
Online or onsite, instructor-led live Networking training courses demonstrate through interactive discussion and hands-on practice the fundamentals and advanced topics of Networking.
Networking training is available as "online live training" or "onsite live training". Online live training (aka "remote live training") is carried out by way of an interactive, remote desktop. Onsite live Networking training can be carried out locally on customer premises in Egypt or in NobleProg corporate training centers in Egypt.
NobleProg -- Your Local Training Provider.
Testimonials
Hands on and setup were nicely done and practical knowledge thoroughly imparted. Trainer was really helpful throughout.
B Kishore
Course: SIP protocol in VoIP
I liked the network forensics portion to identify unusual network traffic and possible attacks through investigation of cap files.
MINDEF
Course: Advanced Network Troubleshooting Using Wireshark
The course build up the whole picture and helped me understand in depth how to deal with everyday tasks I perform with Tenable Census Manager.
Konstantinos Papadopoulos
Course: Nessus Manager
I generally was benefit from the whole training.
Tassos Papadopoulos
Course: Nessus Manager
The exercises and analysis portion is very enriching and enlightening.
MINDEF
Course: Advanced Network Troubleshooting Using Wireshark
Richard was very knowledgable, clearly knew the subject area extremely well. Broke all of the complicated parts down into easier to understand chunks, and had great rapport with the group. He made a potentially tough and dry subject interesting. As a complete novice, I really enjoyed and found it very helpful for my role.
Capita Business Services Ltd
Course: Understanding Modern Information Communications Technology
For a very intense course, Richard gave a good high level overview for people who work in an IT Department but not actually undertaking the IT aspects of a job e.g. Cloud solutions, platforming, architecture...
Capita Business Services Ltd
Course: Understanding Modern Information Communications Technology
Trainer was very engaging.
Ryan Goddard - Capita Business Services Ltd
Course: Understanding Modern Information Communications Technology
Friendly informative and met objectives.
Capita Business Services Ltd
Course: Understanding Modern Information Communications Technology
The content, very interesting.
Lowri Jones - Capita Business Services Ltd
Course: Understanding Modern Information Communications Technology
Trainer, knowledge of trainer and ability to communicate complicated content and make it understandable.
Capita Business Services Ltd
Course: Understanding Modern Information Communications Technology
I really liked the rapport and connection that the trainer was able to achieve with the class. And that, on the fly, he was able to shape the class into the things we needed.
Fredrik Lindlöf - Svenska Spel AB
Course: HAProxy Administration
reaffirm my knowledge and learn many new things
Vale of glamorgan council; Vale of glamorgan council
Course: Cisco ASA/Pix Operation
lots of information, all questions ansered, interesting examples
A1 Telekom Austria AG
Course: Deep Learning for Telecom (with Python)
His huge amount of knowledge.
Mirela Ochia - Deutsche Telekom Pan-Net Romania S.R.L.
Course: Practical SIP Telephony
Very well trained and documented. Every question addressed was very well answered.
Deutsche Telekom Pan-Net Romania S.R.L.
Course: Practical SIP Telephony
Trainer is well prepared and dedicated in making us understand. Well done.
Alan Lye - SBS Transit Ltd
Course: Basic Network Troubleshooting Using Wireshark
the trainer adapted his course to answer questions even if the questions where out of the course scope.
Mario Kuik - Netherlands Army
Course: HAProxy Administration
To get a better understanding about OpenStack.
Jan Gustafsson - Polystar OSIX
Course: OpenStack Architecture and Troubleshooting
It was very easy communication during all the course, got answers and help in very pedagogical manner. The trainer is very experienced, I recommend him anyone who is interested in getting good knowledge in this very complicated area :-)
Polystar OSIX
Course: OpenStack Architecture and Troubleshooting
The broad perspective of Openstack, no chance to dive in to deep to be able to keep schedule, more to where to get information from.
