Szkolenia TCP/IP Networking

Szkolenia TCP/IP Networking

TCP/IP Networking courses

Opinie uczestników

SIP protocol in VoIP

Handson and setup were nicely done and practical knowledge thoroughly imparted. Trainer was really helpful throughout.

B Kishore - Bharat Electronics Limited (BEL)

Podkategorie

Plany Szkoleń TCP/IP Networking

Kod Nazwa Czas trwania Charakterystyka kursu
waaacdwtacacs One Day Workshop for AAA of Cisco Devices using a Windows-based TACACS+ Server 7 godz. Suitable for network planners, engineers or anyone interested in TACACS+ operation with Cisco IOS devices. Course is almost entirely practical if one day.  If extended to 2 days due to lack of pre-reqs it will be around 50% practical. Objectives: Review the operation of TACACS+ AAA process. Configure Cisco IOS devices to use TACACS+ for access to the management software. Configure Windows users/groups to authorise the TACACS+ requests. Configure TACACS+ server files for proper operation. Test successful operation of TACACS+. Equipment used in Practical Sessions: Cisco routers and/or switches running v12 of IOS. Windows 2008 R2 server running TACACS.net software.
Munin Monitoring your resources with Munin 7 godz. Munin is an open-source monitoring tool that helps system administrators monitor resources such as servers, workstations, networks, SANs, applications, network devices, etc. It shows resource trends and provides insights to into questions such as "what just happened to kill our performance?" It includes visualization tools and is available on various flavors of Linux and FreeBSD. Audience System administrators Network administrators Network engineers IT managers IT administrators Format of the course Heavy emphasis on hands-on practice. Most of the concepts are learned through samples, exercises and hands-on development. Introduction Master-node architecture Installation Requirements Master and node setup Monitoring with Munin Visualizing resources and trends Graphing system Data logging Integration with Nagios Monitoring Windows nodes Working with Plugins Working with the API Troubleshooting Munin Closing remarks  
ipv6und Understanding IPv6 14 godz. A 2 day theoretical course (with some practical demonstrations) covering the fundamentals of Internet Protocol v6 – including addressing, protocol formats, ICMP v6, discovery processes and IP v6 routing. Audience: Network Planners, Designers, and Engineers requiring an understanding of IP v6. Those requiring a comprehensive overview of IP v6 and the migration process from an IP v4 environment. Objectives: Explain the benefits of migrating from IP v4 to IP v6 Describe and explain the IP v6 fixed header format Describe and explain the IP v6 optional header formats Describe and explain global IP v6 unicast addresses and aggregation Describe and explain link-local IP v6 unicast addresses Describe and explain multicast IP v6 addresses Describe and explain anycast IP v6 addresses Describe and explain IP v6 special addresses Describe IP v4 to IP v6 compatibility and mapped addresses Describe and explain ICMP v6 messages Describe and explain path MTU discovery Describe and explain neighbour discovery process Describe and explain router discovery process Describe and explain multicast listener discovery process Describe and explain stateful and stateless auto-configuration Describe and explain IP v6 and DNS Describe IP v6 routing protocols – RIP, OSPF, ISIS and BGP v4 Describe IP v4 to IP v6 migration strategies. Practical Demonstrations: Demonstrate IP v6 addressing and local link communication. Demonstrate IP v6 routing processes.
varnish Varnish: Speeding up your website with HTTP reverse proxy caching 7 godz. Varnish is a reverse proxy for content-heavy dynamic web sites. Unlike Squid, which was originally a client-side cache, or Apache and nginx, which are web servers, Varnish was designed as an HTTP accelerator. Varnish is focused exclusively on HTTP, unlike other proxy servers that support FTP, SMTP and other network protocols. Varnish is used by Wikipedia, The New York Times, Facebook and Twitter, among other high-profile websites. In this course, participants will learn about Varnish's features and caching approach while practicing in the setup and configuration of a Varnish proxy on Linux. The course starts with a refresher on key networking principles, then digs into setup and configuration topics and moves steadily towards complex implementations. By the end of the training participants will understand when and where it makes sense to deploy Varnish and will have the necessary practice to deploy their own Varnish proxy solutions. Audience     Network technicians     Network designers     System administrators Format of the course     Part lecture, part discussion, heavy hands-on practice and implementation, occasional quizing to measure progress Introduction     Varnish vs Nginx vs other solutions Overview of caching and proxy servers Installing and configuring Varnish Using the Varnish Administration Console (VAC) Handling HTTP connections with Varnish Working with the Varnish Configuration Language (VCL) Invalidating the Varnish cache Understanding the lifetime of cached objects Dealing with Backends Optimizing connections Logging, measuring and debugging Varnish Integrating Varnish with other infrastructure and services Closing remarks
