Technology Training Limited Module Portfolio for Customised Courses
|
|
- Barry Goodman
- 8 years ago
- Views:
Transcription
1 Technology Training Limited Module Portfolio for Customised Courses website: Module Catalogue v1.3 Page 1 of 17
2 CONTENTS LIST 1 ACCESS TECHNOLOGIES DIGITAL SUBSCRIBER LINES (XDSL) WIRELESS LOCAL LOOP (WLL) GIGABIT ETHERNET ACCESS SERVICES VERY SMALL APERTURE TERMINAL (VSAT) MULTISERVICE ACCESS NETWORKS (MSAN) AND METRO NODES ROUTING AND SWITCHING INTRODUCTION TO NETWORKING INTRODUCTION TO ROUTING AND SWITCHING ADVANCED ROUTING IP VERSION 6 (IPV6) INTRODUCTION TO MULTIPROTOCOL LABEL SWITCHING ( MPLS) MPLS TRAFFIC ENGINEERING (MPLS TE) ETHERNET AND GIGABIT ETHERNET CARRIER ETHERNET GENERALISED MPLS AND T-MPLS INTRODUCTION TO VIRTUAL LOCAL AREA NETWORKS (VLANS) LAN EXTENSION SERVICES: ETHERNET OVER MPLS, VPLS, AND VPWS CORE NETWORK ROUTING PROTOCOLS INTERNET ARCHITECTURE AND PEERING ADVANCED BORDER GATEWAY PROTOCOL VERSION 4 (BGP-4) ADVANCED OPEN SHORTEST PATH FIRST (OSPF) AND IS-IS NETWORK SERVICES DOMAIN NAME SYSTEM (DNS) AND DHCP NETWORK AND PORT ADDRESS TRANSLATION (NAT/PAT) IP MOBILITY (MIP) IP QUALITY OF SERVICE (QOS) AND DIFFERENTIATED SERVICES (DIFFSERV) SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP) AND RMON LIGHTWEIGHT DIRECTORY ACCESS PROTOCOL (LDAP) VOICE OVER IP (VOIP) NETWORKS AND SERVICES INTRODUCTION TO VOIP ARCHITECTURES THE H.248 AND MEGACO PROTOCOLS THE SESSION INITIATION PROTOCOL (SIP) SIP FOR CORE NETWORKS (SIP-T/SIP-I) AND BICC SIGNALLING TRANSPORT (SIGTRAN) IPCENTREX APPLICATIONS...11 Page 2 of 17
3 4.7 IP MULTIMEDIA SUBSYSTEM (IMS) IP SECURITY INTRODUCTION TO NETWORK AND SYSTEM SECURITY PRACTICAL VULNERABILITY ASSESSMENT FIREWALL DESIGN AND DEPLOYMENT INTRUSION DETECTION AND PREVENTION SYSTEMS (IDS) MALICIOUS CONTENT SCANNING IP SECURITY PROTOCOL (IPSEC) AND INTERNET KEY EXCHANGE (IKE) PUBLIC KEY INFRASTRUCTURE (PKIX) SECURE SHELL (SSH) WEB SECURITY USING SSL/TLS UNIX AND LINUX SECURITY IP APPLICATIONS INTERNET INTRODUCTION TO LINUX AND UNIX SYSTEM ADMINISTRATION LINUX AND UNIX-BASED NETWORK APPLICATIONS INSTANT MESSAGING (IM) INTRODUCTION TO VIRTUAL PRIVATE NETWORKS IP SECURITY PROTOCOL (IPSEC) AND SECURE VPNS MPLS VIRTUAL PRIVATE NETWORKS (VPNS) IP TELEVISION (IPTV) AND TRIPLE PLAY SERVICES...16 Page 2 of 17
4 1 Access Technologies 1.1 Digital Subscriber Lines (xdsl) xdsl architecture and technology xdsl as a Multiservice access network for IP, data and voice Unbundling approaches and network integration SHDSL and other DSL technologies 1.2 Wireless Local Loop (WLL) Introduction to Wireless Local Loop Competing technologies for WLL Integrated voice and data over WLL Future Directions in WLL 1.3 Gigabit Ethernet Access Services Gigabit Ethernet Architecture and Protocols Metro networks using Gigabit Ethernet LAN Extension Services (LES)/EPLAN Pseudo-wire Emulation Services over Ethernet/EPL 1.4 Very Small Aperture terminal (VSAT) VSAT architecture and technology Design of VSAT Space Segment and Link Budgets Earth Segment design and optimisation Compression technology and DCME 1.5 Multiservice Access Networks (MSAN) and Metro Nodes Section 6 Traditional voice and data access networks MSAN and Metro Nodes Architectures Physical Layer Access to MSAN Layer 2 Switching, grooming and aggregation Service and Network Interworking in Metro Nodes Legacy Support and Network Migration Page 3 of 17
5 2 Routing and Switching 2.1 Introduction to Networking The Role of Networks Network Architectures in LANs and WANs Ethernet and WLAN Protocols and Operation The IP Protocol and Its Operation TCP and UDP Transport Protocols Integrating Networks and Network Security 2.2 Introduction to Routing and Switching Section 6 Introduction to Network Design using Switches and Routers Ethernet Switching using STP and its Variants VLAN technology in Large Switched Networks Enterprise Routing using RIP, EIGRP, VLSM and CIDR Routing using OSPF and BGP4 Routing Across Boundaries and Redistribution 2.3 Advanced Routing Section 6 IP Core Technology Review Routing using OSPF and BGP4 Routing Across Boundaries and Redistribution BGP-4 Policy Configuration and Peering Packet-filtering using Access Lists Network and Port Address Translation 2.4 IP Version 6 (IPv6) IPv6 addressing and Address Migration IPv6 and IPv4 Comparison Network Infrastructure and Application Protocols Inter-working IPv4 and IPv6 Planning the Deployment of IPv6 Page 4 of 17