Jörgen Selegran - Polystar OSIX
Course: OpenStack Architecture and Troubleshooting
A good mix of hands on exercises and lectures!
Polystar OSIX
Course: OpenStack Architecture and Troubleshooting
The flexibility to answer questions. Good pdf, good examples
Conny Vigström - Polystar OSIX
Course: OpenStack Architecture and Troubleshooting
Damian, is very skilled, I'm very pleased with everything, no complains, best training session I've participated in for a long time… It's very difficult to have a training course like this, totally remote, you did a great job, It went very well, there were no issues.
Peter Erlandsson - Polystar OSIX
Course: OpenStack Architecture and Troubleshooting
The virtual desktop in a browser feature was kind of neat.
Mikael Karlsson - Polystar OSIX
Course: OpenStack Architecture and Troubleshooting
The network parts.
Polystar OSIX
Course: OpenStack Architecture and Troubleshooting
The varied topics
Daniel Lindh - Tele 2 Sverige AB
Course: OpenStack for Telecom
I like that we before the training had some meetings to discuss what parts we should focus on, and what is interesting for us at Tele2.
Tele 2 Sverige AB
Course: OpenStack for Telecom
The paste, all the information I got.
Tele 2 Sverige AB
Course: OpenStack for Telecom
Playing around in a non production environment.
Tele 2 Sverige AB
Course: OpenStack for Telecom
Exercises were good, trainer had a good pace and good knowledge
Global Knowledge Networks UK
Course: Certified Kubernetes Application Developer (CKAD) - exam preparation
The trainer explains very well and he has a lot of patience and dedication to explain the subject.
Course: SIP protocol in VoIP
The trainer explains very well and he has a lot of patience and dedication to explain the subject.
Course: SIP protocol in VoIP
very engaging trainer context related excercises managed well to integrated different start/knowledge levels
Procter&Gamble Polska Sp. z o.o.
Course: Certified Kubernetes Administrator (CKA) - exam preparation
Quiz
Maxis Broadband Sdn Bhd
Course: SIP protocol in VoIP
the tools and the contents of the slide.
Kak Khen Man - Maxis Broadband Sdn Bhd
Course: SIP protocol in VoIP
Very informative and detail explanation
Syahrifendi Lukmanilhakim - Maxis Broadband Sdn Bhd
Course: SIP protocol in VoIP
Alot of example for on how protocol works
Maxis Broadband Sdn Bhd
Course: SIP protocol in VoIP
Trainer can explain and give example for questions asked
SHAMSANI ABU BAKAR - Maxis Broadband Sdn Bhd
Course: SIP protocol in VoIP
The instructor patient to explain and show the step on each lab session.
CHEE WAI KAN - Maxis Broadband Sdn Bhd
Course: SIP protocol in VoIP
Mostly on the content for 1st day.
Maxis Broadband Sdn Bhd
Course: SIP protocol in VoIP
Trainer knows very well the subject. He try to give a lot of examples in order that we understand "how" it is working. He answer to all questions raised. Very available.
christel salve - BICS
Course: Blockchain for Telecom
The trainer explains very well and he has a lot of patience and dedication to explain the subject.
Course: SIP protocol in VoIP
The trainer explains very well and he has a lot of patience and dedication to explain the subject.
Course: SIP protocol in VoIP
Networking Subcategories in Egypt
Networking Course Outlines in Egypt
- Learn and understand the architecture security on Zscaler.
- Understand the value and baseline features of Zscaler advanced configurations.
- Use Zscaler to secure network connections for applications and cloud services.
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
- To request a customized training for this course, please contact us to arrange.
- To learn more about CKA certification, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-administrator-cka/
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
- To request a customized training for this course, please contact us to arrange.
- To learn more about CKAD, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-application-developer-ckad/
- Install and configure Calico.
- Understand how Calico differs from traditional overlay networks.
- Understand how Calico combines internet routing protocols with consensus-based data stores.
- Use Calico to create a container networking solution for Kubernetes clusters.
