Technology Training Limited Module Portfolio for Customised Courses



Similar documents
Data Networking and Architecture. Delegates should have some basic knowledge of Internet Protocol and Data Networking principles.

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

Designing and Developing Scalable IP Networks

Networking Technology Online Course Outline

EDA Training Programs. Catalog of Course Descriptions

SSVVP SIP School VVoIP Professional Certification

Advanced Internetworking

COURSE AGENDA. Lessons - CCNA. CCNA & CCNP - Online Course Agenda. Lesson 1: Internetworking. Lesson 2: Fundamentals of Networking

SSVP SIP School VoIP Professional Certification

Network Access Security. Lesson 10

Cisco Which VPN Solution is Right for You?

Managed 4G LTE WAN: Provide Cost-Effective Wireless Broadband Service

Solutions Guide. Secure Remote Access. Allied Telesis provides comprehensive solutions for secure remote access.

November Defining the Value of MPLS VPNs

Cisco Networking Professional-6Months Project Based Training

Networking 4 Voice and Video over IP (VVoIP)

Sprint Global MPLS VPN IP Whitepaper

Hands on VoIP. Content. Tel +44 (0) Introduction

ICTTEN4215A Install and configure internet protocol TV in a service provider network

Gigabit SSL VPN Security Router

NETWORK SECURITY (W/LAB) Course Syllabus

IPv6 Migration Challenges for Large Service Providers

Recommended IP Telephony Architecture

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs

Secure Network Foundation 1.1 Design Guide for Single Site Deployments

Training Proposal. Training Description for Enterprise Network COMMERCIAL IN CONFIDENCE 1

Cisco Certified Network Professional - Routing & Switching

10CS64: COMPUTER NETWORKS - II

How To Use A Cisco Wvvvdns4400N Wireless-N Gigabit Security Router For Small Businesses

Magnum Network Software DX

Enterprise Edge Communications Manager. Data Capabilities

HP VSR1000 Virtual Services Router Series

Addressing Inter Provider Connections With MPLS-ICI

MED: Voice over IP systems

Company Course Description: Course Objectives: Intended Audience

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

(d-5273) CCIE Security v3.0 Written Exam Topics

Cisco Catalyst 3750 Metro Series Switches

Voice over IP Basics for IT Technicians

Mobile Packet Backbone Network Training Programs. Catalog of Course Descriptions

CompTIA Convergence Examination Objectives

WAN and VPN Solutions:

Cisco WRVS4400N Wireless-N Gigabit Security Router: Cisco Small Business Routers

Cisco RV 120W Wireless-N VPN Firewall

MPLS/IP VPN Services Market Update, United States

APPLICATION NOTE. Benefits of MPLS in the Enterprise Network

Chapter 4: Security of the architecture, and lower layer security (network security) 1

Network System Design Lesson Objectives

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Cisco. A Beginner's Guide Fifth Edition ANTHONY T. VELTE TOBY J. VELTE. City Milan New Delhi Singapore Sydney Toronto. Mc Graw Hill Education

CompTIA Network+ (Exam N10-005)

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

The Essential Guide to Deploying MPLS for Enterprise Networks

Application Note. Onsight Connect Network Requirements v6.3

CTS2134 Introduction to Networking. Module Network Security

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Network Administrator Gateway Progression Plan

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications

HughesNet Broadband VPN End-to-End Security Using the Cisco 87x

LifeSize Video Communications Systems Administrator Guide

Cisco Certified Network Professional (CCNP Routing & Switching)

Quidway MPLS VPN Solution for Financial Networks

Virtual Private Networks. Juha Heinänen Song Networks

EdgeRouter Lite 3-Port Router. Datasheet. Model: ERLite-3. Sophisticated Routing Features. Advanced Security, Monitoring, and Management

Course Contents CCNP (CISco certified network professional)

Contents. Features Major Functions. Detailed Specifications. c SAMSUNG Electronics Co.,Ltd.

Description: Objective: Upon completing this course, the learner will be able to meet these overall objectives:

IPv6 Opportunity and challenge

Introduction to MPLS-based VPNs

Cisco RV220W Network Security Firewall

Network Virtualization Network Admission Control Deployment Guide

Enterprise Network Simulation Using MPLS- BGP

"Charting the Course...

WHITE PAPER. Addressing Inter Provider Connections with MPLS-ICI CONTENTS: Introduction. IP/MPLS Forum White Paper. January Introduction...

