Online or onsite, instructor-led live Networking training courses demonstrate through interactive discussion and hands-on practice the fundamentals and advanced topics of Networking.
Networking training is available as "online live training" or "onsite live training". Online live training (aka "remote live training") is carried out by way of an interactive, remote desktop. Warminsko-mazurskie onsite live Networking trainings can be carried out locally on customer premises or in NobleProg corporate training centers.
NobleProg -- Your Local Training Provider.
Olsztyn
sale szkoleniowe NobleProg, ul. Gietkowska 6a, Olsztyn, poland, 10-170
Training and conference room with full audio-visual equipment. p>
Functional furniture provides the possibility...
Training and conference room with full audio-visual equipment. p>
Functional furniture provides the possibility of setting them in a conference layout, school, workshop & cinema, or cinema, depending on the client's needs. p>
This instructor-led, live training in warminsko-mazurskie (online or onsite) is aimed at intermediate-level network engineers, architects, and system administrators who wish to gain the knowledge and skills required to implement and manage Cisco's Nexus 9K and Catalyst 9200/9500 series switches. It combines theoretical knowledge with hands-on practical experience, focusing on the Cisco NX-OS and IOS-XE platforms.By the end of this training, participants will be able to:
Install and manage Cisco Nexus 9K and Catalyst 9200/9500 switches.
Configure advanced switch features for optimal performance.
Integrate switches into diverse network environments.
Enhance network resilience and efficiency.
Utilize switches for high availability and data management.
This instructor-led, live training in warminsko-mazurskie (online or onsite) is aimed at expert-level network professionals who wish to prepare for the CCNA Routing & Switching certification exam.By the end of this training, participants will be able to:
Develop a comprehensive understanding of networking fundamentals.
Master IP connectivity and understand WAN technologies.
Secure network devices using Access Control Lists (ACLs), VPNs, and other security protocols to prevent unauthorized access and threats.
Prepare for the CCNA Routing & Switching Certification exam.
This instructor-led, live training in warminsko-mazurskie (online or onsite) is aimed at intermediate-level network administrators who wish to manage and secure their networks using FortiGate firewalls.By the end of this training, participants will be able to:
Understand Fortigate features and functionalities, particularly those introduced or enhanced in version 7.4.
Configure and manage FortiGate devices and implement advanced security features.
Deploy and manage advanced security measures like IPS, antivirus, web filtering, and threat management.
Monitor network activities, analyze logs, and generate reports for auditing and compliance.
This instructor-led, live training in warminsko-mazurskie (online or onsite) is aimed at intermediate-level network security professionals who wish to learn how to implement and configure Cisco ISE to enhance the security posture of their network infrastructure.By the end of this training, participants will be able to:
Understand Cisco ISE architecture and access control capabilities.
Implement basic network access control and advanced network access control.
Configure and manage TACACS+ for device administration, command authorization, and role-based access control.
This instructor-led, live training in warminsko-mazurskie (online or onsite) is aimed at intermediate-level technical professionals who wish to delve deeper into the technical aspects and functionalities of Fortinet’s product line to effectively recommend, sell, and implement Fortinet security solutions.By the end of this training, participants will be able to:
Gain in-depth knowledge of Fortinet’s advanced security solutions and products.
Understand the technical features, benefits, and deployment scenarios for each core Fortinet product.
Configure, manage, and troubleshoot Fortinet solutions in diverse environments.
Apply Fortinet products to address complex security challenges and requirements.
This instructor-led, live training in warminsko-mazurskie (online or onsite) is aimed at intermediate-level network professionals who wish to achieve more agile, secure, and efficient networks that align closely with their business objectives and adapt to changing needs and threats dynamically.By the end of this training, participants will be able to:
Understand the fundamentals of Intent-Based Networking.
Implement network automation and integrate security in the Intent-Based Network.
Use analytics for network monitoring and how assurance can provide insights into network performance and user experience.
Designing and deploying an IBN that meets business requirements and operational objectives.
This instructor-led, live training in warminsko-mazurskie (online or onsite) is aimed at beginner-level technical professionals who wish to learn the concept of the Security Fabric and how it evolved to address the cybersecurity needs of organizations.By the end of this training, participants will be able to:
Learn the evolution of cybersecurity and how it has shaped current security technologies.
Use Fortinet products to protect against specific types of cyber threats and attacks.
Understand the integration and automation capabilities of Fortinet solutions in providing a coordinated response to cyber incidents.
This instructor-led, live training in warminsko-mazurskie (online or onsite) is aimed at security professionals who wish to learn how to use Cortex XDR in preventing and stopping the occurrence of sophisticated attacks and threats.
By the end of this training, participants will be able to:
Understand the architecture and components of Cortex XDR.
Create and manage profiles for exploit and malware prevention.
Analyze behavioral threats and monitor response actions.
This instructor-led, live training in warminsko-mazurskie (online or onsite) is aimed at intermediate-level network professionals who wish to implement and secure wireless networks within an enterprise environment using Cisco equipment and technologies.By the end of this training, participants will be able to:
Design and Implement FlexConnect Architectures.
Implement Quality of Service in a wireless network environment.
Configure and troubleshoot multicast in a wireless network.
Implement security for wireless client connectivity.
This instructor-led, live training in warminsko-mazurskie (online or onsite) is aimed at beginner-level network security professionals who wish to learn the concept of cybersecurity and the current global threat landscape.By the end of this training, participants will be able to:
Understand the current global threat landscape and identify the main types of cyber adversaries.
Recognize the primary types of malware and the mechanics of cyber attacks.
Understand the basics of network security and the importance of a layered security approach.
Learn about Fortinet's Security Fabric and how it addresses modern cybersecurity challenges.
This instructor-led, live training in warminsko-mazurskie (online or onsite) is aimed at security professionals who wish to learn how to troubleshoot Palo Alto Networks' next-generation firewalls.
By the end of this training, participants will be able to:
Understand the architecture of the next-generation firewall.
Investigate and troubleshoot networking issues using firewall tools.
Analyze advanced logs to resolve real-life scenarios.
This instructor-led, live training in warminsko-mazurskie (online or onsite) is aimed at intermediate-level network and security professionals who wish to effectively implement, manage, and secure SD-WAN solutions.By the end of this training, participants will be able to:
Understand the fundamental concepts, benefits, and challenges associated with SD-WAN technologies.