ipsecvpn Understanding IPSec VPNs 14 godz. This 2 day course investigates the theory and technology associated with IPSec VPN’s.VPN’s are setup using Cisco IOS Routers and ASA Firewalls using the web interface. The workings of the protocols are examined using debug commands and protocol analyser traces of relevant negotiations. Audience: Suitable for network planners, engineers or anyone interested in IPSec VPNs Course is approximately 40% practical Objectives: Review TCP/IP and the fields in the IP Header. Describe the fields and headers in the ISAKMP Protocol. Describe Main Mode negotiation to set up Phase 1 of a VPN Describe Aggressive Mode negotiation to set up Phase 1 of a VPN. Describe Quick Mode negotiation to set up Phase 2 of a VPN. Compare IKEv1 and IKEv2 protocols. Describe Symmetric and Public/Private Key encryption. Describe ISAKMP Security Associations. Describe IPSec Security Associations. Describe IPSec AH Protocol. Describe IPSec ESP Protocol. Describe and Explain Diffie-Hellman Key Exchange. Describe prime and primitive root of a prime number. Describe, explain and configure site to site VPN’s using Cisco Routers and/or ASA Firewalls. Describe Remote Access VPN’s using ADSL and Dial-up. Use debug commands in Cisco CLI and wireshark to demonstrate and troubleshoot VPN negotiation. Practical Exercises: Lab Exercise 1: IPSec using manual, symmetric encryption keys. Lab Exercise 2: IPSec using IKEv1/v2 and shared secret
dnsandbind DNS and BIND: Setting up, managing, and securing your DNS server 14 godz. DNS (domain name system) is the "phone book" of the internet, providing a directory of computer names and their IP addresses. BIND is the most common Linux implementation of DNS. When you open a website or send and receive an email, a DNS server somewhere is quietly addressing your message to its intended recipient. In this training, participants will learn the critical features of DNS while carrying out exercises in the setup and configuration of a BIND DNS server on Linux. The course starts with a refresher on key networking principles, then digs into hands-on practice with setup and configuration. Steadily, the discussion and practices move towards more complex topics such as security, availability, debugging and troubleshooting. Audience     Network technicians     Network designers     System administrators Format of the course     Part lecture, part discussion, heavy hands-on practice and implementation, occasional quizing to measure progress Introduction How DNS works Different types of name servers Installing BIND Configuring BIND Creating Zones DNS server and email Configuring your hosts Maintaining BIND Adding name servers Parents and sub-domains Securing your name server Stealth configurations Load balancing and failover Deploying IPv6 Supporting international domain names DNS and DHCP Dynamic DNS Interoperability and upgrading Debugging your name server Troubleshooting tools and techniques Closing remarks
siptel Practical SIP Telephony 21 godz. A 3 day practical course covering the messages and call flows of the Session Initiation Protocol (SIP) and its use in voice networks. This course is a mixture of theory and practice (utilising protocol analyser traces where appropriate for explanation and troubleshooting) with practical VoIP configured using IP telephones, softphones, voice capable Cisco routers and SIP IP PBX,s (e.g. Trixbox). Audience: Network Planners, Designers, and Engineers requiring an understanding of SIP. The course is around 40% practical. Objectives: Describe call signalling and setup in the voice network Describe carrying of voice media and bandwidth requirements for VoIP calls Describe SIP standards, services, messages and return codes Describe basic call setup using SIP Describe SIP flows and SDP Describe registration process and making calls with a SIP Server Describe IP PBX and Call Conferences Describe SRV records and DNS Describe uri/url/urn, ENUM and NAPTR Records Describe mapping of services to an address Describe SIP-T and SIP-I Describe SIP early media and SIP trunks Describe call flows between PSTN and IP using SIP Describe Secure SIP, Secure RTP and Secure RTCP Describe typical Secure SIP implementations Practical Exercises: Lab Exercise 1: Practical SIP in the LAN with Xlite Lab Exercise 2: Examine SIP Packets using Wireshark Lab Exercise 3: SDP, Presence and IM Lab Exercise 4: Call Flows with SIP Server Lab Exercise 5a: SIP Registration with DNS Lab Exercise 5b: Call Flows with DNS Lab Exercise 6: SIP Trunks Lab Exercise 7: Security with IPSec Lab Exercise 8: Security with Secure SIP
muipv4 Understanding Multicast using IPv4 21 godz. Transport of baseband audio and video streams across IP networks using multicast signalling protocols is becoming increasingly used in broadcast networks. This 3 day course/workshop covers the theory and practice of implementing these protocols within IP and Ethernet networks. The practical element of the course will use Cisco L3 switches and the multicast streamers and receivers will use the cross -platform VLC application. It is not necessary to have any expertise in the Cisco command line as the configuration of the devices can be instructor-led if required. However the course is intended to have at least 50% practical content and can be customised or even lengthened (to examine the protocols in more detail) if run as a single company event. Assignment and use of the Class D Multicast IP address space. Mapping multicast MAC addresses (L2) to multicast IP addressses (L3). An overview of the Real time Transport Protocol (RTP). Comparison between the 3 versions of the Internet Group Management Protocol (IGMP) and their use in requesting RTP streams within VLANs. IGMP snooping on a L2 network. IGMP queriers and querier resilience. The use of multicast routing using Protocol Independent Multicast (PIM) on an inter-VLAN and/or L3 routed network. The difference between PIM operated in Dense Mode PIM-DM and in Sparse Mode (SM). Registration of multicast streams with a Rendezvous Point (RP). Important timers used in IGMP and PIM protocols. Gateway resilience using Virtual Router Redundancy Protocol (VRRP) and mapping resilient multicast forwarding at L3 and L2 using the Rapid Spanning Tree Protocol (RSTP). Important timers and parameters in VRRP and RSTP. Operation and use of the multicast routing table to forward IP packets using a multicast destination IP address. The differences between Any Source Multicast (ASM) and Source Specific Multicast (SSM). Forwarding of multicast streams using shortest  path and shared trees. Use of Reverse Path Forwarding for loop avoidance in multicast forwarding. An overview of the Session Announcement Protocol (SAP) and it's use in describing and announcing RTP multicast streams that can be requested using IGMP. Practical: Wireshark will be used to analyse the multicast signalling (IGMP and SAP) and also the multicast media delivery (RTP). Lab 1.  