6 2.5 Introduction to Multiprotocol Label Switching (MPLS) Native IP and IP over ATM MPLS Core Technology MPLS Virtual Private Network Services MPLS LAN Extension Services MPLS Traffic Engineering 2.6 MPLS Traffic Engineering (MPLS TE) MPLS Core Technology Review Traffic Engineering Using MPLS-TE MPLS Deployment in Next Generation Networks Future Directions in MPLS-TE and Generalised MPLS 2.7 Ethernet and Gigabit Ethernet Bridges, Hubs, Switches and Routers Switched 10/100 Ethernet technology Ethernet LANs, VLANs and QoS Tagging Gigabit and 10G Ethernet Extensions 2.8 Carrier Ethernet Gigabit Ethernet Core Technology Review Manageability, Scalability and OAM Additions for Carrier Ethernet Ethernet in Service Provider Access Networks Ethernet n Service Provider Core Networks Ethernet Interworking with MPLS 2.9 Generalised MPLS and T-MPLS MPLS Core Technology Review GMPLS and T-MPLS Control and Management MPLS and T-MPLS Interworking Future Directions in GMPLS and T-MPLS Page 5 of 17
7 2.10 Introduction to Virtual Local Area Networks (VLANs) VLANs versus LANs, VPNs 802.1p and 802.1q frame tagging and QoS techniques Integrating Switching, Routing and VLANs Public service VLANs including VPLS and VPWS 2.11 LAN Extension Services: Ethernet over MPLS, VPLS, and VPWS MPLS Core Technology Review Virtual Private LAN and Virtual Private Wire services Ethernet-based VLANs for Service Access RSTP and VRRP for scale and availability in VLAN Services 2.12 Core Network Routing Protocols The Requirements on and Role of Core Network Routing Protocols OSPF Architecture and Operation BGP-4 Architecture and Operation Integrating Multiple Routing Protocols and Instances Integrating Customers Routing into Service Provider Networks 2.13 Internet Architecture and Peering The Internet Architecture: Autonomous Systems and Peeing Internet Exchange Point (IXP) Services VoIP and AAA Peering Providers 2.14 Advanced Border Gateway Protocol version 4 (BGP-4) Architecture and Operation of BGP4 Designing Scaleable BGP4 Networks Using BGP4 Policy Controls Implementing BGP4 and Other Security Features Page 6 of 17
8 2.15 Advanced Open Shortest Path First (OSPF) and IS-IS Architecture and Operation of OSPF Designing Scaleable OSPF Networks The Use of Stubby, Totally Stubby, and Not So Stubby Areas OSPF in NBMA networks OSPF Extensions for IPv6 and MPLS Page 7 of 17
9 3 Network Services 3.1 Domain Name System (DNS) and DHCP Architecture and Operation of the Internet Domain Name System DNS Implementations for public/private networks DNS Vulnerabilities and Security DNS Operational Aspects 3.2 Network and Port Address Translation (NAT/PAT) Operation NAT/NAPT NAT Traversal Issues for Applications Remedies Based Upon ALGs, Tunnelling and Keepalives NAT Traversal using STUN, TURN and MIDCOM 3.3 IP Mobility (MIP) The Role of IP Mobility versus Dynamic Addressing Mobile IPv4 architecture and standards Mobile IP in 3GPP networks and IPv6 3.4 IP Quality of Service (QoS) and Differentiated Services (Diffserv) QoS Issues in Pure IP Networks The Integrated Services and RSVP Architecture The Differentiated Services Architecture Diffserv Integration into ATM, MPLS and L2TP networks 3.5 Simple Network Management Protocol (SNMP) and RMON SNMP Architecture and Operation MIB2 and Private Extensions to the Deployed MIBs RMON 2 Architecture and Operation Integration of SNMP and RMON into Network Management Systems Page 8 of 17
10 3.6 Lightweight Directory Access Protocol (LDAP) The Role of X.500 Directories and Access Protocols LDAP version 2 and 3 Architecture and Operation Enterprise directories based on LDAP Page 9 of 17
