Networking Training Courses in Egypt

Networking Training Courses

Online or onsite, instructor-led live Networking training courses demonstrate through interactive discussion and hands-on practice the fundamentals and advanced topics of Networking.

Networking training is available as "online live training" or "onsite live training". Online live training (aka "remote live training") is carried out by way of an interactive, remote desktop. Onsite live Networking training can be carried out locally on customer premises in Egypt or in NobleProg corporate training centers in Egypt.

NobleProg -- Your Local Training Provider.

Testimonials

★★★★★
★★★★★

Networking Course Outlines in Egypt

Course Name
Duration
Overview
Course Name
Duration
Overview
14 hours
This instructor-led, live training in Egypt (online or onsite) is aimed at systems administrators who wish to learn how to use Zscaler to secure network connections for applications and cloud services. By the end of this training, participants will be able to:
  • Learn and understand the architecture security on Zscaler.
  • Understand the value and baseline features of Zscaler advanced configurations.
  • Use Zscaler to secure network connections for applications and cloud services.
21 hours
The Certified Kubernetes Administrator (CKA) program was created by The Linux Foundation and the Cloud Native Computing Foundation (CNCF). Kubernetes is nowadys a leading platform used for containers orchestration. NobleProg have been delivering Docker & Kubernetes training from 2015. With more than 360 successfully completed training projects, we became one of the best known training companyworldwide in field of containerization. Since 2019 we are also helping our customers to confirm their performance in k8s environment by preparing them and encouraging to pass CKA and CKAD exams. This instructor-led, live training (online or onsite) is aimed at System Administrators, Kubernetes User swho wish to confirm their knowledge by passing CKA exam. On the other hand, training is focused also on gaining practical experience in Kubernetes Administration, so we recommend taking part in it, even if you don't intend to take CKA exam. Format of the Course
  • Interactive lecture and discussion.
  • Lots of exercises and practice.
  • Hands-on implementation in a live-lab environment.
Course Customization Options
  • To request a customized training for this course, please contact us to arrange.
  • To learn more about CKA certification, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-administrator-cka/
21 hours
The Certified Kubernetes Application Developer (CKAD) program has been developed by The Linux Foundation and the Cloud Native Computing Foundation (CNCF), the host of Kubernetes. This instructor-led, live training (online or onsite) is aimed at Developers who wish to confirm their skills in design, build, configure, and expose cloud native applications for Kubernetes.  On the other hand, training is also focused on gaining practical experience in Kubernetes application development, so we recommend taking part in it, even if you don't intend to take CKAD exam. NobleProg have been delivering Docker & Kubernetes training from 2015. With more than 360 successfully completed training projects, we became one of the best known training company worldwide in field of containerization. Since 2019 we are also helping our customers to confirm their performance in k8s environment by preparing them and encouraging to pass CKA and CKAD exams. Format of the Course
  • Interactive lecture and discussion.
  • Lots of exercises and practice.
  • Hands-on implementation in a live-lab environment.
Course Customization Options
  • To request a customized training for this course, please contact us to arrange.
  • To learn more about CKAD, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-application-developer-ckad/
14 hours
This instructor-led, live training in Egypt (online or onsite) is aimed at engineers who wish to optimize networking for Kubernetes clusters. By the end of this training, participants will be able to:
  • Install and configure Calico.
  • Understand how Calico differs from traditional overlay networks.
  • Understand how Calico combines internet routing protocols with consensus-based data stores.
  • Use Calico to create a container networking solution for Kubernetes clusters.
