TCP/IP training course description An intensive hands on IP foundation leading to LINX Accredited Internet Technician stage 1. The course focuses on all parts of TCP/IP including layers 4 to 7 on end stations as well as layer 3 on routers. The TCP/IP protocols are also studied to enable delegates to be able to troubleshoot TCP/IP using Wireshark. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. A multiple choice exam, leading to the LAIT I certification, is available after the course. The exam consists of 40 questions and lasts 1.5 hours. What will you learn Use ping, traceroute and other tools to diagnose faults on a network. Configure IP on PCs and routers. Plan IP addresses and subnets. Analyse IP and TCP packets using an analyser. Troubleshoot TCP/IP. TCP/IP training course details Who will benefit: Network engineers. Prerequisites: None Duration 5 days TCP/IP training course contents What is TCP/IP? TCP and IP are protocols, 7 layer model, network layers, hardware/software layers, internetworking, protocols, What is IP? What is TCP? The internet, The IAB, RFCs. Ping and Wireshark Host configuration, IP addresses, subnet masks, default gateways, ping. Hands on Base configuration. Testing with ping. Analysing packets with Wireshark. Switches and Wireshark Switches versus hubs, layer 2 forwarding table, flooding, broadcasts. Hands on Building a switched based network. Configuring network devices Configuration options, console port, putty, telnet. Hands on Configuring switches, telnet. IP IP packet format, protocol field, TTL, DiffServ, fragments, ICMP. Hands on IP packet analysis. IP addressing 32 bits, dotted decimal, rules, networks, role of subnet masks, simple subnetting, prefix notation. Broadcasts, special use addresses. Hands on Planning and implementing addressing. IP and the lower layers ARP, media not supporting ARP. Hands on ARP. Routing What are routers? What routers do, default gateways, routing and addressing, routing tables, ways to update routing tables. Hands on Building a routed network, traceroute. Routing protocols IGPs and EGPs, RIP, RIPv2, Why not to use RIP, OSPF, OSPF metrics, convergence, distance vector protocols, link state protocols. Hands on OSPF, analysing routing tables, loopbacks. Network simulators Network simulators, EVE-NG, GNS3, CML. Hands on Using EVE-NG. Subnetting Subnetting to the bit level, ranges, how prefixes are used. Hands on Subnetting. VLANS and IP addressing What are VLANs, tagging, 802.1Q, Inter VLAN routing. Hands on Inter VLAN routing. TCP and UDP Layer 4, port numbers, client ports, broadcasts multicasts and layer 4, UDP header, TCP header, connections, ACK, sliding windows, options, connection states. Sockets. Hands on Analysing TCP packets. IPv4 address configuration Private addresses, NAT, NAPT, dynamic addressing, DHCP, link local addresses. Hands on DHCP, NAT. IPv6 What is IPv6, 128 bit addresses, address formats, IPv6 address allocation, header format, migration, dual stack, tunnelling, NAT64, DNS64. Hands on IPv6 setup troubleshooting. IPv6 address configuration Static addressing, EUI-64 addresses, IPv6 address order, SLAAC, DHCPv6. Hands on SLAAC. Applications Clients, servers, HTTP, Email, resource sharing, VoIP, video, terminal emulation, remote desktop. Network management and SNMP. Hands on Servers, TFTP, VoIP packet analysis. DNS Names and addresses, hosts file, how DNS works. FQDNs, DNS client configuration. Hands on Troubleshooting DNS. Security Firewalls, firewall architectures, DMZ, how firewalls work, proxy servers, filtering, ACLs, IDS, VPNs, authentication, encryption, tunnels, secure protocols. Hands on Firewalls, SSH Troubleshooting Methods, tools. Using the 7 layer model. Troubleshooting toolkits. Hands on Fixing the network.