Design an SD-WAN architecture tailored to organizational needs and deploy SD-WAN solutions effectively.
Implement and manage security features within an SD-WAN.
Monitor, manage, and troubleshoot SD-WAN environments.
This instructor-led, live training in warminsko-mazurskie (online or onsite) is aimed at intermediate-level network engineers who wish to gain the skills and knowledge necessary to effectively administer, manage, and optimize Cisco Unified Communications Manager (CUCM) v12.x.
By the end of this training, participants will be able to:
Understand CUCM architecture and deployment.
Learn how to install, set up, and perform initial configurations of CUCM, including the setup of users, devices, and basic network settings.
This instructor-led, live training in warminsko-mazurskie (online or onsite) is aimed at intermediate-level network and security professionals who wish to effectively manage and secure networks using Fortigate 600E equipment, with a specific focus on HA configurations for enhanced reliability and performance.By the end of this training, participants will be able to:
Understand the features, specifications, and operating principles of the Fortigate 600E firewall.
Perform the initial setup of the Fortigate 600E, including basic configuration tasks like setting up interfaces, routing, and initial firewall policies.
Configure and manage advanced security features such as SSL VPN, user authentication, antivirus, IPS, web filtering, and anti-malware capabilities to protect against a variety of network threats.
Troubleshoot common issues in HA setups and effectively manage HA environments.
This instructor-led, live training in warminsko-mazurskie (online or onsite) is aimed at security professionals who wish to learn how to manage firewalls at scale.
By the end of this training, participants will be able to:
Design, configure, and manage the Panorama FireWall management server.
Manage policies using device groups.
Roll out network configurations to different firewalls.
This instructor-led, live training in warminsko-mazurskie (online or onsite) is aimed at intermediate-level IT professionals who wish to effectively use and manage Sophos XG Firewall to enhance the security posture of their organizations or clients.By the end of this training, participants will be able to:
Understand the features and capabilities of Sophos XG Firewall.
Perform initial setup, configure network interfaces, and create and manage firewall policies and rules.
Understand how to integrate with various authentication services.
Utilize Sophos XG Firewall's monitoring and reporting tools to maintain oversight of network security.
This instructor-led, live training in warminsko-mazurskie (online or onsite) is aimed at intermediate-level network administrators who wish to learn how to implement, configure, and optimize ISE for effective network security.
By the end of this training, participants will be able to:
Deploy Cisco ISE in various network environments, considering best practices, hardware, and software requirements.
Implement network profiling to identify and classify connected devices.
Manage authorization and access control.
Configure posture policies, remediation actions, and compliance modules.
This instructor-led, live training in warminsko-mazurskie (online or onsite) is aimed at experienced network security managers who wish to gain the knowledge and skills needed to deploy, manage, and troubleshoot Fortinet's FortiGate security appliances running on FortiOS 7.2 as an NSE4 Network Security Professional.
By the end of this training, participants will be able to:
Understand Fortinet's product portfolio and the role of FortiOS in network security.
This instructor-led, live training in warminsko-mazurskie (online or onsite) is aimed at security professionals who wish to learn the fundamentals of managing Palo Alto Networks' next-generation firewalls.
By the end of this training, participants will be able to:
Configure and manage Palo Alto Networks' firewall essential features.
This instructor-led, live training in warminsko-mazurskie (online or onsite) is aimed at intermediate-level network professionals who wish to effectively manage and operate SD-WAN networks, including design, configuration, troubleshooting, and optimization.By the end of this training, participants will be able to:
Understand the fundamental concepts, benefits, and challenges associated with SD-WAN technologies.
Design an SD-WAN architecture tailored to organizational needs and deploy SD-WAN solutions effectively.
Implement and manage security features within an SD-WAN.
Monitor, manage, and troubleshoot SD-WAN environments.
This instructor-led, live training in warminsko-mazurskie (online or onsite) is aimed at systems administrators who wish to learn how to use Zscaler to secure network connections for applications and cloud services.
By the end of this training, participants will be able to:
Learn and understand the architecture security on Zscaler.
Understand the value and baseline features of Zscaler advanced configurations.
Use Zscaler to secure network connections for applications and cloud services.
This instructor-led, live training in warminsko-mazurskie (online or onsite) is aimed at advanced-level network professionals who wish to gain a deeper understanding of Cisco Enterprise Network and pass the CCNP certification exam.
By the end of this training, participants will be able to:
Understand the architecture and components of Cisco enterprise networks.
Implement and troubleshoot advanced routing technologies and secure enterprise LAN and WAN networks.
Configure and manage Cisco SD-WAN solutions for enterprise networks.
Design enterprise networks with an emphasis on scalability, security, and availability.
The Certified Kubernetes Administrator (CKA) program was created by The Linux Foundation and the Cloud Native Computing Foundation (CNCF).Kubernetes is nowadys a leading platform used for containers orchestration.NobleProg have been delivering Docker & Kubernetes training from 2015. With more than 360 successfully completed training projects, we became one of the best known training companies worldwide in field of containerization.Since 2019 we are also helping our customers to confirm their performance in k8s environment by preparing them and encouraging to pass CKA and CKAD exams.This instructor-led, live training (online or onsite) is aimed at System Administrators, Kubernetes users who wish to confirm their knowledge by passing CKA exam.On the other hand, training is focused also on gaining practical experience in Kubernetes Administration, so we recommend taking part in it, even if you don't intend to take CKA exam.Format of the Course
Interactive lecture and discussion.
Lots of exercises and practice.
Hands-on implementation in a live-lab environment.
Course Customization Options
To request a customized training for this course, please contact us to arrange.
To learn more about CKA certification, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-administrator-cka
The Certified Kubernetes Application Developer (CKAD) program has been developed by The Linux Foundation and the Cloud Native Computing Foundation (CNCF), the host of Kubernetes.This instructor-led, live training (online or onsite) is aimed at Developers who wish to confirm their skills in design, build, configure, and expose cloud native applications for Kubernetes. On the other hand, training is also focused on gaining practical experience in Kubernetes application development, so we recommend taking part in it, even if you don't intend to take CKAD exam.NobleProg have been delivering Docker & Kubernetes training from 2015. With more than 360 successfully completed training projects, we became one of the best known training company worldwide in field of containerization. Since 2019 we are also helping our customers to confirm their performance in k8s environment by preparing them and encouraging to pass CKA and CKAD exams.Format of the Course
Interactive lecture and discussion.
