servers, Varnish was designed as an HTTP accelerator. Varnish is focused exclusively on HTTP, unlike other proxy servers that support FTP, SMTP and other network protocols. Varnish is used by Wikipedia, The New York Times, Facebook and Twitter, among other high-profile websites.

In this course, participants will learn about Varnish's features and caching approach while practicing in the setup and configuration of a Varnish proxy on Linux. The course starts with a refresher on key networking principles, then digs into setup and configuration topics and moves steadily towards complex implementations. By the end of the training participants will understand when and where it makes sense to deploy Varnish and will have the necessary practice to deploy their own Varnish proxy solutions.

Audience

- Network technicians
- Network designers
- System administrators

Format of the course

- Part lecture, part discussion, heavy hands-on practice and implementation, occasional quizing to measure progress
MuninMonitoring Your Resources with Munin7 hoursMunin is an open-source monitoring tool that helps system administrators monitor resources such as servers, workstations, networks, SANs, applications, network devices, etc. It shows resource trends and provides insights into questions such as "what just happened to kill our performance?" It includes visualization tools and is available on various flavors of Linux and FreeBSD.

Audience

- System administrators
- Network administrators
- Network engineers
- IT managers
- IT administrators

Format of the course

- Heavy emphasis on hands-on practice. Most of the concepts are learned through samples, exercises and hands-on development.
sambadvSamba 14 hoursSamba is an Open Source / Free Software suite that provides file and print services to all manner of SMB/CIFS clients, including Linux and the numerous versions of Microsoft Windows operating systems.

Audience

This course is suitable for developers and engineers who work with preexisting Samba instances, or who intend to integrate Samba into their work flow.

No two courses are delivered the same. Each course is tailored to your specific requirements.
datacomnetData Communications Networks - Theory and Practice21 hoursThe Data Communications Course presents the basic theory of operation os data communications networks, starting from the OSI-RM, LANs, WANs, TCP/IP and basic network security and network applications. The course provides the student with general knowledge of the architecture, hardware components, software configuration, and structure of data communications networks.
wiresharkadvAdvanced Network Troubleshooting with Wireshark21 hoursWireshark is a free open source packet analyzer used for troubleshooting network issues. Network packet analysis is a technique used to view, in real time, the raw data sent and received over a network interface. This is useful for troubleshooting network configuration and network application problems.

In this instructor-led, live training (onsite or remote), participants will learn advanced techniques for troubleshooting the functionality and performance of a network and its applications. This course is an extension of "Network Troubleshooting with Wireshark", which focuses primarily on common HTTP applications. In this training, we consider protocols and connection mediums such as Wifi, HTTPS, SMTP, enterprise applications and more.

By the end of this training, participants will be able to:

- Isolate and solve network security issues using the Wireshark CLI
- Troubleshoot applications that use protocols beyond HTTP, including HTTPS, FTP, mail, DNS, etc.
- Troubleshoot network connection problems in enterprise applications such as databases, RPC, etc.
- Troubleshoot connection problems in media applications such as VoIP and streaming
- Use network forensics to trace and detect security issues

Audience

- Network engineers
- Network and computer technicians

Format of the Course

- Part lecture, part discussion, exercises and heavy hands-on practice

Note

- To request a customized training for this course, please contact us to arrange.
wiresharkNetwork Troubleshooting with Wireshark21 hoursNetwork packet analysis is a technique used to view, in real time, the raw data sent and received over a network interface. This is useful for troubleshooting network configuration and network application problems. Wireshark is a free open source packet analyzer used for troubleshooting such network issues.

In this instructor-led, live training, participants will learn how to use Wireshark to troubleshoot the functionality of a network as well as the performance of differente networked applications. Participants will learn network troubleshooting principles and practice techniques for capturing and analyzing TCP/IP request and response traffic between different clients and the servers.

By the end of this training, participants will be able to:

- Analyze network functionality and performance in various environments under different conditions
- Determine whether instances of different server applications are performing acceptably
- Identify the primary sources of network performance problems
- Identify and troubleshoot the most common causes of performance problems in TCP/IP communications

Audience

- Network engineers
- Network and computer technicians

Format of the Course

- Part lecture, part discussion, exercises and heavy hands-on practice

Note

- To request a customized training for this course, please contact us to arrange.
nettbswsadvAdvanced Network Troubleshooting Using Wireshark21 hoursThis course is a continuation of the "Basic Network Troubleshooting Using Wireshark" course, and comes to provide the participants with advanced capabilities for network troubleshooting. The course provides an in-depth knowledge of network behaviour and problems, along with the capabilities to isolate and solve security and advanced applications problems. The course is based on theory, class exercise and labs.
nettbswsBasic Network Troubleshooting Using Wireshark21 hoursThe purpose of the course is to provide the participant with basic knowledge of the Wireshark protocol analyzer. The course focuses on deep understanding of the tool, as the basics for using it for network troubleshooting. The course starts with packet capturing, capture and display filters, statistical features and the basics of the expert system. By the end of the course the participant will be able to perform basic troubleshooting in small to medium size networks. The course is based on theory, class exercise and labs.
nagiosysadminNagios XI Administration21 hoursNagios XI is enterprise server and network monitoring software.