DASA DevOps Fundamentals: In-House Training The DASA DevOps Fundamentals™ certification provides the core education necessary to build your DevOps vocabulary and understand its principles and practices. It's the ideal starting point for DevOps journeys, whether you're already familiar with working with Agile and/or DevOps teams or not. Faster software deployment, increased deployment frequency, and higher change success rate are only some of the visible outcomes of practicing DevOps. Organizations such as Netflix, Spotify, and Facebook are transforming IT by successfully implementing DevOps principles. But you don't have to be big to be a DevOps leader. Companies large and small, young and old, have smoothly made the transition and have the proof of success in their pockets. This course will inspire you to serve as a change champion by sharing and using what you learned, and continue to learn, about DevOps to lead and mentor others. A solid understanding of DevOps Fundamentals has helped numerous professionals and organizations how to approach a DevOps journey, not only from a tool and automation perspective but also looking in-depth at the softer side of things. This course provides learners with an extensive introduction to the core Agile DevOps principles. It covers all 12 key knowledge and skill competencies defined by DASA to ensure you acquire a solid knowledge of DevOps concepts and terminology. Multiple cases or scenarios, group discussions, and examples are included in the course to enhance your learning experience. What you will Learn DASA DevOps Fundamentals-certified professionals are able to: Explain the drivers responsible for the emergence of DevOps. Define and discuss the key concepts and principles of DevOps. List and explain the business benefits of DevOps and continuous delivery. Know how teams can translate DevOps principles into tangible practices. Learn about modern operations in a DevOps context. Explain the concepts of test automation, infrastructure automation, and build and deployment automation. Describe how DevOps relates to Lean and Agile methodologies. Get insight into the various organizational DevOps models and architectures. Identify how Cloud and Delivery pipeline automation optimizes and accelerates the ways of working. Discuss the critical success factors for DevOps transformation. Introducing DASA DevOps Fundamentals DASA DevOps Fundamentals An Introduction Case Study - Easy Journey Airways Building the DevOps Context DevOps Evolution Business Benefits of DevOps DASA DevOps Principles Goals and Measurements Knowing DevOps for Individuals T-Shape Profiles DevOps Capabilities by DASA DASA DevOps Certifications Getting Acquainted with DevOps Culture and Behavior Embracing a DevOps Culture Core Elements of a DevOps Culture Implementation of a DevOps Culture Understanding the Value of DevOps for Teams and Organizations Organizational Models Team Autonomy DevOps at Scale Getting Familiar with DevOps Management Practices ITSM Lean Agile Getting Familiar with DevOps Technical Practices Architecture Modern Infrastructure and Cloud Operations Enabling DevOps Team Performance Through Continuous Delivery and Automation Software Delivery Automation Concepts Continuous Delivery Core Concepts Continuous Delivery Automation Concepts Continuous Delivery Automation Focus Topics Measuring the Performance - The Next Steps Analyze the Current Situation Improve Incrementally
ITIL® 4 Specialist: Drive Stakeholder Value: In-House Training The ITIL® 4 Specialist: Drive Stakeholder Value module is part of the Managing Professional stream for ITIL 4. Candidates need to pass the related certification exam for working towards the Managing Professional (MP) designation. This course is based on the ITIL® 4 Specialist: Drive Stakeholder Value exam specifications from AXELOS. With the help of ITIL® 4 concepts and terminology, exercises, and examples included in the course, candidates acquire the relevant knowledge required to pass the certification exam. What You Will Learn The learning objectives of the course are based on the following learning outcomes of the ITIL® 4 Specialist: Drive Stakeholder Value exam specification: Understand how customer journeys are designed Know how to target markets and stakeholders Know how to foster stakeholder relationships Know how to shape demand and define service offerings Know how to align expectations and agree on details of services Know how to onboard and offboard customers and users Know how to act together to ensure continual value co-creation (service consumption / provisioning) Know how to realize and validate service value Customer Journey Purpose of the Module Purpose of Mastering the Customer Journey Touchpoints and Service Interactions Module Topics Mapping the Customer Journey Designing the Customer Journey Measuring and Improving the Customer Journey Customer Journey Step 1: Explore Purpose of the Module Purpose of the Explore Step Module Topics Understanding Service Consumers Understanding Service