  • Use Calico to provide network policy for Kubernetes.
28 hours
In this instructor-led, live training in Egypt, participants will learn how to implement deep learning models for telecom using Python as they step through the creation of a deep learning credit risk model. By the end of this training, participants will be able to:
  • Understand the fundamental concepts of deep learning.
  • Learn the applications and uses of deep learning in telecom.
  • Use Python, Keras, and TensorFlow to create deep learning models for telecom.
  • Build their own deep learning customer churn prediction model using Python.
14 hours
The aim of this course is twofold - gain solid knowledge about OpenStack architecture and acquire profound troubleshooting skills. In the architecture part you will learn how to design the hardware for the public and private cloud, prepare high-availability control plane, choose proper size of the flavours, and safely overcommit cloud resources, among other things. Getting knowledge about the internals of Neutron (Networking Service) is another essential part in OpenStack architecture. Next the participant will be introduced into methods of troubleshooting issues in OpenStack clusters starting from general tips, through network troubleshooting up to caveats of main OpenStack services. Around 75% of the course comprises of hands-on workshops in the real OpenStack training environment.
28 hours
The course is a comprehensive training on OpenStack. It starts with the introduction to the system, then through hands-on workshops it gives practical knowledge on managing private clouds based on OpenStack, finally troubleshooting and advanced, architectural topics are present. The goal of this course is to familiarize with the OpenStack ecosystem as well as to give a strong background for further expansion and refinement of the OpenStack clouds. The course comprises all topics necessary to accomplish the Certificate OpenStack Administrator exam. 75% of the course is based on hands-on workshop in the real OpenStack training environment.
35 hours
The course is a comprehensive training on OpenStack, extended version of the OpenStack Bootcamp course includes extra excercises, troubleshooting and sample examination tasks. Extended content is highlited in bold in the course outline. It starts with the introduction to the system, then through hands-on workshops it gives practical knowledge on managing private clouds based on OpenStack, finally troubleshooting and advanced, architectural topics are present. The goal of this course is to familiarize with the OpenStack ecosystem as well as to give a strong background for further expansion and refinement of the OpenStack clouds. The course comprises all topics necessary to accomplish the Certificate OpenStack Administrator exam. 75% of the course is based on hands-on workshop in the real OpenStack training environment. After the course participants get all the materials and training environment for self-study and feature/troubleshooting excercises. Customization options The full course is to be meant for at least 5 days. It could be shortened if some of the topics are not relevant for the customer. In case the participants are beginners to OpenStack (slower pace) it is recommended to expand the course for 6 days or remove some advanced topics. The course can be also extended with 1 more day when OVN topics can be presented.  
14 hours
The course is providing practical knowledge on OpenStack and private cloud security. It starts from the introduction to the system, then the participants are getting practical knowledge on security in private clouds and securing OpenStack installation. During the course, each of the core OpenStack modules is presented, participants are building up virtual identity, image, network, compute and storage resources while discussing relevant security topics. Each participant is getting their own training environment with a complete OpenStack installation based on selected cloud architecture (eg. storage, networking). The training could be highly customized based on the needs of the client. Customization options
The training can be contracted to 2 days, focusing on core aspects relevant for the customer. The training can be also extended regarding administrative, design, networking and/or troubleshooting topics concerning OpenStack deployments
 