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE)

IP Implementation in Private Branch Exchanges From 9:30 a.m until 4:30 p.m (7 hrs./day) 5 days / week

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the

PARAMETERS TO BE MONITORED IN THE PROCESS OF OPERATION WHEN IMPLEMENTING NGN TECHNICAL MEANS IN PUBLIC TELECOMMUNICATION NETWORKS

Session Border Controllers in Enterprise

Voice over IP (VoIP) Basics for IT Technicians

The term Virtual Private Networks comes with a simple three-letter acronym VPN

ICTTEN8195B Evaluate and apply network security

Implementing Cisco IOS Network Security v2.0 (IINS)

Layer 3 Network + Dedicated Internet Connectivity

Evaluating the Cisco ASA Adaptive Security Appliance VPN Subsystem Architecture

SCOPE DOCUMENT. Trade Name IT- Network Systems Administration Post- Secondary DATE OF DISTRIBUTION VIA WEBSITE

Cisco RV180 VPN Router

GPRS / 3G Services: VPN solutions supported

Cisco Certified Network Expert (CCNE)

Designing for Cisco Internetwork Solutions

IINS Implementing Cisco Network Security 3.0 (IINS)

How To Understand The Benefits Of An Mpls Network

How To Learn Cisco Cisco Ios And Cisco Vlan

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Advanced VSAT Solutions Bridge Point-to-Multipoint (BPM) Overview

Optimizing Networks for NASPI

Computer Networks. A Top-Down Approach. Behrouz A. Forouzan. and. Firouz Mosharraf. \Connect Mc \ Learn. Hill

Transcription:

Technology Training Limited Module Portfolio for Customised Courses E-mail: info@technology-training.co.uk website: www.technology-training.co.uk Module Catalogue v1.3 Page 1 of 17

CONTENTS LIST 1 ACCESS TECHNOLOGIES...3 1.1 DIGITAL SUBSCRIBER LINES (XDSL)...3 1.2 WIRELESS LOCAL LOOP (WLL)...3 1.3 GIGABIT ETHERNET ACCESS SERVICES...3 1.4 VERY SMALL APERTURE TERMINAL (VSAT)...3 1.5 MULTISERVICE ACCESS NETWORKS (MSAN) AND METRO NODES...3 2 ROUTING AND SWITCHING...4 2.1 INTRODUCTION TO NETWORKING...4 2.2 INTRODUCTION TO ROUTING AND SWITCHING...4 2.3 ADVANCED ROUTING...4 2.4 IP VERSION 6 (IPV6)...4 2.5 INTRODUCTION TO MULTIPROTOCOL LABEL SWITCHING ( MPLS)...5 2.6 MPLS TRAFFIC ENGINEERING (MPLS TE)...5 2.7 ETHERNET AND GIGABIT ETHERNET...5 2.8 CARRIER ETHERNET...5 2.9 GENERALISED MPLS AND T-MPLS...5 2.10 INTRODUCTION TO VIRTUAL LOCAL AREA NETWORKS (VLANS)...6 2.11 LAN EXTENSION SERVICES: ETHERNET OVER MPLS, VPLS, AND VPWS...6 2.12 CORE NETWORK ROUTING PROTOCOLS...6 2.13 INTERNET ARCHITECTURE AND PEERING...6 2.14 ADVANCED BORDER GATEWAY PROTOCOL VERSION 4 (BGP-4)...6 2.15 ADVANCED OPEN SHORTEST PATH FIRST (OSPF) AND IS-IS...7 3 NETWORK SERVICES...8 3.1 DOMAIN NAME SYSTEM (DNS) AND DHCP...8 3.2 NETWORK AND PORT ADDRESS TRANSLATION (NAT/PAT)...8 3.3 IP MOBILITY (MIP)...8 3.4 IP QUALITY OF SERVICE (QOS) AND DIFFERENTIATED SERVICES (DIFFSERV)...8 3.5 SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP) AND RMON...8 3.6 LIGHTWEIGHT DIRECTORY ACCESS PROTOCOL (LDAP)...9 4 VOICE OVER IP (VOIP) NETWORKS AND SERVICES...10 4.1 INTRODUCTION TO VOIP ARCHITECTURES...10 4.2 THE H.248 AND MEGACO PROTOCOLS...10 4.3 THE SESSION INITIATION PROTOCOL (SIP)...10 4.4 SIP FOR CORE NETWORKS (SIP-T/SIP-I) AND BICC...10 4.5 SIGNALLING TRANSPORT (SIGTRAN)...10 4.6 IPCENTREX APPLICATIONS...11 Page 2 of 17