Providers Understanding and Targeting Markets Customer Journey Step 2: Engage Purpose of the Module Purpose of the Engage Step Aspects of Service Value Module Topics Service Relationship Types Building Service Relationships Building and Sustaining Trust and Relationships Analyzing Customer Needs Managing Suppliers and Partners Customer Journey Step 3: Offer Purpose of the Module Purpose of Shaping Demand and Service Offerings Module Topics Managing Demand and Opportunities Specifying and Managing Customer Requirements Designing Service Offerings and User Experience Selling and Obtaining Service Offerings Customer Journey Step 4: Agree Purpose of the Module Purpose of Aligning Expectations and Agreeing on Services Module Topics Agreeing on and Planning Value Co-Creation Negotiating and Agreeing on a Service Customer Journey Step 5: Onboard Purpose of the Module Purpose of Onboarding and Offboarding ITIL® Management Practices Module Topics Planning Onboarding Fostering Relationships with Users Providing User Engagement and Delivery Channels Enabling Users for Service Elevating Mutual Capabilities Offboarding Customer Journey Step 6: Co-create Purpose of the Module Purpose of Service Provision and Consumption Module Topics Service Mindset Ongoing Service Interactions Nurturing User Communities Customer Journey Step 7: Realize Purpose of the Module Measuring Service Value Purpose of Value Capturing and Customer Journey Improvement Realizing Service Value in Different Settings Module Topics Tracking Value Realization Assessing and Reporting Value Realization Evaluating Value Realization and Improving Customer Journeys Realizing Value for the Service Provider
ADO.NET training course description This ADO.net training course is designed to enable developers to use the toolset provided with.NET for data access including ADO.net objects, data controls, designers and interoperability with earlier ADO objects. The course is applicable for those using C# or VB.NET with ADO.NET What will you learn Retrieve and manipulate data using Microsoft's ADO.NET library. Work with the ADO.NET object model. Update data, including handling stored procedures, parameters, and return value. Search, sort and filter data. Leverage the power of XML. ADO.NET training course details Who will benefit: Programmers working with ADO.Net. Prerequisites: Effective programming with VB.NET or Concise introduction to C# Duration 2 days ADO.NET training course contents Introducing ADO.Net Traditional Data Access Architecture. ADO.Net Disconnected Data Access Architecture. Different components of ADO.Net. A review of basic SQL queries SQL SELECT Statement. SQL INSERT Statement. SQL UPDATE Statement. SQL DELETE Statement. Common data access tasks with ADO.Net Accessing Data using ADO.Net. Defining the connection string. Defining a Connection. Defining the command or command string. Defining the Data Adapter. Creating and filling the DataSet. A Demonstration Application The Interface. Loading the table. Filling the controls on the Form. Navigating through the records. Updating Data Steps for updating the table. Building the Application. Loading the table and displaying data in the form's controls. Initialising Commands. Adding Parameters to the commands. The ToggleControls() method of our application. Editing (or Updating) Records. Event Handler for the Save Button. Event Handler for the Cancel Button. Inserting Records. Deleting a Record. Using Stored Procedures Sample Stored Procedures. UPDATE Stored Procedure. INSERT Stored Procedure. DELETE Stored Procedure. SELECT Stored Procedure. Using Stored Procedures with ADO.Net.
ASP.Net training course description Our hands on ASP.NET training course that will teach students how to create a simple ASP.NET application that delivers dynamic content to the web. The course is applicable for those using C# or VB.NET with ASP.NET. What will you learn Create a web form with server controls Separate page code from content with code-behind pages, page controls, and components. Display dynamic data from a data source by using ADO.NET and data binding. Debug ASP.NET pages by using trace. ASP.Net training course details Who will benefit: Programmers working with ASP.NET. Prerequisites: HTML5 development fundamentals VBNet_course.htm or C++ programming foundation Duration 3 days ASP.Net training course contents Working with ASP.NET Introducing ASP.NET. Creating web forms. Adding ASP.NET code to a page. Handling page events. Using Web Controls Web controls and HTML controls compared. Using intrinsic controls. Using input validation controls. Introduction to user controls. Using trace in ASP.NET pages Overview of tracing. Trace information. Page-level trace and application-level trace. Separating code from content Advantages of partitioning an ASP.NET page. Creating and using code-behind pages. Creating and using components and classes. Inheritance of classes. Interfaces. Using ADO .NET to access data Accessing text files. Overview of ADO .NET Connecting to a data source. Accessing data with DateSets. Using DataViews. Accessing data with DataReaders. Using XML data with a DataSet. Creating an ASP.NET Web Application Requirements of a web application. Sharing information between pages. Securing an ASP.NET application. Web services. Creating a simple web service using Visual Studio.NET Calling a web service using Visual Studio.NET
