Online or onsite, instructor-led live Networking training courses demonstrate through interactive discussion and hands-on practice the fundamentals and advanced topics of Networking.
Networking training is available as "online live training" or "onsite live training". Online live training (aka "remote live training") is carried out by way of an interactive, remote desktop. Olsztyn onsite live Networking trainings can be carried out locally on customer premises or in NobleProg corporate training centers.
NobleProg -- Your Local Training Provider.
Olsztyn
sale szkoleniowe NobleProg, ul. Gietkowska 6a, Olsztyn, poland, 10-170
Sala o charakterze szkoleniowo – konferencyjnym z pełnym wyposażeniem audio-wizualnym.
Funkcjonalne meb...
Sala o charakterze szkoleniowo – konferencyjnym z pełnym wyposażeniem audio-wizualnym.
Funkcjonalne meble zapewniają możliwość ustawienie ich w układzie konferencyjnym, szkolnym, warsztatowym lub kinowym w zależności od potrzeb Klienta.
Cisco Nexus 9K is a versatile and high-performance switch series designed for modern data center architectures. Cisco Catalyst 9200/9500 are robust and scalable switches tailored for enterprise network cores and distribution layers.This instructor-led, live training (online or onsite) is aimed at intermediate-level network engineers, architects, and system administrators who wish to gain the knowledge and skills required to implement and manage Cisco's Nexus 9K and Catalyst 9200/9500 series switches. It combines theoretical knowledge with hands-on practical experience, focusing on the Cisco NX-OS and IOS-XE platforms.By the end of this training, participants will be able to:
Install and manage Cisco Nexus 9K and Catalyst 9200/9500 switches.
Configure advanced switch features for optimal performance.
Integrate switches into diverse network environments.
Enhance network resilience and efficiency.
Utilize switches for high availability and data management.
Format of the Course
Interactive lecture and discussion.
Lots of exercises and practice.
Hands-on implementation in a live-lab environment.
Course Customization Options
To request a customized training for this course, please contact us to arrange.
The Cisco Certified Network Associate (CCNA) Routing & Switching is a certification highly valued in the IT industry and recognized globally as a standard for network professionals. It demonstrates a professional's ability to handle essential network tasks and their readiness for higher-level challenges in the IT networking domain.This instructor-led, live training (online or onsite) is aimed at expert-level network professionals who wish to prepare for the CCNA Routing & Switching certification exam.By the end of this training, participants will be able to:
Develop a comprehensive understanding of networking fundamentals.
Master IP connectivity and understand WAN technologies.
Secure network devices using Access Control Lists (ACLs), VPNs, and other security protocols to prevent unauthorized access and threats.
Prepare for the CCNA Routing & Switching Certification exam.
Format of the Course
Interactive lecture and discussion.
Lots of exercises and practice.
Hands-on implementation in a live-lab environment.
Course Customization Options
To request a customized training for this course, please contact us to arrange.
Cisco ISE is a network security policy management platform that allows organizations to enforce security policies across their network infrastructure.This instructor-led, live training (online or onsite) is aimed at intermediate-level network security professionals who wish to learn how to implement and configure Cisco ISE to enhance the security posture of their network infrastructure.By the end of this training, participants will be able to:
Understand Cisco ISE architecture and access control capabilities.
Implement basic network access control and advanced network access control.
Configure and manage TACACS+ for device administration, command authorization, and role-based access control.
Format of the Course
Interactive lecture and discussion.
Lots of exercises and practice.
Hands-on implementation in a live-lab environment.
Course Customization Options
To request a customized training for this course, please contact us to arrange.
The Cisco Intent-Based Networking is a revolutionary approach that uses advanced algorithms and software to automate network operations, ensure network security, and improve network performance and reliability based on the business intent or outcomes that the network needs to achieve.This instructor-led, live training (online or onsite) is aimed at intermediate-level network professionals who wish to achieve more agile, secure, and efficient networks that align closely with their business objectives and adapt to changing needs and threats dynamically.By the end of this training, participants will be able to:
Understand the fundamentals of Intent-Based Networking.
Implement network automation and integrate security in the Intent-Based Network.
Use analytics for network monitoring and how assurance can provide insights into network performance and user experience.