- Use Calico to provide network policy for Kubernetes.
- Understand the fundamental concepts of deep learning.
- Learn the applications and uses of deep learning in telecom.
- Use Python, Keras, and TensorFlow to create deep learning models for telecom.
- Build their own deep learning customer churn prediction model using Python.
The training can be contracted to 2 days, focusing on core aspects relevant for the customer. The training can be also extended regarding administrative, design, networking and/or troubleshooting topics concerning OpenStack deployments
- Install and configure Shadowsocks on any of a number of supported platforms, including Windows, Linux, Mac, Android, iOS, and OpenWrt.
- Deploy Shadosocks with package manager systems, such as pip, aur, freshports and others.
- Run Shadowsocks on mobile devices and wireless networks.
- Understand how Shadowsocks encrypts messages and ensures integrity and authenticity.
- Optimize a Shadowsocks server
- Network engineers
- System Administrators
- Computer technicians
- Part lecture, part discussion, exercises and heavy hands-on practice
have to maintain MetroEthernet services across the globe. The course introduces all the
prevailing standards, Troubleshooting guides, vendor options and evolving technologies in
Metro Ethernet domain.
- Understand fundamental VoIP concepts
- Learn how to use VoIP equipment
- Configure CISCO routers for VoIP
- Implement VoIP and CallManager Express into their network
- Configure CME features for SIP, SCCP, and soft phones
- Work with advanced configuration settings and features of CME
- Managers
- System administrators
- Software and support system developers
- Technicians
- Network engineers
- Part lecture, part discussion, exercises and heavy hands-on practice
- Install, configure, run, test, and troubleshoot Tinc VPN on any operating system
- Deploy a Tinc Mesh VPN
- Use Tinc VPN for Centralized Cloud Interconnection
- Developers
- Network engineers
- Part lecture, part discussion, exercises and heavy hands-on practice
- To request a customized training for this course, please contact us to arrange.
- Optimize and leverage Paramiko, Netmiko, Napalm, Telnet, and pyntc for network automation with Python.
- Master multi-threading and multiprocessing in network automation.
- Use GNS3 and Python for network programming.
- Perform configurations of SAN and NAS storage on a storage system.
- Connect to storage systems and devices from a client.
- Compare SAN and NAS solutions for centralized storage.
- Understand how networking works under Linux.
- Set up a sample LAN.
- Understand the various protocols used on the internet and implement each one under Linux.
- Secure a networking and various types of servers, such as a webs server.
- Install and configure a Cisco SD-WAN.
- Create policies to control network traffic.
- Understand and implement overlay routing.
- Simplify the management of the network used for public cloud applications.
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
- To request a customized training for this course, please contact us to arrange.
- Illustrate the hierarchical network design model and architecture using the access, distribution, and core layers
- Compare and contrast the various hardware and software switching mechanisms and operation, while defining the Ternary Content Addressable Memory (TCAM) and Content Addressable Memory (CAM), along with process switching, fast switching, and Cisco Express Forwarding concepts
- Troubleshoot Layer 2 connectivity using VLANs and trunking
- Implementation of redundant switched networks using Spanning Tree Protocol
- Troubleshooting link aggregation using Etherchannel
- Describe the features, metrics, and path selection concepts of Enhanced Interior Gateway Routing Protocol (EIGRP)
- Implementation and optimization of Open Shortest Path First (OSPF)v2 and OSPFv3, including adjacencies, packet types, and areas, summarization, and route filtering for IPv4 and IPv6
- Implementing External Border Gateway Protocol (EBGP) interdomain routing, path selection, and single and dual-homed networking
- Implementing network redundancy using protocols including Hot Standby Routing Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP)
- Implementing internet connectivity within Enterprise using static and dynamic Network Address Translation (NAT)
- Describe the virtualization technology of servers, switches, and the various network devices and components
- Implementing overlay technologies such as Virtual Routing and Forwarding (VRF), Generic Routing Encapsulation (GRE), VPN, and Location Identifier Separation Protocol (LISP)