11 4 Voice over IP (VoIP) Networks and Services 4.1 Introduction to VoIP Architectures Section 6 Section 7 The Development of VoIP Networks Voice over IP (VoIP) Architectures Voice Quality Issues and QoS Engineering Techniques The H.248 Architecture for Fixed/Mobile Networks Session Initiation Protocol (SIP) Architecture and Operation VoIP Customer Premises Equipment Future Directions in VoIP Networks 4.2 The H.248 and MEGACO Protocols H.248 Architecture and Operation Packages and Gateway Functionality FAX, CODEC and DTMF support The Role of H.248/MEGACO in TIPSPAN and 3GPP Architectures 4.3 The Session Initiation Protocol (SIP) SIP Architecture and Operation SIP to PSTN Inter-working SIP Security Extensions Real-world SIP Platforms 4.4 SIP for Core Networks (SIP-T/SIP-I) and BICC SIP Core Technology Review PSTN Signalling Core Technology Review BICC Architecture and Operation SIP-T and SIP-I Architecture and Operation The Evolution Towards Native VoIP Interconnect 4.5 Signalling Transport (SIGTRAN) PSTN Signalling Core Technology Review Architecture and Operation of SIGTRAN SCTP Protocol Page 10 of 17
12 MTP Adaptation Layers Application Adaptation Layers 4.6 IPCentrex Applications SIP Core Technology Review IPCentrex versus POTS and Centrex Services Master/Slave Architectures to support IPCentrex Services CPE Requirements for IPCentrex QoS Techniques for IPCentrex services 4.7 IP Multimedia Subsystem (IMS) SIP Core Technology Review IP Multimedia System Architecture and Operation SIP Procedures in IMS IMS Applications Page 11 of 17
13 5 IP Security 5.1 Introduction to Network and System Security Section 6 Threats and Vulnerabilities The Role and Structure of Security Policies Authentication Systems Privilege Management Systems for Authorisation Network Security Devices: Firewalls and IDS Introduction to Security Protocols: IPSec, SSH and TLS 5.2 Practical Vulnerability Assessment Systems Security Core Technology Review Hacking Techniques and Tools Assessment Techniques and Tools Honey Traps and Active Measures Life-cycle Vulnerability Management 5.3 Firewall Design and Deployment Section 6 Security Core Technology Review The Role of Internet and Enterprise Firewalls Platform hardening and testing using third-party tools Implementation and Configuration of Enterprise Solutions Understanding and Acting on Firewall Logs Integration of VPNs with Firewalls 5.4 Intrusion Detection and Prevention Systems (IDS) The Role of Intrusion Detection Systems IDS and IPS Types and Capabilities Design and Deployment of Host and Network-based Sensors Tailoring and Testing IDS Operation Page 12 of 17
14 5.5 Malicious Content Scanning The Role of Virus Scanning Systems Virus Scanning System Types and Capabilities Design and Deployment of Host, Gateway and Server Solutions Integration of Scanning into and Web Proxy Systems 5.6 IP Security Protocol (IPSec) and Internet Key Exchange (IKE) Security Protocols Core Technology Review IPSec Architecture and Operation IKE and IPSec Policies and Security Associations Encryption and Authentication Algorithms Available in IPSec IPSec Applications and Design Approaches IPSec Limitations: NAT and Routing 5.7 Public Key Infrastructure (PKIX) Section 6 Security Protocols Core Technology Review Digital Signatures and Certificates Certificate Authorities PKIX Profiles and Extensions Implementation of Certificate Directories Life-cycle Management of Certificates: CRLs and OCSP 5.8 Secure Shell (SSH) Security Protocols Core Technology Review The basic operation of SSH SSH as a secure telnet replacement SSH port forwarding and X-forwarding SSH Implementation and Configuration 5.9 Web Security Using SSL/TLS Security Protocols Core Technology Review The use of SSL and TLS in secure HTTP applications Encryption, Authentication available in SSL/TLS Server Certificates and Key Management SSL-based VPNs Page 13 of 17
15 5.10 UNIX and Linux Security Section 6 Security Core Technology Review System Vulnerability Assessment User Accounts and Security Hardening System Services and the Core Security Protocols for Internet Services Use of Host IDS and Audit/Logging Page 14 of 17
16 6 IP Applications 6.1 Internet Introduction to SNMP Hardening of MTA implementations Integration into corporate services SNMP enhancements and SMTP/MMS Interworking 6.2 Introduction to Linux and UNIX System Administration Installing and Managing a UNIX/Linux System Networking Linux/UNIX Systems Installing and Managing Applications System Security and Hardening the Operating System UNIX and Linux Shells and Shell Programming 6.3 Linux and UNIX-based Network Applications Linux/UNIX Core Technology Review Internet Applications: Apache, Sendmail, Samba Network Security Tools: IPTables, NMAP, NESSUS and SNORT 6.4 Instant Messaging (IM) Introduction to Instant Messaging IM Protocols and Public Services IM security and Interoperability Enterprise IM and IM Integration Using GAIM Voice and Video over IM Services 6.5 Introduction to Virtual Private Networks Layer 2 versus Layer 3 VPNs: Frame Relay Services Simple Tunnelling VPNs: GRE and PPTP VPNs based upon MPLS: Cisco MPLS VPNs VPNs Based upon IPSec: Microsoft IPSec VPNs Based upon Hybrid Solutions: OpenVPN Page 15 of 17