4.7 IP MULTIMEDIA SUBSYSTEM (IMS)...11 5 IP SECURITY...12 5.1 INTRODUCTION TO NETWORK AND SYSTEM SECURITY...12 5.2 PRACTICAL VULNERABILITY ASSESSMENT...12 5.3 FIREWALL DESIGN AND DEPLOYMENT...12 5.4 INTRUSION DETECTION AND PREVENTION SYSTEMS (IDS)...12 5.5 MALICIOUS CONTENT SCANNING...13 5.6 IP SECURITY PROTOCOL (IPSEC) AND INTERNET KEY EXCHANGE (IKE)...13 5.7 PUBLIC KEY INFRASTRUCTURE (PKIX)...13 5.8 SECURE SHELL (SSH)...13 5.9 WEB SECURITY USING SSL/TLS...13 5.10 UNIX AND LINUX SECURITY...14 6 IP APPLICATIONS...15 6.1 INTERNET EMAIL...15 6.2 INTRODUCTION TO LINUX AND UNIX SYSTEM ADMINISTRATION...15 6.3 LINUX AND UNIX-BASED NETWORK APPLICATIONS...15 6.4 INSTANT MESSAGING (IM)...15 6.5 INTRODUCTION TO VIRTUAL PRIVATE NETWORKS...15 6.6 IP SECURITY PROTOCOL (IPSEC) AND SECURE VPNS...16 6.7 MPLS VIRTUAL PRIVATE NETWORKS (VPNS)...16 6.8 IP TELEVISION (IPTV) AND TRIPLE PLAY SERVICES...16 Page 2 of 17

1 Access Technologies 1.1 Digital Subscriber Lines (xdsl) xdsl architecture and technology xdsl as a Multiservice access network for IP, data and voice Unbundling approaches and network integration SHDSL and other DSL technologies 1.2 Wireless Local Loop (WLL) Introduction to Wireless Local Loop Competing technologies for WLL Integrated voice and data over WLL Future Directions in WLL 1.3 Gigabit Ethernet Access Services Gigabit Ethernet Architecture and Protocols Metro networks using Gigabit Ethernet LAN Extension Services (LES)/EPLAN Pseudo-wire Emulation Services over Ethernet/EPL 1.4 Very Small Aperture terminal (VSAT) VSAT architecture and technology Design of VSAT Space Segment and Link Budgets Earth Segment design and optimisation Compression technology and DCME 1.5 Multiservice Access Networks (MSAN) and Metro Nodes Section 6 Traditional voice and data access networks MSAN and Metro Nodes Architectures Physical Layer Access to MSAN Layer 2 Switching, grooming and aggregation Service and Network Interworking in Metro Nodes Legacy Support and Network Migration Page 3 of 17

2 Routing and Switching 2.1 Introduction to Networking The Role of Networks Network Architectures in LANs and WANs Ethernet and WLAN Protocols and Operation The IP Protocol and Its Operation TCP and UDP Transport Protocols Integrating Networks and Network Security 2.2 Introduction to Routing and Switching Section 6 Introduction to Network Design using Switches and Routers Ethernet Switching using STP and its Variants VLAN technology in Large Switched Networks Enterprise Routing using RIP, EIGRP, VLSM and CIDR Routing using OSPF and BGP4 Routing Across Boundaries and Redistribution 2.3 Advanced Routing Section 6 IP Core Technology Review Routing using OSPF and BGP4 Routing Across Boundaries and Redistribution BGP-4 Policy Configuration and Peering Packet-filtering using Access Lists Network and Port Address Translation 2.4 IP Version 6 (IPv6) IPv6 addressing and Address Migration IPv6 and IPv4 Comparison Network Infrastructure and Application Protocols Inter-working IPv4 and IPv6 Planning the Deployment of IPv6 Page 4 of 17

2.5 Introduction to Multiprotocol Label Switching (MPLS) Native IP and IP over ATM MPLS Core Technology MPLS Virtual Private Network Services MPLS LAN Extension Services MPLS Traffic Engineering 2.6 MPLS Traffic Engineering (MPLS TE) MPLS Core Technology Review Traffic Engineering Using MPLS-TE MPLS Deployment in Next Generation Networks Future Directions in MPLS-TE and Generalised MPLS 2.7 Ethernet and Gigabit Ethernet Bridges, Hubs, Switches and Routers Switched 10/100 Ethernet technology Ethernet LANs, VLANs and QoS Tagging Gigabit and 10G Ethernet Extensions 2.8 Carrier Ethernet Gigabit Ethernet Core Technology Review Manageability, Scalability and OAM Additions for Carrier Ethernet Ethernet in Service Provider Access Networks Ethernet n Service Provider Core Networks Ethernet Interworking with MPLS 2.9 Generalised MPLS and T-MPLS MPLS Core Technology Review GMPLS and T-MPLS Control and Management MPLS and T-MPLS Interworking Future Directions in GMPLS and T-MPLS Page 5 of 17