28 hours
This 4 day course involves a mixture of expository based (utilising protocol analyser traces where appropriate) and practical experiments to test and verify the operation of TCP/IP networks. The major aspects of the TCP/IP protocol stack are covered, including subnetting, supernetting and running dynamic routing protocols. TCP and UDP will be compared and contrasted, covering the end-to-end reliability and congestion avoidance capabilities of the TCP/IP stack. Some application layer protocols (HTTP, TLS, DNS, DHCP etc) will be investigated during the course. Network security in the form of TLS will be covered both from a theoretical and practical standpoint. The practical exercises are designed to augment the theory and enhance both the understanding of the underlying protocols and also the problem solving abilities of the delegates. Audience: Suitable for anyone looking for an understanding of TCP/IP. Course is approximately 50% practical.
14 hours
A 2 day theoretical course (with some practical demonstrations) covering the fundamentals of Internet Protocol v6 – including addressing, protocol formats, ICMP v6, discovery processes and IP v6 routing. Audience: Network Planners, Designers, and Engineers requiring an understanding of IP v6. Those requiring a comprehensive overview of IP v6 and the migration process from an IP v4 environment.
14 hours
This 2 day course investigates the theory and technology associated with IPSec VPN’s.VPN’s are setup using Cisco IOS Routers and ASA Firewalls using the web interface. The workings of the protocols are examined using debug commands and protocol analyser traces of relevant negotiations. Audience: Suitable for network planners, engineers or anyone interested in IPSec VPNs Course is approximately 40% practical
35 hours
A 5 day practical networking course designed to familiarise students with Cisco IOS (version 12). The course details the key commands used to configure and secure Cisco routers and switches, and covers the CCNA syllabus - including wired and wireless LAN access. Students will inter-connect networks by implementing static routes, distance-vector and link-state based dynamic routing protocols. The devices will be configured to route traffic across LAN/VLAN//WAN boundaries, by encapsulating datagrams across serial data links using various WAN protocols, such as HDLC, Frame Relay, ISDN and PPP (with CHAP authentication). VLAN encapsulation/tagging will be via IEEE802.1Q/P. Standard and Extended Access Control Lists will be configured and applied to router interfaces to filter traffic based on IP address and/or traffic type. Students will configure static and dynamic NAT to route between private and public networks and cover the theory of Virtual Private Networks (VPN's) Students will copy router configurations and IOS images to/from a TFTP Server. Privileged commands will be used to debug TCP/IP protocols to ensure proper operation of the routers. Students will also perform password recovery operations. The course is primarily aimed at IP v4 but does give an overview of IP v6 addressing and covers migration from an IP v4 to an IP v6 network. Other protocols and technologies (VPN's / Wireless) may be demonstrated if time permits. Course can be customised to precise requirements of customer. Audience: This course is suitable for anyone looking for a basic understanding of internetworking with Cisco devices and covers the CCNA syllabus. Course is approximately 50% practical
28 hours
A 4 day instructor-led practical course designed to familiarise delegates with the Cisco ASA Firewall CLI and ASDM. The course details the key commands used to configure and secure networks using the ASA Firewall with v8 of the operating system and version 6 of the ASDM. Delegates will configure the ASA using the console port, TFTP server, telnet and SSH using local and RADIUS authentication. The device will be configured to utilise Syslog and SNMP. ASA Firewalls will also be configured to use Access-Lists, Network Address Translation and VPN's utilising IPSec protocols. The course will cover the theory of Public/Private Keys, shared secret keys and their use in forming Site to site VPN's between ASA Firewalls using IKE and IPSec. Students will configure the units to create site to site VPN's, remote access VPN's using the Cisco Secure VPN Client and Web VPN's. The course will cover the theory of failover and delegates will configure Active/Standby failover on the ASA. Privileged commands and protocol analyser traces will be used, where necessary, to debug protocols and ensure proper operation of the ASA Firewall. Students will also perform password recovery operations. This course will involve interfacing the ASA with other network equipment, such as routers and switches, as would be expected in a network environment. Audience: Course is suitable for anyone involved in ASA firewall configuration and network security Course is approximately 50% practical
14 hours
In this instructor-led, live training in Egypt, participants will learn the critical features of DNS while carrying out exercises in the setup and configuration of a BIND DNS server on Linux. The course starts with a refresher on key networking principles, then digs into hands-on practice with setup and configuration. Steadily, the discussion and practices move towards more complex topics such as security, availability, debugging and troubleshooting.
7 hours