Multicast Forwarding at L2 and IGMP Snooping. Lab 2.  Multicast Forwarding at L3 across VLANs using IGMP and PIM. Lab 3.  Announcement of multicast streams in L2/L3 networks using SAP and the mini-SAP Server. Lab 4.  Load balancing and failover of multicast streams carried in separate VLANs across a resilient Layer 2 network consisting of leaf (access) switches and 2 redundant spine (core) switches. Lab 5:  Multicast forwarding across VLAN boundaries in resilient Layer 3 networks consisting of leaf (access) switches and 2 redundant spine (core) switches. Lab 6.  Multicast forwarding over a routed L3 network using PIM-SM.
tcpipprac Practical TCP/IP 28 godz. This 4 day course involves a mixture of expository based (utilising protocol analyser traces where appropriate) and practical experiments to test and verify the operation of TCP/IP networks. The major aspects of the TCP/IP protocol stack are covered, including subnetting, supernetting and running dynamic routing protocols. TCP and UDP will be compared and contrasted, covering the end-to-end reliability and congestion avoidance capabilities of the TCP/IP stack. Some application layer protocols (HTTP, TLS, DNS, DHCP etc) will be investigated during the course. Network security in the form of TLS will be covered both from a theoretical and practical standpoint. The practical exercises are designed to augment the theory and enhance both the understanding of the underlying protocols and also the problem solving abilities of the delegates. Audience: Suitable for anyone looking for an understanding of TCP/IP. Course is approximately 50% practical. Objectives: Describe encapsulation, de-encapsulation and modularity within the TCP/IP protocol stack. Describe, identify and explain the fields and flags within the IP header. Describe, identify and explain IP address classes A, B and C. Use subnet mask to identify network portion of IP address. Describe differences between classful and classless IP addressing. Describe the operation of an IP router and the use of static and dynamic routing. Describe and compare distance vector (RIP) and link-state (OSPF) routing protocols. Describe and explain IP subnetworking. Describe and explain supernetting, VLSM and CIDR. Describe ICMP and use ping and traceroute as a network connectivity tool. Describe use of DHCP in dynamic IP addressing. Describe and use ARP to relate IP address to MAC address. Describe and explain the use of DNS in TCP/IP networks. Describe, identify and explain the fields and flags in the TCP and UDP headers. Describe and explain how TCP gives end to end reliability in an unreliable IP network. Describe and explain the operation of congestion avoidance in TCP/IP networks. Describe and explain Transport Layer Security (TLS). Practical Exercises: Lab Exercise 1: Connectivity and Testing. Lab Exercise 2: DHCP and DNS. Lab Exercise 3: Checking ARP cache. Lab Exercise 4: Fragmentation. Lab Exercise 5: Traceroute. Lab Exercise 6: Routing. Lab Exercise 7: Subnetting. Lab Exercise 8: TCP Options. Lab Exercise 9: TLS.
plcladder Programowanie PLC Ladder 14 godz. Szkolenie przeznaczone dla inżynierów oraz pasjonatów którzy chcą stworzyć własny inteligentny dom PLC Basics and overview of applications with PLC Overview of PLC programming languages (Ladder, SFC, C) Simple Ladder programming Coils, Inputs, Outputs Working with memory Logical functions Advanced functionality Sample programming - exercises PLC and Networking
wpeapawscw One Day Workshop for PEAP Authentication of Windows 7 Supplicant using a Cisco Switch as Authenticator and Windows 2008 R2 Server 7 godz. This one day workshop covers the configuration and operation of the IEEE802.1x protocol in the authentication and authorisation of a wired Windows 7 supplicant. The authenticator is a Cisco Switch and the server is Windows NPS running on Windows 2008 R2 server, operating as a Certification Authority (CA). The EAP protocol is Protected EAP (PEAP) and a successful request will be allocated a VLAN on the switch via RADIUS attributes received from the server following successful authentication. The procedure for a wired supplicant is almost identical to that of a wireless supplicant. Audience: Suitable for network planners, engineers or anyone interested in operation of PEAP with Cisco IOS Devices and NPS. Objectives Review the operation of IEEE802.1x process. Configure Cisco Switch to use IEEE802.1x and RADIUS. Configure Cisco Switch to authorise VLAN assignment via RADIUS attributes from server. Configure Windows 7 supplicant for dot1x authentication and install certificate from CA as a trusted computer certificate. Configure connection request and network policies on NPS to authenticate and to pass VLAN assignment to switch. Configure Windows users/groups on Windows 2008 R2 server to enable NPS authentication. Configure Windows 2008 R2 server as a DHCP server. Configure ip helper addresses and inter-VLAN routing on Cisco L3 switch. Test successful PEAP authentication and PING PCs in different VLANs. Equipment used in Practical Sessions: Cisco L2 and L3 switches running v12 of IOS. Windows 2008 R2 server running Network Policy Server (NPS).