17 6.6 IP Security Protocol (IPSec) and Secure VPNs Security Protocols Core Technology Review IPSec and IKE Architecture and Operation Policies, Databases and Security Associations IPSec Applications and Design Approaches IPSec Limitations: NAT and Routing 6.7 MPLS Virtual Private Networks (VPNs) Overview of IP addressing and routing MPLS Technology and Packet Forwarding MPLS Layer 3 VPNs 6.8 IP Television (IPTV) and Triple Play Services Introduction to Live TV, Video on Demand and Triple Play Services Architecture and Components of IPTV Technical Building Blocks and Protocols of IPTV Case Studies: Fastweb, Microsoft and Cisco Page 16 of 17
Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.
Data Networking and Architecture The course focuses on theoretical principles and practical implementation of selected Data Networking protocols and standards. Physical network architecture is described
More informationImplementing Secured Converged Wide Area Networks (ISCW) Version 1.0
COURSE OVERVIEW Implementing Secure Converged Wide Area Networks (ISCW) v1.0 is an advanced instructor-led course that introduces techniques and features that enable or enhance WAN and remote access solutions.
More informationICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling
ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling Release: 1 ICTTEN6172A Design and configure an IP-MPLS network with virtual private network tunnelling Modification
More informationDesigning and Developing Scalable IP Networks
Designing and Developing Scalable IP Networks Guy Davies Telindus, UK John Wiley & Sons, Ltd Contents List of Figures List of Tables About the Author Acknowledgements Abbreviations Introduction xi xiii
More informationNetworking Technology Online Course Outline
Networking Technology Online Course Outline Introduction Networking Technology Introduction Welcome to InfoComm University About InfoComm International About Networking Technology Network Technology Course
More informationEDA 1200 4.3 Training Programs. Catalog of Course Descriptions
EDA 1200 4.3 Training Programs Catalog of Course Descriptions Catalog of Course Descriptions INTRODUCTION...3 ACCESS NETWORKS, AN OVERVIEW...4 CORE NETWORKS, AN OVERVIEW...6 EDA 1200 4.3 INSTALLATION AND
More informationSSVVP SIP School VVoIP Professional Certification
SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that
More informationAdvanced Internetworking
Hands-On TCP-IP / IPv6 / VoIP Course Description In this Hands-On 3-day course, gives a deeper understanding of internetworking and routed network protocols. The focus of the course is the design, operation,
More informationCOURSE AGENDA. Lessons - CCNA. CCNA & CCNP - Online Course Agenda. Lesson 1: Internetworking. Lesson 2: Fundamentals of Networking
COURSE AGENDA CCNA & CCNP - Online Course Agenda Lessons - CCNA Lesson 1: Internetworking Internetworking models OSI Model Discuss the OSI Reference Model and its layers Purpose and function of different
More informationSSVP SIP School VoIP Professional Certification
SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover
More informationNetwork Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
More informationCisco Which VPN Solution is Right for You?
Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2
More informationManaged 4G LTE WAN: Provide Cost-Effective Wireless Broadband Service
Solution Overview Managed 4G LTE WAN: Provide Cost-Effective Wireless Broadband Service What You Will Learn With the arrival of the fourth-generation (4G) or Long Term Evolution (LTE) cellular wireless
More informationSolutions Guide. Secure Remote Access. Allied Telesis provides comprehensive solutions for secure remote access.
