
Online or onsite, instructor-led live Networking training courses demonstrate through interactive discussion and hands-on practice the fundamentals and advanced topics of Networking.
Networking training is available as "online live training" or "onsite live training". Online live training (aka "remote live training") is carried out by way of an interactive, remote desktop. Onsite live Networking trainings in Pakistan can be carried out locally on customer premises or in NobleProg corporate training centers.
NobleProg -- Your Local Training Provider.
Testimonials
Hands on and setup were nicely done and practical knowledge thoroughly imparted. Trainer was really helpful throughout.
B Kishore
Course: SIP protocol in VoIP
I liked the network forensics portion to identify unusual network traffic and possible attacks through investigation of cap files.
MINDEF
Course: Advanced Network Troubleshooting Using Wireshark
The course build up the whole picture and helped me understand in depth how to deal with everyday tasks I perform with Tenable Census Manager.
Konstantinos Papadopoulos
Course: Nessus Manager
I generally was benefit from the whole training.
Tassos Papadopoulos
Course: Nessus Manager
The exercises and analysis portion is very enriching and enlightening.
MINDEF
Course: Advanced Network Troubleshooting Using Wireshark
I really liked the rapport and connection that the trainer was able to achieve with the class. And that, on the fly, he was able to shape the class into the things we needed.
Fredrik Lindlöf - Svenska Spel AB
Course: HAProxy Administration
reaffirm my knowledge and learn many new things
Vale of glamorgan council; Vale of glamorgan council
Course: Cisco ASA/Pix Operation
lots of information, all questions ansered, interesting examples
A1 Telekom Austria AG
Course: Deep Learning for Telecom (with Python)
His huge amount of knowledge.
Mirela Ochia - Deutsche Telekom Pan-Net Romania S.R.L.
Course: Practical SIP Telephony
Very well trained and documented. Every question addressed was very well answered.
Deutsche Telekom Pan-Net Romania S.R.L.
Course: Practical SIP Telephony
Trainer is well prepared and dedicated in making us understand. Well done.
Alan Lye - SBS Transit Ltd
Course: Basic Network Troubleshooting Using Wireshark
the trainer adapted his course to answer questions even if the questions where out of the course scope.
Mario Kuik - Netherlands Army
Course: HAProxy Administration
The varied topics
Daniel Lindh - Tele 2 Sverige AB
Course: OpenStack for Telecom
I like that we before the training had some meetings to discuss what parts we should focus on, and what is interesting for us at Tele2.
Tele 2 Sverige AB
Course: OpenStack for Telecom
The paste, all the information I got.
Tele 2 Sverige AB
Course: OpenStack for Telecom
Playing around in a non production environment.
Tele 2 Sverige AB
Course: OpenStack for Telecom
Exercises were good, trainer had a good pace and good knowledge
Global Knowledge Networks UK
Course: Certified Kubernetes Application Developer (CKAD) - exam preparation
The trainer explains very well and he has a lot of patience and dedication to explain the subject.
Course: SIP protocol in VoIP
The trainer explains very well and he has a lot of patience and dedication to explain the subject.
Course: SIP protocol in VoIP
very engaging trainer context related excercises managed well to integrated different start/knowledge levels
Procter&Gamble Polska Sp. z o.o.
Course: Certified Kubernetes Administrator (CKA) - exam preparation
Quiz
Maxis Broadband Sdn Bhd
Course: SIP protocol in VoIP
the tools and the contents of the slide.
Kak Khen Man - Maxis Broadband Sdn Bhd
Course: SIP protocol in VoIP
Very informative and detail explanation
Syahrifendi Lukmanilhakim - Maxis Broadband Sdn Bhd
Course: SIP protocol in VoIP
Alot of example for on how protocol works
Maxis Broadband Sdn Bhd
Course: SIP protocol in VoIP
Trainer can explain and give example for questions asked
SHAMSANI ABU BAKAR - Maxis Broadband Sdn Bhd
Course: SIP protocol in VoIP
The instructor patient to explain and show the step on each lab session.
CHEE WAI KAN - Maxis Broadband Sdn Bhd
Course: SIP protocol in VoIP
Mostly on the content for 1st day.
Maxis Broadband Sdn Bhd
Course: SIP protocol in VoIP
The trainer explains very well and he has a lot of patience and dedication to explain the subject.
Course: SIP protocol in VoIP
The trainer explains very well and he has a lot of patience and dedication to explain the subject.
Course: SIP protocol in VoIP
Networking Subcategories in Pakistan
Networking Course Outlines in Pakistan
Kubernetes is nowadys a leading platform used for containers orchestration.
NobleProg have been delivering Docker & Kubernetes training from 2015. With more than 360 successfully completed training projects, we became one of the best known training companyworldwide in field of containerization.
Since 2019 we are also helping our customers to confirm their performance in k8s environment by preparing them and encouraging to pass CKA and CKAD exams.
