Technology Training Limited Module Portfolio for Customised Courses E-mail: info@technology-training.co.uk website: www.technology-training.co.uk Module Catalogue v1.3 Page 1 of 17
CONTENTS LIST 1 ACCESS TECHNOLOGIES...3 1.1 DIGITAL SUBSCRIBER LINES (XDSL)...3 1.2 WIRELESS LOCAL LOOP (WLL)...3 1.3 GIGABIT ETHERNET ACCESS SERVICES...3 1.4 VERY SMALL APERTURE TERMINAL (VSAT)...3 1.5 MULTISERVICE ACCESS NETWORKS (MSAN) AND METRO NODES...3 2 ROUTING AND SWITCHING...4 2.1 INTRODUCTION TO NETWORKING...4 2.2 INTRODUCTION TO ROUTING AND SWITCHING...4 2.3 ADVANCED ROUTING...4 2.4 IP VERSION 6 (IPV6)...4 2.5 INTRODUCTION TO MULTIPROTOCOL LABEL SWITCHING ( MPLS)...5 2.6 MPLS TRAFFIC ENGINEERING (MPLS TE)...5 2.7 ETHERNET AND GIGABIT ETHERNET...5 2.8 CARRIER ETHERNET...5 2.9 GENERALISED MPLS AND T-MPLS...5 2.10 INTRODUCTION TO VIRTUAL LOCAL AREA NETWORKS (VLANS)...6 2.11 LAN EXTENSION SERVICES: ETHERNET OVER MPLS, VPLS, AND VPWS...6 2.12 CORE NETWORK ROUTING PROTOCOLS...6 2.13 INTERNET ARCHITECTURE AND PEERING...6 2.14 ADVANCED BORDER GATEWAY PROTOCOL VERSION 4 (BGP-4)...6 2.15 ADVANCED OPEN SHORTEST PATH FIRST (OSPF) AND IS-IS...7 3 NETWORK SERVICES...8 3.1 DOMAIN NAME SYSTEM (DNS) AND DHCP...8 3.2 NETWORK AND PORT ADDRESS TRANSLATION (NAT/PAT)...8 3.3 IP MOBILITY (MIP)...8 3.4 IP QUALITY OF SERVICE (QOS) AND DIFFERENTIATED SERVICES (DIFFSERV)...8 3.5 SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP) AND RMON...8 3.6 LIGHTWEIGHT DIRECTORY ACCESS PROTOCOL (LDAP)...9 4 VOICE OVER IP (VOIP) NETWORKS AND SERVICES...10 4.1 INTRODUCTION TO VOIP ARCHITECTURES...10 4.2 THE H.248 AND MEGACO PROTOCOLS...10 4.3 THE SESSION INITIATION PROTOCOL (SIP)...10 4.4 SIP FOR CORE NETWORKS (SIP-T/SIP-I) AND BICC...10 4.5 SIGNALLING TRANSPORT (SIGTRAN)...10 4.6 IPCENTREX APPLICATIONS...11 Page 2 of 17
4.7 IP MULTIMEDIA SUBSYSTEM (IMS)...11 5 IP SECURITY...12 5.1 INTRODUCTION TO NETWORK AND SYSTEM SECURITY...12 5.2 PRACTICAL VULNERABILITY ASSESSMENT...12 5.3 FIREWALL DESIGN AND DEPLOYMENT...12 5.4 INTRUSION DETECTION AND PREVENTION SYSTEMS (IDS)...12 5.5 MALICIOUS CONTENT SCANNING...13 5.6 IP SECURITY PROTOCOL (IPSEC) AND INTERNET KEY EXCHANGE (IKE)...13 5.7 PUBLIC KEY INFRASTRUCTURE (PKIX)...13 5.8 SECURE SHELL (SSH)...13 5.9 WEB SECURITY USING SSL/TLS...13 5.10 UNIX AND LINUX SECURITY...14 6 IP APPLICATIONS...15 6.1 INTERNET EMAIL...15 6.2 INTRODUCTION TO LINUX AND UNIX SYSTEM ADMINISTRATION...15 6.3 LINUX AND UNIX-BASED NETWORK APPLICATIONS...15 6.4 INSTANT MESSAGING (IM)...15 6.5 INTRODUCTION TO VIRTUAL PRIVATE NETWORKS...15 6.6 IP SECURITY PROTOCOL (IPSEC) AND SECURE VPNS...16 6.7 MPLS VIRTUAL PRIVATE NETWORKS (VPNS)...16 6.8 IP TELEVISION (IPTV) AND TRIPLE PLAY SERVICES...16 Page 2 of 17
1 Access Technologies 1.1 Digital Subscriber Lines (xdsl) xdsl architecture and technology xdsl as a Multiservice access network for IP, data and voice Unbundling approaches and network integration SHDSL and other DSL technologies 1.2 Wireless Local Loop (WLL) Introduction to Wireless Local Loop Competing technologies for WLL Integrated voice and data over WLL Future Directions in WLL 1.3 Gigabit Ethernet Access Services Gigabit Ethernet Architecture and Protocols Metro networks using Gigabit Ethernet LAN Extension Services (LES)/EPLAN Pseudo-wire Emulation Services over Ethernet/EPL 1.4 Very Small Aperture terminal (VSAT) VSAT architecture and technology Design of VSAT Space Segment and Link Budgets Earth Segment design and optimisation Compression technology and DCME 1.5 Multiservice Access Networks (MSAN) and Metro Nodes Section 6 Traditional voice and data access networks MSAN and Metro Nodes Architectures Physical Layer Access to MSAN Layer 2 Switching, grooming and aggregation Service and Network Interworking in Metro Nodes Legacy Support and Network Migration Page 3 of 17