Solutions Guide Secure Remote Access Allied Telesis provides comprehensive solutions for secure remote access. Introduction The world is generating electronic data at an astonishing rate, and that data
More informationNovember 2013. Defining the Value of MPLS VPNs
November 2013 S P E C I A L R E P O R T Defining the Value of MPLS VPNs Table of Contents Introduction... 3 What Are VPNs?... 4 What Are MPLS VPNs?... 5 What Are the Benefits of MPLS VPNs?... 8 How Do
More informationCisco Networking Professional-6Months Project Based Training
Cisco Networking Professional-6Months Project Based Training Core Topics Cisco Certified Networking Associate (CCNA) 1. ICND1 2. ICND2 Cisco Certified Networking Professional (CCNP) 1. CCNP-ROUTE 2. CCNP-SWITCH
More informationNetworking 4 Voice and Video over IP (VVoIP)
Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move
More informationSprint Global MPLS VPN IP Whitepaper
Sprint Global MPLS VPN IP Whitepaper Sprint Product Marketing and Product Development January 2006 Revision 7.0 1.0 MPLS VPN Marketplace Demand for MPLS (Multiprotocol Label Switching) VPNs (standardized
More informationHands on VoIP. Content. Tel +44 (0) 845 057 0176 enquiries@protelsolutions.co.uk. Introduction
Introduction This 4-day course offers a practical introduction to 'hands on' VoIP engineering. Voice over IP promises to reduce your telephony costs and provides unique opportunities for integrating voice
More informationICTTEN4215A Install and configure internet protocol TV in a service provider network
ICTTEN4215A Install and configure internet protocol TV in a service provider network Release: 1 ICTTEN4215A Install and configure internet protocol TV in a service provider network Modification History
More informationGigabit SSL VPN Security Router
As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is the ideal to help the SMBs increase the
More informationNETWORK SECURITY (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information
More informationIPv6 Migration Challenges for Large Service Providers
IPv6 Migration Challenges for Large Service Providers Aruna P General manager Network Operation Agenda Airtel Overview Drivers of IPV6 Migration challenges Design Considerations Deployment plan Airtel
More informationRecommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings
More informationMPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs
A Silicon Valley Insider MPLS VPN Services PW, VPLS and BGP MPLS/IP VPNs Technology White Paper Serge-Paul Carrasco Abstract Organizations have been demanding virtual private networks (VPNs) instead of
More informationSecure Network Foundation 1.1 Design Guide for Single Site Deployments
Secure Network Foundation 1.1 Design Guide for Single Site Deployments This document provides a simple vision for a smart and secure business where everyday communications are made easier, faster, and
More informationTraining Proposal. Training Description for Enterprise Network COMMERCIAL IN CONFIDENCE 1
Training Proposal Training Description for Enterprise Network COMMERCIAL IN CONFIDENCE 1 Training Proposal CONTENTS CONTENTS... 2 1 Training Solution... 7 1.1 Routing and Switching Certification Training
More informationCisco Certified Network Professional - Routing & Switching
Cisco Certified Network Professional - Routing & Switching Information Course Price 5,265 No. Vouchers: Course Code 0 Vouchers CCNP-RS No. Courses: 3 1/9 Implementing Cisco IP Routing Information Length:
More information10CS64: COMPUTER NETWORKS - II
QUESTION BANK 10CS64: COMPUTER NETWORKS - II Part A Unit 1 & 2: Packet-Switching Networks 1 and Packet-Switching Networks 2 1. Mention different types of network services? Explain the same. 2. Difference
More informationHow To Use A Cisco Wvvvdns4400N Wireless-N Gigabit Security Router For Small Businesses
Cisco WRVS4400N Wireless-N Gigabit Security Router Cisco Small Business Routers Highlights Secure, high-speed wireless network access for small business Gigabit Ethernet connections enable rapid transfer
More informationMagnum Network Software DX
Magnum Network Software DX Software Release Notes Software Revision 3.0.1 RC5, Inc. www..com www..com/techsupport email: support@.com This document contains Confidential information or Trade Secrets, or
More informationEnterprise Edge Communications Manager. Data Capabilities
Enterprise Edge Communications Manager Data Capabilities Data Module Objectives After the completion of this module you will be able to describe the following Data components of the Enterprise Edge Communications
More informationHP VSR1000 Virtual Services Router Series
Data sheet HP VSR1000 Virtual Services Router Series Key features Virtualized enterprise-class x86 routing software Firewall, IPSec, and MPLS VPN security Agile deployments across the branch office, data
More informationAddressing Inter Provider Connections With MPLS-ICI
Addressing Inter Provider Connections With MPLS-ICI Introduction Why migrate to packet switched MPLS? The migration away from traditional multiple packet overlay networks towards a converged packet-switched
