Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. Security Fundamentals Overview The Growth of Environments and Security Our Motivation? The Goal: Protecting Information! CIA Triad in Detail Approach Security Holistically Security Definitions Definitions Relationships Method: Ping The TCP/IP Stack Which Services Use Which Ports? TCP 3-Way Handshake TCP Flags Malware Types of Malware Types of Malware Cont... Types of Viruses More Malware: Spyware Trojan Horses Back Doors DoS DDoS Packet Sniffers Passive Sniffing Active Sniffing Firewalls, IDS and IPS Firewall ? First Line of Defense IDS ? Second Line of Defense IPS ? Last Line of Defense? Firewalls Firewall Types: (1) Packet Filtering Firewall Types: (2) Proxy Firewalls Firewall Types ? Circuit-Level Proxy Firewall Type of Circuit- Level Proxy ? SOCKS Firewall Types ? Application-Layer Proxy Firewall Types: (3) Stateful Firewall Types: (4) Dynamic Packet-Filtering Firewall Types: (5) Kernel Proxies Firewall Placement Firewall Architecture Types ? Screened Host Multi- or Dual-Homed Screened Subnet Wi-Fi Network Types Wi-Fi Network Types Widely Deployed Standards Standards Comparison 802.11n - MIMO Overview of Database Server Review Access Controls Overview Role of Access Control Definitions More Definitions Categories of Access Controls Physical Controls Logical Controls ?Soft? Controls Security Roles Steps to Granting Access Access Criteria Physical Access Control Mechanisms Biometric System Types Synchronous Token Asynchronous Token Device Memory Cards Smart Card Cryptographic Keys Logical Access Controls OS Access Controls Linux Access Controls Accounts and Groups Password & Shadow File Formats Accounts and Groups Linux and UNIX Permissions Set UID Programs Trust Relationships Review Protocols Protocols Overview OSI ? Application Layer OSI ? Presentation Layer OSI ? Session Layer Transport Layer OSI ? Network Layer OSI ? Data Link OSI ? Physical Layer Protocols at Each OSI Model Layer TCP/IP Suite Port and Protocol Relationship Conceptual Use of Ports UDP versus TCP Protocols ? ARP Protocols ? ICMP Network Service ? DNS SSH Security Protocol SSH Protocols ? SNMP Protocols ? SMTP Packet Sniffers Example Packet Sniffers Review Cryptography Overview Introduction Encryption Cryptographic Definitions Encryption Algorithm Implementation Symmetric Encryption Symmetric Downfalls Symmetric Algorithms Crack Times Asymmetric Encryption Public Key Cryptography Advantages Asymmetric Algorithm Disadvantages Asymmetric Algorithm Examples Key Exchange Symmetric versus Asymmetric Using the Algorithm Types Together Instructor Demonstration Hashing Common Hash Algorithms Birthday Attack Example of a Birthday Attack Generic Hash Demo Instructor Demonstration Security Issues in Hashing Hash Collisions MD5 Collision Creates Rogue Certificate Authority Hybrid Encryption Digital Signatures SSL/TLS SSL Connection Setup SSL Hybrid Encryption SSH IPSec - Network Layer Protection IPSec IPSec Public Key Infrastructure Quantum Cryptography Attack Vectors Network Attacks More Attacks (Cryptanalysis) Review Why Vulnerability Assessments? Overview What is a Vulnerability Assessment? Vulnerability Assessment Benefits of a Vulnerability Assessment What are Vulnerabilities? Security Vulnerability Life Cycle Compliance and Project Scoping The Project Overview Statement Project Overview Statement Assessing Current Network Concerns Vulnerabilities in Networks More Concerns Network Vulnerability Assessment Methodology Network Vulnerability Assessment Methodology Phase I: Data Collection Phase II: Interviews, Information Reviews, and Hands-On Investigation Phase III: Analysis Analysis cont. Risk Management Why Is Risk Management Difficult? Risk Analysis Objectives Putting Together the Team and Components What Is the Value of an Asset? Examples of Some Vulnerabilities that Are Not Always Obvious Categorizing Risks Some Examples of Types of Losses Different Approaches to Analysis Who Uses What? Qualitative Analysis Steps Quantitative Analysis ALE Values Uses ALE Example ARO Values and Their Meaning ALE Calculation Can a Purely Quantitative Analysis Be Accomplished? Comparing Cost and Benefit Countermeasure Criteria Calculating Cost/Benefit Cost of a Countermeasure Can You Get Rid of All Risk? Management?s Response to Identified Risks Liability of Actions Policy Review (Top-Down) Methodology Definitions Policy Types Policies with Different Goals Industry Best Practice Standards Components that Support the Security Policy Policy Contents When Critiquing a