wciosd One Day Workshop for Cisco IOS Devices Implementing IPSec using Certificate Authentication via a Windows 2008 R2 CA 7 godz. This one day workshop covers the configuration and operation of negotiating IKE/IPSec Security Association (SA) between Cisco IOS devices.  The devices will authenticate using certificates provided through enrollment with a Windows 2008 R2 Certification Authority. The Windows 2008 R2 server will run the Simple Certificate Enrollment Process (SCEP) using the Network Device Enrollment Service (NDES). Audience: Suitable for network planners, engineers or anyone interested in operation of Cisco IOS devices running IPSec using certificate authentication. Objectives: Review the operation of IPSec SA negotiation. Configure Cisco Router/ASA to authenticate and enroll with a Windows 2008 R2 CA. Configure Windows 2008 R2 Server to perform network device enrollment using NDES. Test successful operation of IPSec with certificate authentication. Equipment used in Practical Sessions: Cisco IOS devices running v12 of IOS and Windows 2008 R2 server acting as an enterprise CA and running NDES and certificate enrollment.
waaacdwnpsr One Day Workshop for AAA of Cisco Devices using Windows 2008 NPS RADIUS 7 godz. This one day workshop covers the configuration and operation of the RADIUS protocol in the authentication, authorisation and accounting of accessing the management software of Cisco IOS devices. The RADIUS server is Network Policy Server (NPS) in Windows 2008 R2. Audience: Suitable for network planners, engineers or anyone interested in RADIUS operation with Cisco IOS Devices and NPS. Workshop is almost all practical. If extended to 2 days it will be approximately 50% practical. Objectives: Review the operation of RADIUS AAA process. Configure Cisco IOS devices to use RADIUS for access to the management software. Configure connection request and network policies on NPS. Configure Windows users/groups to authorise the RADIUS requests. Test successful operation of RADIUS using NPS. Equipment used in Practical Sessions: Cisco routers and/or switches running v12 of IOS. Windows 2008 R2 server running Network Policy Server (NPS).
casapixo Cisco ASA/Pix Operation 28 godz. A 4 day instructor-led practical course designed to familiarise delegates with the Cisco ASA Firewall CLI and ASDM. The course details the key commands used to configure and secure networks using the ASA Firewall with v8 of the operating system and version 6 of the ASDM. Delegates will configure the ASA using the console port, TFTP server, telnet and SSH using local and RADIUS authentication. The device will be configured to utilise Syslog and SNMP. ASA Firewalls will also be configured to use Access-Lists, Network Address Translation and VPN's utilising IPSec protocols. The course will cover the theory of Public/Private Keys, shared secret keys and their use in forming Site to site VPN's between ASA Firewalls using IKE and IPSec. Students will configure the units to create site to site VPN's, remote access VPN's using the Cisco Secure VPN Client and Web VPN's. The course will cover the theory of failover and delegates will configure Active/Standby failover on the ASA. Privileged commands and protocol analyser traces will be used, where necessary, to debug protocols and ensure proper operation of the ASA Firewall. Students will also perform password recovery operations. This course will involve interfacing the ASA with other network equipment, such as routers and switches, as would be expected in a network environment. Audience: Course is suitable for anyone involved in ASA firewall configuration and network security Course is approximately 50% practical Objectives: At the end of this course the student will be able to configure ASA Firewalls to: Allow configuration via console port, telnet and SSH Copy configurations and upgrade OS image. Authenticate users using RADIUS and local authentication. Act as a DHCP Server, Client and Relay. Operate as a Routed or Transparent Firewall. Operate in Failover mode. Support VLANs. Run routing protocols (OSPF and RIP) and exchange routing information with Cisco routers. Support Access Control Lists and content filtering. Support Object Grouping. Establish Internet connections using NAT and PAT. Setup site to site VPN's using IKE and IPSec. Setup Remote Access VPN's using Cisco secure VPN client. Setup Web VPN's Log access-list activity using a syslog server. Send traps to an SNMP Server. Password recovery Practical Exercises Lab Exercise 1: Basic Configuration of Cisco ASA. Lab Exercise 2: Configure support for VLANs on ASA. Lab Exercise 3: Connectivity via Telnet and Local/RADIUS authentication. Lab Exercise 4: Configure Static and Dynamic routing on ASA. Lab Exercise 5: Filter traffic using Access Control Lists. Lab Exercise 6: Configure NAT on ASA. Lab Exercise 7: Configure VPN's on ASA. Lab Exercise 8: Configure Active/Standby Failover on ASA/Pix. Lab Exercise 9: Password Recovery on Cisco ASA. Equipment Used in Practical Exercises: 4 Cisco ASA 5505 Firewalls running v8 of the CLI and capable of Active/Standby Failover. Pix 515E firewalls running v8 of the CLI, Cisco routers, switches and hubs as required.