In this instructor-led, live training, participants will learn how to set up and operate Nagios XI as they step through process of managing Linux and Windows servers in a series of hands-on live-lab exercises.

By the end of this training, participants will be able to:

- Install and configure Nagios XI
- Monitor Windows and Linux machines
- Monitor network devices
- Perform administrating tasks, including backing up, restoring, and scheduling downtime of Nagios XI

Audience

- System administrators

Format of the Course

- Part lecture, part discussion, exercises and heavy hands-on practice

Note

- To request a customized training for this course, please contact us to arrange.
nagiosbspkNagios35 hoursThe 5-day course demonstrates through hands-on practice the fundamentals of Nagios.
nagioscoreNagios Core21 hoursThis course covers the installation, planning and configuration of Nagios Core

The level of this course is Intermediate
shadowsocksShadowsocks: Set Up a Proxy Server7 hoursShadowsocks is an open-source, secure socks5 proxy.

In this instructor-led, live training, participants will learn how to secure an internet connection through a Shadowsocks proxy.

By the end of this training, participants will be able to:

- Install and configure Shadowsocks on any of a number of supported platforms, including Windows, Linux, Mac, Android, iOS, and OpenWRT.
- Deploy Shadosocks with package manager systems, such as pip, aur, freshports and others.
- Run Shadowsocks on mobile devices and wireless networks.
- Understand how Shadowsocks encrypts messages and ensures integrity and authenticity.
- Optimize a Shadowsocks server

Audience

- Network engineers
- System Administrators
- Computer technicians

Format of the course

- Part lecture, part discussion, exercises and heavy hands-on practice
waaacdwtacacsOne Day Workshop for AAA of Cisco Devices using a Windows-based TACACS+ Server7 hoursSuitable for network planners, engineers or anyone interested in TACACS+ operation with Cisco IOS devices.

Course is almost entirely practical if one day. If extended to 2 days due to lack of pre-reqs it will be around 50% practical.
dnsandbindDNS and BIND: Setting Up, Managing and Securing Your DNS Server14 hoursDNS (domain name system) is the "phone book" of the internet, providing a directory of computer names and their IP addresses. BIND is the most common Linux implementation of DNS. When you open a website or send and receive an email, a DNS server somewhere is quietly addressing your message to its intended recipient.

In this training, participants will learn the critical features of DNS while carrying out exercises in the setup and configuration of a BIND DNS server on Linux. The course starts with a refresher on key networking principles, then digs into hands-on practice with setup and configuration. Steadily, the discussion and practices move towards more complex topics such as security, availability, debugging and troubleshooting.

Audience

- Network technicians
- Network designers
- System administrators

Format of the course

- Part lecture, part discussion, heavy hands-on practice and implementation, occasional quizing to measure progress
muipv4Understanding Multicast using IPv421 hoursTransport of baseband audio and video streams across IP networks using multicast signalling protocols is becoming increasingly used in broadcast networks.

This 3 day course/workshop covers the theory and practice of implementing these protocols within IP and Ethernet networks. The practical element of the course will use Cisco L3 switches and the multicast streamers and receivers will use the cross -platform VLC application. It is not necessary to have any expertise in the Cisco command line as the configuration of the devices can be instructor-led if required. However the course is intended to have at least 50% practical content and can be customised or even lengthened (to examine the protocols in more detail) if run as a single company event.
ipsecvpnUnderstanding IPSec VPNs14 hoursThis 2 day course investigates the theory and technology associated with IPSec VPN’s.VPN’s are setup using Cisco IOS Routers and ASA Firewalls using the web interface. The workings of the protocols are examined using debug commands and protocol analyser traces of relevant negotiations.

Audience:

Suitable for network planners, engineers or anyone interested in IPSec VPNs

Course is approximately 40% practical
pradtacacsPractical RADIUS and TACACS+14 hoursA 2 day practical course that covers the theory of RADIUS and TACACS+ protocols. Network Policy Server (NPS) on Windows 2008 Server will be used to implement Connection Request and Network Policies to allow users access to network resources. A windows based TACACS+ server will be used to investigate the operation of this protocol to provide authentication, authorisation and accounting for users accessing network resources.