Policy Technical (Bottom-Up) Methodology Review Vulnerability Tools of the Trade Vulnerability Scanners Nessus SAINT ? Sample Report Tool: Retina Qualys Guard http://www.qualys.com/products/overview/ Tool: LANguard Microsoft Baseline Analyzer MBSA Scan Report Dealing with Assessment Results Patch Management Options Review Output Analysis and Reports Overview Staying Abreast: Security Alerts Vulnerability Research Sites Nessus SAINT SAINT Reports GFI Languard GFI Reports MBSA MBSA Reports Review Reconnaissance, Enumeration & Scanning Reconnaissance Overview Step One in the Hacking ?Life-Cycle? What Information is Gathered by the Hacker? Passive vs. Active Reconnaissance Footprinting Defined Social Access Social Engineering Techniques Social Networking Sites People Search Engines Internet Archive: The WayBack Machine Footprinting Tools Overview Maltego GUI Johnny.Ihackstuff.com Google (cont.) Domain Name Registration WHOIS Output DNS Databases Using Nslookup Traceroute Operation Web Server Info Tool: Netcraft Introduction to Port Scanning Which Services use Which Ports? Port Scan Tips Port Scans Shou
LINX 3 training course description A detailed study of BGP, from the basics of how it works through to advanced issues such as route reflectors, policy, filtering, route selection and routing registries. The course culminates with a study of an industrial strength BGP template illustrating important issues such as bogon filtering. Practical hands on with routers follow the major sessions to reinforce the theory. A multiple choice exam, leading to the LAIT III certification, is available after the course. The exam consists of 60 questions and lasts 2 hours. What will you learn Connect enterprises to the Internet, and ISPs to each other. Describe how BGP works. List, describe and configure the main BGP attributes. Implement and troubleshoot BGP. Work with route aggregation and calculate CIDR prefixes in seconds. Influence traffic paths with BGP. LINX 3 training course details Who will benefit: Network engineers. Prerequisites: LAIT I and II OR CCNP and take LAIT I and LAIT II exams whilst on this course. Duration 5 days LINX 3 training course contents Basic BGP IGPs, EGPs, What's BGP? BGP RIB, in/out process, tables peers, adding routes. Hands on Simple configuration and troubleshooting. The Internet and peering ASs, AS numbers, Internet structure, ISP types, ISP network design, IXs, peering vs. transit, public/ private peering, bi/multi-lateral peering. Hands on AS information gathering. How BGP works Incremental updates, Path vector protocols, BGP protocol stack, the BGP header, message types, NLRI, withdrawn routes, route refresh, route dampening. Hands on More troubleshooting, packet analysis. MBGP and IPv6 Multiprotocol routing, AFI, SAFI, MBGP and multicasts, IPv6, MPLS VPNs. Hands on IPv6 BGPv4 aggregation CIDR, benefits, techniques, shortcuts, configuring BGP aggregation, leaking routes. Hands on Reducing routing table size. BGP path selection BGP attributes, attribute types, route selection order, Local preference, AS prepend, MEDs. Hands on Influencing traffic with BGP. BGP routing policies What is policy? Examples, route filtering, AS filtering, REs, applying preference selectively, peer groups. Hands on Sophisticated policies. RIPE and routing registries RIRs, Allocations, assignments, PI vs. PA. Objects, RPSL, routing registry, Hands on The RIPE database. Automating BGP configuration Automation tools, whois, IRRToolSet, Bogon lists, tracking bogon lists, HTTP, Peering, routing registries, DNS. Communities What is a community? Community names, communities for: peer types and geography. RFC 1998, default communities. Hands on Setting local preference on other routers. Route servers What are route servers? LINX route servers, route server policy control, What are route collectors, Looking glasses. Hands on Setting up and working with a route server. Peer relationships IBGP, EBGP, next hop self, advertising routes into/out of BGP, synchronisation. Hands on IBGP, troubleshooting a large BGP network. Route reflectors and confederations Full mesh IBGP, Route reflectors, RR configuration and design, confederations, migration issues. Hands on RR configuration. BGP architectures Stub vs. transit AS, when to use BGP, multihoming strategies and issues, default routes. Multihop EBGP, load balancing. Hands on Multihoming. BGP security RFC 7454, security steps, BGP TTL security, filters, RPKI, ROAs, rsync, rrdp, validators. A secure BGP template. Hands on RPKI prefix validation.
24 Hour Flash Deal **25-in-1 Door Supervisor Advanced Diploma Mega Bundle** Door Supervisor Advanced Diploma Enrolment Gifts **FREE PDF Certificate**FREE PDF Transcript ** FREE Exam** FREE Student ID ** Lifetime Access **FREE Enrolment Letter ** Take the initial steps toward a successful long-term career by studying the Door Supervisor Advanced Diploma package online with Studyhub through our online learning platform. The Door Supervisor Advanced Diploma bundle can help you improve your CV, wow potential employers, and differentiate yourself from the mass. This Door Supervisor Advanced Diploma course provides complete 360-degree training on Door Supervisor Advanced Diploma. You'll get not one, not two, not three, but twenty-five Door Supervisor Advanced Diploma courses included in this course. Plus Studyhub's signature Forever Access is given as always, meaning these Door Supervisor Advanced Diploma courses are yours for as long as you want them once you enrol in this course This Door Supervisor Advanced Diploma Bundle consists the following career oriented courses: Course 01: Door Supervisor Training Course 02: Basic Security Guard Training Course 03: Diploma in Security Management Course 04: Close Protection Certificate Course 05: Conflict Management Course 06: Criminal Intelligence & Counterterrorism Analysis Course 07: Criminal Procedure, Law and Psychology Diploma Course 08: Crowd Management Course 09: Cyber Security Awareness Training Course 10: Decision Making and Critical Thinking Online Course Course 11: Equality, Diversity and Discrimination Course 12: Evacuation Procedures Training Course 13: Fire Safety Course 14: First Aid Training Certification Course 15: Lone Worker Safety & Protection Course 16: Mental Health and Wellbeing Course 17: Personal Hygiene Course 18: Professional Crisis Management Certificate Course 19: Public Health and Safety Course 20: Risk Assessment & Management Course 21: Safeguarding Children & Child Risk Assessment Course 22: Stress Management Training Course 23: Traffic Marshal (Banksman) Certification Course 24: Workplace Communication Management Course 25: Workplace Violence, Harassment and Conflict Resolution Training The Door Supervisor Advanced Diploma course has been prepared by focusing largely on Door Supervisor Advanced Diploma career readiness. It has been designed by our Door Supervisor Advanced Diploma specialists in a manner that you will be likely to find yourself head and shoulders above the others. For better learning, one to one assistance will also be provided if it's required by any learners. The Door Supervisor Advanced Diploma Bundle is one of the most prestigious training offered at StudyHub and is highly valued by employers for good reason. This Door Supervisor Advanced Diploma bundle course has been created with twenty-five premium courses to provide our learners with the best learning experience possible to increase their understanding of their chosen field. This Door Supervisor Advanced Diploma Course, like every one of Study Hub's courses, is meticulously developed and well researched. Every one of the topics is divided into Door Supervisor Advanced Diploma Elementary modules, allowing our students to grasp each lesson quickly. The Door Supervisor Advanced Diploma course is self-paced and can be taken from the comfort of your home, office, or on the go! With our Student ID card you will get discounts on things like music, food, travel and clothes etc. In this exclusive Door Supervisor Advanced Diploma bundle, you really hit the jackpot. Here's what you get: Step by step Door Supervisor Advanced Diploma lessons One to one assistance from Door Supervisor Advanced Diplomaprofessionals if you need it Innovative exams to test your knowledge after the Door Supervisor Advanced Diplomacourse 24/7 customer support should you encounter any hiccups Top-class learning portal Unlimited lifetime access to all twenty-five Door Supervisor Advanced Diploma courses Digital Certificate, Transcript and student ID are all included in the price PDF certificate immediately after passing Original copies of your Door Supervisor Advanced Diploma certificate and transcript on the next working day Easily learn the Door Supervisor Advanced Diploma skills and knowledge you want from the comfort of your home CPD 250 CPD hours / points Accredited by CPD Quality Standards Who is this course for? This Door Supervisor Advanced Diploma training is suitable for - Students Recent graduates Job Seekers Individuals who are already employed in the relevant sectors and wish to enhance their knowledge and expertise in Door Supervisor Advanced Diploma Requirements To participate in this Door Supervisor Advanced Diploma course, all you need is - A smart device A secure internet connection And a keen interest in Door Supervisor Advanced Diploma Career path You will be able to kickstart your Door Supervisor Advanced Diploma career because this course includes various courses as a bonus. This Door Supervisor Advanced Diploma is an excellent opportunity for you to learn multiple skills from the convenience of your own home and explore Door Supervisor Advanced Diploma career opportunities. Certificates CPD Accredited Certificate Digital certificate - Included CPD Accredited e-Certificate - Free CPD Accredited Hardcopy Certificate - Free Enrolment Letter - Free Student ID Card - Free
This intermediate course provides hands-on training of white, grey, and black hat skills every cybersecurity professional needs to know.
If you are looking to expand your knowledge in Man in the Middle attacks, then this is the right course for you. Starting from setting up your Kali Linux lab environment and communication between devices to the basics of MITM attacks, this course covers it all. A course that focuses on both the practical and theoretical aspects.
Description Linux has grown into an industry-leading software and service delivery platform that is used for everything from super computers and Web servers to virtualized systems and your Android phone. This growth creates a high demand for qualified Linux professionals. This CompTIA Linux+ Certification - Complete Video Course is designed to prepare you for the CompTIA Linux+ certification exam. It will provide you a comprehensive look at common tasks performed by system administrators. This includes installation, Management of Linux systems from the command line and the GUI, user administration, file permissions, customization, software configuration, Management of Linux-based clients, troubleshooting, and much more. Expanded coverage of networking and security are covered, which is in step with the CompTIA exam objectives. With this course, you'll acquire the fundamental skills and knowledge you need to successfully configure, manage and troubleshoot Linux systems. Assessment & Certification To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee. Hardcopy Certificate by post - £19 Soft copy PDF via email - £10 Requirements Our CompTIA Linux+ Certification - Complete Video Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Installation Linux Introduction FREE 00:25:00 Pre-installation Tasks 00:09:00 Linux Installation 00:18:00 Using Linux Graphical User Interfaces 00:26:00 Command Line Linux 00:56:00 File and Directory Management Directory Organization 00:33:00 File Management 00:58:00 Removable Storage 00:19:00 System Administration Users and Groups 00:57:00 File and Directory Permissions 00:53:00 User Environment Configuration 00:29:00 GUI Configuration 00:18:00 Application Management Packages and Package Managers 00:30:00 Source Code Software 00:20:00 System Configuration Disk Management 00:46:00 File System Management 00:29:00 Device Management 00:13:00 Process and Module Management Process Management 00:35:00 Process Priority and Execution 00:12:00 Kernel Modules 00:24:00 System Maintenance Backup and Restore 00:38:00 Scheduling Tasks 00:14:00 Performance Monitoring 00:26:00 Logging 00:39:00 Networking Networking Basics 00:58:00 Network Services 00:36:00 Domain Name Services 00:29:00 File Sharing and Printing Network File Resources 00:25:00 Printing 00:16:00 Interoperability Network Interoperability 00:18:00 Remote Desktop Access 00:08:00 Security System Security 00:23:00 Network Security 00:32:00 Web Environment Web Services 00:43:00 MySQL Services 00:13:00 FTP and Email Services FTP Services 00:36:00 Mail Services 00:05:00 Troubleshooting and Maintenance Booting Linux 00:28:00 Network Troubleshooting 00:11:00 Scripting Basics 00:08:00 Mock Exam Mock Exam- CompTIA Linux+ Certification - Complete Video Course 00:20:00 Final Exam Final Exam- CompTIA Linux+ Certification - Complete Video Course 00:20:00 Order Your Certificates and Transcripts Order Your Certificates and Transcripts 00:00:00
48-Hour Knowledge Knockdown! Prices Reduced Like Never Before! This Certificate in Close Protection at QLS Level 3 course is endorsed by The Quality Licence Scheme and accredited by CPDQS (with 120 CPD points) to make your skill development & career progression more accessible than ever! Our unique Close Protection at QLS Level 3 course might help you improve your current abilities or make a life-changing career move! It is an expertly designed course on Close Protection which ensures you learn everything about the topic thoroughly. Expand your expertise with high-quality training from the Close Protection at QLS Level 3 course. Due to Close Protection at QLS Level 3's massive demand in the competitive market, you can use our comprehensive course as a weapon to strengthen your knowledge. Learn from the Close Protection at QLS Level 3 course and quickly equip yourself with the specific knowledge and skills you need to excel in your chosen career. Close Protection involves the meticulous planning and execution of security measures to safeguard individuals or groups from potential threats. This comprehensive course is designed to equip participants with the knowledge and skills essential for a successful career in the field of Close Protection. The course encompasses a broad spectrum of topics, ranging from threat assessment to legislative intricacies surrounding Close Protection. This Close Protection at QLS Level 3 training can help you accomplish your ambitions and prepare you for a meaningful career. So, join us today and gear up for excellence! Learning Outcomes: Apply Close Protection strategies adeptly across diverse scenarios Showcase Close Protection team dynamics proficiency Hone meticulous planning skills for Close Protection security operations Conduct precise threat assessments in various Close Protection environments Master Close Protection vehicle drills, encompass Embus and Debus techniques Grasp legislation intricacies governing Close Protection operations Why Prefer This Course? Earn a Close Protection certificate endorsed by the Quality Licence Scheme and CPDQS-accredited certification for free. Receive a free Close Protection student ID card. Enjoy innovative, engaging Close Protection course content. Benefit from free Close Protection assessments. Access 24/7 Close Protection tutor support. Take a step toward a brighter future! *** Course Curriculum *** Module 01: Introduction Module 02: The Close Protection Team Module 03: The Planning Module 04: Threat Assessment Module 05: Vehicle Drills: Embus and Debus Module 06: Route Selection and Reconnaissance Module 07: Legislation Regarding Close Protection Assessment Process You have to complete the assignment questions given at the end of the course and score a minimum of 60% to pass each exam. Our expert trainers will assess your assignment and give you feedback after you submit the assignment. You will be entitled to claim a certificate endorsed by the Quality Licence Scheme after you have completed all of the Certificate in Close Protection at QLS Level 3 exams. CPD 120 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Close Protection at QLS Level 3 This Close Protection at QLS Level 3 course is perfect for highly motivated people who want to improve their technical skills like: Security professionals Law enforcement Corporate personnel Requirements Close Protection at QLS Level 3 No prior background or expertise is required to enrol in this Close Protection Course. Career path The Close Protection at QLS Level 3 course will boost your CV and aims to help you get jobs such as: Close Protection Officer Security Consultant Executive Security Private Security Certificates Certificate in Close Protection at QLS Level 3 Hard copy certificate - Included After successfully completing the Certificate in Close Protection at QLS Level 3, you can order an original hardcopy certificate of achievement endorsed by the Quality Licence Scheme andalso you can order CPDQSAccredited Certificate that is recognised all over the UK and also internationally. The certificates will be home-delivered, completely free of cost. CPDQS Accredited Certificate Digital certificate - Included
This is a complete and comprehensive CompTIA Network+ Certification (N10-008) course. It is designed to prepare the student to be able to take and pass the certification exam needed to become CompTIA Network+ Certified.
Network management technologies course description A comprehensive tour of the available network management technologies available for todays networks. The course starts with basic tools such as syslog along with Python network automation. SNMP is then covered with the *flow technologies and streaming telemetry. Configuration management with ansible, Python, NETCONF and RESTCONF is then studied. The final part of the course looks at SDN. Hands on sessions are used throughout to reinforce the theory rather than teach specific manufacturer equipment. Note that sections are available as individual courses. What will you learn Evaluate network management technologies. Evaluate network management technologies. Recognise the weaknesses of SNMP versus NETCONF and streaming telemetry. Explain the role of NETCONF and RESTCONF. Compare & contrast *flow and streaming telemetry. Explain the role of SDN in network management. Automate network configuration with ansible and Python. Network management technologies course details Who will benefit: Those wishing to manage networks. (Previous Python experience is NOT needed) Prerequisites: Intro to data comms Duration 5 days Network management technologies course content Basic network management Network management What is network management? Benefits, issues. FCAPS model. Fault management, Configuration management, accounting, performance, security. What to manage, what not to manage. Managing network devices, managing servers. Monitoring networks Traditional network tools Ping..., SSH, syslog, TFTP for configurations. nmap. Wireshark. CLI. Web based management. Splunk. Nessus, snort, Kali. Hands on syslog, network inventories. Network automation using the CLI Programming and automating networks, netOps. Python, Git. Python network modules, SSH, paramiko, netmiko. EVE-NG. Hands onPython network modules. Structured versus unstructured data Problems with automation and unstructured data. XML, JSON, YAML. The role of YANG. Hands on Parsing data. SNMP SNMP architecture, SNMP MIBs, SMI, the SNMP protocol, polling security. Configuring SNMP. SNMPv1, v2, v3, SNMP security. Which version should you use? MIBs and MIB structure. mib-2, extra parts of mib-2, Private enterprise MIBs. Summary: What SNMP is good/bad at. Hands on Configuring agents and a NMS. MIB browsing. Server management Microsoft, Linux, application polling. WMI vs SNMP. Hands on: Application polling. Performance management *flow Polling, push vs pull, netflow, sflow, IPFIX, *flow. Flows. Where to monitor traffic. Comparing *flow with SNMP. Architecture: Generators and collectors. When flows are exported. NetFlow reporting products. SolarWinds. Hands on Netflow configuration. Collectors. Streaming telemetry Model driven telemetry, periodic/on change. Structured data. Telemetry protocol stack. gRPC and gNMI. Protobuf. gNMI operations. Telemetry architecture. Telegraf, databases, Grafana. Hands on Telemetry example. Configuration management Configuration management tools Chef, puppet, ansible, saltstack. Ansible architecture, controlling machines, nodes, agentless, SSH, modules. Inventories, playbooks, modules, network modules, jinja2 templates. Hands on Network configuration with ansible. NETCONF What is NETCONF? Protocol stack, Data stores, traffic flows, validating configurations, rollback. YANG data models and how YANG is used by NETCONF. XML. Explorers and other tools. Hands on anx, Python and NETCONF. RESTCONF The REST API, HTTP, What is RESTCONF? Tools including Postman. Comparison with NETCONF. Hands on Configuration with RESTCONF. Python network automation: configuration SSH issues. Using structured data. Jinja2. ncclient, requests, NAPALM, Nornir. Automated testing. Hands on Python network device configuration with nornir. Software Defined Networks and orchestration Classic SDN What is SDN? benefits. SDN architecture. SDN applications, SDN switches, SDN controllers, Network Operating Systems. Control plane, data plane. Northbound interfaces. SDN components. Southbound interfaces. OpenFlow. ONF, OpenFlow ports, Flow tables. Network virtualization Virtual networks, virtual switches, NfV. Service chaining. NfV and SDN. SDN implementations Classic SDN, Hybrid SDN, SDN via APIs, SDN via overlays. Data centre SDN, VXLAN, Service Provider SDN, SD WAN, Enterprise SDN, WiFi. SDN and open source OpenDaylight, OpenVSwitch, Open Networking Forum, Open Network Operating System. Hands onOpenStack. SD-WAN What is SD-WAN? Architecture: Edge, gateway, orchestrator, controller. Overlay and underlay. Use of MPLS, 4G/5G. Benefits and features. Secure Access Service Edge (SASE).