pradtacacs Practical RADIUS and TACACS+ 14 godz. A 2 day practical course that covers the theory of RADIUS and TACACS+ protocols. Network Policy Server (NPS) on Windows 2008 Server will be used to implement Connection Request and Network Policies to allow users access to network resources. A windows based TACACS+ server will be used to investigate the operation of this protocol to provide authentication, authorisation and accounting for users accessing network resources. There is an option for an additional one day workshop to configure and test IEEE802.1x authentication using Windows 7 client as the supplicant, a Cisco switch as the authenticator and an NPS server to provide the authentication.  Delegates will configure the Cisco switch and NPS server to use the Extensible Authentication Protocol (EAP). Audience: Network Planners, Designers, and Engineers requiring an understanding of RADIUS and TACACS+ operation Course is approximately 40% practical. Objectives: Describe and explain RADIUS protocol. Describe and explain RADIUS messages and attributes. Describe and explain the differences between clients and users. Describe and explain the TACACS+ protocol. Compare the operation of RADIUS and TACACS+ protocols. Describe and explain operation of Network Policy Server (NPS) in Windows Server 2008. Describe and explain Connectiion Request and Network Policies. Use Windows Server 2008 logs to troubleshoot RADIUS operation. Use NTRADping test utility to test RADIUS operation. Describe and explain TACACS+ message format and operation. Configure Cisco switch/router as a RADIUS client and test operation. Explain and configure standard and vendor specific attributes on NPS Server. Configure Cisco switch/router as a TACACS+ client and test operation. Describe configure and test RADIUS and TACACS+ accounting. Describe and explain RADIUS Proxy operation. Configure and test RADIUS proxy and load balancing using NPS. Practical Exercises: Lab Exercise 1: Configure and test RADIUS. Lab Exercise 2: RADIUS Authentication/Authorisation. Lab Exercise 3: TACACS+ Authentication/Authorisation. Lab Exercise 4: RADIUS Accounting. Lab Exercise 5: TACACS+ Accounting. Lab Exercise 6: Proxy RADIUS Lab Exercise 7:Load Sharing RADIUS Requests
vvoip Practical Voice and Video over IP 21 godz. A 3 day practical course covering the fundamentals of the various voice protocols used to carry voice (and video) over a packet switched network. This course is a mixture of theory and practice (utilising Wireshark where appropriate for explanation and troubleshooting) with practical VoIP configured using IP telephones, softphones and voice capable Cisco routers. This is primarily a ‘generic’ VoIP course – but uses Cisco equipment to provide an IP backbone and voice gateways. We can also provide Cisco specific voice training courses. The course also covers call setup between circuit switched and packet switched networks. The course is approximately 40% practical. Objectives: Explain the operation of circuit switched networks. Contrast the differences between circuit switched and packet switched networks. Explain the fields and flags within the IP header – including the new DSCP field. Explain and quantify the need for voice compression and delay in an IP network. Identify the CODEC’s used in voice and video compression – e.g. G711, G729 and H261/3/4. Identify and explain the fields of the Real Time Transport Protocol and Real Time Control Protocol – including carrying DTMF tones. Calculate bandwidth requirements for various voice compression algorithms. Explain and demonstrate the need for security and encryption within VoIP. Describe and explain the H.323 protocol stack. Describe and explain call setup and signalling (H.225). Describe and explain H.245, fast start and tunnelling of H245. Describe and explain SIP call setup. Describe and explain SIP Servers. Describe and explain SDP. Describe and explain Soft Switching – including MGCP and H248. Describe and explain the use of SCTP in backhauling signalling messages. Describe and explain the importance of network delay and the need for QoS in the network. Describe and explain the differences between reservation and prioritisation QoS in an IP Network. Describe the use of IntServ and RSVP in QoS. Describe the use of TOS and DiffServ in QoS. Describe and explain the need for multiple queues and intelligent scheduling of packets at router/switch interfaces. Describe the use of MPLS to deliver QoS in the WAN environment. Describe the use of VLAN’s to deliver QoS in the LAN environment. Practical Exercises: Lab Exercise 1: Practical VoIP in the LAN. Lab Exercise 2: Build IP network, make calls and examine RTP packets using Wireshark. Lab Exercise 3: Make calls and examine SIP Packets using Wireshark. Lab Exercise 4: Make calls and examine H323 Packets using Wireshark. Lab Exercise 5: Calls between PSTN and IP Networks. Lab Exercise 6: Configure QoS and make calls to examine effects. Lab Exercise 7: Security and VoIP. Equipment used in Practical Sessions: Cisco 2600 series and 2800 series voice capable routers and Cisco ASA 5505 Firewalls. IP Telephones, softphones and analogue telephones as required. SIP client and server software as required.