Lots of exercises and practice.
Hands-on implementation in a live-lab environment.
Course Customization Options
To request a customized training for this course, please contact us to arrange.
To learn more about CKAD, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-application-developer-ckad/
This instructor-led, live training in warminsko-mazurskie (online or onsite) is aimed at engineers who wish to optimize networking for Kubernetes clusters.
By the end of this training, participants will be able to:
Install and configure Calico.
Understand how Calico differs from traditional overlay networks.
Understand how Calico combines internet routing protocols with consensus-based data stores.
Use Calico to create a container networking solution for Kubernetes clusters.
Use Calico to provide network policy for Kubernetes.
In this instructor-led, live training in warminsko-mazurskie, participants will learn how to implement deep learning models for telecom using Python as they step through the creation of a deep learning credit risk model.
By the end of this training, participants will be able to:
Understand the fundamental concepts of deep learning.
Learn the applications and uses of deep learning in telecom.
Use Python, Keras, and TensorFlow to create deep learning models for telecom.
Build their own deep learning customer churn prediction model using Python.
The aim of this course is twofold - gain solid knowledge about OpenStack architecture and acquire profound troubleshooting skills. In the architecture part you will learn how to design the hardware for the public and private cloud, prepare high-availability control plane, choose proper size of the flavours, and safely overcommit cloud resources, among other things. Getting knowledge about the internals of Neutron (Networking Service) is another essential part in OpenStack architecture. Next the participant will be introduced into methods of troubleshooting issues in OpenStack clusters starting from general tips, through network troubleshooting up to caveats of main OpenStack services. Around 75% of the course comprises of hands-on workshops in the real OpenStack training environment.
The "Cyberbezpieczeństwo w praktyce dla początkujących" course focuses on aspects of computer security in everyday use. Provides interactive lectures, discussions and hands-on exercises in a live environment. Topics covered include data security, risk of leakage of personal information, online payment security, protection against online fraud, safe use of the Internet, good practices related to passwords, antivirus software, backups, data encryption, system updates and remote work security.
The course is a comprehensive training on OpenStack. It starts with the introduction to the system, then through hands-on workshops it gives practical knowledge on managing private clouds based on OpenStack, finally troubleshooting and advanced, architectural topics are present. The goal of this course is to familiarize with the OpenStack ecosystem as well as to give a strong background for further expansion and refinement of the OpenStack clouds. The course comprises all topics necessary to accomplish the Certificate OpenStack Administrator exam. 75% of the course is based on hands-on workshop in the real OpenStack training environment.
The course is a comprehensive training on OpenStack, extended version of the OpenStack Bootcamp course includes extra excercises, troubleshooting and sample examination tasks. Extended content is highlited in bold in the course outline. It starts with the introduction to the system, then through hands-on workshops it gives practical knowledge on managing private clouds based on OpenStack, finally troubleshooting and advanced, architectural topics are present. The goal of this course is to familiarize with the OpenStack ecosystem as well as to give a strong background for further expansion and refinement of the OpenStack clouds. The course comprises all topics necessary to accomplish the Certificate OpenStack Administrator exam. 75% of the course is based on hands-on workshop in the real OpenStack training environment. After the course participants get all the materials and training environment for self-study and feature/troubleshooting excercises.
Customization options
The full course is to be meant for at least 5 days. It could be shortened if some of the topics are not relevant for the customer. In case the participants are beginners to OpenStack (slower pace) it is recommended to expand the course for 6 days or remove some advanced topics. The course can be also extended with 1 more day when OVN topics can be presented.
The course is a profound training on OpenStack networking. It starts with the introduction to OpenStack and its architecture, then clarifies core OpenStack projects as Identity service (Keystone), Image service (Glance), Compute service (Nova), Block storage (Cinder) in order to describe the surroundings of the networks in OpenStack and mainly focus on Networking project (Neutron). Virtual network infrastructure is described and based on the Open Virtual Network project, Open vSwitch and OpenFlow. The goal of the course is to understand basic operations and architecture of OpenStack as well as to familiarize participants with various networking technologies behind OpenStack, extending information about OVN and underlying flows, resources and tools.
Customization options
The training can be contracted to 2 days, focusing on core aspects relevant for the customer. The training can be also extended regarding administrative, design, networking and/or troubleshooting topics concerning OpenStack deployments. It is possible to describe other underlying SDN solutions like Linux Bridge or OvS.
In this instructor-led, live training in warminsko-mazurskie (online or onsite), participants will learn how to use ONAP to automate networking services.
By the end of this training, participants will be able to:
Understand, install and configure the various components in the ONAP ecosystem.
Carry out real-time, policy-driven orchestration and automation of physical and virtual network functions.
Design, create, orchestrate, and monitor VNFs, SDNs and other network services.
Efficiently manage the entire networking lifecycle using a software-driven approach.
Develop, deploy, and scale a network using the latest open source technologies and practices.
This instructor-led, live training in warminsko-mazurskie (online or onsite) is aimed at telecom engineers, developers, and IT personnel who wish to use ONAP and optimize telecommunication network functions.
By the end of this training, participants will be able to:
Install Open Network Automation Platform and configure the necessary frameworks.
Understand the components and concepts foundational to the ONAP environment.
Build and automate physical and virtual telecommunication network functions.
Manage and optimize the life cycles of systems and operations executed through ONAP.
Leverage the features of ONAP and overcome the challenges to telecommunication applications.
This instructor-led, live training in warminsko-mazurskie (online or onsite) is aimed at security engineers and system administrators who wish to use FortiGate NGFW's advanced security-driven network systems to protect their organization from internal and external threats.
By the end of this training, participants will be able to:
Install and configure the preferred FortiGate NGFW software and hardware model.
Operate and employ FortiGate NGFW to improve the efficiency of system administration tasks.
Manage various forms of external and internal threats using FortiGate features.
Integrate FortiGate security fabric with the entire IT infrastructure to provide quick automated protection.
Ensure long-term protection from attacks with independent and continuous FortiGate threat intelligence.
Troubleshoot the most common firewall system setup errors relevant to FortiGate NGFWs.
Implement Fortinet security solutions in other enterprise applications.
This instructor-led, live training in warminsko-mazurskie (online or onsite) is aimed at software testers who wish to protect their organization's network with Nmap.
By the end of this training, participants will be able to:
Set up the necessary testing environment to start using Nmap.
Scan network systems for security vulnerabilities.
This instructor-led, live training in warminsko-mazurskie (online or onsite) is aimed at developers who wish to prevent malware intrusion with Palo Alto Networks.
By the end of this training, participants will be able to:
Set up the necessary development environment to start developing firewalls.
OpenVAS is an advanced open source framework which consists of several services and tools for network vulnerability scanning and management.
In this instructor-led, live training, participants will learn how to use OpenVAS for network vulnerability scanning.
By the end of this training, participants will be able to:
Install and configure OpenVAS
Learn the fundamental features and components of OpenVAS
Configure and implement network vulnerability scans with OpenVAS
Review and interpret OpenVAS scan results
Audience
Network engineers
Network administrators
Format of the course
Part lecture, part discussion, exercises and heavy hands-on practice
Note
To request a customized training for this course, please contact us to arrange.
This instructor-led, live training in warminsko-mazurskie (online or onsite) is aimed at networking engineers and developers who wish to configure, execute and manage programmable networking resources using P4.
By the end of this training, participants will be able to:
Learn the fundamentals of the P4 language.
Program network devices.
Set up a server for traffic management.
Compile and execute a P4 program to control plane applications.
Manage network congestion using monitoring and debugging methods.
This instructor-led, live training in warminsko-mazurskie (online or onsite) is aimed at network engineers who wish to use Linux for network engineering.
By the end of this training, participants will be able to:
This instructor-led, live training in warminsko-mazurskie (online or onsite) is aimed at system administrators, network engineers, and developers who wish to install, configure, and manage controllers, applications, and networking devices under an SDN.
By the end of this training, participants will be able to:
Set up a virtual network.
Create applications.
Use controllers to operate a software-defined network.
AI is a collection of technologies for building intelligent systems capable of understanding data and the activities surrounding the data to make "intelligent decisions". For Telecom providers, building applications and services that make use of AI could open the door for improved operations and servicing in areas such as maintenance and network optimization.
In this course we examine the various technologies that make up AI and the skill sets required to put them to use. Throughout the course, we examine AI's specific applications within the Telecom industry.
Audience
In this instructor-led, live training in warminsko-mazurskie, we examine the core principles behind Blockchain technology and gain an understanding of its overall architecture and functionality. Throughout the course, we examine Blockchain technology's specific applications within the Telecom industry. Scenarios include security, payment systems, and user verification.
BSS Course Contents :
This course is primarily aimed at managers in Telecom operation who need to have 360
view of a) legacy BSS in eTOM b) emerging BSS in NGOSS c) Billing system including
mediation, rating and CDR in details. This course also introduces in new topics like
advanced big data based CRM, Churn management and Fraud Management.
This instructor-led, live training in warminsko-mazurskie (online or onsite) is aimed at engineers, architects and managers who wish to deploy an OpenStack cloud to manage their Telecom infrastructure.
By the end of this training, participants will be able to:
Plan, deploy, and administer OpenStack as a private cloud.
Understand IaaS architecture and its implementation under OpenStack.
Replace physical routers and servers with virtual machines running in a private cloud.
Reduce infrastructure and maintenance costs through virtualization and cloud computing.
Expedite the rollout of new services to customers.
Introduction:
OSS/BSS is at the heart of operation of any Telecom operator. Given growth of Big Data in recent time,
area of OSS/BSS has undergone disruptive changes specially with virtualization of the OSS/BSS and given
the fact, many of the new OTT ( Over the top) services are newly developed web/mobile based services
that do not fit into legacy OSS. In this current course, which consists of 4 days, first 3 days are spent
extensively to develop background in legacy OSS/BSS, while last 5 modules, are dedicated to explain
emerging Big Data analytics application in OSS/BSS layer
Target Audience:
This instructor-led, live training in warminsko-mazurskie (online or onsite) is aimed at technical persons who wish to apply the most suitable tools and techniques to secure both telecom as well as wireless networks.
This instructor-led, live training in warminsko-mazurskie (online or onsite) is aimed at engineers who wish to use a proxy approach to ensure high availability for MySQL based databases.
By the end of this training, participants will be able to:
Install and configure ProxySQL.
Enable thousands of concurrent database connections over multiple backend servers.
The 3 day practical course covers the messages and call flows of the Session Initiation Protocol (SIP) and its use in voice networks. This course is a mixture of theory and practice (utilising protocol analyser traces where appropriate for explanation and troubleshooting) with practical VoIP configured using IP telephones, softphones, voice capable Cisco routers and SIP IP PBX,s (e.g. Trixbox).
Audience:
Network Planners, Designers, and Engineers requiring an understanding of SIP.
The course is around 40% practical.
The course consists of two complementary parts – a theoretical and a practical one. The first is a one day introduction covering motivation, philosophy, fundamentals and rules of operation of the SIP protocol and ways it is used to implement telecom services with focus on IP telephony and VoIP. The second two-day part enables participants to learn practical aspects of service operation within a framework of hand-on laboratory exercises giving detailed insight into configuration of components of SIP telephony architecture, SIP signalling at both message sequence chart and internal message structure levels, and assists in understanding of typical problems and troubleshooting including security and telecom fraud aspects. The trainers will share their experience in launching, operation and management of SIP telephony covering also virtualization and cloud based solutions. Practical part is presented using both SIP hardphones and softphones and IP telephony servers (Asterisk and Freeswitch). Participants can take advantage of the fact trainers have got rich technical and business experience in IP telephony and submit their own problems and questions. They will be included in the agenda at wrap-up as a supplement to the training to meet current urgent needs of clients. Training is addressed to participants with basic knowledge and experience in telecom services – specifically in VoIP and IP networking.
VoIP (Voice over Internet Protocol) is a technology that makes it possible for users to make voice calls over an Internet connection instead of through a regular phone line.
In this instructor-led, live training, participants will learn how to set up a VoIP system using Cisco CallManager Express.
By the end of this training, participants will be able to:
Understand fundamental VoIP concepts
Learn how to use VoIP equipment
Configure CISCO routers for VoIP
Implement VoIP and CallManager Express into their network
Configure CME features for SIP, SCCP, and soft phones
Work with advanced configuration settings and features of CME
Audience
Managers
System administrators
Software and support system developers
Technicians
Network engineers
Format of the course
Part lecture, part discussion, exercises and heavy hands-on practice
The 3 day practical course covers the fundamentals of the various voice protocols used to carry voice (and video) over a packet switched network. This course is a mixture of theory and practice (utilising Wireshark where appropriate for explanation and troubleshooting) with practical VoIP configured using IP telephones, softphones and voice capable Cisco routers. This is primarily a 'generic' VoIP course – but uses Cisco equipment to provide an IP backbone and voice gateways. We can also provide Cisco specific voice training courses. The course also covers call setup between circuit switched and packet switched networks.
The course is approximately 40% practical.
This instructor-led, live training in warminsko-mazurskie (online or onsite) is aimed at programmers who wish to download, install, and set up Akraino Edge Stack blueprints to manage their edge systems.
By the end of this training, participants will be able to install, deploy, manage, and support end-to-end Akraino Edge Stack solutions to improve and organize their edge systems, services, and devices.
In this course, you will describe the major networking technologies and systems of modern networks and configure, manage, and troubleshoot modern networks.
This instructor-led, live training in warminsko-mazurskie (online or onsite) is aimed at system administrators who wish to manage and deploy G Suite for organizations.
By the end of this training, participants will be able to:
Apply Google security practices with 2SV and SSO.
Monitor domain and services usage through reports in the Admin Console.
The LEDE Project (Linux Embedded Development Environment) is a Linux operating system based on OpenWrt. It is a complete replacement for the vendor-supplied firmware of a wide range of wireless routers and non-network devices.
In this instructor-led, live training, participants will learn how to set up a LEDE based wireless router.
Audience
Network administrators and technicians
Format of the course
Part lecture, part discussion, exercises and heavy hands-on practice
The Nessus vulnerability scanner is a very versatile platform for detecting and managing vulnerabilities. They can even do so much more than vulnerability detection. They can also do baseline auditing. In which case you system configuration is being compared with the best hardening standard
In this Instructor led course, we will introduce the components of the solution and the different t functionalities, each module in the application will be explained and its use case laid out.
At the end of the course, participants will be able to carry out vulnerability (authenticated and unauthenticated) scans on almost all IP based systems and analyze the results of the scan to eliminate false positives. The participants will learn to carry out risk based prioritization of findings and recommend compensating controls. This course will help the participants determine the security posture of their systems using Nessus and decide on the best course of action for remediation.
Audience:
Infrastructure managers
System administrators
System Auditors
System compliance officers
vulnerability managers
cybersecurity managers
Format:
Part Lecture, part discussion and hands on practice
The "Computer Network Security - How to Secure Your Services" training presents mechanisms and services securing modern network solutions. It covers the basics of ensuring data confidentiality and integrity, the use of encryption, certificates, public key infrastructure (PKI), and secure password storage. The course also covers network security protocols and services, security systems, protecting wireless networks, connecting corporate branches, and testing security through penetration testing, network scanning and vulnerability detection.
Varnish is a reverse proxy for content-heavy dynamic web sites. Unlike Squid, which was originally a client-side cache, or Apache and nginx, which are web servers, Varnish was designed as an HTTP accelerator. Varnish is focused exclusively on HTTP, unlike other proxy servers that support FTP, SMTP and other network protocols. Varnish is used by Wikipedia, The New York Times, Facebook and Twitter, among other high-profile websites.
In this course, participants will learn about Varnish's features and caching approach while practicing in the setup and configuration of a Varnish proxy on Linux. The course starts with a refresher on key networking principles, then digs into setup and configuration topics and moves steadily towards complex implementations. By the end of the training participants will understand when and where it makes sense to deploy Varnish and will have the necessary practice to deploy their own Varnish proxy solutions.
Audience
Network technicians
Network designers
System administrators
Format of the course
Part lecture, part discussion, heavy hands-on practice and implementation, occasional quizing to measure progress
The aim of the "Bezpieczeństwo sieci WiFi" training is to comprehensively discuss issues related to the security of wireless networks. Topics include the basics of operation and design of WiFi networks, issues of vulnerabilities, scanning, attacks, and network security. The course is interactive and includes lectures, discussions, numerous practical exercises and implementation in a live-lab environment. The training covers, among others: IEEE 802.11 standards, security mechanisms, problems and attacks related to WiFi networks, as well as network security and privacy issues.
Network packet analysis is a technique used to view, in real time, the raw data sent and received over a network interface. This is useful for troubleshooting network configuration and network application problems. Wireshark is a free open source packet analyzer used for troubleshooting such network issues.
In this instructor-led, live training, participants will learn how to use Wireshark to troubleshoot the functionality of a network as well as the performance of differente networked applications. Participants will learn network troubleshooting principles and practice techniques for capturing and analyzing TCP/IP request and response traffic between different clients and the servers.
By the end of this training, participants will be able to:
Analyze network functionality and performance in various environments under different conditions
Determine whether instances of different server applications are performing acceptably
Identify the primary sources of network performance problems
Identify and troubleshoot the most common causes of performance problems in TCP/IP communications
Audience
Network engineers
Network and computer technicians
Format of the Course
Part lecture, part discussion, exercises and heavy hands-on practice
Note
To request a customized training for this course, please contact us to arrange.
The Data Communications Course presents the basic theory of operation os data communications networks, starting from the OSI-RM, LANs, WANs, TCP/IP and basic network security and network applications. The course provides the student with general knowledge of the architecture, hardware components, software configuration, and structure of data communications networks.
Transport of baseband audio and video streams across IP networks using multicast signalling protocols is becoming increasingly used in broadcast networks.
This 3 day course/workshop covers the theory and practice of implementing these protocols within IP and Ethernet networks. The practical element of the course will use Cisco L3 switches and the multicast streamers and receivers will use the cross -platform VLC application. It is not necessary to have any expertise in the Cisco command line as the configuration of the devices can be instructor-led if required. However the course is intended to have at least 50% practical content and can be customised or even lengthened (to examine the protocols in more detail) if run as a single company event.
The purpose of the course is to provide the participant with basic knowledge of the Wireshark protocol analyzer. The course focuses on deep understanding of the tool, as the basics for using it for network troubleshooting. The course starts with packet capturing, capture and display filters, statistical features and the basics of the expert system. By the end of the course the participant will be able to perform basic troubleshooting in small to medium size networks. The course is based on theory, class exercise and labs.
This course is a continuation of the "Basic Network Troubleshooting Using Wireshark" course, and comes to provide the participants with advanced capabilities for network troubleshooting. The course provides an in-depth knowledge of network behaviour and problems, along with the capabilities to isolate and solve security and advanced applications problems. The course is based on theory, class exercise and labs.