Shadowsocks is an open-source, secure socks5 proxy. In this instructor-led, live training, participants will learn how to secure an internet connection through a Shadowsocks proxy. By the end of this training, participants will be able to:
  • Install and configure Shadowsocks on any of a number of supported platforms, including Windows, Linux, Mac, Android, iOS, and OpenWrt.
  • Deploy Shadosocks with package manager systems, such as pip, aur, freshports and others.
  • Run Shadowsocks on mobile devices and wireless networks.
  • Understand how Shadowsocks encrypts messages and ensures integrity and authenticity.
  • Optimize a Shadowsocks server
Audience
  • Network engineers
  • System Administrators
  • Computer technicians
Format of the course
  • Part lecture, part discussion, exercises and heavy hands-on practice
28 hours
This 4 day coursework is intended for Telecom management and technology professionals who
have to maintain MetroEthernet services across the globe. The course introduces all the
prevailing standards, Troubleshooting guides, vendor options and evolving technologies in
Metro Ethernet domain.
35 hours
VoIP (Voice over Internet Protocol) is a technology that makes it possible for users to make voice calls over an Internet connection instead of through a regular phone line. In this instructor-led, live training, participants will learn how to set up a VoIP system using Cisco CallManager Express. By the end of this training, participants will be able to:
  • Understand fundamental VoIP concepts
  • Learn how to use VoIP equipment
  • Configure CISCO routers for VoIP
  • Implement VoIP and CallManager Express into their network
  • Configure CME features for SIP, SCCP, and soft phones
  • Work with advanced configuration settings and features of CME
Audience
  • Managers
  • System administrators
  • Software and support system developers
  • Technicians
  • Network engineers
Format of the course
  • Part lecture, part discussion, exercises and heavy hands-on practice
14 hours
Tinc VPN is an open source peer-to-peer virtual private network (VPN) daemon that is compatible with most operating systems. Tinc VPN makes use of tunneling and encryption to build a secure private network between hosts. In this instructor-led, live training, participants will learn the fundamentals of working with Tinc VPN. By the end of this training, participants will be able to:
  • Install, configure, run, test, and troubleshoot Tinc VPN on any operating system
  • Deploy a Tinc Mesh VPN
  • Use Tinc VPN for Centralized Cloud Interconnection
Audience
  • Developers
  • Network engineers
Format of the course
  • Part lecture, part discussion, exercises and heavy hands-on practice
Note
  • To request a customized training for this course, please contact us to arrange.
14 hours
This instructor-led, live training in Egypt (online or onsite) is aimed at network engineers who wish to maintain, manage, and design computer networks with Python. By the end of this training, participants will be able to:
  • Optimize and leverage Paramiko, Netmiko, Napalm, Telnet, and pyntc for network automation with Python.
  • Master multi-threading and multiprocessing in network automation.
  • Use GNS3 and Python for network programming.
14 hours
This instructor-led, live training in Egypt (online or onsite) is aimed at network engineers who wish to converge storage infrastructures with SAN and NAS. By the end of this training, participants will be able to:
  • Perform configurations of SAN and NAS storage on a storage system.
  • Connect to storage systems and devices from a client.
  • Compare SAN and NAS solutions for centralized storage.
21 hours
This instructor-led, live training in Egypt (online or onsite) is aimed at anyone who wish to understand and implement a network and various types of servers under Linux. By the end of this training, participants will be able to:
  • Understand how networking works under Linux.
  • Set up a sample LAN.
  • Understand the various protocols used on the internet and implement each one under Linux.
  • Secure a networking and various types of servers, such as a webs server.
21 hours
The course consists of two complementary parts – a theoretical and a practical one. The first is a one day introduction covering motivation, philosophy, fundamentals and rules of operation of the SIP protocol and ways it is used to implement telecom services with focus on IP telephony and VoIP. The second two-day part enables participants to learn practical aspects of service operation within a framework of hand-on laboratory exercises giving detailed insight into configuration of components of SIP telephony architecture, SIP signalling at both message sequence chart and internal message structure levels, and assists in understanding of typical problems and troubleshooting including security and telecom fraud aspects. The trainers will share their experience in launching, operation and management of SIP telephony covering also virtualization and cloud based solutions. Practical part is presented using both SIP hardphones and softphones and IP telephony servers (Asterisk and Freeswitch). Participants can take advantage of the fact trainers have got rich technical and business experience in IP telephony and submit their own problems and questions. They will be included in the agenda at wrap-up as a supplement to the training to meet current urgent needs of clients. Training is addressed to participants with basic knowledge and experience in telecom services – specifically in VoIP and IP networking.
21 hours