Designing and deploying an IBN that meets business requirements and operational objectives.
Format of the Course
Interactive lecture and discussion.
Lots of exercises and practice.
Hands-on implementation in a live-lab environment.
Course Customization Options
To request a customized training for this course, please contact us to arrange.
The Cisco Enterprise Wireless Networks (ENWLSI) refers to a specific focus area within Cisco's training and certification programs, especially geared towards professionals working with Cisco's wireless networking solutions.This instructor-led, live training (online or onsite) is aimed at intermediate-level network professionals who wish to implement and secure wireless networks within an enterprise environment using Cisco equipment and technologies.By the end of this training, participants will be able to:
Design and Implement FlexConnect Architectures.
Implement Quality of Service in a wireless network environment.
Configure and troubleshoot multicast in a wireless network.
Implement security for wireless client connectivity.
Format of the Course
Interactive lecture and discussion.
Lots of exercises and practice.
Hands-on implementation in a live-lab environment.
Course Customization Options
To request a customized training for this course, please contact us to arrange.
Cisco Unified Communications Management v12.x Administration refers to the management and administrative tasks associated with Cisco Unified Communications Manager (CUCM) version 12.x. CUCM is a key component of Cisco's communications and collaboration portfolio and is an enterprise-class IP telephony call-processing system.
This instructor-led, live training (online or onsite) is aimed at intermediate-level network engineers who wish to gain the skills and knowledge necessary to effectively administer, manage, and optimize Cisco Unified Communications Manager (CUCM) v12.x.
By the end of this training, participants will be able to:
Understand CUCM architecture and deployment.
Learn how to install, set up, and perform initial configurations of CUCM, including the setup of users, devices, and basic network settings.
Implement and manage call routing.
Perform system maintenance and troubleshooting.
Format of the Course
Interactive lecture and discussion.
Lots of exercises and practice.
Hands-on implementation in a live-lab environment.
Course Customization Options
To request a customized training for this course, please contact us to arrange.
Cisco ISE is a network security policy management platform that allows organizations to enforce security policies across their network infrastructure.
This instructor-led, live training (online or onsite) is aimed at intermediate-level network administrators who wish to learn how to implement, configure, and optimize ISE for effective network security.
By the end of this training, participants will be able to:
Deploy Cisco ISE in various network environments, considering best practices, hardware, and software requirements.
Implement network profiling to identify and classify connected devices.
Manage authorization and access control.
Configure posture policies, remediation actions, and compliance modules.
Format of the Course
Interactive lecture and discussion.
Lots of exercises and practice.
Hands-on implementation in a live-lab environment.
Course Customization Options
To request a customized training for this course, please contact us to arrange.
Cisco CCNP (Cisco Certified Network Professional) is a professional-level certification by Cisco Systems that is designed to validate the skills and knowledge of network professionals to plan, implement, verify, and troubleshoot local and wide-area enterprise networks.
This instructor-led, live training (online or onsite) is aimed at advanced-level network professionals who wish to gain a deeper understanding of Cisco Enterprise Network and pass the CCNP certification exam.
By the end of this training, participants will be able to:
Understand the architecture and components of Cisco enterprise networks.
Implement and troubleshoot advanced routing technologies and secure enterprise LAN and WAN networks.
Configure and manage Cisco SD-WAN solutions for enterprise networks.
Design enterprise networks with an emphasis on scalability, security, and availability.
Take the CCNP Certification Exam with confidence.
Format of the Course
Interactive lecture and discussion.
Lots of exercises and practice.
Hands-on implementation in a live-lab environment.
Course Customization Options
To request a customized training for this course, please contact us to arrange.
Project Calico is a networking solution for containers and virtual machines. Originally created for OpenStack to simplify data transmission across the network, today it supports Kubernetes, OpenShift, Docker EE, OpenStack, bare metal services, and others. Calico uses IP routing instead of switching, virtual networks, overlay networks, and other complicated workarounds to enable efficient and secure networking.
This instructor-led, live training (online or onsite) is aimed at engineers who wish to network Kubernetes clusters using a simplified IP routing based approach.
By the end of this training, participants will be able to:
Install and configure Calico.
Use Calico to create a container networking solution for Kubernetes clusters.