Wireshark is a free open source packet analyzer used for troubleshooting network issues. Network packet analysis is a technique used to view, in real time, the raw data sent and received over a network interface. This is useful for troubleshooting network configuration and network application problems.
In this instructor-led, live training (onsite or remote), participants will learn advanced techniques for troubleshooting the functionality and performance of a network and its applications. This course is an extension of "Network Troubleshooting with Wireshark", which focuses primarily on common HTTP applications. In this training, we consider protocols and connection mediums such as Wi-Fi, HTTPS, SMTP, enterprise applications and more.
By the end of this training, participants will be able to:
Isolate and solve network security issues using the Wireshark CLI
Troubleshoot applications that use protocols beyond HTTP, including HTTPS, FTP, mail, DNS, etc.
Troubleshoot network connection problems in enterprise applications such as databases, RPC, etc.
Troubleshoot connection problems in media applications such as VoIP and streaming
Use network forensics to trace and detect security issues
Audience
Network engineers
Network and computer technicians
Format of the Course
Part lecture, part discussion, exercises and heavy hands-on practice
Wireshark is a free open source packet analyzer used for troubleshooting network issues. Network packet analysis is a technique used to view, in real time, the raw data sent and received over a network interface. This is useful for troubleshooting network configuration and network application problems.
In this instructor-led, live training (onsite or remote), participants will learn advanced techniques for troubleshooting the functionality and performance of a network and its applications. This course is an extension of "Network Troubleshooting with Wireshark", which focuses primarily on common HTTP applications. In this training, we consider protocols and connection mediums such as Wi-Fi, HTTPS, SMTP, enterprise applications and more.
By the end of this training, participants will be able to:
Isolate and solve network security issues using the Wireshark CLI
Troubleshoot applications that use protocols beyond HTTP, including HTTPS, FTP, mail, DNS, etc.
Troubleshoot network connection problems in enterprise applications such as databases, RPC, etc.
Troubleshoot connection problems in media applications such as VoIP and streaming
Use network forensics to trace and detect security issues
Audience
Network engineers
Network and computer technicians
Format of the Course
Part lecture, part discussion, exercises and heavy hands-on practice
Note
To request a customized training for this course, please contact us to arrange.
BeyondCorp is an open source Zero Trust security framework that allows employees to work securely from any location without the need for a traditional VPN.
In this instructor-led, live training, participants will learn hands-on how to set up a Zero Security system as they set up and deploy BeyondCorop in a live-lab environment.
By the end of this training, participants will be able to:
Assess their organization's existing security model.
Shift access controls from the perimeter to individual devices and users.
Deploy applications using a user and device-centric authentication and authorization workflow.
Understand, plan and implement a Zero Trust network within their organization.
Audience
Network engineers
Cyber security professionals
System architects
IT managers
Format of the Course
Part lecture, part discussion, exercises and heavy hands-on practice
Note
To request a customized training for this course, please contact us to arrange.
Since all applications today heavily rely on communication and networks, there is no application security without network security.
This course focuses on network security with a software security viewpoint, and discusses common network attacks and defenses on different OSI layers, with an emphasis on application layer issues, tackling topics like session management or denial of service.
As cryptography is a critical aspect of network security, the most important cryptographic algorithms in symmetric cryptography, hashing, asymmetric cryptography, and key agreement are also discussed. Instead of presenting an in-depth mathematical and theoretical background, these elements are discussed from a merely practical, engineering perspective, showing typical use-case examples and practical considerations related to the use of crypto, such as public key infrastructures. Security protocols in many areas of secure communication are introduced, with an in-depth discussion on the most widely-used protocol families such as IPSEC and SSL/TLS.
Finally, typical crypto vulnerabilities are discussed – both related to certain crypto algorithms and cryptographic protocols, such as BEAST, CRIME, TIME, BREACH, FREAK, Logjam, Padding oracle, Lucky Thirteen, POODLE and similar, as well as the RSA timing attack. In each case, the practical considerations and potential consequences are described for each problem, again, without going into deep mathematical details.
Participants attending this course will
Understand basic concepts of security, IT security and secure coding
Learn about network attacks and defenses at different OSI layers
Have a practical understanding of cryptography
Understand essential security protocols
Understand some recent attacks against cryptosystems
Get information about some recent related vulnerabilities
Get sources and further readings on secure coding practices
The "Bezpieczeństwo IT dla praktyków" course provides participants with comprehensive practical knowledge in the field of IT security. Participants will acquire skills in analyzing and auditing systems for security and compliance with regulations. The course includes, among others: issues of operating system security, cryptography, identity protection, security systems, network services, threats, penetration tests, web application security and legal and organizational aspects. Graduates will be ready to work in various positions related to IT security, such as security administrator, SOC analyst, or cybersecurity consultant. The course is based on interactive lectures, discussions, practical exercises and implementation in a live-lab environment.
A 5 day practical networking course designed to familiarise students with Cisco IOS (version 12). The course details the key commands used to configure and secure Cisco routers and switches, and covers the CCNA syllabus - including wired and wireless LAN access.
Students will inter-connect networks by implementing static routes, distance-vector and link-state based dynamic routing protocols.
The devices will be configured to route traffic across LAN/VLAN//WAN boundaries, by encapsulating datagrams across serial data links using various WAN protocols, such as HDLC, Frame Relay, ISDN and PPP (with CHAP authentication). VLAN encapsulation/tagging will be via IEEE802.1Q/P.
Standard and Extended Access Control Lists will be configured and applied to router interfaces to filter traffic based on IP address and/or traffic type.
Students will configure static and dynamic NAT to route between private and public networks and cover the theory of Virtual Private Networks (VPN's)
Students will copy router configurations and IOS images to/from a TFTP Server. Privileged commands will be used to debug TCP/IP protocols to ensure proper operation of the routers. Students will also perform password recovery operations.
The course is primarily aimed at IP v4 but does give an overview of IP v6 addressing and covers migration from an IP v4 to an IP v6 network. Other protocols and technologies (VPN's / Wireless) may be demonstrated if time permits.
Course can be customised to precise requirements of customer.
Audience:
This course is suitable for anyone looking for a basic understanding of internetworking with Cisco devices and covers the CCNA syllabus.