This instructor-led, live training (online or onsite) is aimed at System Administrators, Kubernetes User swho wish to confirm their knowledge by passing CKA exam.
On the other hand, training is focused also on gaining practical experience in Kubernetes Administration, so we recommend taking part in it, even if you don't intend to take CKA exam.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
- To learn more about CKA certification, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-administrator-cka/
This instructor-led, live training (online or onsite) is aimed at Developers who wish to confirm their skills in design, build, configure, and expose cloud native applications for Kubernetes.
On the other hand, training is also focused on gaining practical experience in Kubernetes application development, so we recommend taking part in it, even if you don't intend to take CKAD exam.
NobleProg have been delivering Docker & Kubernetes training from 2015. With more than 360 successfully completed training projects, we became one of the best known training company worldwide in field of containerization. Since 2019 we are also helping our customers to confirm their performance in k8s environment by preparing them and encouraging to pass CKA and CKAD exams.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
- To learn more about CKAD, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-application-developer-ckad/
Students will inter-connect networks by implementing static routes, distance-vector and link-state based dynamic routing protocols.
The devices will be configured to route traffic across LAN/VLAN//WAN boundaries, by encapsulating datagrams across serial data links using various WAN protocols, such as HDLC, Frame Relay, ISDN and PPP (with CHAP authentication). VLAN encapsulation/tagging will be via IEEE802.1Q/P.
Standard and Extended Access Control Lists will be configured and applied to router interfaces to filter traffic based on IP address and/or traffic type.
Students will configure static and dynamic NAT to route between private and public networks and cover the theory of Virtual Private Networks (VPN's)
Students will copy router configurations and IOS images to/from a TFTP Server. Privileged commands will be used to debug TCP/IP protocols to ensure proper operation of the routers. Students will also perform password recovery operations.
The course is primarily aimed at IP v4 but does give an overview of IP v6 addressing and covers migration from an IP v4 to an IP v6 network. Other protocols and technologies (VPN's / Wireless) may be demonstrated if time permits.
Course can be customised to precise requirements of customer.
Audience:
This course is suitable for anyone looking for a basic understanding of internetworking with Cisco devices and covers the CCNA syllabus.
Course is approximately 50% practical
Audience
This course is suitable for developers and engineers who work with preexisting Samba instances, or who intend to integrate Samba into their work flow.
No two courses are delivered the same. Each course is tailored to your specific requirements.
By the end of this training, participants will be able to:
- Understand how networking works under Linux.
- Set up a sample LAN.
- Understand the various protocols used on the internet and implement each one under Linux.
- Secure a networking and various types of servers, such as a webs server.
By the end of this training, participants will be able to:
- Set up the necessary testing environment to start using Nmap.
- Scan network systems for security vulnerabilities.
- Discover active and vulnerable hosts.
By the end of this training, participants will be able to:
- Understand, install and configure the various components in the ONAP ecosystem
- Carry out real-time, policy-driven orchestration and automation of physical and virtual network functions
- Design, create, orchestrate, and monitor VNFs, SDNs and other network services
- Efficiently manage the entire networking lifecycle using a software-driven approach
- Develop, deploy, and scale a network using the latest open source technologies and practices
By the end of this training, participants will be able to:
- Install Open Network Automation Platform and configure the necessary frameworks.
- Understand the components and concepts foundational to the ONAP environment.
- Build and automate physical and virtual telecommunication network functions.
- Manage and optimize the life cycles of systems and operations executed through ONAP.
- Leverage the features of ONAP and overcome the challenges to telecommunication applications.
By the end of this training, participants will be able to:
- Plan, deploy, and administer OpenStack as a private cloud.
- Understand IaaS architecture and its implementation under OpenStack.
- Replace physical routers and servers with virtual machines running in a private cloud.
- Reduce infrastructure and maintenance costs through virtualization and cloud computing.
- Expedite the rollout of new services to customers.
In this instructor-led, live training, participants will learn how to use OpenVAS for network vulnerability scanning.
By the end of this training, participants will be able to:
- Install and configure OpenVAS
- Learn the fundamental features and components of OpenVAS
- Configure and implement network vulnerability scans with OpenVAS
- Review and interpret OpenVAS scan results
Audience
- Network engineers
- Network administrators
Format of the course
- Part lecture, part discussion, exercises and heavy hands-on practice
Note
- To request a customized training for this course, please contact us to arrange.
OSS/BSS is at the heart of operation of any Telecom operator. Given growth of Big Data in recent time,
area of OSS/BSS has undergone disruptive changes specially with virtualization of the OSS/BSS and given
the fact, many of the new OTT ( Over the top) services are newly developed web/mobile based services
that do not fit into legacy OSS. In this current course, which consists of 4 days, first 3 days are spent
extensively to develop background in legacy OSS/BSS, while last 5 modules, are dedicated to explain
emerging Big Data analytics application in OSS/BSS layer
Target Audience:
- Telecom/Cellular Operation People
- Telecom Sales professionals
- Telecom Operation vendors/contractors
- CXO, VP, Director level managers in TELECOM
By the end of this training, participants will be able to:
- Set up the necessary development environment to start developing firewalls.