2.10 Introduction to Virtual Local Area Networks (VLANs) VLANs versus LANs, VPNs 802.1p and 802.1q frame tagging and QoS techniques Integrating Switching, Routing and VLANs Public service VLANs including VPLS and VPWS 2.11 LAN Extension Services: Ethernet over MPLS, VPLS, and VPWS MPLS Core Technology Review Virtual Private LAN and Virtual Private Wire services Ethernet-based VLANs for Service Access RSTP and VRRP for scale and availability in VLAN Services 2.12 Core Network Routing Protocols The Requirements on and Role of Core Network Routing Protocols OSPF Architecture and Operation BGP-4 Architecture and Operation Integrating Multiple Routing Protocols and Instances Integrating Customers Routing into Service Provider Networks 2.13 Internet Architecture and Peering The Internet Architecture: Autonomous Systems and Peeing Internet Exchange Point (IXP) Services VoIP and AAA Peering Providers 2.14 Advanced Border Gateway Protocol version 4 (BGP-4) Architecture and Operation of BGP4 Designing Scaleable BGP4 Networks Using BGP4 Policy Controls Implementing BGP4 and Other Security Features Page 6 of 17

2.15 Advanced Open Shortest Path First (OSPF) and IS-IS Architecture and Operation of OSPF Designing Scaleable OSPF Networks The Use of Stubby, Totally Stubby, and Not So Stubby Areas OSPF in NBMA networks OSPF Extensions for IPv6 and MPLS Page 7 of 17

3 Network Services 3.1 Domain Name System (DNS) and DHCP Architecture and Operation of the Internet Domain Name System DNS Implementations for public/private networks DNS Vulnerabilities and Security DNS Operational Aspects 3.2 Network and Port Address Translation (NAT/PAT) Operation NAT/NAPT NAT Traversal Issues for Applications Remedies Based Upon ALGs, Tunnelling and Keepalives NAT Traversal using STUN, TURN and MIDCOM 3.3 IP Mobility (MIP) The Role of IP Mobility versus Dynamic Addressing Mobile IPv4 architecture and standards Mobile IP in 3GPP networks and IPv6 3.4 IP Quality of Service (QoS) and Differentiated Services (Diffserv) QoS Issues in Pure IP Networks The Integrated Services and RSVP Architecture The Differentiated Services Architecture Diffserv Integration into ATM, MPLS and L2TP networks 3.5 Simple Network Management Protocol (SNMP) and RMON SNMP Architecture and Operation MIB2 and Private Extensions to the Deployed MIBs RMON 2 Architecture and Operation Integration of SNMP and RMON into Network Management Systems Page 8 of 17

3.6 Lightweight Directory Access Protocol (LDAP) The Role of X.500 Directories and Access Protocols LDAP version 2 and 3 Architecture and Operation Enterprise directories based on LDAP Page 9 of 17

4 Voice over IP (VoIP) Networks and Services 4.1 Introduction to VoIP Architectures Section 6 Section 7 The Development of VoIP Networks Voice over IP (VoIP) Architectures Voice Quality Issues and QoS Engineering Techniques The H.248 Architecture for Fixed/Mobile Networks Session Initiation Protocol (SIP) Architecture and Operation VoIP Customer Premises Equipment Future Directions in VoIP Networks 4.2 The H.248 and MEGACO Protocols H.248 Architecture and Operation Packages and Gateway Functionality FAX, CODEC and DTMF support The Role of H.248/MEGACO in TIPSPAN and 3GPP Architectures 4.3 The Session Initiation Protocol (SIP) SIP Architecture and Operation SIP to PSTN Inter-working SIP Security Extensions Real-world SIP Platforms 4.4 SIP for Core Networks (SIP-T/SIP-I) and BICC SIP Core Technology Review PSTN Signalling Core Technology Review BICC Architecture and Operation SIP-T and SIP-I Architecture and Operation The Evolution Towards Native VoIP Interconnect 4.5 Signalling Transport (SIGTRAN) PSTN Signalling Core Technology Review Architecture and Operation of SIGTRAN SCTP Protocol Page 10 of 17