67525 Cisco Unified Wireless Network (CUWN) 35 godz. Overview This course enables a network administrator to deploy a wireless LAN (WLAN) enterprise solution through the identification and successful implementation of site-appropriate hardware and software features in a Cisco Unified Wireless Network. Audience Anyone involved in the deployment of a wireless LAN solution. After you complete this course you will be able to: Identify how the Cisco Unified Wireless Network solution meets the challenges of successful WLAN deployments Select and properly install the Cisco Unified Wireless Network hardware appropriate to site and use requirements Administer the WLAN, 802.11 security policies, and QoS appropriately to protect and optimize performance on the wireless network Configure and implement the key Cisco Unified Wireless Network security features to mitigate WLAN security threats Utilize a recommended troubleshooting methodology and the various tools available to gather and assess system data to isolate equipment failures and security threats Cisco WLAN Solutions Characterizing Cisco Enterprise WLANs Identifying Hardware Models Describing WLC Terms and Protocols Cisco Unified Wireless Network Installation and Configuration Installing Hardware Components Configuring the Cisco WLC Setup Configuring Cisco WLC Settings Configuring LAG Configuring IPv6 Describing AP Operational Modes Configuring 802.11 Protocols, Performance Optimization, and Auto RF Implementing Cisco CleanAir Cisco Unified Wireless Network Administration Associating an AP to a WLC Configuring Mobility Groups and Roaming Administering Individual WLANs and AP Groups Configuring QoS Performing General Administration Service Provider Enhancements Cisco Unified Wireless Network Security Describing 802.11 Weak Security Policy Configuring Security Parameters Configuring a Cisco Unified Wireless Network to Support 802.1X Authentication Cisco Unified Wireless Network Maintenance and Troubleshooting Troubleshooting Cisco Unified Wireless Network Gathering VLAN Traffic and Other Data Configuring Policies and Management Loading Device Code and Managing Configuration Data Labs Lab 2-1: CLI Setup and Web Setup Lab 2-2: Controller Web Interface Lab 3-1: AP Association Options, Configurations, and Cisco CleanAir Lab 3-2: Interface Group Configuration Lab 3-3: VideoStream Lab 4-1: Web Authentication Lab 4-2: WPA or WPA2 PEAP-MS-CHAPv2 Authentication Lab 4-3: WPA or WPA2 EAP-FAST Local EAP Authentication Lab 5-1: Pre-Image Download
3712 Cisco CCNA Syllabus in 5 Days 35 godz. A 5 day practical networking course designed to familiarise students with Cisco IOS (version 12). The course details the key commands used to configure and secure Cisco routers and switches, and covers the CCNA syllabus - including wired and wireless LAN access. Students will inter-connect networks by implementing static routes, distance-vector and link-state based dynamic routing protocols. The devices will be configured to route traffic across LAN/VLAN//WAN boundaries, by encapsulating datagrams across serial data links using various WAN protocols, such as HDLC, Frame Relay, ISDN and PPP (with CHAP authentication). VLAN encapsulation/tagging will be via IEEE802.1Q/P. Standard and Extended Access Control Lists will be configured and applied to router interfaces to filter traffic based on IP address and/or traffic type. Students will configure static and dynamic NAT to route between private and public networks and cover the theory of Virtual Private Networks (VPN's) Students will copy router configurations and IOS images to/from a TFTP Server. Privileged commands will be used to debug TCP/IP protocols to ensure proper operation of the routers. Students will also perform password recovery operations. The course is primarily aimed at IP v4 but does give an overview of IP v6 addressing and covers migration from an IP v4 to an IP v6 network. Other protocols and technologies (VPN's / Wireless) may be demonstrated if time permits. Course can be customised to precise requirements of customer. Audience: This course is suitable for anyone looking for a basic understanding of internetworking with Cisco devices and covers the CCNA syllabus. Course is approximately 50% practical Objectives: At the end of this course the student will be able to configure Cisco routers to: Inter-connect networks using static routes Inter-connect networks using RIP, OSPF and EIGRP. Route between VLAN's. Encapsulate datagrams using PPP Apply Standard and Extended Access Control Lists Encapsulate datagrams using HDLC Encapsulate datagrams using Frame Relay Configure Frame Relay Switching. Support ISDN dial backup. Route between public and private networks using NAT. At the end of this course the student will be able to configure Cisco switches to: Run Spanning Tree Protocol. Support VLANs. Connect switches via VLAN Trunks. Practical Exercises: Lab Exercise 1: Connectivity and Testing Lab Exercise 2: Checking ARP Cache Lab Exercise 3: Traceroute Lab Exercise 4: Telnet into a Router Lab Exercise 5: Configuring routers using TFTP Lab Exercise 6: Configuration and Connectivity using RIP Lab Exercise 7: Network Failure Lab Exercise 8: Running other Routing Protocols Lab Exercise 9: Spanning Tree Protocol Lab Exercise 10: VLAN Exercise Lab Exercise 11: Inter-VLAN Routing. Lab Exercise 12: Classful & Classless Routing - Subnetting at Byte Boundaries Lab Exercise 13: Access Lists Lab Exercise 14: PPP Encapsulation Lab Exercise 15: Frame Relay Encapsulation and ISDN dial backup. Lab Exercise 16: Static and Dynamic NAT Configuration.
411 Information Safety and Network Security 7 godz. Organisation-wide policies device policy user access control user credential management regular review and logwatch Computer system rules vulnerability self-scan tighten up firewall DMZ design and deployment port knocking protection classify client-side users/devides collaboration models for multiple sysadmins mobile devices / storage media certificates, encryption keys, passwords, passphrases data integrity and verification auto-detecting of intrusions alert and alarm log tracking and accountability