There is an option for an additional one day workshop to configure and test IEEE802.1x authentication using Windows 7 client as the supplicant, a Cisco switch as the authenticator and an NPS server to provide the authentication. Delegates will configure the Cisco switch and NPS server to use the Extensible Authentication Protocol (EAP).

Audience:

Network Planners, Designers, and Engineers requiring an understanding of RADIUS and TACACS+ operation

Course is approximately 40% practical.
ipv6undUnderstanding IPv614 hoursA 2 day theoretical course (with some practical demonstrations) covering the fundamentals of Internet Protocol v6 – including addressing, protocol formats, ICMP v6, discovery processes and IP v6 routing.

Audience:

Network Planners, Designers, and Engineers requiring an understanding of IP v6. Those requiring a comprehensive overview of IP v6 and the migration process from an IP v4 environment.
tcpippracPractical TCP/IP28 hoursThis 4 day course involves a mixture of expository based (utilising protocol analyser traces where appropriate) and practical experiments to test and verify the operation of TCP/IP networks. The major aspects of the TCP/IP protocol stack are covered, including subnetting, supernetting and running dynamic routing protocols. TCP and UDP will be compared and contrasted, covering the end-to-end reliability and congestion avoidance capabilities of the TCP/IP stack. Some application layer protocols (HTTP, TLS, DNS, DHCP etc) will be investigated during the course. Network security in the form of TLS will be covered both from a theoretical and practical standpoint. The practical exercises are designed to augment the theory and enhance both the understanding of the underlying protocols and also the problem solving abilities of the delegates.

Audience:

Suitable for anyone looking for an understanding of TCP/IP.

Course is approximately 50% practical.
beyondcorpBeyondCorp: Implementing Zero Trust Security14 hoursBeyondCorp is an open source Zero Trust security framework that allows employees to work securely from any location without the need for a traditional VPN.

In this instructor-led, live training, participants will learn hands-on how to set up a Zero Security system as they set up and deploy BeyondCorop in a live-lab environment.

By the end of this training, participants will be able to:

- Assess their organization's existing security model.
- Shift access controls from the perimeter to individual devices and users.
- Deploy applications using a user and device-centric authentication and authorization workflow.
- Understand, plan and implement a Zero Trust network within their organization.

Audience

- Network engineers
- Cyber security professionals
- System architects
- IT managers

Format of the Course

- Part lecture, part discussion, exercises and heavy hands-on practice

Note

- To request a customized training for this course, please contact us to arrange.
netsecadmNetwork Security Administrator35 hoursAudience:

System Administrators and Network Administrators as well as anyone who is interested in defensive network security technologies.
sipvoipSIP protocol in VoIP21 hoursThe course consists of two complementary parts – a theoretical and a practical one. The first is a one day introduction covering motivation, philosophy, fundamentals and rules of operation of the SIP protocol and ways it is used to implement telecom services with focus on IP telephony and VoIP. The second two-day part enables participants to learn practical aspects of service operation within a framework of hand-on laboratory exercises giving detailed insight into configuration of components of SIP telephony architecture, SIP signalling at both message sequence chart and internal message structure levels, and assists in understanding of typical problems and troubleshooting including security and telecom fraud aspects. The trainers will share their experience in launching, operation and management of SIP telephony covering also virtualization and cloud based solutions. Practical part is presented using both SIP hardphones and softphones and IP telephony servers (Asterisk and Freeswitch). Participants can take advantage of the fact trainers have got rich technical and business experience in IP telephony and submit their own problems and questions. They will be included in the agenda at wrap-up as a supplement to the training to meet current urgent needs of clients. Training is addressed to participants with basic knowledge and experience in telecom services – specifically in VoIP and IP networking.
67525Cisco Unified Wireless Network (CUWN)35 hoursOverview

This course enables a network administrator to deploy a wireless LAN (WLAN) enterprise solution through the identification and successful implementation of site-appropriate hardware and software features in a Cisco Unified Wireless Network.

Audience

Anyone involved in the deployment of a wireless LAN solution.

After you complete this course you will be able to:

- Identify how the Cisco Unified Wireless Network solution meets the challenges of successful WLAN deployments
- Select and properly install the Cisco Unified Wireless Network hardware appropriate to site and use requirements
- Administer the WLAN, 802.11 security policies, and QoS appropriately to protect and optimize performance on the wireless network
- Configure and implement the key Cisco Unified Wireless Network security features to mitigate WLAN security threats
- Utilize a recommended troubleshooting methodology and the various tools available to gather and assess system data to isolate equipment failures and security threats
wpeapawscwOne Day Workshop for PEAP Authentication of Windows 7 Supplicant using a Cisco Switch as Authenticator and Windows 2008 R2 Server7 hoursThis one day workshop covers the configuration and operation of the IEEE802.1x protocol in the authentication and authorisation of a wired Windows 7 supplicant. The authenticator is a Cisco Switch and the server is Windows NPS running on Windows 2008 R2 server, operating as a Certification Authority (CA). The EAP protocol is Protected EAP (PEAP) and a successful request will be allocated a VLAN on the switch via RADIUS attributes received from the server following successful authentication. The procedure for a wired supplicant is almost identical to that of a wireless supplicant.