Understand how Calico differs from traditional overlay networks.
Understand how Calico combines internet routing protocols with consensus-based data stores.
Use Calico to provide a secure network policy for Kubernetes.
Format of the Course
Interactive lecture and discussion.
Lots of exercises and practice.
Hands-on implementation in a live-lab environment.
Course Customization Options
To request a customized training for this course, please contact us to arrange.
To learn more about Project Calico, please visit: https://www.projectcalico.org/
Kurs "Cyberbezpieczeństwo w praktyce dla początkujących" skupia się na aspektach bezpieczeństwa komputerowego w codziennym użytkowaniu. Zapewnia interaktywne wykłady, dyskusje oraz praktyczne ćwiczenia w środowisku na żywo. Omawiane zagadnienia obejmują bezpieczeństwo danych, ryzyko wycieku informacji osobistych, bezpieczeństwo płatności online, ochronę przed oszustwami internetowymi, bezpieczeństwo korzystania z Internetu, dobre praktyki związane z hasłami, oprogramowaniem antywirusowym, kopiami bezpieczeństwa, szyfrowaniem danych, aktualizacjami systemów oraz bezpieczeństwem pracy zdalnej.
A 5 day practical networking course designed to familiarise students with Cisco IOS (version 12). The course details the key commands used to configure and secure Cisco routers and switches, and covers the CCNA syllabus - including wired and wireless LAN access.
Students will inter-connect networks by implementing static routes, distance-vector and link-state based dynamic routing protocols.
The devices will be configured to route traffic across LAN/VLAN//WAN boundaries, by encapsulating datagrams across serial data links using various WAN protocols, such as HDLC, Frame Relay, ISDN and PPP (with CHAP authentication). VLAN encapsulation/tagging will be via IEEE802.1Q/P.
Standard and Extended Access Control Lists will be configured and applied to router interfaces to filter traffic based on IP address and/or traffic type.
Students will configure static and dynamic NAT to route between private and public networks and cover the theory of Virtual Private Networks (VPN's)
Students will copy router configurations and IOS images to/from a TFTP Server. Privileged commands will be used to debug TCP/IP protocols to ensure proper operation of the routers. Students will also perform password recovery operations.
The course is primarily aimed at IP v4 but does give an overview of IP v6 addressing and covers migration from an IP v4 to an IP v6 network. Other protocols and technologies (VPN's / Wireless) may be demonstrated if time permits.
Course can be customised to precise requirements of customer.
Audience:
This course is suitable for anyone looking for a basic understanding of internetworking with Cisco devices and covers the CCNA syllabus.
Course is approximately 50% practical
A 4 day instructor-led practical course designed to familiarise delegates with the Cisco ASA Firewall CLI and ASDM. The course details the key commands used to configure and secure networks using the ASA Firewall with v8 of the operating system and version 6 of the ASDM.
Delegates will configure the ASA using the console port, TFTP server, telnet and SSH using local and RADIUS authentication. The device will be configured to utilise Syslog and SNMP.
ASA Firewalls will also be configured to use Access-Lists, Network Address Translation and VPN's utilising IPSec protocols. The course will cover the theory of Public/Private Keys, shared secret keys and their use in forming Site to site VPN's between ASA Firewalls using IKE and IPSec. Students will configure the units to create site to site VPN's, remote access VPN's using the Cisco Secure VPN Client and Web VPN's. The course will cover the theory of failover and delegates will configure Active/Standby failover on the ASA.
Privileged commands and protocol analyser traces will be used, where necessary, to debug protocols and ensure proper operation of the ASA Firewall. Students will also perform password recovery operations.
This course will involve interfacing the ASA with other network equipment, such as routers and switches, as would be expected in a network environment.
Audience:
Course is suitable for anyone involved in ASA firewall configuration and network security
Course is approximately 50% practical
DNS (domain name system) is the "phone book" of the internet, providing a directory of computer names and their IP addresses. BIND is the most common Linux implementation of DNS. When you open a website or send and receive an email, a DNS server somewhere is quietly addressing your message to its intended recipient.
In this instructor-led, live training, participants will learn the critical features of DNS while carrying out exercises in the setup and configuration of a BIND DNS server on Linux. The course starts with a refresher on key networking principles, then digs into hands-on practice with setup and configuration. Steadily, the discussion and practices move towards more complex topics such as security, availability, debugging and troubleshooting.