SD-WAN is a software-defined approach to managing a WAN (Wide Area Network). This instructor-led, live training (online or onsite) is aimed at engineers who wish to use Cisco SD-WAN products to set up and operate a software defined network. By the end of this training, participants will be able to:
  • Install and configure a Cisco SD-WAN.
  • Create policies to control network traffic.
  • Understand and implement overlay routing.
  • Simplify the management of the network used for public cloud applications.
Format of the Course
  • Interactive lecture and discussion.
  • Lots of exercises and practice.
  • Hands-on implementation in a live-lab environment.
Course Customization Options
  • To request a customized training for this course, please contact us to arrange.
35 hours
EC-Council’s CCISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, contributed by forming the foundation of the program and outlining the content that would be covered by the exam, body of knowledge, and training. Some members of the Board contributed as authors, others as exam writers, others as quality assurance checks, and still others as trainers. Each segment of the program was developed with the aspiring CISO in mind and looks to transfer the knowledge of seasoned professionals to the next generation in the areas that are most critical in the development and maintenance of a successful information security program. The Certified CISO (CCISO) program is the first of its kind training and certification program aimed at producing top-level information security executives. The CCISO does not focus solely on technical knowledge but on the application of information security management principles from an executive management point of view. The program was developed by sitting CISOs for current and aspiring CISOs.
35 hours
After taking this course, you should be able to:
  • Illustrate the hierarchical network design model and architecture using the access, distribution, and core layers
  • Compare and contrast the various hardware and software switching mechanisms and operation, while defining the Ternary Content Addressable Memory (TCAM) and Content Addressable Memory (CAM), along with process switching, fast switching, and Cisco Express Forwarding concepts
  • Troubleshoot Layer 2 connectivity using VLANs and trunking
  • Implementation of redundant switched networks using Spanning Tree Protocol
  • Troubleshooting link aggregation using Etherchannel
  • Describe the features, metrics, and path selection concepts of Enhanced Interior Gateway Routing Protocol (EIGRP)
  • Implementation and optimization of Open Shortest Path First (OSPF)v2 and OSPFv3, including adjacencies, packet types, and areas, summarization, and route filtering for IPv4 and IPv6
  • Implementing External Border Gateway Protocol (EBGP) interdomain routing, path selection, and single and dual-homed networking
  • Implementing network redundancy using protocols including Hot Standby Routing Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP)
  • Implementing internet connectivity within Enterprise using static and dynamic Network Address Translation (NAT)
  • Describe the virtualization technology of servers, switches, and the various network devices and components
  • Implementing overlay technologies such as Virtual Routing and Forwarding (VRF), Generic Routing Encapsulation (GRE), VPN, and Location Identifier Separation Protocol (LISP)
  • Describe the components and concepts of wireless networking including Radio Frequency (RF) and antenna characteristics, and define the specific wireless standards
  • Describe the various wireless deployment models available, include autonomous Access Point (AP) deployments and cloud-based designs within the centralized Cisco Wireless LAN Controller (WLC) architecture
  • Describe wireless roaming and location services
  • Describe how APs communicate with WLCs to obtain software, configurations, and centralized management
  • Configure and verify Extensible Authentication Protocol (EAP), WebAuth, and Pre-Shared Key (PSK) wireless client authentication on a WLC
  • Troubleshoot wireless client connectivity issues using various available tools
  • Troubleshooting Enterprise networks using services such as Network Time Protocol (NTP), Simple Network Management Protocol (SNMP), Cisco Internetwork Operating System (Cisco IOS®) IP Service Level Agreements (SLAs), NetFlow, and Cisco IOS Embedded Event Manager
  • Explain the use of available network analysis and troubleshooting tools, which include show and debug commands, as well as best practices in troubleshooting
  • Configure secure administrative access for Cisco IOS devices using the Command-Line Interface (CLI) access, Role-Based Access Control (RBAC), Access Control List (ACL), and Secure Shell (SSH), and explore device hardening concepts to secure devices from less secure applications, such as Telnet and HTTP
  • Implement scalable administration using Authentication, Authorization, and Accounting (AAA) and the local database, while exploring the features and benefits
  • Describe the enterprise network security architecture, including the purpose and function of VPNs, content security, logging, endpoint security, personal firewalls, and other security features
  • Explain the purpose, function, features, and workflow of Cisco DNA Center™ Assurance for Intent-Based Networking, for network visibility, proactive monitoring, and application experience
