VoIP and IP Telephony training course description A concise overview course for management covering voice communications using IP networks. The course focuses on how VoIP works at a simplified level enabling delegates to recognise the key decisions to be made when implementing VoIP. What will you learn Describe the key buzzwords used in the VoIP arena. Explain how VoIP and IPT work (at a simplified level). Describe the issues of providing a converged architecture. Recognise the key decisions to be made when implementing VoIP VoIP and IP Telephony training course details Who will benefit: Anyone, although the course is particularly aimed at non-technical personnel needing some knowledge of VoIP. Prerequisites: Network fundamentals Duration 1 day VoIP and IP Telephony training course contents Introduction What is VoIP, brief review of IP, brief review of telephones, voice and signalling. VoIP issues Bandwidth, Delay, Jitter. Voice coding and compression, packetising voice, comparison of techniques, MOS.IP performance and QoS. The need for QoS, prioritising voice. Architectures Hard phones, soft phones, video phones, desktop, backbone, gateway, integrating analog phones and PCs, carriers, Softswitches. VoIP protocol stack RTP, RTCP. H.323 vs SIP, other signalling protocols. H.323 Architecture, Call setup, Gatekeepers. SIP Comparison with H.323, SIP proxy, proxy servers, redirect servers, location servers. MGCP and MegaCo Carrier networks, PSTN breakout, SS7 gateways, MGCP, Megaco. IP PBXs Integrating IP into 'normal' PBXs, IP PBXs, Asterisk. UM, other telephony applications.
WANs training course description A concise overview course covering Wide Area Networks with particular emphasis on the WAN options available including the use of the Internet. What will you learn Choose and evaluate WAN technologies. Recognise the role of service providers. Describe the benefits of VPNs. Describe how the Internet can be used as a WAN. Describe the equipment needed to connect LANS to WANS. List the speeds of various WAN technologies. WANs training course details Who will benefit: Anyone, although the course is particularly aimed at non-technical personnel needing some knowledge of WANS. Prerequisites: Network fundamentals Duration 1 day WANs training course contents WANS WAN architecture, Common WAN terms, Core vs access, service providers, relationship with 7 layer model, WAN equipment, how to choose a WAN. Layer 1 Copper, phone lines, fibre, coaxial, satellite, wireless. Cabling to the building, CPE cabling, interfaces. Layer 2 Dial up vs. Dedicated vs. packet switched networks and when to use them. Packet switching vs. circuit switching. Point to point and point to multipoint. Dialup access technologies Modems, ISDN, BRI, PRI. Access with dedicated lines XDSL, leased lines. WAN services X.25, SMDS, Frame Relay, CIR, ATM, Internet, MANS, dark fibre and other services. Case study: Selecting WAN technologies. Service provider technologies MPLS, SDH, WDM, DWDM. Routers Network addressing, default gateways, routing tables, routing protocols. Internet architecture Service providers, ISPs, private peering, public peering, core WANs in the Internet. VPNs Private networks, public networks, What are VPNs?, benefits of VPNs, tunnelling, encryption, IPSec. Case study: Specifying WAN connectivity.
IPv6 demystified training course description IPv6 is the next generation Internet Protocol. This course looks at the benefits and features of the new protocol along with an assessment of the likely impact of the protocol and migration strategies. What will you learn Explain the benefits and disadvantages of IPv6 Recognise the impact of IPv6 on existing networks. Plan migration strategies for IPv6 Integrate IPv6 and IPv4 networks IPv6 demystified training course details Who will benefit: Sales staff, managers and other non technical staff. Prerequisites: None. Duration 1 day IPv6 demystified training course contents What's wrong with IPv4 IPv4 works, NAT, carrier grade NAT, addresses running out. Current state of IPv4 addressing. Why IPv6 Reasons for IPv6, what is IPv6? the origins of IPv6. IPv6 addressing IPv6 address allocation, address format, prefixes, address categories, scope zones, global unicast, link local. Plug and play. Migration techniques A migration plan, Dual stack, DNS, tunnelling, tunnel establishment, tunnel brokers, Tunnel types. IPv6 steps How IPv6 can affect the following: Firewalls, routers, switches!, DNS, Web services, Email. Current state of IPv6 IPv6 release 1996, 3G, World IPv6 day 2011, World IPv6 launch 2012.