Format of the Course
Part lecture, part discussion, heavy hands-on practice and implementation, occasional quizing to measure progress
This 2 day course investigates the theory and technology associated with IPSec VPN’s.VPN’s are setup using Cisco IOS Routers and ASA Firewalls using the web interface. The workings of the protocols are examined using debug commands and protocol analyser traces of relevant negotiations.
Audience:
Suitable for network planners, engineers or anyone interested in IPSec VPNs
Course is approximately 40% practical
A 2 day theoretical course (with some practical demonstrations) covering the fundamentals of Internet Protocol v6 – including addressing, protocol formats, ICMP v6, discovery processes and IP v6 routing.
Audience:
Network Planners, Designers, and Engineers requiring an understanding of IP v6. Those requiring a comprehensive overview of IP v6 and the migration process from an IP v4 environment.
This 4 day coursework is intended for Telecom management and technology professionals who
have to maintain MetroEthernet services across the globe. The course introduces all the
prevailing standards, Troubleshooting guides, vendor options and evolving technologies in
Metro Ethernet domain.
Networking is the maintenance, management, and design for computer networks that support wireless network services. Incorporating Python into the networking environment enables the use of key libraries and modules for quick and easy automation.
This instructor-led, live training (online or onsite) is aimed at network engineers who wish to maintain, manage, and design computer networks with Python.
By the end of this training, participants will be able to:
Optimize and leverage Paramiko, Netmiko, Napalm, Telnet, and pyntc for network automation with Python.
Master multi-threading and multiprocessing in network automation.
Use GNS3 and Python for network programming.
Format of the Course
Interactive lecture and discussion.
Lots of exercises and practice.
Hands-on implementation in a live-lab environment.
Course Customization Options
To request a customized training for this course, please contact us to arrange.
Networking Fundamentals refers to the foundational concepts needed to understand networking, as well as the practical skills to implement networking in a lab environment. Linux will be used in this course as it offers the necessary tools and features for setting up the various aspects of a network.
This instructor-led, live training (online or onsite) is aimed at anyone who wish to understand and implement a network and various types of servers under Linux.
By the end of this training, participants will be able to:
Understand how networking works under Linux.
Set up a sample LAN.
Understand the various protocols used on the internet and implement each one under Linux.
Secure a network and various types of servers, such as a web server.
Format of the Course
Interactive lecture and discussion.
Lots of exercises and practice.
Hands-on implementation in a live-lab environment.
Course Customization Options
To request a customized training for this course, please contact us to arrange.
This course introduces you to how to install, operate, configure, and verify a basic Internet Protocol version 4 (IPv4), including configuring a LAN switch, configuring an IP router, connecting to a WAN, and identifying basic security threats
This course will help you:
Install, operate, configure, and verify a basic IPv4 network
Perform basic troubleshooting steps in enterprise branch office
Format of the Course
Interactive lecture and discussion.
Lots of exercises and practice.
Hands-on implementation in a live-lab environment.
Course Customization Options
To request a customized training for this course, please contact us to arrange.
SAN (Storage Area Network) is a consolidated data storage for enhancing the access to storage systems and devices. NAS (Network-Attched Storage) is a network storage device for storing and retrieving data. Together with SAN and NAS, users will be able to configure storage systems, data centers, and cloud environments for converging storage infrastructures.
This instructor-led, live training (online or onsite) is aimed at network engineers who wish to converge storage infrastructures with SAN and NAS.
By the end of this training, participants will be able to:
Perform configurations of SAN and NAS storage on a storage system.
Connect to storage systems and devices from a client.
Compare SAN and NAS solutions for centralized storage.
Format of the Course
Interactive lecture and discussion.
Lots of exercises and practice.
Hands-on implementation in a live-lab environment.
Course Customization Options
To request a customized training for this course, please contact us to arrange.
Shadowsocks is an open-source, secure socks5 proxy.
In this instructor-led, live training, participants will learn how to secure an internet connection through a Shadowsocks proxy.