Complete Ruby programming training course description This course starts with a quick-start session and then explains the language in detail from the bottom up. Hands on sessions follow all the major sessions to reinforce the theory. What will you learn Read Ruby programs. Write Ruby programs. Debug Ruby programs. Complete Ruby programming training course details Who will benefit: Anyone wishing to program in Ruby. Prerequisites: Software development fundamentals Duration 3 days Complete Ruby programming training course contents Introduction A tour of Ruby, Try Ruby, A suduko solver in Ruby. The Structure and execution of Ruby Lexical structure, Syntactic structure, Files structure, Program encoding, Program execution. Datatypes and objects Numbers, text, Arrays, Hashes, Ranges, Symbols, True, false, and nil, Objects. Expressions and operators Literals and keyword literals, Variable references, Constant references, Method invocations, Assignments, Operators. Statements and control structures Conditionals, loops, Iterators and enumerable objects, Blocks, Altering flow control, Exceptions and exception handling, BEGIN and END, Threads, fibres and continuations. Methods, Procs, Lambdas and closures Defining simple methods, Method names, Methods and parentheses, Method arguments, Procs and lambdas, Closures, Method objects, Functional programming. Classes and modules Defining a simple class, Method visibility: public, protected, privates, Subclassing and inheritance, Object creation and initialization, Modules, Loading and requiring modules, Singleton methods and Eigenclass, Method lookup, Constant lookup. Reflection and metaprogramming Types, classes and modules, Evaluating strings and blocks, Variables and constants, Methods, Hooks, Tracing, ObjectSpace and GV, Custom control structures, Missing methods and missing constants, Dynamically creating methods, Alias chaining. The Ruby platform Strings, Regular expressions, Numbers and Math, Dates and times, Collections, Files and directories, Input/output, Networking, Threads and concurrency. The Ruby environment Invoking the Ruby interpreter, The Top-level environment, Practical extraction and reporting shortcuts, Calling the OS, Security.
Total PHP training course description PHP provides for the creation of dynamic web sites. This hands on training course looks at programming with PHP with an emphasis of building dynamic websites. Forms, state management and database integration are all covered with practicals used throughout the course to reinforce theory sessions. What will you learn Create dynamic web sites using PHP. Write PHP programs. Debug PHP programs. Examine existing code and determine its function. Total PHP training course details Who will benefit: Anyone creating dynamic web sites. Prerequisites: Software development fundamentals Duration 3 days Total PHP training course contents What is PHP? PHP history, dynamic web pages, how PHP works, alternatives to PHP. Downloading and installing PHP. Installing MySQL, installing Apache, platform issues. A first PHP web page A basic PHP script, PHP page structure. PHP comments. Integrating PHP and HTML. PHP forms HTML forms, taking values from forms. PHP and HTML Page inputs, environment inputs. phpinfo(), other form elements, sticky fields, generalised code, tables, forms, form elements, style sheets, JavaScript. Variables operators and expressions Expressions, data types, assignments, scope, constants, HTTP environment variables, getting data from forms using variables. Operators Arithmetic, logical, relational, Boolean, others. Control statements Conditional: if, else, elseif, switch. Loops: while, do while, for, break, continue, exit. Functions Built in functions, declaration, arguments, scope, loading functions from other files, defaulting parameters, call by value/ name. Arrays Indexes, array initialisation, array manipulation, multi dimensional arrays, array functions. String handling What is a string, string functions, matching, extraction, replacement. String operations, cleansing, sprintf, formatting web pages, strops and others, splitting strings, REs. PHP and databases Database structure, Database APIs, MySQL, Creating tables, Editing tables, simple SQL queries using PHP, building HTML tables using SQL queries, SQL injection, security issues, error handling. File I/O Opening, reading, writing files. Permissions, ownership, locking, directories. PHP, cookies and sessions State, Cookie properties, setting cookies, retrieving cookies, expiring/deleting cookies. Sessions, session variables, session IDs. PHP and email Emailing from servers, attachments. Objects OOP, PHP classes, constructors, instances.