Peering demystified training course description A concise overview course covering The Internet and peering. Particular emphasis is placed on the structure of the Internet, how IXs benefit the Internet, IX architectures, peering and the technical buzzwords behind the IX services. What will you learn Describe the structure of the Internet Explain the role of RIPE, ARIN and IXs in the Internet Explain how IXs connect ISPs and the benefits of using IXs. Describe peering from a technical perspective including the role of BGP and AS's. Peering demystified training course details Who will benefit: Non technical staff working for Internet companies. Prerequisites: None. Duration 1 day Peering demystified training course contents IP and routers IP as glue. What is a router? How routers join networks, benefits and disadvantages of routers, default gateways, routing tables, routing protocols. Addressing IP address format, rules of IP addressing, where to get IP addresses. Subnetting and groups of IP addresses. The Internet What is the Internet? The big picture, IP basics, registering IP addresses, DNS and registering domain names, whois, The IAB, IANA, ICANN, RIPE and other Internet organisations. ISPs Top ISPs, Tier 1, Tier 2 and Tier 3 ISPs, backbone providers, circuit providers, content providers, virtual ISPs, the internal network of ISPs. Customer connections to ISPs (DSL, Leased lines, MPLSâ¦) ISP to ISP connections: Peering points Public peering versus private peering, NAPs, Internet Exchanges, Metropolitan Area Exchanges, LINX, other major peering points, the geography of the Internet. BGP and ASNs. How to peer. IRRs. IX architecture Ethernet switching.
Network automation training course description This course concentrates on the technical side of tools and languages for network DevOps rather than the soft skills. These tools include Python, Ansible, Git and NAPALM By the end of the course delegates should be able to recognise the tools that they can use to automate their networks and be able to use the knowledge gained to feel confident approaching network automation. What will you learn Describe network DevOps. Choose network automation tools. Explain the role of various network automation technologies including: Python Ansible Git NAPALM Network automation training course details Who will benefit: Those wishing to learn about the tools of network automation. Prerequisites: Introduction to data communications. Duration 1 day Network automation training course contents What is DevOps and network automation Programming and automating networks, networks and clouds, AWS, OpenStack, SDN, DevOps for network operations. Unit testing. Hype vs reality. Benefits and features. Network monitoring and troubleshooting Traditional methods, SNMP. Netflow and xflow. Traditional automation. Streaming telemetry. Event driven automation. gRPC, Protocol buffers. Configuration management Catch 22 and initial configuration. ZTP, POAP. Traditional automation. TFTP. Ansible vs the rest (chef, salt, puppet). Jinja2 and templating. How ansible works. Network programmability Programming languages. Linux, shell scripting. Python vs the rest. Off box vs on box automation. Python network libraries Sockets pysnmp, ncclient, paramiko, netmiko, pyez, NAPALM. APIs Proprietary APIs, CLI, NETCONF, RETCONF. YANG, XML, YAML, JSON. Other tools Git, GitHub, Jenkins, JIRA and others.
Git and GitHub course description This course covers version control using Git but also using GUI frontends such as GitHub. The course starts with a tour of using GitHub but then quickly moves onto using git from the command line. All elements of git version control are covered including creation of repositories, adding and editing files, branches and merging, rewriting history and handling merge conflicts. Hands on sessions are used throughout the course. What will you learn Install git. Add and edit files in a repository. Create branches and perform merges. Handle merge conflicts. Git and GitHub course details Who will benefit: Anyone requiring version control. Prerequisites: None. Duration 1 day Git and GitHub course contents Introduction Version control for software, configuration management. Other uses. Version control systems. What is git? What is GitHub? Distributed version control. Comparison of git to other systems. GitHub Getting started, creating an account, account types, repositories, access control, bug tracking, feature requests. Alternatives to GitHub. Hands on Using GitHub. Installing git Linux install, Windows install, git config, levels, user.name, user.email. Hands on Installing and configuring git. Creating repositories git clone, github, git remote, git init. Hands on Creating a repository. Adding and editing files Staging and adding, git add, git commit, git push, git pull, git status, git log. Two stage process. File states: Working, staging, history, untracked. git mv, git rm, .gitignore, git diff, git difftool. Undoing changes. Hands on Adding and editing files in git. Branching and merging What is a branch, HEAD label, master branch, git branch, git checkout. Feature branches, bux fix branches, integration branches, production branches, fast forward merges, 3 way merges, git merge, git status, git log, tags. Hands on Making branches, merging. Rewriting history git reset, git rebase, advantages. Hands on Reset commits, rebase a branch. Merge conflicts What is a conflict, conflict resolution process, resolving merges, rebasing, git log, merge tools, configuring merge tools, avoiding conflicts. Hands on Merge resolution.