By the end of this training, participants will be able to:
Install and configure Shadowsocks on any of a number of supported platforms, including Windows, Linux, Mac, Android, iOS, and OpenWrt.
Deploy Shadosocks with package manager systems, such as pip, aur, freshports and others.
Run Shadowsocks on mobile devices and wireless networks.
Understand how Shadowsocks encrypts messages and ensures integrity and authenticity.
Optimize a Shadowsocks server
Audience
Network engineers
System Administrators
Computer technicians
Format of the course
Part lecture, part discussion, exercises and heavy hands-on practice
This 4 day course involves a mixture of expository based (utilising protocol analyser traces where appropriate) and practical experiments to test and verify the operation of TCP/IP networks. The major aspects of the TCP/IP protocol stack are covered, including subnetting, supernetting and running dynamic routing protocols. TCP and UDP will be compared and contrasted, covering the end-to-end reliability and congestion avoidance capabilities of the TCP/IP stack. Some application layer protocols (HTTP, TLS, DNS, DHCP etc) will be investigated during the course. Network security in the form of TLS will be covered both from a theoretical and practical standpoint. The practical exercises are designed to augment the theory and enhance both the understanding of the underlying protocols and also the problem solving abilities of the delegates.
Audience:
Suitable for anyone looking for an understanding of TCP/IP.
Course is approximately 50% practical.
Tinc VPN is an open source peer-to-peer virtual private network (VPN) daemon that is compatible with most operating systems. Tinc VPN makes use of tunneling and encryption to build a secure private network between hosts.
In this instructor-led, live training, participants will learn the fundamentals of working with Tinc VPN.
By the end of this training, participants will be able to:
Install, configure, run, test, and troubleshoot Tinc VPN on any operating system
Deploy a Tinc Mesh VPN
Use Tinc VPN for Centralized Cloud Interconnection
Audience
Developers
Network engineers
Format of the course
Part lecture, part discussion, exercises and heavy hands-on practice
Note
To request a customized training for this course, please contact us to arrange.
Information and communication technologies (ICT) are the systems and tools that enable the creation, transmission, storage, processing, and sharing of information and data. ICT has revolutionized various aspects of our society, such as education, business, health, entertainment, and governance. ICT is constantly evolving and improving, offering new possibilities and challenges for individuals and organizations.
This instructor-led, live training (online or onsite) is aimed at beginner-level to intermediate-level IT professionals who wish to understand the basics and principles of modern information and communication technologies and their applications.
By the end of this training, participants will be able to:
Explain the main components and functions of the internet architecture and how they interact.
Describe the features and benefits of modern network solutions and implementations, such as fiber technology, clustering, and internet of things.
Understand the concepts and models of cloud computing and its services, such as infrastructure as a service and virtualization.
Identify the future trends and directions of information and communication technologies and their implications.
Format of the Course
Interactive lecture and discussion.
Lots of exercises and practice.
Hands-on implementation in a live-lab environment.
Course Customization Options
To request a customized training for this course, please contact us to arrange.
VoIP (Voice over Internet Protocol) is a technology that makes it possible for users to make voice calls over an Internet connection instead of through a regular phone line.
In this instructor-led, live training, participants will learn how to set up a VoIP system using Cisco CallManager Express.
By the end of this training, participants will be able to:
Understand fundamental VoIP concepts
Learn how to use VoIP equipment
Configure CISCO routers for VoIP
Implement VoIP and CallManager Express into their network
Configure CME features for SIP, SCCP, and soft phones
Work with advanced configuration settings and features of CME
Audience
Managers
System administrators
Software and support system developers
Technicians
Network engineers
Format of the course
Part lecture, part discussion, exercises and heavy hands-on practice
Szkolenie "Wyższe warstwy sieci" skupia się na zagadnieniach związanych z systemami transmisyjnymi, koncentrując się na strukturze i funkcjach systemów SDH, technologii xWDM, oraz integracji protokołów ATM i IP/MPLS. Uczestnicy zdobędą wiedzę na temat hierarchii SDH, struktury ramki STM-N, protekcji, restoracji, zarządzania w systemach SDH, oraz zastosowań technologii DWDM i IP/MPLS w sieciach optycznych.
SD-WAN is a software-defined approach to managing a WAN (Wide Area Network).