Course is approximately 50% practical
A 4 day instructor-led practical course designed to familiarise delegates with the Cisco ASA Firewall CLI and ASDM. The course details the key commands used to configure and secure networks using the ASA Firewall with v8 of the operating system and version 6 of the ASDM.
Delegates will configure the ASA using the console port, TFTP server, telnet and SSH using local and RADIUS authentication. The device will be configured to utilise Syslog and SNMP.
ASA Firewalls will also be configured to use Access-Lists, Network Address Translation and VPN's utilising IPSec protocols. The course will cover the theory of Public/Private Keys, shared secret keys and their use in forming Site to site VPN's between ASA Firewalls using IKE and IPSec. Students will configure the units to create site to site VPN's, remote access VPN's using the Cisco Secure VPN Client and Web VPN's. The course will cover the theory of failover and delegates will configure Active/Standby failover on the ASA.
Privileged commands and protocol analyser traces will be used, where necessary, to debug protocols and ensure proper operation of the ASA Firewall. Students will also perform password recovery operations.
This course will involve interfacing the ASA with other network equipment, such as routers and switches, as would be expected in a network environment.
Audience:
Course is suitable for anyone involved in ASA firewall configuration and network security
Course is approximately 50% practical
SD-WAN is a software-defined approach to managing a WAN (Wide Area Network).
This instructor-led, live training (online or onsite) is aimed at engineers who wish to use Cisco SD-WAN products to set up and operate a software defined network.
By the end of this training, participants will be able to:
Install and configure a Cisco SD-WAN.
Create policies to control network traffic.
Understand and implement overlay routing.
Simplify the management of the network used for public cloud applications.
Format of the Course
Interactive lecture and discussion.
Lots of exercises and practice.
Hands-on implementation in a live-lab environment.
Course Customization Options
To request a customized training for this course, please contact us to arrange.
In this instructor-led, live training in warminsko-mazurskie, participants will learn the critical features of DNS while carrying out exercises in the setup and configuration of a BIND DNS server on Linux. The course starts with a refresher on key networking principles, then digs into hands-on practice with setup and configuration. Steadily, the discussion and practices move towards more complex topics such as security, availability, debugging and troubleshooting.
This 2 day course investigates the theory and technology associated with IPSec VPN’s.VPN’s are setup using Cisco IOS Routers and ASA Firewalls using the web interface. The workings of the protocols are examined using debug commands and protocol analyser traces of relevant negotiations.
Audience:
Suitable for network planners, engineers or anyone interested in IPSec VPNs
Course is approximately 40% practical
A 2 day theoretical course (with some practical demonstrations) covering the fundamentals of Internet Protocol v6 – including addressing, protocol formats, ICMP v6, discovery processes and IP v6 routing.
Audience:
Network Planners, Designers, and Engineers requiring an understanding of IP v6. Those requiring a comprehensive overview of IP v6 and the migration process from an IP v4 environment.
This 4 day coursework is intended for Telecom management and technology professionals who
have to maintain MetroEthernet services across the globe. The course introduces all the
prevailing standards, Troubleshooting guides, vendor options and evolving technologies in
Metro Ethernet domain.
This instructor-led, live training in warminsko-mazurskie (online or onsite) is aimed at network engineers who wish to maintain, manage, and design computer networks with Python.
By the end of this training, participants will be able to:
Optimize and leverage Paramiko, Netmiko, Napalm, Telnet, and pyntc for network automation with Python.
Master multi-threading and multiprocessing in network automation.
This instructor-led, live training in warminsko-mazurskie (online or onsite) is aimed at anyone who wish to understand and implement a network and various types of servers under Linux.
By the end of this training, participants will be able to:
Understand how networking works under Linux.
Set up a sample LAN.
Understand the various protocols used on the internet and implement each one under Linux.
Secure a networking and various types of servers, such as a webs server.
This course introduces you to how to install, operate, configure, and verify a basic Internet Protocol version 4 (IPv4), including configuring a LAN switch, configuring an IP router, connecting to a WAN, and identifying basic security threats
This course will help you:
Install, operate, configure, and verify a basic IPv4 network
Perform basic troubleshooting steps in enterprise branch office
Format of the Course
Interactive lecture and discussion.
Lots of exercises and practice.
Hands-on implementation in a live-lab environment.
Course Customization Options
To request a customized training for this course, please contact us to arrange.
This instructor-led, live training in warminsko-mazurskie (online or onsite) is aimed at network engineers who wish to converge storage infrastructures with SAN and NAS.
By the end of this training, participants will be able to:
Perform configurations of SAN and NAS storage on a storage system.
Connect to storage systems and devices from a client.
Compare SAN and NAS solutions for centralized storage.
Shadowsocks is an open-source, secure socks5 proxy.
In this instructor-led, live training, participants will learn how to secure an internet connection through a Shadowsocks proxy.
By the end of this training, participants will be able to:
Install and configure Shadowsocks on any of a number of supported platforms, including Windows, Linux, Mac, Android, iOS, and OpenWrt.
Deploy Shadosocks with package manager systems, such as pip, aur, freshports and others.
Run Shadowsocks on mobile devices and wireless networks.
Understand how Shadowsocks encrypts messages and ensures integrity and authenticity.
Optimize a Shadowsocks server
Audience
Network engineers
System Administrators
Computer technicians
Format of the course
Part lecture, part discussion, exercises and heavy hands-on practice
This 4 day course involves a mixture of expository based (utilising protocol analyser traces where appropriate) and practical experiments to test and verify the operation of TCP/IP networks. The major aspects of the TCP/IP protocol stack are covered, including subnetting, supernetting and running dynamic routing protocols. TCP and UDP will be compared and contrasted, covering the end-to-end reliability and congestion avoidance capabilities of the TCP/IP stack. Some application layer protocols (HTTP, TLS, DNS, DHCP etc) will be investigated during the course. Network security in the form of TLS will be covered both from a theoretical and practical standpoint. The practical exercises are designed to augment the theory and enhance both the understanding of the underlying protocols and also the problem solving abilities of the delegates.
Audience:
Suitable for anyone looking for an understanding of TCP/IP.
Course is approximately 50% practical.
Tinc VPN is an open source peer-to-peer virtual private network (VPN) daemon that is compatible with most operating systems. Tinc VPN makes use of tunneling and encryption to build a secure private network between hosts.
In this instructor-led, live training, participants will learn the fundamentals of working with Tinc VPN.