Software development training course description This three-day MTA Training course helps you prepare for Microsoft Technology Associate Exam 98-361, and build an understanding of these topics: Core programming, Object-Oriented programming, general software development, web applications, desktop applications, and databases. This course leverages the same content as found in the Microsoft Official Academic Course (MOAC) for this exam. What will you learn Describe core programming. Explain Object Oriented programming. Describe general software development. Describe Web applications. Describe desktop applications. Explain how databases work. Software development training course details Who will benefit: Anyone looking to learn the fundamentals of software. Prerequisites: None. Duration 3 days Software development training course contents Core programming Computer storage and data types How a computer stores programs and the instructions in computer memory, memory stacks and heaps, memory size requirements for the various data storage types, numeric data and textual data. Computer decision structures Various decision structures used in all computer programming languages; If decision structures; multiple decision structures, such as Ifâ¦Else and switch/Select Case; reading flowcharts; decision tables; evaluating expressions. Handling repetition For loops, While loops, Do...While loops and recursion. Understand error handling Structured exception handling. Object-oriented programming Classes Properties, methods, events and constructors; how to create a class; how to use classes in code. Inheritance Inheriting the functionality of a base class into a derived class. Polymorphism Extending the functionality in a class after inheriting from a base class, overriding methods in the derived class. Encapsulation Creating classes that hide their implementation details while still allowing access to the required functionality through the interface, access modifiers. General software development Application life cycle management Phases of application life cycle management, software testing. Interpret application specifications Application specifications, translating them into prototypes, code, select appropriate application type and components. Algorithms and data structures Arrays, stacks, queues, linked lists and sorting algorithms; performance implications of various data structures; choosing the right data structure. Web applications Web page development HTML, CSS, JavaScript. ASP.NET web application development Page life cycle, event model, state management, client-side versus server-side programming. Web hosting Creating virtual directories and websites, deploying web applications, understanding the role of Internet Information Services. Web services Web services that will be consumed by client applications, accessing web services from a client application, SOAP, WSDL. Desktop applications Windows apps UI design guideline categories, characteristics and capabilities of Store Apps, identify gestures. Console-based applications Characteristics and capabilities of console- based applications. Windows Services Characteristics and capabilities of Windows Services. Databases Relational database management systems Characteristics and capabilities of database products, database design, ERDs, normalisation concepts. Database query methods SQL, creating and accessing stored procedures, updating and selecting data. Database connection methods Connecting to various types of data stores, such as flat file; XML file; in-memory object; resource optimisation.
CWSP training course description A hands-on training course concentrating solely on WiFi security with an emphasis on the delegates learning the necessary knowledge and skills to pass the CWSP exam. The course progresses from simple authentication, encryption and key management onto in depth coverage of 802.X and EAP along with many other security solutions such as access control, intrusion prevention and secure roaming. What will you learn Demonstrate the threats to WiFi networks. Secure WiFi networks. Configure: WPA2 RADIUS 802.1x EAP Pass the CWSP exam. CWSP training course details Who will benefit: Technical network staff. Technical security staff. Prerequisites: Certified Wireless Network Associate. Duration 5 days CWSP training course contents WLAN Security overview Standards, security basics, AAA, 802.11 security history. Hands on WLAN connectivity. Legacy 802.11 security Authentication: Open system, shared key. WEP. VPNs. MAC filters. SSID segmentation, SSID cloaking. Hands on Analysing 802.11 frame exchanges, viewing hidden SSIDs. Encryption Basics, AES, TKIP, CCMP, WPA, WPA2. Hands on Decrypting 802.11 data frames. 802.11 layer 2 authentication 802.1X: Supplicant, Authenticator, Authentication server. Credentials. Legacy authentication. EAP, Weak EAP protocols, Strong EAP protocols: EAP -PEAP, EAP-TTLS, EAP-TLS, EAP-FAST. Hands on Analysing 802.1X/EAP frames. 802.11 layer 2 dynamic key generation Robust Security Network. Hands on Authentication and key management. SOHO 802.11 security WPA/WPA2 personal, Preshared Keys, WiFi Protected Setup (WPS). Hands on PSK mapping. WLAN security infrastructure DS, Autonomous APs, WLAN controllers, split MAC, mesh, bridging, location based access control. Resilience. Wireless network management system. RADIUS/LDAP servers, PKI, RBAC. Hands on 802.1X/EAP configuration. RADIUS configuration. 802.11 Fast secure roaming History, RSNA, OKC, Fast BSS transition, 802.11k. Hands on Roaming. Wireless security risks Rogue devices, rogue prevention. Eavesdropping, DOS attacks. Public access and hotspots. Hands on Backtrack. WiFi security auditing Layer 1 audit, layer 2 audit, pen testing. WLAN security auditing tools. WiFi security monitoring Wireless Intrusion Detection and Prevention Systems. Device classification, WIDS/WIPS analysis. Monitoring. 802.11w. Hands on Laptop spectrum analysers. VPNs, remote access, guest access Role of VPNs in 802.11, remote access, hotspots, captive portal. Wireless security policies General policy, functional policy, recommendations.
Securing Linux systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure Linux accounts. Secure Linux file systems. Secure Linux access through the network. Securing Linux systems training course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing Linux systems training course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.