This instructor-led, live training (online or onsite) is aimed at engineers who wish to use Cisco SD-WAN products to set up and operate a software defined network.
By the end of this training, participants will be able to:
Install and configure a Cisco SD-WAN.
Create policies to control network traffic.
Understand and implement overlay routing.
Simplify the management of the network used for public cloud applications.
Format of the Course
Interactive lecture and discussion.
Lots of exercises and practice.
Hands-on implementation in a live-lab environment.
Course Customization Options
To request a customized training for this course, please contact us to arrange.
Szkolenie składa się z dwóch uzupełniających się części – teoretycznej i praktycznej. Pierwsza, stanowi jednodniowe wprowadzenie omawiające podstawowe założenia, filozofię, podstawową funkcjonalność i zasady działania protokołu SIP oraz sposób ich wykorzystania do realizacji usług telekomunikacyjnych ze szczególnym uwzględnieniem telefonii IP i VoIP. Druga dwudniowa część pozwala uczestnikom zapoznać się z praktycznymi problemami realizacji usług poprzez zestaw ćwiczeń laboratoryjnych dający szczegółowy wgląd w zagadnienia konfiguracji komponentów architektury telefonii SIP, analizę sygnalizacji na poziomie sekwencji wiadomości i ich budowy wewnętrznej oraz umożliwia zrozumienie typowych problemów i sposobów ich rozwiązywania z uwzględnieniem kwestii bezpieczeństwa i zabezpieczenia przed nadużyciami telekomunikacyjnymi. Prowadzący podzielą się wiedzą na temat uruchamiania, zarządzania i eksploatacji usług telefonii SIP z uwzględnieniem wirtualizacji i przetwarzania w chmurze. W części praktycznej wykorzystywane są zarówno fizyczne telefony SIP jak i aplikacje implementujące funkcjonalność klientów SIP oraz serwery aplikacyjne usług telefonii IP (Asterisk i Freeswitch). Dzięki temu, że trenerzy posiadają bogate doświadczenie techniczne i komercyjne w zakresie telefonii IP, oferujemy uczestnikom możliwość zgłaszania własnych problemów i pytań. Zostaną one uwzględnione w podsumowaniu jako uzupełniający element szkolenia wychodzący naprzeciw bieżącym potrzebom. Szkolenie jest przeznaczone dla osób posiadających podstawową wiedzę i doświadczenie w zakresie usług telekomunikacyjnych – w szczególności VoIP i sieci IP.
BeyondCorp is an open source Zero Trust security framework that allows employees to work securely from any location without the need for a traditional VPN.
In this instructor-led, live training, participants will learn hands-on how to set up a Zero Security system as they set up and deploy BeyondCorop in a live-lab environment.
By the end of this training, participants will be able to:
Assess their organization's existing security model.
Shift access controls from the perimeter to individual devices and users.
Deploy applications using a user and device-centric authentication and authorization workflow.
Understand, plan and implement a Zero Trust network within their organization.
Audience
Network engineers
Cyber security professionals
System architects
IT managers
Format of the Course
Part lecture, part discussion, exercises and heavy hands-on practice
Note
To request a customized training for this course, please contact us to arrange.
Since all applications today heavily rely on communication and networks, there is no application security without network security.
This course focuses on network security with a software security viewpoint, and discusses common network attacks and defenses on different OSI layers, with an emphasis on application layer issues, tackling topics like session management or denial of service.
As cryptography is a critical aspect of network security, the most important cryptographic algorithms in symmetric cryptography, hashing, asymmetric cryptography, and key agreement are also discussed. Instead of presenting an in-depth mathematical and theoretical background, these elements are discussed from a merely practical, engineering perspective, showing typical use-case examples and practical considerations related to the use of crypto, such as public key infrastructures. Security protocols in many areas of secure communication are introduced, with an in-depth discussion on the most widely-used protocol families such as IPSEC and SSL/TLS.
Finally, typical crypto vulnerabilities are discussed – both related to certain crypto algorithms and cryptographic protocols, such as BEAST, CRIME, TIME, BREACH, FREAK, Logjam, Padding oracle, Lucky Thirteen, POODLE and similar, as well as the RSA timing attack. In each case, the practical considerations and potential consequences are described for each problem, again, without going into deep mathematical details.