2 Routing and Switching 2.1 Introduction to Networking The Role of Networks Network Architectures in LANs and WANs Ethernet and WLAN Protocols and Operation The IP Protocol and Its Operation TCP and UDP Transport Protocols Integrating Networks and Network Security 2.2 Introduction to Routing and Switching Section 6 Introduction to Network Design using Switches and Routers Ethernet Switching using STP and its Variants VLAN technology in Large Switched Networks Enterprise Routing using RIP, EIGRP, VLSM and CIDR Routing using OSPF and BGP4 Routing Across Boundaries and Redistribution 2.3 Advanced Routing Section 6 IP Core Technology Review Routing using OSPF and BGP4 Routing Across Boundaries and Redistribution BGP-4 Policy Configuration and Peering Packet-filtering using Access Lists Network and Port Address Translation 2.4 IP Version 6 (IPv6) IPv6 addressing and Address Migration IPv6 and IPv4 Comparison Network Infrastructure and Application Protocols Inter-working IPv4 and IPv6 Planning the Deployment of IPv6 Page 4 of 17
2.5 Introduction to Multiprotocol Label Switching (MPLS) Native IP and IP over ATM MPLS Core Technology MPLS Virtual Private Network Services MPLS LAN Extension Services MPLS Traffic Engineering 2.6 MPLS Traffic Engineering (MPLS TE) MPLS Core Technology Review Traffic Engineering Using MPLS-TE MPLS Deployment in Next Generation Networks Future Directions in MPLS-TE and Generalised MPLS 2.7 Ethernet and Gigabit Ethernet Bridges, Hubs, Switches and Routers Switched 10/100 Ethernet technology Ethernet LANs, VLANs and QoS Tagging Gigabit and 10G Ethernet Extensions 2.8 Carrier Ethernet Gigabit Ethernet Core Technology Review Manageability, Scalability and OAM Additions for Carrier Ethernet Ethernet in Service Provider Access Networks Ethernet n Service Provider Core Networks Ethernet Interworking with MPLS 2.9 Generalised MPLS and T-MPLS MPLS Core Technology Review GMPLS and T-MPLS Control and Management MPLS and T-MPLS Interworking Future Directions in GMPLS and T-MPLS Page 5 of 17
2.10 Introduction to Virtual Local Area Networks (VLANs) VLANs versus LANs, VPNs 802.1p and 802.1q frame tagging and QoS techniques Integrating Switching, Routing and VLANs Public service VLANs including VPLS and VPWS 2.11 LAN Extension Services: Ethernet over MPLS, VPLS, and VPWS MPLS Core Technology Review Virtual Private LAN and Virtual Private Wire services Ethernet-based VLANs for Service Access RSTP and VRRP for scale and availability in VLAN Services 2.12 Core Network Routing Protocols The Requirements on and Role of Core Network Routing Protocols OSPF Architecture and Operation BGP-4 Architecture and Operation Integrating Multiple Routing Protocols and Instances Integrating Customers Routing into Service Provider Networks 2.13 Internet Architecture and Peering The Internet Architecture: Autonomous Systems and Peeing Internet Exchange Point (IXP) Services VoIP and AAA Peering Providers 2.14 Advanced Border Gateway Protocol version 4 (BGP-4) Architecture and Operation of BGP4 Designing Scaleable BGP4 Networks Using BGP4 Policy Controls Implementing BGP4 and Other Security Features Page 6 of 17
2.15 Advanced Open Shortest Path First (OSPF) and IS-IS Architecture and Operation of OSPF Designing Scaleable OSPF Networks The Use of Stubby, Totally Stubby, and Not So Stubby Areas OSPF in NBMA networks OSPF Extensions for IPv6 and MPLS Page 7 of 17