Audience:

Suitable for network planners, engineers or anyone interested in operation of PEAP with Cisco IOS Devices and NPS.
wciosdWorkshop for Cisco IOS Devices Implementing IPSec using Certificate Authentication via a Windows 2008 R2 CA7 hoursThis one day workshop covers the configuration and operation of negotiating IKE/IPSec Security Association (SA) between Cisco IOS devices. The devices will authenticate using certificates provided through enrollment with a Windows 2008 R2 Certification Authority. The Windows 2008 R2 server will run the Simple Certificate Enrollment Process (SCEP) using the Network Device Enrollment Service (NDES).

Audience:

Suitable for network planners, engineers or anyone interested in operation of Cisco IOS devices running IPSec using certificate authentication.
waaacdwnpsrOne Day Workshop for AAA of Cisco Devices using Windows 2008 NPS RADIUS7 hoursThis one day workshop covers the configuration and operation of the RADIUS protocol in the authentication, authorisation and accounting of accessing the management software of Cisco IOS devices. The RADIUS server is Network Policy Server (NPS) in Windows 2008 R2.

Audience:

Suitable for network planners, engineers or anyone interested in RADIUS operation with Cisco IOS Devices and NPS.

Workshop is almost all practical. If extended to 2 days it will be approximately 50% practical.
ledeLEDE: Set Up a Linux Wireless Router7 hoursThe LEDE Project (Linux Embedded Development Environment) is a Linux operating system based on OpenWrt. It is a complete replacement for the vendor-supplied firmware of a wide range of wireless routers and non-network devices.

In this instructor-led, live training, participants will learn how to set up a LEDE based wireless router.

Audience

- Network administrators and technicians

Format of the course

- Part lecture, part discussion, exercises and heavy hands-on practice

Upcoming Networking Courses

CourseCourse DateCourse Price [Remote / Classroom]
HAProxy Administration - One Fullerton - NobleProg SingaporeMon, 2018-10-29 09:304030SGD / 7250SGD
Network Troubleshooting with Wireshark - JTC Summit - NobleProg SingaporeMon, 2018-10-29 09:306045SGD / 9995SGD
ONAP for Network Orchestration and Automation - Suntec Tower 2 - NobleProg SingaporeTue, 2018-10-30 09:304030SGD / 7250SGD
NetNORAD - United Square - NobleProg SingaporeFri, 2018-11-09 09:302015SGD / 4415SGD
LEDE: Set Up a Linux Wireless Router - Centennial Tower - NobleProg SingaporeThu, 2018-11-29 09:302015SGD / 4375SGD
Weekend Networking courses, Evening Networking training, Networking boot camp, Networking instructor-led, Weekend Networking training, Evening Networking courses, Networking coaching, Networking instructor, Networking trainer, Networking training courses, Networking classes, Networking on-site, Networking private courses, Networking one on one training

Course Discounts

Course Venue Course Date Course Price [Remote / Classroom]
Codius: Setting Up a Host System Centennial Tower - NobleProg Singapore Wed, 2018-12-05 09:30 1814SGD / 4174SGD
Tableau for Developers Centennial Tower - NobleProg Singapore Wed, 2019-01-23 09:30 7363SGD / 11043SGD
IoT security Centennial Tower - NobleProg Singapore Wed, 2019-01-30 09:30 7254SGD / 10934SGD
Tableau for Developers Centennial Tower - NobleProg Singapore Mon, 2019-03-18 09:30 7363SGD / 11043SGD
Big Data - Data Science Centennial Tower - NobleProg Singapore Mon, 2019-04-01 09:30 4909SGD / 7929SGD

Course Discounts Newsletter

We respect the privacy of your email address. We will not pass on or sell your address to others.
You can always change your preferences or unsubscribe completely.

Some of our clients

is growing fast!

We are looking to expand our presence in your region!

As a Business Development Manager you will:

  • expand business in the region
  • recruit local talent (sales, agents, trainers, consultants)
  • recruit local trainers and consultants

We offer:

  • Artificial Intelligence and Big Data systems to support your local operation
  • high-tech automation
  • continuously upgraded course catalogue and content
  • good fun in international team

If you are interested in running a high-tech, high-quality training and consulting business.

contact us right away!