More informationMED: Voice over IP systems
www.ptt.co.uk Online course specification MED: Voice over IP systems Target audience: This online course is designed for those who will be responsible for the design or maintenance of Voice over IP (VoIP)
More informationCompany Course Description: Course Objectives: Intended Audience
VoIP Basics Training Courses: Teracom Training Institute- VoIP Training Course 301: Understanding Voice over IP VoIP Training Course301: Teracom -How voice packetization works -To give a thorough overall
More informationCourse Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
More information(d-5273) CCIE Security v3.0 Written Exam Topics
(d-5273) CCIE Security v3.0 Written Exam Topics CCIE Security v3.0 Written Exam Topics The topic areas listed are general guidelines for the type of content that is likely to appear on the exam. Please
More informationCisco Catalyst 3750 Metro Series Switches
Cisco Catalyst 3750 Metro Series Switches Product Overview Q. What are Cisco Catalyst 3750 Metro Series Switches? A. The Cisco Catalyst 3750 Metro Series is a new line of premier, customer-located switches
More informationVoice over IP Basics for IT Technicians
Voice over IP Basics for IT Technicians White Paper Executive summary The IP phone is coming or has arrived on desk near you. The IP phone is not a PC, but does have a number of hardware and software elements
More informationMobile Packet Backbone Network Training Programs. Catalog of Course Descriptions
Mobile Packet Backbone Network Training Programs Catalog of Course Descriptions Page 2 Catalog of Course Descriptions INTRODUCTION... 6 MOBILE PACKET BACKBONE NETWORK (M-PBN) R5.1 DELTA... 7 MOBILE PACKET
More informationCompTIA Convergence+ 2006 Examination Objectives
CompTIA Convergence+ 2006 Examination Objectives Introduction The CompTIA Convergence+ examination covering the 2006 objectives certifies that the successful candidate has the necessary knowledge to perform
More informationWAN and VPN Solutions:
WAN and VPN Solutions: Choosing the Best Type for Your Organization xo.com WAN and VPN Solutions: Choosing the Best Type for Your Organization WAN and VPN Solutions: Choosing the Best Type for Your Organization
More informationCisco WRVS4400N Wireless-N Gigabit Security Router: Cisco Small Business Routers
Cisco WRVS4400N Wireless-N Gigabit Security Router: Cisco Small Business Routers Highlights Secure, high-speed wireless network access for small business Gigabit Ethernet connections enable rapid transfer
More informationCisco RV 120W Wireless-N VPN Firewall
Cisco RV 120W Wireless-N VPN Firewall Take Basic Connectivity to a New Level The Cisco RV 120W Wireless-N VPN Firewall combines highly secure connectivity to the Internet as well as from other locations
More informationMPLS/IP VPN Services Market Update, 2014. United States
MPLS/IP VPN Services Market Update, 2014 United States August 2014 Contents Section Slide Numbers Executive Summary 4 Market Overview & Definitions 8 Drivers & Restraints 14 Market Trends & Revenue Forecasts
More informationAPPLICATION NOTE. Benefits of MPLS in the Enterprise Network
APPLICATION NOTE Benefits of MPLS in the Enterprise Network Abstract As enterprises evolve to keep pace with the ever-changing business climate, enterprises networking needs are becoming more dynamic.
More informationChapter 4: Security of the architecture, and lower layer security (network security) 1
Chapter 4: Security of the architecture, and lower layer security (network security) 1 Outline Security of the architecture Access control Lower layer security Data link layer VPN access Wireless access
More informationNetwork System Design Lesson Objectives
Network System Design Lesson Unit 1: INTRODUCTION TO NETWORK DESIGN Assignment Customer Needs and Goals Identify the purpose and parts of a good customer needs report. Gather information to identify network
More informationInternet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
More informationCisco. A Beginner's Guide Fifth Edition ANTHONY T. VELTE TOBY J. VELTE. City Milan New Delhi Singapore Sydney Toronto. Mc Graw Hill Education
Cisco A Beginner's Guide Fifth Edition ANTHONY T. VELTE TOBY J. VELTE Mc Graw Hill Education New York Chicago San Francisco Athens London Madrid Mexico City Milan New Delhi Singapore Sydney Toronto Contents
More informationCompTIA Network+ (Exam N10-005)
CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate
More informationCisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)
Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and
More informationThe Essential Guide to Deploying MPLS for Enterprise Networks
White Paper The Essential Guide to Deploying MPLS for Enterprise Networks Daniel Backman Systems Engineer Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale,
More informationApplication Note. Onsight Connect Network Requirements v6.3
Application Note Onsight Connect Network Requirements v6.3 APPLICATION NOTE... 1 ONSIGHT CONNECT NETWORK REQUIREMENTS V6.3... 1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview...
More informationCTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
More informationIndustrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
More informationNetwork Administrator Gateway Progression Plan
June 2014 Network Administrator Gateway Progression Plan Scope: Network Administrators (NA) are part of the IT Services infrastructure team and provide advanced network services such as designing solutions
More informationCisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications
Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications Product Overview Cisco Dynamic Multipoint VPN (DMVPN) is a Cisco IOS Software-based security solution for building scalable
More informationHughesNet Broadband VPN End-to-End Security Using the Cisco 87x
HughesNet Broadband VPN End-to-End Security Using the Cisco 87x HughesNet Managed Broadband Services includes a high level of end-to-end security features based on a robust architecture designed to meet
More informationLifeSize Video Communications Systems Administrator Guide
LifeSize Video Communications Systems Administrator Guide November 2009 Copyright Notice 2005-2009 LifeSize Communications Inc, and its licensors. All rights reserved. LifeSize Communications has made
More informationCisco Certified Network Professional (CCNP Routing & Switching)
529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Network Professional (CCNP Routing & Switching) Program Summary This instructor-led
More informationQuidway MPLS VPN Solution for Financial Networks
Quidway MPLS VPN Solution for Financial Networks Using a uniform computer network to provide various value-added services is a new trend of the application systems of large banks. Transplanting traditional
More informationVirtual Private Networks. Juha Heinänen jh@song.fi Song Networks
Virtual Private Networks Juha Heinänen jh@song.fi Song Networks What is an IP VPN? an emulation of private (wide area) network facility using provider IP facilities provides permanent connectivity between
More informationEdgeRouter Lite 3-Port Router. Datasheet. Model: ERLite-3. Sophisticated Routing Features. Advanced Security, Monitoring, and Management
EdgeRouter Lite 3-Port Router Model: ERLite-3 Sophisticated Routing Features Advanced Security, Monitoring, and Management High-Performance Gigabit Ports Advanced 3-Port Router Introducing the EdgeRouter
More informationCourse Contents CCNP (CISco certified network professional)
Course Contents CCNP (CISco certified network professional) CCNP Route (642-902) EIGRP Chapter: EIGRP Overview and Neighbor Relationships EIGRP Neighborships Neighborship over WANs EIGRP Topology, Routes,
More informationContents. Features Major Functions. Detailed Specifications. c SAMSUNG Electronics Co.,Ltd.
OfficeServ 7400 Contents Features Major Functions Detailed Specifications Features All in one Solution All in One = IP PBX + Router + Switch + Security PBX PSTN Data + Voice : UTP, PoE, VoIP Auto Config.
More informationDescription: Objective: Upon completing this course, the learner will be able to meet these overall objectives:
Course: Building Cisco Service Provider Next-Generation Networks, Part 2 Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,750.00 Learning Credits: 38 Description: The Building Cisco Service Provider
More informationIPv6 Opportunity and challenge
Juniper Networks Solution from enterprise to service provider Jean-Marc Uzé juze@juniper.net 10 May 2004 1 Opportunity and challenge More devices demanding more addresses 3G Mobile IP multimedia specifies
More informationIntroduction to MPLS-based VPNs
Introduction to MPLS-based VPNs Ferit Yegenoglu, Ph.D. ISOCORE ferit@isocore.com Outline Introduction BGP/MPLS VPNs Network Architecture Overview Main Features of BGP/MPLS VPNs Required Protocol Extensions
More informationCisco RV220W Network Security Firewall
Cisco RV220W Network Security Firewall High-Performance, Highly Secure Connectivity for the Small Office The Cisco RV220W Network Security Firewall lets small offices enjoy secure, reliable, wired and
More informationNetwork Virtualization Network Admission Control Deployment Guide
Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus
More informationEnterprise Network Simulation Using MPLS- BGP
Enterprise Network Simulation Using MPLS- BGP Tina Satra 1 and Smita Jangale 2 1 Department of Computer Engineering, SAKEC, Chembur, Mumbai-88, India tinasatra@gmail.com 2 Department of Information Technolgy,
More information"Charting the Course...
Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content
More informationWHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January 2008. Introduction...
Introduction WHITE PAPER Addressing Inter Provider Connections with MPLS-ICI The migration away from traditional multiple packet overlay networks towards a converged packet-switched MPLS system is now
More informationIP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
More informationIMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE)
IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE) COURSE OVERVIEW: Implementing Cisco IP Routing (ROUTE) v2.0 is an instructor-led five day training course developed to help students prepare for Cisco CCNP _
More informationIP Implementation in Private Branch Exchanges From 9:30 a.m until 4:30 p.m (7 hrs./day) 5 days / week
Course Title: No. of Hours: IP Implementation in Private Branch Exchanges From 9:30 a.m until 4:30 p.m (7 hrs./day) 5 days / week 1 Course Duration: 3 Months (12weeks) No. Of Hours: 7 Hrs./Day- 5 days/week.