Duration 5 Days 30 CPD hours Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture and main components of NSX Explain the features and benefits of NSX Deploy the NSX Management cluster and VMware NSX Edge⢠nodes Prepare VMware ESXi⢠hosts to participate in NSX networking Create and configure segments for layer 2 forwarding Create and configure Tier-0 and Tier-1 gateways for logical routing Use distributed and gateway firewall policies to filter east-west and north-south traffic in NSX Configure Advanced Threat Prevention features Configure network services on NSX Edge nodes Use VMware Identity Manager⢠and LDAP to manage users and access Explain the use cases, importance, and architecture of Federation This five-day, fast-paced course provides comprehensive training to install, configure, and manage a VMware NSX© environment. This course covers key features and functionality offered in the NSX 4.0.0.1 and NSX 4.0.1 releases, including the overall infrastructure, logical switching, logical routing, networking and security services, firewalls and advanced threat prevention, and more. Course Introduction Introductions and course logistics Course objectives VMware Virtual Cloud Network and VMware NSX Introduce the VMware Virtual Cloud Network vision Describe the NSX product portfolio Discuss NSX features, use cases, and benefits Explain NSX architecture and components Explain the management, control, data, and consumption planes and their functions. Preparing the NSX Infrastructure Deploy VMware NSX© ManagerTM nodes on ESXi hypervisors Navigate through the NSX UI Explain data plane components such as N-VDS/VDS, transport nodes, transport zones, profiles, and more Perform transport node preparation and configure the data plane infrastructure Verify transport node status and connectivity Explain DPU-based acceleration in NSX Install NSX using DPUs NSX Logical Switching Introduce key components and terminology in logical switching Describe the function and types of L2 segments Explain tunneling and the Geneve encapsulation Configure logical segments and attach hosts using NSX UI Describe the function and types of segment profiles Create segment profiles and apply them to segments and ports Explain the function of MAC, ARP, and TEP tables used in packet forwarding Demonstrate L2 unicast packet flow Explain ARP suppression and BUM traffic handling NSX Logical Routing Describe the logical routing function and use cases Introduce the two-tier routing architecture, topologies, and components Explain the Tier-0 and Tier-1 gateway functions Describe the logical router components: Service Router and Distributed Router Discuss the architecture and function of NSX Edge nodes Discuss deployment options of NSX Edge nodes Configure NSX Edge nodes and create NSX Edge clusters Configure Tier-0 and Tier-1 gateways Examine single-tier and multitier packet flows Configure static routing and dynamic routing, including BGP and OSPF Enable ECMP on a Tier-0 gateway Describe NSX Edge HA, failure detection, and failback modes Configure VRF Lite NSX Bridging Describe the function of logical bridging Discuss the logical bridging use cases Compare routing and bridging solutions Explain the components of logical bridging Create bridge clusters and bridge profiles NSX Firewalls Describe NSX segmentation Identify the steps to enforce Zero-Trust with NSX segmentation Describe the Distributed Firewall architecture, components, and function Configure Distributed Firewall sections and rules Configure the Distributed Firewall on VDS Describe the Gateway Firewall architecture, components, and function Configure Gateway Firewall sections and rules NSX Advanced Threat Prevention Explain NSX IDS/IPS and its use cases Configure NSX IDS/IPS Deploy NSX Application Platform Identify the components and architecture of NSX Malware Prevention Configure NSX Malware Prevention for east-west and north-south traffic Describe the use cases and architecture of VMware NSX© Intelligence? Identify the components and architecture of VMware NSX© Network Detection and Response? Use NSX Network Detection and Response to analyze network traffic events. NSX Services Explain and configure Network Address Translation (NAT) Explain and configure DNS and DHCP services Describe VMware NSX© Advanced Load Balancer? architecture, components, topologies, and use cases. Configure NSX Advanced Load Balancer Discuss the IPSec VPN and L2 VPN function and use cases Configure IPSec VPN and L2 VPN using the NSX UI NSX User and Role Management Describe the function and benefits of VMware Identity Manager? in NSX Integrate VMware Identity Manager with NSX Integrate LDAP with NSX Identify the various types of users, authentication policies, and permissions Use role-based access control to restrict user access Explain object-based access control in NSX NSX Federation Introduce the NSX Federation key concepts, terminology, and use cases. Explain the onboarding process of NSX Federation Describe the NSX Federation switching and routing functions. Describe the NSX Federation security concepts.