sipvoip Protokół SIP w VoIP 21 godz. Szkolenie składa się z dwóch uzupełniających się części – teoretycznej i praktycznej. Pierwsza, stanowi jednodniowe wprowadzenie omawiające podstawowe założenia, filozofię, podstawową funkcjonalność i zasady działania protokołu SIP oraz sposób ich wykorzystania do realizacji usług telekomunikacyjnych ze szczególnym uwzględnieniem telefonii IP i VoIP. Druga dwudniowa część pozwala uczestnikom zapoznać się z praktycznymi problemami realizacji usług poprzez zestaw ćwiczeń laboratoryjnych dający szczegółowy wgląd w zagadnienia konfiguracji komponentów architektury telefonii SIP, analizę sygnalizacji na poziomie sekwencji wiadomości i ich budowy wewnętrznej oraz umożliwia zrozumienie typowych problemów i sposobów ich rozwiązywania z uwzględnieniem kwestii bezpieczeństwa i zabezpieczenia przed nadużyciami telekomunikacyjnymi. Prowadzący podzielą się wiedzą na temat uruchamiania, zarządzania i eksploatacji usług telefonii SIP z uwzględnieniem wirtualizacji i przetwarzania w chmurze. W części praktycznej wykorzystywane są zarówno fizyczne telefony SIP jak i aplikacje implementujące funkcjonalność klientów SIP oraz serwery aplikacyjne usług telefonii IP (Asterisk i Freeswitch). Dzięki temu, że trenerzy posiadają bogate doświadczenie techniczne i komercyjne w zakresie telefonii IP, oferujemy uczestnikom możliwość zgłaszania własnych problemów i pytań. Zostaną one uwzględnione w podsumowaniu jako uzupełniający element szkolenia wychodzący naprzeciw bieżącym potrzebom. Szkolenie jest przeznaczone dla osób posiadających podstawową wiedzę i doświadczenie w zakresie usług telekomunikacyjnych – w szczególności VoIP i sieci IP. Część I: Wprowadzenie Wprowadzenie Historia i główne przesłanki Rodzaje i ewolucja VoIP Główne założenia SIP Normalizacja SIP (RFC 3261 i inne ważne normy) Architektura i jej główne składniki UA – agent użytkownika Predefiniowane serwery: Registrar, Location, Proxy i Redirect Serwery aplikacyjne Identyfikacja i adresacja Trapez SIP Serwery i ich działanie Rejestracja Działanie serwera SIP w trybach Proxy i Redirect Serwery Proxy bezstanowe i stanowe Działanie serwera lokalizacyjnego Rekordy SRV i DNS uri/url/urn, ENUM i rekordy NAPTR Wiadomości sygnalizacyjne SIP (z uwzględnieniem rozszerzeń dla Instant Messaging i Presence - IMP) Struktura wiadomości Żądania Odpowiedzi Przykład ustanowienia sesji Nagłówki i parametry żądań Modele IMP SDP (Session Description Protocol) Opis mediów Standardowa lista typów kodeków Zasady negocjacji sesji Realizacja połączeń – sekwencje wiadomości sygnalizacyjnych Sesja komunikacyjna SIP – główny przykład z RFC 3261 Przykładowe scenariusze połączeń -  realizacja usług podstawowych i dodatkowych Połączenia konferencyjne i IP PBX Modyfikacja mediów w czasie trwania sesji Wykorzystanie obecności i wymiany wiadomości natychmiastowych Zasady kierowania żądań i odpowiedzi Nagłówek VIA Nagłówki ROUTE i RECORD-ROUTE Współpraca SIP-PSTN SIP-I i SIP-T Wczesne media w SIP i łącza tranzytowe SIP (SIP trunking) Współpraca sygnalizacyjna SIP-PSTN SIP – problem bezpieczeństwa  Secure SIP, Secure RTP i Secure RTCP Typowe implementacje Secure SIP Problemy praktyczne i perspektywy Przejście przez NAT i firewall QoS SIP i SDP w architekturze 3GPP IMS Podsumowanie i dyskusja Część II: Część praktyczna SIP w środowisku LAN: XLite SIP UA + Asterisk Utworzenie kont w centralach Asterisk z prostym planem numeracji Konfiguracja XLite SIP UA (dtmf, codecs, nat, rtp, timer, register) oraz telefonów fizycznych SIP (Polycom, Gigaset, Yealink, Linphone) Rejestracja a wykonywanie połączeń i odbieranie połączeń Konfiguracja i realizacja połączeń w trybie P2P za pomocą Linphone Analiza sygnalizacji SIP za pomocą aplikacji Wireshark Konfiguracja serwera Nagrywanie sygnalizacji SIP i strumieni medialnych RTP Analiza przechwyconych pakietów SIP. Wyszukiwanie konkretnej rozmowy omówienie problemów z dźwiękiem, jitterbuffer, wyszukiwanie DTMF (rfc2833,INFO), najczęstsze problemy z kodekami i DTMF (transkodowanie, uszkodzenia kodeka GSM, duplikacja tonów DTMF) VoIP monitor SDP, Instant Messaging and Presence (IM&P) Parametry i atrybuty opisów SDP Wiadomości sygnalizacyjne SIP: SUBSCRIBE, PUBLISH i MESSAGE Testy IM&P z XLite i Linphone Procedury sygnalizacyjne SIP dla połączeń Rejestracja SIP z wykorzystaniem DNS Rekord SIP SRV Rejestracja telefonu SIP z wykorzystaniem DNS-SRV Procedury sygnalizacyjne SIP dla połączeń wykorzystujące DNS Analiza sygnalizacji SIP w trakcie połączenia za pomocą aplikacji Wireshark Rozwiązywanie problemów – timeout DNS, opóźnienia SIP trunking (wykorzystanie protokołu SIP do tranzytowania ruchu) Realizacja testowego łącza tranzytowego SIP Rozwiązywanie problemów (DOS, DDOS, fraud, cps) SIP - problemy bezpieczeństwa Zapewnianie bezpieczeństwa za pomocą IPSec Zapewnianie bezpieczeństwa za pomocą Secure SIP Telefonia IP – ryzyko nadużyć Ochrona przed DDOS i innymi rodzajami ataków Uruchamianie usług VoIP wykorzystujących SIP Konfiguracja centrali Konfiguracja i rejestracja klienta SIP Oprogramowanie Asterisk PBX / Freeswitch softswitch / Cisco Call Manager Linux CentOS Sterowniki TDM2IP Aplikacje telefoniczne (XLite, Linphone) Sprzęt Serwer Karta/brama TDM2IP Telefon (Polycom, Gigaset, Yealink) Aplikacja/telefon fizyczny Konfiguracja Kodeki User/Password/SIP Server/Proxy/Ports Działanie i sygnalizacja SIP w przypadku obsługi: 3-Way Calling Call Forwarding Attendant Call Transfer MWI, BLF Yealink autoprovisioning Specyficzne ograniczenia produktów poszczególnych dostawców Problemy Network Adress Translation (NAT) Typy i struktura NAT STUN (Simple Traversal of UDP Through NATs) Jakość połączeń VoIP – rozwiązywanie problemów Połączenie zestawiane, ale brak mediów Kluczowe elementy związane ze sterowaniem jakością opóźnienie, fluktuacja opóźnienia (jitter), rozmiar bufora (play buffer size) Miary jakości VoIP RTCP – opóźnienie i jitter MOS zgodnie z ITU-T G.107 E-model Narzędzia umożliwiające monitoring jakości (Voipmonitor) Telefonia IP w chmurze Podsumowanie i odniesienie się przez prowadzących szkolenie do problemów i pytań zgłoszonych przez uczestników