- Describe the components and concepts of wireless networking including Radio Frequency (RF) and antenna characteristics, and define the specific wireless standards
- Describe the various wireless deployment models available, include autonomous Access Point (AP) deployments and cloud-based designs within the centralized Cisco Wireless LAN Controller (WLC) architecture
- Describe wireless roaming and location services
- Describe how APs communicate with WLCs to obtain software, configurations, and centralized management
- Configure and verify Extensible Authentication Protocol (EAP), WebAuth, and Pre-Shared Key (PSK) wireless client authentication on a WLC
- Troubleshoot wireless client connectivity issues using various available tools
- Troubleshooting Enterprise networks using services such as Network Time Protocol (NTP), Simple Network Management Protocol (SNMP), Cisco Internetwork Operating System (Cisco IOS®) IP Service Level Agreements (SLAs), NetFlow, and Cisco IOS Embedded Event Manager
- Explain the use of available network analysis and troubleshooting tools, which include show and debug commands, as well as best practices in troubleshooting
- Configure secure administrative access for Cisco IOS devices using the Command-Line Interface (CLI) access, Role-Based Access Control (RBAC), Access Control List (ACL), and Secure Shell (SSH), and explore device hardening concepts to secure devices from less secure applications, such as Telnet and HTTP
- Implement scalable administration using Authentication, Authorization, and Accounting (AAA) and the local database, while exploring the features and benefits
- Describe the enterprise network security architecture, including the purpose and function of VPNs, content security, logging, endpoint security, personal firewalls, and other security features
- Explain the purpose, function, features, and workflow of Cisco DNA Center™ Assurance for Intent-Based Networking, for network visibility, proactive monitoring, and application experience
- Describe the components and features of the Cisco SD-Access solution, including the nodes, fabric control plane, and data plane, while illustrating the purpose and function of the Virtual Extensible LAN (VXLAN) gateways
- Define the components and features of Cisco SD-WAN solutions, including the orchestration plane, management plane, control plane, and data plane
- Describe the concepts, purpose, and features of multicast protocols, including Internet Group Management Protocol (IGMP) v2/v3, Protocol-Independent Multicast (PIM) dense mode/sparse mode, and rendezvous points
- Describe the concepts and features of Quality of Service (QoS), and describe the need within the enterprise network
- Explain basic Python components and conditionals with script writing and analysis
- Describe network programmability protocols such as Network Configuration Protocol (NETCONF) and RESTCONF
- Describe APIs in Cisco DNA Center and vManage
- Deploy high-availability email protection against the dynamic, rapidly changing threats affecting your organization
- Gain leading-edge career skills focused on enterprise security
- Describe and administer the Cisco Email Security Appliance (ESA)
- Control sender and recipient domains
- Control spam with Talos SenderBase and anti-spam
- Use anti-virus and outbreak filters
- Use mail policies
- Use content filters
- Use message filters to enforce email policies
- Prevent data loss
- Perform LDAP queries
- Authenticate Simple Mail Transfer Protocol (SMTP) sessions
- Authenticate email
- Encrypt email
- Use system quarantines and delivery methods
- Perform centralized management using clusters
- Test and troubleshoot
- What is denial of service attacks, Flooding, Sniffing, MIM?
- How to break from the network to the server?
- How to watch packets on the network (also running on switches)?
- Do you watch any combination of the world?
- How to monitor the network?
- How to configure a firewall?
- How to use encrypted connections?
- How to create tunnels?
- How to log packets?
- How to scan ports?
- How to reduce the number of unnecessary services on the server?
- Understand basic concepts of security, IT security and secure coding
- Learn about network attacks and defenses at different OSI layers
- Have a practical understanding of cryptography
- Understand essential security protocols
- Understand some recent attacks against cryptosystems
- Get information about some recent related vulnerabilities
- Get sources and further readings on secure coding practices
Last Updated: