Advanced Asterisk training course description This 2 day hands-on Asterisk training course covers advanced Asterisk configuration including fault tolerant clusters, upgrading and patching Asterisk servers, firewall and NAT transversal, using databases to store Asterisk data. Practical sessions follow each major section to reinforce the theory. What will you learn Configure advanced Asterisk features. Utilise databases from Asterisk Integrate Asterisk with SIP servers. Build High Availability Asterisk clusters. Maintain and secure Asterisk servers. Advanced Asterisk training course details Who will benefit: Technical staff working with or evaluating Asterisk. Prerequisites: Definitive Asterisk for engineers Duration 2 days Advanced Asterisk training course contents Best Practice Review of basics, Channel best practice, dial plan best practise. Call Centre Features GUI, Asterisk Manager Interface, billing, CDR, advanced IVR, ACD, Vici Dial. Hands on Install Vici-Dial Asterisk and Databases MySQL, LDAP, ODBC, dial plan from a Database, storing CDR in a Database, Hands on Dial plan in MySQL, CDR in MySQL. TDM over Ethernet What is TDMoE, Asterisk to Asterisk TDMoE, Phone Bridge. Hands on * 2 * via TDMoE. High Availability Asterisk HA Linux - Virtual Servers, Fail-over steps, setting up HA Linux, configuring Asterisk for fail-over on HA Linux, Hands on Configure Asterisk HA. Advanced Dial plans Asterisk Gateway Interface, AGI IVR applications, Multiple switches sharing Dial plans, ENUM, DUNDI. Hands on Configure DUNDI. Integration Legacy PBX, SIP Proxys, OpenSER. Hands on Configure SER to work with Asterisk. Asterisk Maintenance Asterisk upgrades, implementing patches, advanced debugging, Security Firewalls, NAT, Asterisk security issues. Hands on Configure Asterisk to work through a Firewall and NAT.
RADIUS training course description A fast paced hands-on introduction to RADIUS. Moves from installation and configuration through to packet analysis and accounting. Practical exercises are spread throughout the course to maintain student interest. What will you learn Configure PPP and PAP/CHAP. Install and configure RADIUS servers. Describe how RADIUS works. Setup RADIUS accounting. Analyse RADIUS packets. Troubleshoot RADIUS installations. RADIUS training course details Who will benefit: Network Administrators. Support personnel. Anyone who will be working with RADIUS. Prerequisites: Knowledge of the TCP/IP protocols would be advantageous. Duration 2 days RADIUS training course contents What is RADIUS? AAA services, Authentication, Authorisation, Accounting, local AAA services, remote AAA services, What is RADIUS? RADIUS as a protocol, RADIUS as an architecture, RADIUS as a standard. Installing RADIUS RADIUS platforms, RADIUS servers, client server communications, services, daemons. Hands on Installing RADIUS and testing with NTRadPing. Server configuration Configuring clients on the server, shared secrets, usernames and passwords. IP address pools. Hands on Configuring a server and testing with NTRadPing. Client configuration Example clients, client configuration steps, enabling RADIUS, pointing clients to the server, shared secrets, example Cisco authentication, example Cisco authorization. Hands on Configuring clients for RADIUS. How RADIUS works RADIUS architecture, RADIUS and authentication, PPP, PAP, CHAP, RADIUS SUCCESS, RADIUS FAILURE, the RADIUS protocol stack, the RADIUS protocol, the RADIUS header, RADIUS codes, RADIUS attributes, ACCESS-REQUEST example, ACCESS-ACCECPT example, CHAP example, proprietary attributes, using unassigned type codes, RADIUS attribute 26, Cisco specific attributes. Hands on Analysing RADIUS packets, configuring PPP CHAP to work with RADIUS. RADIUS accounting Simplified operation, Accounting codes, Accounting attributes, client and server configuration for accounting. Hands on Configuring RADIUS accounting. RADIUS architectures Traditional architecture, multiple RADIUS servers for resilience, Proxy RADIUS servers, Realms, RADIUS in VPNs, RADIUS with 802.1x. Hands on Using multiple RADIUS servers, Proxies. Troubleshooting RADIUS General problem solving, basic tools, RADIUS troubleshooting, Common configuration errors, log files, RADIUS design and performance. Hands on Fixing RADIUS problems.
SNMPc training course description A hands on course providing a solid foundation on network management using SolarWinds. The course specifically focusses on SolarWinds Orion Network Performance Monitor. The course starts with configuring agents and device discovery, onto exploiting SNMP with SolarWinds and then Alerts, reports and customisation of menus, views and maps. What will you learn Discover devices using Solarwinds. Use Solarwinds. Poll and monitor devices using Solarwinds. Create Alarms and reports. Diagnose faults using Solarwinds. SNMPc training course details Who will benefit: Technical staff working with Solarwinds. Prerequisites: None. Duration 2 days SNMPc training course content Getting started with SNMPc Manual discovery, automatic discovery, controlling IP discovery, mapping network devices. Hands on Using SNMPc. Agents Configuring Cisco devices for SNMP support, communities, traps, syslog. MIBs. Hands on Device discovery. Adding devices. Customising maps. Using SNMPc Polling, obtaining MIB information, MIB walking. Compiling MIBs. Hands on Monitoring devices. Groups. MIB walking. SNMP traps. Alarms Events and alarms, thresholds, event actions. Hands on Automatic alarms. Reports Creating reports, trend reports, customising reports. Hands on Performance reports. Graphs. Administration Users, customised views, backups, the database. Hands on Adding a user. Backups.
Hardening Cisco devices training course description A hands on course focusing on how to lock down Cisco IOS routers and switches. What will you learn Harden Cisco devices. Hardening Cisco devices training course details Who will benefit: Technical network staff. Technical security staff. Prerequisites: TCP/IP foundation for engineers. Duration 5 days Hardening Cisco devices training course content Introduction Router security, Switch security, Cisco IOS, IOS versions, Cisco advisories, the management plane, control plane, data plane. Hands on Checking IOS versions and advisories. Access control Infrastructure ACLs, Transit ACLs. Hands on Restricting access to the device, Filtering data traffic. Management plane: Securing operations Passwords, privilege levels, AAA, TACACS+, RADIUS. Hands on Password management. Management plane: Other general hardening Logging best practices, secure protocols, encrypting management sessions, configuration management. Hands on Hardening the management plane. Control plane Disabling reception and transmission of certain messages, Limiting CPU impact of control plane traffic, securing routing protocols. Hands on Hardening the control plane. Data plane Transit ACLs, disabling unused services, disabling unnecessary protocols, anti spoofing, limiting CPU impact of data plane traffic, identifying and tracing traffic, Netflow, VLANs, port security. Hands on hardening the data plane.
WhatsUp Gold training course description A hands on course focusing on network management using WhatsUp Gold. What will you learn Discover devices using WhatsUp Gold. Use WhatsUp Gold. Poll and monitor devices using WhatsUp Gold. Create Alarms, alerts and reports. Diagnose faults using WhatsUp Gold. Administrate a WhatsUp Gold system. WhatsUp Gold training course details Who will benefit: Technical staff working with WhatsUp Gold. Prerequisites: None. Duration 2 days WhatsUp Gold for engineers Getting started with WhatsUp Gold Starting WhatsUp Gold, manual discovery, automatic discovery, controlling IP discovery, mapping network devices. Hands on Using WhatsUp Gold. Agents Configuring Cisco devices for SNMP support, communities, traps, syslog. MIBs. Hands on Device discovery. Adding devices. Customising maps. Using WhatsUp Gold Polling, obtaining MIB information, MIB walking, Active monitors, critical monitors, passive monitors. Hands on Monitoring devices. Groups. MIB walking. SNMP trap monitor. Syslog monitor. Alarms Actions, Alert centre, thresholds, actions on events. Hands on Using the alert centre. Web tools. Reports Creating reports, automatic reports, customising reports. Hands on Performance reports. Graphs. Administration Users, backups, the database. Hands on Adding a user. Backups.
Session Border Controllers course description A hands on course covering Session Border Controllers with a focus on the technical workings of features commonly found in Session Border Controllers. Hands on practicals follow each major theory session. What will you learn Explain how Session Border Controllers work. Explain the SIP call flow using a SBC. Deploy Session Border Controllers Describe the features found in Session Border Controllers. Session Border Controllers course details Who will benefit: Technical staff working with SIP. Prerequisites: Definitive SIP for engineers Duration 2 days Session Border Controllers course contents SIP review Signalling, media, RTP, SIP, peer to peer, SIP proxies, SIP call flows. Hands on: SIP packet analysis. Session Border Controllers What is a SBC? SBC features, peering scenario, access scenario, NNI SBC, UNI SBC, enterprise SBC. Hands on: SBC call flows SBC topology hiding Header privacy, B2BUA. Hands on: Header analysis. Session control Call admissions, QoS, statistics and billing, redundancy and scalability. Hands on: SBC session control SBC and NAT NAT traversal, STUN, ICE, NAT and SIP, NAT and RTP. Hands on: SBC and NAT traversal. SBC and security DoS, access control, encryption, authentication, toll fraud, regulatory issues, lawful intercept. Hands on: Security. Interoperability mediation Manipulating SIP headers, IMS, IETF, TISPAN, SIP-I. SBC interworking.
MRTG training course description A hands on course focusing on the installation, configuration and use of the MRTG network monitoring and graphing tools. What will you learn Install MRTG. Configure MRTG. Use MRTG to monitor networks. MRTG training course details Who will benefit: Anyone working with MRTG. Prerequisites: Total SNMP for engineers Duration 2 days MRTG training course contents What is MRTG? Network monitoring, review of SNMP. What MRTG does do, what MRTG doesn't do, MRTG architecture, MRTG components. Hands on configuring SNMP support on network devices, configuring extended SNMP support on Windows. Installing MRTG Configuring MRTG tasks, .cfg files, index.html files, running MRTG tasks, instances. Hands on Configuring and running MRTG tasks. MRTG tasks Configuring MRTG tasks, .cfg files, index.html files, running MRTG tasks, instances. Hands on Configuring and running MRTG tasks. MRTG graphs Daily, weekly, monthly, yearly, MRTG database support, RRDTOOL. Hands on MRTG graphs. Using MRTG MRTG examples, custom SNMP OIDs, using the MRTG configuration reference. Hands on MRTG examples. RRDTOOL Installing RRD database support, MRTG instances with the RRD database, RRD database structure, resizing and extending the database. Exporting database records into plain text and XML formats, on demand MRTG graphs using the database. Hands on Using MRTG with RRD database support. Alternatives to MRTG MRTG strengths and weaknesses, scalability, cricket, cacti, other SNMP tools.
ZigBee training course description A hands on course covering the entire ZigBee protocol stack. ZigBee operation, primitives and frame formats are covered in detail using software tools to test and analyse ZigBee commands and demonstrate how these affect the 802.15.4 MAC. Analysers are used to decode packet formats. What will you learn Describe the ZigBee architecture and applications. Explain the workings of ZigBee protocol stack including the 802.15.4, NWK, APS and ZDO sub layers. Describe in detail the ZigBee primitives and how they are used to pass data; make networks; join networks and repair networks. Secure ZigBee networks. ZigBee training course details Who will benefit: Technical staff requiring grounding in ZigBee including application engineers. Prerequisites: RF fundamentals. Duration 2 days ZigBee training course contents Wireless data overview What is 802.15.4 and ZigBee? WLAN, WPAN, Bluetooth vs. ZigBee. Markets. Applications and architecture. ZigBee demonstration. ZigBee Standards and technology The 7-layer model, IEEE WPAN standards overview, 802.15.4 & ZigBee, ZigBee alliance. ZigBee Protocol stack The ZigBee 5 layer model, The network (NWK) sub layer, Application support sub layer (APS), the ZigBee Device Object (ZDO). 802.15.4 Radio Frequencies, modulation, power, DSSS, BPSK/ O-QPSK, channels, symbols, chips and bit rate. 802.15.4 PHY PHY data transfer primitives. The PHY packet. PHY PIB management. 802.15.4 MAC layer The MAC layer overview, CSMA/CA, addresses, frame types, super frames, MAC layer: Data, Data control, Scan and join, PAN maintenance, MAC PIB. Hands on 802.15.4 frame analysis. ZigBee Topologies Point to point topology, star topology, cluster tree, wired integration. Hands on Building a ZigBee network. ZigBee frame formats General frame format, data frames, command frames. Hands on Analysing ZigBee frames. ZigBee NWK NWK data primitives: Request. Confirm. Indication. NWK management primitives: Network discovery, network formation. Permit joining. Start router. Join. Direct join. Leave. Reset. Sync. NWK database management. Hands on NWK analysis ZigBee APS Address mapping, matching devices, binding devices, binding tables. Hands on APS analysis. ZigBee ZDO Device roles, binding requests, initiating and responding, device discovery, service discovery, network management. ZDO Endpoint 0. ZigBee Security Security issues, security modes, MAC security, NWK security, APS security. Applications Writing ZigBee applications, application profiles, End points, Endpoint addressing, clusters of attributes, broadcasts. Hands on Sample ZigBee application.