Networks demystified training course description A concise overview course covering all aspects of networking with particular emphasis of use of the 7 layer model as a framework for discussing and learning new network terms enabling delegates to recognise the main buzzwords used in the industry. What will you learn Use the 7 layer model to classify networking terms. Differentiate between LANS and WANS. Recognise bandwidth measurements. List LAN and WAN technologies. Recognise cabling issues in a network. Networks demystified training course details Who will benefit: Sales staff, managers and other non-technical personnel. Technical personnel may benefit more from our Intro to data communications and networking course. Prerequisites: None. Duration 1 day Networks demystified training course contents What are networks? What is a network? Types of network, Local Area Networks (LANs), Wide Area Networks (WANs), connecting networks together with routers. The 7 layer model What is the 7 layer model? The importance of standards, using the 7 layer model to classify networking terms. Cables Copper, Fibre, Air, standards, connectors, LAN cables, WAN cables, distance limitations, hubs and repeaters, other issues. The radio spectrum. Bandwidth Bits and bytes. Bandwidth measurements, common technologies and their bandwidth, the impact of applications on bandwidth. Full and half duplex. Joining cables together to increase bandwidth (Link aggregation). LANs and WANs What is Ethernet? What is WiFi? What are Leased lines? What is MPLS? Ethernet switches Ethernet 'packets', MAC addresses, what is a switch, what is the difference between a hub and a switch. TCP/IP What is TCP/IP? What is a protocol? What is IP? What is TCP? The role of routers in joining LANS and WANS, What is the Internet? Applications Ways to use the network, clients, servers, web browsing and HTTP, Email, instant messaging, multimedia applications.
Duration 5 Days 30 CPD hours This course is intended for Implementers and administrators who have experience with IBM Spectrum Protect. Overview After completing this course, you should be able to: Describe a multi-server IBM Spectrum Protect storage environment. Manage storage containers and traditional storage pools. Configure a multi-server environment. Improve data protection and recovery with replication. Enable advanced client functions. Protect and monitor the IBM Spectrum Protect environment. Use scripting to automate daily processing. Optimize the IBM Spectrum Protect server and client. Troubleshoot common problems. Describe the other IBM Spectrum Protect family products. IBM Spectrum Protect, formerly known as IBM Tivoli Storage Manager, is a data backup and recovery solution designed to help you manage your data retention, reduce the cost of storage, and provide appropriate recovery point objectives to meet any service level agreement. IBM Spectrum Protect offers improved efficiency and flexibility using objectbased data management, policy-driven retention, and an easy to use interface, the Operations Center.In this advanced-level course, you streamline your daily operations with the latest features, such as using Retention Sets for data retention, and using the Web Client 2.0 to restore data. You use the Operations Center and administrative command line to manage multiple IBM Spectrum Protect servers and nodes. This course also includes scripting, performance tuning, restoring the database and storage, and an overview of integration with IBM Spectrum Protect Plus 10.1.6. The hands-on exercises are performed on two Windows 2016 R2 virtual machines.This course is the second in a two-course series. It is for storage administrators familiar with the daily management of IBM Spectrum Protect, and focuses on the latest features, such as container pool storage. Basic concepts and installation are not covered in this course. TS618G, the first course in the series, IBM Spectrum Protect 8.1.9 Implementation and Administration, covers basic administration and installation. Unit 1 The IBM Spectrum Protect 8.1.11 environment Unit 2 Storage pool management overview Unit 3 Multi- server management Unit 4 Recovery and long-term retention Unit 5 Client functions and management Unit 6 Daily maintenance and monitoring Unit 7 Automation and scripting Unit 8 Tuning the server and client for optimization Unit 9 Troubleshooting and recovery