- Deploy a Palo Alto firewall in a cloud server.
- Manage packet flow through Palo Alto firewalls.
- Interpret QoS classifications and types.
By the end of this training, participants will be able to:
- Install and configure ProxySQL.
- Enable thousands of concurrent database connections over multiple backend servers.
- Deploy multiple ProxySQL proxies spanning numerous database instances.
- Optimize the performance of a MySQL cluster, without altering the querying applications.
In this instructor-led, live training, participants will learn how to secure an internet connection through a Shadowsocks proxy.
By the end of this training, participants will be able to:
- Install and configure Shadowsocks on any of a number of supported platforms, including Windows, Linux, Mac, Android, iOS, and OpenWrt.
- Deploy Shadosocks with package manager systems, such as pip, aur, freshports and others.
- Run Shadowsocks on mobile devices and wireless networks.
- Understand how Shadowsocks encrypts messages and ensures integrity and authenticity.
- Optimize a Shadowsocks server
Audience
- Network engineers
- System Administrators
- Computer technicians
Format of the course
- Part lecture, part discussion, exercises and heavy hands-on practice
By the end of this training, participants will be able to:
- Perform configurations of SAN and NAS storage on a storage system.
- Connect to storage systems and devices from a client.
- Compare SAN and NAS solutions for centralized storage.
System Administrators and Network Administrators as well as anyone who is interested in defensive network security technologies.
Audience:
Network Planners, Designers, and Engineers requiring an understanding of SIP.
The course is around 40% practical.
Audience:
Suitable for anyone looking for an understanding of TCP/IP.
Course is approximately 50% practical.
In this instructor-led, live training, participants will learn the fundamentals of working with Tinc VPN.
By the end of this training, participants will be able to:
- Install, configure, run, test, and troubleshoot Tinc VPN on any operating system
- Deploy a Tinc Mesh VPN
- Use Tinc VPN for Centralized Cloud Interconnection
Audience
- Developers
- Network engineers
Format of the course
- Part lecture, part discussion, exercises and heavy hands-on practice
Note
- To request a customized training for this course, please contact us to arrange.
In this course, participants will learn about Varnish's features and caching approach while practicing in the setup and configuration of a Varnish proxy on Linux. The course starts with a refresher on key networking principles, then digs into setup and configuration topics and moves steadily towards complex implementations. By the end of the training participants will understand when and where it makes sense to deploy Varnish and will have the necessary practice to deploy their own Varnish proxy solutions.
Audience
- Network technicians
- Network designers
- System administrators
Format of the course
- Part lecture, part discussion, heavy hands-on practice and implementation, occasional quizing to measure progress
In this instructor-led, live training, participants will learn how to set up a VoIP system using Cisco CallManager Express.
By the end of this training, participants will be able to:
- Understand fundamental VoIP concepts
- Learn how to use VoIP equipment
- Configure CISCO routers for VoIP
- Implement VoIP and CallManager Express into their network
- Configure CME features for SIP, SCCP, and soft phones
- Work with advanced configuration settings and features of CME
Audience
- Managers
- System administrators
- Software and support system developers
- Technicians
- Network engineers
Format of the course
- Part lecture, part discussion, exercises and heavy hands-on practice
The course is approximately 40% practical.
In this instructor-led, live training, participants will learn how to use Wireshark to troubleshoot the functionality of a network as well as the performance of differente networked applications. Participants will learn network troubleshooting principles and practice techniques for capturing and analyzing TCP/IP request and response traffic between different clients and the servers.
By the end of this training, participants will be able to:
- Analyze network functionality and performance in various environments under different conditions
- Determine whether instances of different server applications are performing acceptably
- Identify the primary sources of network performance problems
- Identify and troubleshoot the most common causes of performance problems in TCP/IP communications
Audience
- Network engineers
- Network and computer technicians
Format of the Course
- Part lecture, part discussion, exercises and heavy hands-on practice
Note
- To request a customized training for this course, please contact us to arrange.
By the end of this training, participants will be able to:
- Optimize and leverage Paramiko, Netmiko, Napalm, Telnet, and pyntc for network automation with Python.
- Master multi-threading and multiprocessing in network automation.
- Use GNS3 and Python for network programming.
In this instructor-led, live training, participants will learn how NetNORAD and active path testing can help them improve their network troubleshooting methods.
By the end of this training, participants will be able to:
- Understand how NetNORAD works
- Learn the design principles behind NetNORAD
- Use open-source NetNORAD tools with their own code to implement a fault detection system
Audience
- Network engineers
- Developers
- System engineers
Format of the course
- Part lecture, part discussion, exercises and heavy hands-on practice