  • Describe the components and features of the Cisco SD-Access solution, including the nodes, fabric control plane, and data plane, while illustrating the purpose and function of the Virtual Extensible LAN (VXLAN) gateways
  • Define the components and features of Cisco SD-WAN solutions, including the orchestration plane, management plane, control plane, and data plane
  • Describe the concepts, purpose, and features of multicast protocols, including Internet Group Management Protocol (IGMP) v2/v3, Protocol-Independent Multicast (PIM) dense mode/sparse mode, and rendezvous points
  • Describe the concepts and features of Quality of Service (QoS), and describe the need within the enterprise network
  • Explain basic Python components and conditionals with script writing and analysis
  • Describe network programmability protocols such as Network Configuration Protocol (NETCONF) and RESTCONF
  • Describe APIs in Cisco DNA Center and vManage
28 hours
This class will help you:
  • Deploy high-availability email protection against the dynamic, rapidly changing threats affecting your organization
  • Gain leading-edge career skills focused on enterprise security
Objectives After taking this course, you should be able to:
  • Describe and administer the Cisco Email Security Appliance (ESA)
  • Control sender and recipient domains
  • Control spam with Talos SenderBase and anti-spam
  • Use anti-virus and outbreak filters
  • Use mail policies
  • Use content filters
  • Use message filters to enforce email policies
  • Prevent data loss
  • Perform LDAP queries
  • Authenticate Simple Mail Transfer Protocol (SMTP) sessions
  • Authenticate email
  • Encrypt email
  • Use system quarantines and delivery methods
  • Perform centralized management using clusters
  • Test and troubleshoot
14 hours
During the course, participants will learn:
  • What is denial of service attacks, Flooding, Sniffing, MIM?
  • How to break from the network to the server?
  • How to watch packets on the network (also running on switches)?
  • Do you watch any combination of the world?
  • How to monitor the network?
  • How to configure a firewall?
  • How to use encrypted connections?
  • How to create tunnels?
  • How to log packets?
  • How to scan ports?
  • How to reduce the number of unnecessary services on the server?
14 hours
Since all applications today heavily rely on communication and networks, there is no application security without network security. This course focuses on network security with a software security viewpoint, and discusses common network attacks and defenses on different OSI layers, with an emphasis on application layer issues, tackling topics like session management or denial of service. As cryptography is a critical aspect of network security, the most important cryptographic algorithms in symmetric cryptography, hashing, asymmetric cryptography, and key agreement are also discussed. Instead of presenting an in-depth mathematical and theoretical background, these elements are discussed from a merely practical, engineering perspective, showing typical use-case examples and practical considerations related to the use of crypto, such as public key infrastructures. Security protocols in many areas of secure communication are introduced, with an in-depth discussion on the most widely-used protocol families such as IPSEC and SSL/TLS. Finally, typical crypto vulnerabilities are discussed – both related to certain crypto algorithms and cryptographic protocols, such as BEAST, CRIME, TIME, BREACH, FREAK, Logjam, Padding oracle, Lucky Thirteen, POODLE and similar, as well as the RSA timing attack. In each case, the practical considerations and potential consequences are described for each problem, again, without going into deep mathematical details. Participants attending this course will
  • Understand basic concepts of security, IT security and secure coding
  • Learn about network attacks and defenses at different OSI layers
  • Have a practical understanding of cryptography
  • Understand essential security protocols
  • Understand some recent attacks against cryptosystems
  • Get information about some recent related vulnerabilities
  • Get sources and further readings on secure coding practices
Audience Developers, Professionals

Last Updated:

Upcoming Networking Courses in Egypt

Online Networking courses, Weekend Networking courses, Evening Networking training, Networking boot camp, Networking instructor-led, Weekend Networking training, Evening Networking courses, Networking coaching, Networking instructor, Networking trainer, Networking training courses, Networking classes, Networking on-site, Networking private courses, Networking one on one training

Course Discounts

Course Discounts Newsletter

We respect the privacy of your email address. We will not pass on or sell your address to others.
You can always change your preferences or unsubscribe completely.

Some of our clients

is growing fast!

We are looking to expand our presence in Egypt!

As a Business Development Manager you will:

  • expand business in Egypt
  • recruit local talent (sales, agents, trainers, consultants)
  • recruit local trainers and consultants

We offer:

  • Artificial Intelligence and Big Data systems to support your local operation
  • high-tech automation
  • continuously upgraded course catalogue and content
  • good fun in international team

If you are interested in running a high-tech, high-quality training and consulting business.

Apply now!

This site in other countries/regions