Duration 2 Days 12 CPD hours This course is intended for This class is intended for network engineers and network admins that are either using Google Cloud Platform or are planning to do so. The class is also for individuals that want to be exposed to software-defined networking solutions in the cloud. Overview Configure Google VPC networks, subnets, and routers Control administrative access to VPC objects Control network access to endpoints in VPCsInterconnect networks among GCP projects Interconnect networks among GCP VPC networks and on-premises or other-cloud networks Choose among GCP load balancer and proxy options and configure them Use Cloud CDN to reduce latency and save money Optimize network spend using Network TiersConfigure Cloud NAT or Private Google Access to provide instances without public IP addresses access to other services Deploy networks declaratively using Cloud Deployment Manager or Terraform Design networks to meet common customer requirements Configure monitoring and logging to troubleshoot networks problems Learn about the broad variety of networking options on Google Cloud. This course uses lectures, demos, and hands-on labs to help you explore and deploy Google Cloud networking technologies, including Virtual Private Cloud (VPC) networks, subnets, and firewalls; interconnection among networks; load balancing; Cloud DNS; Cloud CDN; and Cloud NAT. You'll also learn about common network design patterns and automated deployment using Cloud Deployment Manager or Terraform. Google Cloud VPC Networking Fundamentals Recall that networks belong to projects. Explain the differences among default, auto, and custom networks. Create networks and subnets. Explain how IPv4 addresses are assigned to Compute Engine instances. Publish domain names using Google Cloud DNS. Create Compute Engine instances with IP aliases. Create Compute Engine instances with multiple virtual network. Controlling Access to VPC Networks Outline how IAM policies affect VPC networks. Control access to network resources using service accounts. Control access to Compute Engine instances with tag-based firewall rules. Sharing Networks across Projects Outline the overall workflow for configuring Shared VPC. Differentiate between the IAM roles that allow network resources to be managed. Configure peering between unrelated VPC Networks. Recall when to use Shared VPC and when to use VPC Network Peering. Load Balancing Recall the various load balancing services. Configure Layer 7 HTTP(S) load balancing. Whitelist and blacklist IP traffic with Cloud Armor. Cache content with Cloud CDN. Explain Layer 4 TCP or SSL proxy load balancing. Explain regional network load balancing. Configure internal load balancing. Recall the choices for enabling IPv6 Internet connectivity for Google Cloud load balancers. Determine which Google Cloud load balancer to use when. Hybrid Connectivity Recall the Google Cloud interconnect and peering services available to connect your infrastructure to Google Cloud. Explain Dedicated Interconnect and Partner Interconnect. Describe the workflow for configuring a Dedicated Interconnect. Build a connection over a VPN with Cloud Router. Determine which Google Cloud interconnect service to use when. Explain Direct Peering and Partner Peering. Determine which Google Cloud peering service to use when. Networking Pricing and Billing Recognize how networking features are charged for. Use Network Service Tiers to optimize spend. Determine which Network Service Tier to use when. Recall that labels can be used to understand networking spend. Network Design and Deployment Explain common network design patterns. Configure Private Google Access to allow access to certain Google Cloud services from VM instances with only internal IP addresses. Configure Cloud NAT to provide your instances without public IP addresses access to the internet. Automate the deployment of networks using Deployment Manager or Terraform. Launch networking solutions using Cloud Marketplace. Network Monitoring and Troubleshooting Configure uptime checks, alerting policies and charts for your network services. Use VPC Flow Logs to log and analyze network traffic behavior.