Najbliższe szkolenia

SzkolenieData KursuCena szkolenia [Zdalne / Stacjonarne]
Understanding IPSec VPNs - Warszawa, ul. Złota 3/11wt., 2017-10-10 09:007400PLN / 2642PLN
Practical RADIUS and TACACS+ - Częstochowa, ul. Wały Dwernickiego 117/121czw., 2017-10-12 09:0010370PLN / 3842PLN
Practical TCP/IP - Wrocław, ul.Ludwika Rydygiera 2a/22pon., 2017-10-16 09:009800PLN / 4067PLN

Other regions

Szkolenie TCP/IP Networking, TCP/IP Networking boot camp, Szkolenia Zdalne TCP/IP Networking, szkolenie wieczorowe TCP/IP Networking, szkolenie weekendowe TCP/IP Networking , Trener TCP/IP Networking, nauka przez internet TCP/IP Networking, kurs zdalny TCP/IP Networking,Kursy TCP/IP Networking, lekcje UML, edukacja zdalna TCP/IP Networking, e-learning TCP/IP Networking, nauczanie wirtualne TCP/IP Networking, wykładowca TCP/IP Networking , kurs online TCP/IP Networking, instruktor TCP/IP Networking

Kursy w promocyjnej cenie

Szkolenie Miejscowość Data Kursu Cena szkolenia [Zdalne / Stacjonarne]
Visual Basic for Applications (VBA) w Excel - poziom zaawansowany Warszawa, ul. Złota 3/11 pon., 2017-09-25 09:00 3069PLN / 1623PLN
Programowanie w języku C++ Wrocław, ul.Ludwika Rydygiera 2a/22 pon., 2017-09-25 09:00 5445PLN / 2815PLN
Java Performance Tuning Wrocław, ul.Ludwika Rydygiera 2a/22 pon., 2017-09-25 09:00 9801PLN / 3000PLN
Tworzenie i zarządzanie stronami WWW Poznań, Garbary 100/63 pon., 2017-09-25 09:00 5841PLN / 2298PLN
Techniki DTP (InDesign, Photoshop, Illustrator, Acrobat) Katowice ul. Opolska 22 pon., 2017-09-25 09:00 5940PLN / 3730PLN
SQL in Microsoft Access Kraków, ul. Rzemieślnicza 1 wt., 2017-09-26 09:00 10266PLN / 3911PLN
Certyfikacja OCUP2 UML 2.5 - Przygotowanie do egzaminu OCUP2 Foundation Kraków, ul. Rzemieślnicza 1 śr., 2017-09-27 09:00 6930PLN / 3510PLN
Visual Basic for Applications (VBA) w Excel dla analityków Poznań, Garbary 100/63 śr., 2017-09-27 09:00 2970PLN / 1590PLN
Adobe InDesign Katowice ul. Opolska 22 czw., 2017-09-28 09:00 1881PLN / 1327PLN
Wzorce projektowe w C# Rzeszów, Plac Wolności 13 czw., 2017-09-28 09:00 3861PLN / 2331PLN
Statistical and Econometric Modelling Warszawa, ul. Złota 3/11 pon., 2017-10-02 09:00 20483PLN / 6807PLN
Tworzenie aplikacji na platformie Android Łódź, ul. Tatrzańska 11 pon., 2017-10-02 09:00 4455PLN / 3128PLN
Efektywna komunikacja interpersonalna z elementami asertywności Kraków, ul. Rzemieślnicza 1 wt., 2017-10-03 09:00 5148PLN / 1830PLN
Web Development with Symfony3 Kielce, ul. Warszawska 19 pon., 2017-10-09 09:00 5554PLN / 2483PLN
Visual Basic for Applications (VBA) w Excel - wstęp do programowania Szczecin, ul. Sienna 9 pon., 2017-10-09 09:00 3564PLN / 1891PLN
Analiza biznesowa i systemowa z użyciem notacji UML - warsztat praktyczny dla PO w metodyce Scrum Łódź, ul. Tatrzańska 11 wt., 2017-10-10 09:00 7722PLN / 3474PLN
Access - podstawy Szczecin, ul. Sienna 9 wt., 2017-10-10 09:00 3465PLN / 1550PLN
MS-40361 Software Development Fundamentals MTA Exam 98-361 Gdynia, ul. Ejsmonda 2 śr., 2017-10-11 09:00 6138PLN / 2610PLN
UML Analysis and Design Kraków, ul. Rzemieślnicza 1 śr., 2017-10-11 09:00 8910PLN / 4170PLN
PostgreSQL for Administrators Gdynia, ul. Ejsmonda 2 śr., 2017-10-11 09:00 12326PLN / 4235PLN
Agile w projektach zdalnych Katowice ul. Opolska 22 pon., 2017-10-16 09:00 5049PLN / 1962PLN
Programowanie w języku C++ Bielsko-Biała, Al. Armii Krajowej 220 pon., 2017-10-16 09:00 5445PLN / 3565PLN
Programowanie w języku C++ Łódź, ul. Tatrzańska 11 pon., 2017-10-16 09:00 5445PLN / 3315PLN
PostgreSQL Administration Łódź, ul. Tatrzańska 11 wt., 2017-10-17 09:00 7821PLN / 3807PLN
Programowanie w C# Wrocław, ul.Ludwika Rydygiera 2a/22 śr., 2017-10-18 09:00 4851PLN / 1870PLN
Trening radzenie sobie ze stresem Gdynia, ul. Ejsmonda 2 śr., 2017-10-18 09:00 5148PLN / 1530PLN
Business Analysis Kraków, ul. Rzemieślnicza 1 śr., 2017-10-18 09:00 7722PLN / 3774PLN
Nginx konfiguracja i Administracja Wrocław, ul.Ludwika Rydygiera 2a/22 śr., 2017-10-18 09:00 6930PLN / 2700PLN
Projektowanie stron na urządzenia mobilne Kielce, ul. Warszawska 19 czw., 2017-10-19 09:00 2624PLN / 1305PLN
Adobe InDesign Wrocław, ul.Ludwika Rydygiera 2a/22 pon., 2017-10-23 09:00 1881PLN / 1027PLN
Adobe Premiere Pro Gdynia, ul. Ejsmonda 2 pon., 2017-10-23 09:00 3960PLN / 2480PLN
Administracja systemu Linux Gdynia, ul. Ejsmonda 2 wt., 2017-10-24 09:00 4950PLN / 3225PLN
Node.js Olsztyn, ul. Kajki 3/1 czw., 2017-10-26 09:00 3861PLN / 2431PLN
Microsoft Office Excel - efektywna praca z arkuszem Warszawa, ul. Złota 3/11 czw., 2017-10-26 09:00 2475PLN / 1225PLN
SQL Advanced in MySQL Warszawa, ul. Złota 3/11 czw., 2017-11-02 09:00 1881PLN / 1141PLN
Microsoft Office Excel - analiza statystyczna Warszawa, ul. Złota 3/11 czw., 2017-11-02 09:00 2673PLN / 1291PLN
Android - Podstawy Wrocław, ul.Ludwika Rydygiera 2a/22 pon., 2017-11-06 09:00 9801PLN / 4180PLN
Java Spring Wrocław, ul.Ludwika Rydygiera 2a/22 pon., 2017-11-06 09:00 14414PLN / 5970PLN
Kontrola jakości i ciągła integracja Wrocław, ul.Ludwika Rydygiera 2a/22 wt., 2017-11-07 09:00 2673PLN / 1737PLN
Nagios Core Gdańsk, ul. Powstańców Warszawskich 45 pon., 2017-11-13 09:00 13919PLN / 4968PLN
Oracle 11g - Analiza danych - warsztaty Gdynia, ul. Ejsmonda 2 pon., 2017-11-13 09:00 9900PLN / 4664PLN
ADO.NET 4.0 Development Warszawa, ul. Złota 3/11 wt., 2017-11-14 09:00 20176PLN / 6914PLN

Newsletter z promocjami

Zapisz się na nasz newsletter i otrzymuj informacje o aktualnych zniżkach na kursy otwarte.
Szanujemy Twoją prywatność, dlatego Twój e-mail będzie wykorzystywany jedynie w celu wysyłki naszego newslettera, nie będzie udostępniony ani sprzedany osobom trzecim.
W dowolnej chwili możesz zmienić swoje preferencje co do otrzymywanego newslettera bądź całkowicie się z niego wypisać.

Zaufali nam