3 Network Services 3.1 Domain Name System (DNS) and DHCP Architecture and Operation of the Internet Domain Name System DNS Implementations for public/private networks DNS Vulnerabilities and Security DNS Operational Aspects 3.2 Network and Port Address Translation (NAT/PAT) Operation NAT/NAPT NAT Traversal Issues for Applications Remedies Based Upon ALGs, Tunnelling and Keepalives NAT Traversal using STUN, TURN and MIDCOM 3.3 IP Mobility (MIP) The Role of IP Mobility versus Dynamic Addressing Mobile IPv4 architecture and standards Mobile IP in 3GPP networks and IPv6 3.4 IP Quality of Service (QoS) and Differentiated Services (Diffserv) QoS Issues in Pure IP Networks The Integrated Services and RSVP Architecture The Differentiated Services Architecture Diffserv Integration into ATM, MPLS and L2TP networks 3.5 Simple Network Management Protocol (SNMP) and RMON SNMP Architecture and Operation MIB2 and Private Extensions to the Deployed MIBs RMON 2 Architecture and Operation Integration of SNMP and RMON into Network Management Systems Page 8 of 17
3.6 Lightweight Directory Access Protocol (LDAP) The Role of X.500 Directories and Access Protocols LDAP version 2 and 3 Architecture and Operation Enterprise directories based on LDAP Page 9 of 17
4 Voice over IP (VoIP) Networks and Services 4.1 Introduction to VoIP Architectures Section 6 Section 7 The Development of VoIP Networks Voice over IP (VoIP) Architectures Voice Quality Issues and QoS Engineering Techniques The H.248 Architecture for Fixed/Mobile Networks Session Initiation Protocol (SIP) Architecture and Operation VoIP Customer Premises Equipment Future Directions in VoIP Networks 4.2 The H.248 and MEGACO Protocols H.248 Architecture and Operation Packages and Gateway Functionality FAX, CODEC and DTMF support The Role of H.248/MEGACO in TIPSPAN and 3GPP Architectures 4.3 The Session Initiation Protocol (SIP) SIP Architecture and Operation SIP to PSTN Inter-working SIP Security Extensions Real-world SIP Platforms 4.4 SIP for Core Networks (SIP-T/SIP-I) and BICC SIP Core Technology Review PSTN Signalling Core Technology Review BICC Architecture and Operation SIP-T and SIP-I Architecture and Operation The Evolution Towards Native VoIP Interconnect 4.5 Signalling Transport (SIGTRAN) PSTN Signalling Core Technology Review Architecture and Operation of SIGTRAN SCTP Protocol Page 10 of 17
MTP Adaptation Layers Application Adaptation Layers 4.6 IPCentrex Applications SIP Core Technology Review IPCentrex versus POTS and Centrex Services Master/Slave Architectures to support IPCentrex Services CPE Requirements for IPCentrex QoS Techniques for IPCentrex services 4.7 IP Multimedia Subsystem (IMS) SIP Core Technology Review IP Multimedia System Architecture and Operation SIP Procedures in IMS IMS Applications Page 11 of 17
5 IP Security 5.1 Introduction to Network and System Security Section 6 Threats and Vulnerabilities The Role and Structure of Security Policies Authentication Systems Privilege Management Systems for Authorisation Network Security Devices: Firewalls and IDS Introduction to Security Protocols: IPSec, SSH and TLS 5.2 Practical Vulnerability Assessment Systems Security Core Technology Review Hacking Techniques and Tools Assessment Techniques and Tools Honey Traps and Active Measures Life-cycle Vulnerability Management 5.3 Firewall Design and Deployment Section 6 Security Core Technology Review The Role of Internet and Enterprise Firewalls Platform hardening and testing using third-party tools Implementation and Configuration of Enterprise Solutions Understanding and Acting on Firewall Logs Integration of VPNs with Firewalls 5.4 Intrusion Detection and Prevention Systems (IDS) The Role of Intrusion Detection Systems IDS and IPS Types and Capabilities Design and Deployment of Host and Network-based Sensors Tailoring and Testing IDS Operation Page 12 of 17