Participants attending this course will
Understand basic concepts of security, IT security and secure coding
Learn about network attacks and defenses at different OSI layers
Have a practical understanding of cryptography
Understand essential security protocols
Understand some recent attacks against cryptosystems
Get information about some recent related vulnerabilities
Get sources and further readings on secure coding practices
Profesjonalizm ze strony prowadzącego oraz jego zaangażowanie w przekazaniu wiedzy,
Tomasz - WB Electronics S.A.
Łatwość i swada w prowadzeniu szkolenia.
Jarosław - Politechnika Wrocławska
Szkolenie - SIP protocol in VoIP
Doświadczenie trenera i interakcja
Michael Angelo - Metropolitan Bank and Trust Company
Szkolenie - Cisco CCNA Syllabus in 5 Days
Przetłumaczone przez sztuczną inteligencję
Zagadnienia związane z WAN-em od strony providera oraz dzielenie sieci na podsieci i routing
Paweł - Icotera
Szkolenie - CompTIA Network+ N10-008 exam prep with Exam (accredited training course with exam)
Trener jest bardzo dobrze poinformowany i angażujący.
Elias - Armscor
Szkolenie - Cisco ASA/Pix Operation
Przetłumaczone przez sztuczną inteligencję
Wiedza prowadzącego, doświadczenie praktyczne, różnorodność tematyki i przykłady praktycznego wykorzystania nowej wiedzy.
Kamil - Komenda Główna Straży Granicznej
Szkolenie - Testy penetracyjne – wykrywanie i wykorzystywanie podatności
Trener bardzo angażujący i kompetentny
Effendy Bin Ahmad sata - SBS transit
Szkolenie - Basic Network Troubleshooting Using Wireshark
Przetłumaczone przez sztuczną inteligencję
First of all it was very interesting practically for all topics covered by this training. Well balanced with theory, practise labs and breaks. Some of tips and tricks I have introduced to my work yet.
Dawid Woźny - ATOS PGS sp. z o.o.
Szkolenie - Advanced Network Troubleshooting Using Wireshark
examples based on our data
Witold - P4 Sp. z o.o.
Szkolenie - Deep Learning for Telecom (with Python)
knowledge about HAProxy
Marco - CloudFire
Szkolenie - HAProxy Administration
Informacje teoretyczne/ogólne związane z Network Security
Milan Karpf - "MOTOROLA SOLUTIONS SYSTEMS POLSKA" SPÓŁKA Z OGRANICZONĄ ODPOWIEDZIALNOŚCIĄ
Szkolenie - Network Security Administrator
Wiedza trenera, odpowiadał na wszystkie pytania, czasem dość trudne i techniczne. Brawo.
Andrzej Morawski - Polska Spółka Gazownictwa sp. z o.o.
Szkolenie - Network Troubleshooting with Wireshark
It gave me a clear and in depth understanding of NAS and SAN storage
Joubert Choshi - Netcampus
Szkolenie - SAN and NAS Storage
communication, knowledge from experience, solve problems,
Marcin Walewski - Intel Technology Poland Sp. z o.o.
Szkolenie - OpenStack Bootcamp
good knowledge of technical issues, very detailed explanation of topics
Marcin Brzozowski - Asseco Business Solutions S.A.
Szkolenie - Deploying a Cisco SD-WAN
Trainer knows very well the subject. He try to give a lot of examples in order that we understand "how" it is working.
He answer to all questions raised. Very available.
christel salve - BICS
Szkolenie - Blockchain for Telecom
Ćwiczenia praktyczne.
Adam Borowski - NetWorkS! Sp. z o.o.
Szkolenie - AI Awareness for Telecom
The varied topics
Daniel Lindh - Tele 2 Sverige AB
Szkolenie - OpenStack for Telecom
The virtual desktop in a browser feature was kind of neat.
Mikael Karlsson - Polystar OSIX
Szkolenie - OpenStack Architecture and Troubleshooting
Sposób przekazywania wiedzy
Adam Drabek - Gmina Miejska Kraków
Szkolenie - Network Security
His huge amount of knowledge.
Mirela Ochia - Deutsche Telekom Pan-Net Romania S.R.L.