By the end of this training, participants will be able to:
Install, configure, run, test, and troubleshoot Tinc VPN on any operating system
Deploy a Tinc Mesh VPN
Use Tinc VPN for Centralized Cloud Interconnection
Audience
Developers
Network engineers
Format of the course
Part lecture, part discussion, exercises and heavy hands-on practice
Note
To request a customized training for this course, please contact us to arrange.
This instructor-led, live training in warminsko-mazurskie (online or onsite) is aimed at beginner-level to intermediate-level IT professionals who wish to understand the basics and principles of modern information and communication technologies and their applications.
By the end of this training, participants will be able to:
Explain the main components and functions of the internet architecture and how they interact.
Describe the features and benefits of modern network solutions and implementations, such as fiber technology, clustering, and internet of things.
Understand the concepts and models of cloud computing and its services, such as infrastructure as a service and virtualization.
Identify the future trends and directions of information and communication technologies and their implications.
The "Wyższe warstwy sieci" training focuses on issues related to transmission systems, focusing on the structure and functions of SDH systems, xWDM technology, and the integration of ATM and IP/MPLS protocols. Participants will gain knowledge about the SDH hierarchy, STM-N frame structure, protection, restoration, management in SDH systems, and the applications of DWDM and IP/MPLS technologies in optical networks.
The course is providing practical knowledge on OpenStack and private cloud security. It starts from the introduction to the system, then the participants are getting practical knowledge on security in private clouds and securing OpenStack installation. During the course, each of the core OpenStack modules is presented, participants are building up virtual identity, image, network, compute and storage resources while discussing relevant security topics. Each participant is getting their own training environment with a complete OpenStack installation based on selected cloud architecture (eg. storage, networking). The training could be highly customized based on the needs of the client.
Customization options
The training can be contracted to 2 days, focusing on core aspects relevant for the customer. The training can be also extended regarding administrative, design, networking and/or troubleshooting topics concerning OpenStack deployments
The "Penetration Testing - Detecting and Exploiting Vulnerabilities" training comprehensively discusses issues related to practical testing of network and service security. Participants gain skills in penetration testing, including reconnaissance, finding vulnerabilities, attacks and takeover, as well as covering tracks. The course also covers aspects related to system analysis, social engineering and preparation of a test report, enabling practical exercises in a controlled virtual environment.
Professionalism on the part of the instructor and his commitment to transferring knowledge,
Tomasz - WB Electronics S.A.
Machine Translated
Ease and ease of conducting training.
Jarosław - Politechnika Wrocławska
Course - SIP protocol in VoIP
Machine Translated
Experience of the trainor and interaction
Michael Angelo - Metropolitan Bank and Trust Company
Course - Cisco CCNA Syllabus in 5 Days
Issues related to WAN from the provider's side and dividing the network into subnets and routing
Paweł - Icotera
Course - CompTIA Network+ N10-008 exam prep with Exam (accredited training course with exam)
Machine Translated
The trainer is so well informed and engaging.
Elias - Armscor
Course - Cisco ASA/Pix Operation
The instructor's knowledge, practical experience, variety of topics and examples of practical use of new knowledge.
Kamil - Komenda Główna Straży Granicznej
Course - Testy penetracyjne – wykrywanie i wykorzystywanie podatności
Machine Translated
Not standard transfer of knowledge.
Daniel - mikroBIT sp. z o.o.
Course - System and Network Security with FortiGate
Machine Translated
Trainer very engaging and knowledgeable
Effendy Bin Ahmad sata - SBS transit
Course - Basic Network Troubleshooting Using Wireshark
First of all it was very interesting practically for all topics covered by this training. Well balanced with theory, practise labs and breaks. Some of tips and tricks I have introduced to my work yet.
Dawid Woźny - ATOS PGS sp. z o.o.
Course - Advanced Network Troubleshooting Using Wireshark
examples based on our data
Witold - P4 Sp. z o.o.
Course - Deep Learning for Telecom (with Python)
knowledge about HAProxy
Marco - CloudFire
Course - HAProxy Administration
Informacje teoretyczne/ogólne związane z Network Security
Milan Karpf - "MOTOROLA SOLUTIONS SYSTEMS POLSKA" SPÓŁKA Z OGRANICZONĄ ODPOWIEDZIALNOŚCIĄ
Course - Network Security Administrator
Wiedza trenera, odpowiadał na wszystkie pytania, czasem dość trudne i techniczne. Brawo.
Andrzej Morawski - Polska Spółka Gazownictwa sp. z o.o.
Course - Network Troubleshooting with Wireshark
communication, knowledge from experience, solve problems,
Marcin Walewski - Intel Technology Poland Sp. z o.o.
Course - OpenStack Bootcamp
Trainer knows very well the subject. He try to give a lot of examples in order that we understand "how" it is working.
He answer to all questions raised. Very available.
christel salve - BICS
Course - Blockchain for Telecom
godny polecenia
Tomasz Jaworski - Sąd Okręgowy w Legnicy
Course - Palo Alto Firewalls
Ćwiczenia praktyczne.
Adam Borowski - NetWorkS! Sp. z o.o.
Course - AI Awareness for Telecom
The varied topics
Daniel Lindh - Tele 2 Sverige AB
Course - OpenStack for Telecom
The virtual desktop in a browser feature was kind of neat.
Mikael Karlsson - Polystar OSIX
Course - OpenStack Architecture and Troubleshooting
Sposób przekazywania wiedzy
Adam Drabek - Gmina Miejska Kraków
Course - Network Security
His huge amount of knowledge.
Mirela Ochia - Deutsche Telekom Pan-Net Romania S.R.L.
Online Networking training in warminsko-mazurskie, Networking training courses in warminsko-mazurskie, Weekend Networking courses in warminsko-mazurskie, Evening Networking training in warminsko-mazurskie, Networking instructor-led in warminsko-mazurskie, Networking trainer in warminsko-mazurskie, Networking classes in warminsko-mazurskie, Networking boot camp in warminsko-mazurskie, Weekend Networking training in warminsko-mazurskie, Networking coaching in warminsko-mazurskie, Online Networking training in warminsko-mazurskie, Networking on-site in warminsko-mazurskie, Networking one on one training in warminsko-mazurskie, Networking private courses in warminsko-mazurskie, Evening Networking courses in warminsko-mazurskie, Networking instructor in warminsko-mazurskie, Networking instructor-led in warminsko-mazurskie