5.5 Malicious Content Scanning The Role of Virus Scanning Systems Virus Scanning System Types and Capabilities Design and Deployment of Host, Gateway and Server Solutions Integration of Scanning into Email and Web Proxy Systems 5.6 IP Security Protocol (IPSec) and Internet Key Exchange (IKE) Security Protocols Core Technology Review IPSec Architecture and Operation IKE and IPSec Policies and Security Associations Encryption and Authentication Algorithms Available in IPSec IPSec Applications and Design Approaches IPSec Limitations: NAT and Routing 5.7 Public Key Infrastructure (PKIX) Section 6 Security Protocols Core Technology Review Digital Signatures and Certificates Certificate Authorities PKIX Profiles and Extensions Implementation of Certificate Directories Life-cycle Management of Certificates: CRLs and OCSP 5.8 Secure Shell (SSH) Security Protocols Core Technology Review The basic operation of SSH SSH as a secure telnet replacement SSH port forwarding and X-forwarding SSH Implementation and Configuration 5.9 Web Security Using SSL/TLS Security Protocols Core Technology Review The use of SSL and TLS in secure HTTP applications Encryption, Authentication available in SSL/TLS Server Certificates and Key Management SSL-based VPNs Page 13 of 17
5.10 UNIX and Linux Security Section 6 Security Core Technology Review System Vulnerability Assessment User Accounts and Security Hardening System Services and the Core Security Protocols for Internet Services Use of Host IDS and Audit/Logging Page 14 of 17
6 IP Applications 6.1 Internet Email Introduction to SNMP Hardening of MTA implementations Integration into corporate email services SNMP enhancements and SMTP/MMS Interworking 6.2 Introduction to Linux and UNIX System Administration Installing and Managing a UNIX/Linux System Networking Linux/UNIX Systems Installing and Managing Applications System Security and Hardening the Operating System UNIX and Linux Shells and Shell Programming 6.3 Linux and UNIX-based Network Applications Linux/UNIX Core Technology Review Internet Applications: Apache, Sendmail, Samba Network Security Tools: IPTables, NMAP, NESSUS and SNORT 6.4 Instant Messaging (IM) Introduction to Instant Messaging IM Protocols and Public Services IM security and Interoperability Enterprise IM and IM Integration Using GAIM Voice and Video over IM Services 6.5 Introduction to Virtual Private Networks Layer 2 versus Layer 3 VPNs: Frame Relay Services Simple Tunnelling VPNs: GRE and PPTP VPNs based upon MPLS: Cisco MPLS VPNs VPNs Based upon IPSec: Microsoft IPSec VPNs Based upon Hybrid Solutions: OpenVPN Page 15 of 17
6.6 IP Security Protocol (IPSec) and Secure VPNs Security Protocols Core Technology Review IPSec and IKE Architecture and Operation Policies, Databases and Security Associations IPSec Applications and Design Approaches IPSec Limitations: NAT and Routing 6.7 MPLS Virtual Private Networks (VPNs) Overview of IP addressing and routing MPLS Technology and Packet Forwarding MPLS Layer 3 VPNs 6.8 IP Television (IPTV) and Triple Play Services Introduction to Live TV, Video on Demand and Triple Play Services Architecture and Components of IPTV Technical Building Blocks and Protocols of IPTV Case Studies: Fastweb, Microsoft and Cisco Page 16 of 17