More informationNetworking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the
Networking Systems Design and Development Lee Chao CRC Press Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Croup, an Informa business AN AUERBACH BOOK
More informationPARAMETERS TO BE MONITORED IN THE PROCESS OF OPERATION WHEN IMPLEMENTING NGN TECHNICAL MEANS IN PUBLIC TELECOMMUNICATION NETWORKS
Draft Recommendation Q.3902 PARAMETERS TO BE MONITORED IN THE PROCESS OF OPERATION WHEN IMPLEMENTING NGN TECHNICAL MEANS IN PUBLIC TELECOMMUNICATION NETWORKS Summary This Recommendation describes the main
More informationSession Border Controllers in Enterprise
A Light Reading Webinar Session Border Controllers in Enterprise Thursday, October 7, 2010 Hosted by Jim Hodges Senior Analyst Heavy Reading Sponsored by: Speakers Natasha Tamaskar VP Product Marketing
More informationVoice over IP (VoIP) Basics for IT Technicians
Voice over IP (VoIP) Basics for IT Technicians VoIP brings a new environment to the network technician that requires expanded knowledge and tools to deploy and troubleshoot IP phones. This paper provides
More informationThe term Virtual Private Networks comes with a simple three-letter acronym VPN
Application Brief Nortel Networks Virtual Private Networking solutions for service providers Service providers addressing the market for Virtual Private Networking (VPN) need solutions that effectively
More informationICTTEN8195B Evaluate and apply network security
ICTTEN8195B Evaluate and apply network security Release 1 ICTTEN8195B Evaluate and apply network security Modification History Release Release 2 Comments This version first released with ICT10 Integrated
More informationImplementing Cisco IOS Network Security v2.0 (IINS)
Implementing Cisco IOS Network Security v2.0 (IINS) Course Overview: Implementing Cisco IOS Network Security (IINS) v2.0 is a five-day instructor-led course that is presented by Cisco Learning Partners
More informationLayer 3 Network + Dedicated Internet Connectivity
Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for
More informationEvaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture
Deploying Cisco ASA VPN Solutions Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and Course Flow Additional Cisco Glossary of Terms Your Training Curriculum Evaluation of the Cisco
More informationSCOPE DOCUMENT. Trade Name IT- Network Systems Administration Post- Secondary DATE OF DISTRIBUTION VIA WEBSITE
SCOPE DOCUMENT Competition Year Competition location Trade Number Trade Name Level 2013 Vancouver, BC 39 IT- Network Systems Administration Post- Secondary 1. INTRODUCTION 1.1 Purpose of the Challenge
More informationCisco RV180 VPN Router
Data Sheet Cisco RV180 VPN Router Secure, high-performance connectivity at a price you can afford. Figure 1. Cisco RV180 VPN Router (Front Panel) Highlights Affordable, high-performance Gigabit Ethernet
More informationGPRS / 3G Services: VPN solutions supported
GPRS / 3G Services: VPN solutions supported GPRS / 3G VPN soluti An O2 White Paper An O2 White Paper Contents Page No. 3 4-6 4 5 6 6 7-10 7-8 9 9 9 10 11-14 11-12 13 13 13 14 15 16 Chapter No. 1. Executive
More informationCisco Certified Network Expert (CCNE)
529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Network Expert (CCNE) Program Summary This instructor- led program with a combination
More informationDesigning for Cisco Internetwork Solutions
Designing for Cisco Internetwork Solutions Course DESGN v2.1; 5 Days, Instructor-led Course Description: Designing for Cisco Internetwork Solutions (DESGN) v2.1 is an instructor-led course presented by
More informationIINS Implementing Cisco Network Security 3.0 (IINS)
IINS Implementing Cisco Network Security 3.0 (IINS) COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using
More informationHow To Understand The Benefits Of An Mpls Network
NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 NETWORKS NetIron XMR 16000 Introduction MPLS in the Enterprise Multi-Protocol Label Switching (MPLS) as a technology has been around for over a decade
More informationHow To Learn Cisco Cisco Ios And Cisco Vlan
Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led
More information1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
More informationBreeze SERIES- HYBRID CLOUD INTEGRATED SERVICES GATEWAY PRODUCTS
The Breeze SOHO series of INTEGRATED SERVICES HYBRID CLOUD GATEWAYs (ISHCG) from Nuevo Network enables hybrid cloud-ready SOHO office-in-a-box / Telecommuter network making CIO s breathe easy by delivering
More informationAdvanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview
2114 West 7 th Street Tempe, AZ 85281 USA Voice +1.480.333.2200 E-mail sales@comtechefdata.com Web www.comtechefdata.com Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview January 2014 2014
More informationOptimizing Networks for NASPI
Optimizing Networks for NASPI Scott Pelton, CISSP National Director AT&T Enterprise Network Architecture Center 2008 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks
More informationComputer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill
Computer Networks A Top-Down Approach Behrouz A. Forouzan and Firouz Mosharraf \Connect Mc \ Learn Graw I Succeed* Hill Preface xvii Trademarks xxiii Chapter 1 Introduction 1 1.1 OVERVIEW OF THE INTERNET
More information