OpenSSL for engineers training course description A hands on course covering OpenSSL. The course focusses on the use of OpenSSL from the command line as opposed to using its extensive libraries. Certificate authorities are configured along with key generation, HTTPS and a SSL VPN. What will you learn Describe OpenSSL. Use OpenSSL. Describe and implement: Explain how the various technologies involved in an OpenSSL work. OpenSSL for engineers training course details Who will benefit: Network personnel. Prerequisites: IP security foundation for engineers Duration 2 days OpenSSL for engineers training course contents What is OpenSSL? What is SSL? SSL versions, TLS, TLS negotiation, TLS authentication, What is OpenSSL, Command line tool, SSL library. OpenSSH, OpenVPN. Hands on TLS packet analysis. Getting started with OpenSSL Downloading, source code, packages, installing, versions, configuration, openssl command. Cipher suite selection. Hands on Encrypting a file with openssl. Public and private keys Algorithms, creating keys, public keys, private keys, encrypting the private key. Hands on Encrypting a file with keys. Digital signatures Creating signatures, checking validity of signatures, Self signing SSL certificates. Viewing certificates. Certificate files. Converting between formats. Hands on Securing a web server with HTTPS. Simple PKI with OpenSSL Root CA, signing CA, configuration files, Certificate signing requests. Email certificates, TLS server certificates. Hands on Implementing a simple PKI with OpenSSL.
Kerberos for engineers training course description This hands on course covers the details of Kerberos, from installation and administration through to how it all works including the protocols. What will you learn Describe what Kerberos is. Explain how Kerberos works. Install Kerberos. Configure Kerberos. Troubleshoot Kerberos. Kerberos for engineers training course details Who will benefit: Engineers interested in security. Prerequisites: TCP/IP foundation for engineers Duration 2 days Kerberos for engineers training course contents What is Kerberos? Single Sign On, The protocol, the standard, history, v4, v5, RFCs, Linux, Windows. Kerberos concepts and technology AAA, Authentication, Authorization, Accounting. Kerberos vs LDAP and directories. Privacy, integrity. Kerberos realms, principles, instances. Keys, salts, passwords. Key Distribution Centre, Authentication server, ticket granting server. Tickets. Installation and administration of Kerberos Installing Kerberos, creating realms, testing. DNS and Kerberos, Kerberos clients. Hands on Windows and Linux Kerberos. Kerberos protocols The Needham-Schroeder protocol, Kerberos v4. Authentication server, ticket granting server, Kerberos v5, encryption options, ticket options, other protocol features and extensions. Related protocols: GSSAPI, SPNEGO. Hands on Using Wireshark to 'see' Kerberos. Troubleshooting Kerberos Approach, debugging tools, errors and solutions. Hands on Kerberos troubleshooting. Kerberos security concerns Kerberos attacks, protocol security issues. Dictionary attacks, brute force attacks, replay attacks, MITM attacks, security solutions, protecting the KDC, firewalls, NAT and Kerberos. Hands on Kerberos logging. Software which uses Kerberos Kerberos logins, Kerberos and web based applications, Directory services. Advanced Kerberos issues Cross realm authentication, Windows issues, Windows and UNIX interoperability, Hands on Using a Windows DC for UNIX clients.