MTP Adaptation Layers Application Adaptation Layers 4.6 IPCentrex Applications SIP Core Technology Review IPCentrex versus POTS and Centrex Services Master/Slave Architectures to support IPCentrex Services CPE Requirements for IPCentrex QoS Techniques for IPCentrex services 4.7 IP Multimedia Subsystem (IMS) SIP Core Technology Review IP Multimedia System Architecture and Operation SIP Procedures in IMS IMS Applications Page 11 of 17

5 IP Security 5.1 Introduction to Network and System Security Section 6 Threats and Vulnerabilities The Role and Structure of Security Policies Authentication Systems Privilege Management Systems for Authorisation Network Security Devices: Firewalls and IDS Introduction to Security Protocols: IPSec, SSH and TLS 5.2 Practical Vulnerability Assessment Systems Security Core Technology Review Hacking Techniques and Tools Assessment Techniques and Tools Honey Traps and Active Measures Life-cycle Vulnerability Management 5.3 Firewall Design and Deployment Section 6 Security Core Technology Review The Role of Internet and Enterprise Firewalls Platform hardening and testing using third-party tools Implementation and Configuration of Enterprise Solutions Understanding and Acting on Firewall Logs Integration of VPNs with Firewalls 5.4 Intrusion Detection and Prevention Systems (IDS) The Role of Intrusion Detection Systems IDS and IPS Types and Capabilities Design and Deployment of Host and Network-based Sensors Tailoring and Testing IDS Operation Page 12 of 17

5.5 Malicious Content Scanning The Role of Virus Scanning Systems Virus Scanning System Types and Capabilities Design and Deployment of Host, Gateway and Server Solutions Integration of Scanning into Email and Web Proxy Systems 5.6 IP Security Protocol (IPSec) and Internet Key Exchange (IKE) Security Protocols Core Technology Review IPSec Architecture and Operation IKE and IPSec Policies and Security Associations Encryption and Authentication Algorithms Available in IPSec IPSec Applications and Design Approaches IPSec Limitations: NAT and Routing 5.7 Public Key Infrastructure (PKIX) Section 6 Security Protocols Core Technology Review Digital Signatures and Certificates Certificate Authorities PKIX Profiles and Extensions Implementation of Certificate Directories Life-cycle Management of Certificates: CRLs and OCSP 5.8 Secure Shell (SSH) Security Protocols Core Technology Review The basic operation of SSH SSH as a secure telnet replacement SSH port forwarding and X-forwarding SSH Implementation and Configuration 5.9 Web Security Using SSL/TLS Security Protocols Core Technology Review The use of SSL and TLS in secure HTTP applications Encryption, Authentication available in SSL/TLS Server Certificates and Key Management SSL-based VPNs Page 13 of 17

5.10 UNIX and Linux Security Section 6 Security Core Technology Review System Vulnerability Assessment User Accounts and Security Hardening System Services and the Core Security Protocols for Internet Services Use of Host IDS and Audit/Logging Page 14 of 17

6 IP Applications 6.1 Internet Email Introduction to SNMP Hardening of MTA implementations Integration into corporate email services SNMP enhancements and SMTP/MMS Interworking 6.2 Introduction to Linux and UNIX System Administration Installing and Managing a UNIX/Linux System Networking Linux/UNIX Systems Installing and Managing Applications System Security and Hardening the Operating System UNIX and Linux Shells and Shell Programming 6.3 Linux and UNIX-based Network Applications Linux/UNIX Core Technology Review Internet Applications: Apache, Sendmail, Samba Network Security Tools: IPTables, NMAP, NESSUS and SNORT 6.4 Instant Messaging (IM) Introduction to Instant Messaging IM Protocols and Public Services IM security and Interoperability Enterprise IM and IM Integration Using GAIM Voice and Video over IM Services 6.5 Introduction to Virtual Private Networks Layer 2 versus Layer 3 VPNs: Frame Relay Services Simple Tunnelling VPNs: GRE and PPTP VPNs based upon MPLS: Cisco MPLS VPNs VPNs Based upon IPSec: Microsoft IPSec VPNs Based upon Hybrid Solutions: OpenVPN Page 15 of 17

6.6 IP Security Protocol (IPSec) and Secure VPNs Security Protocols Core Technology Review IPSec and IKE Architecture and Operation Policies, Databases and Security Associations IPSec Applications and Design Approaches IPSec Limitations: NAT and Routing 6.7 MPLS Virtual Private Networks (VPNs) Overview of IP addressing and routing MPLS Technology and Packet Forwarding MPLS Layer 3 VPNs 6.8 IP Television (IPTV) and Triple Play Services Introduction to Live TV, Video on Demand and Triple Play Services Architecture and Components of IPTV Technical Building Blocks and Protocols of IPTV Case Studies: Fastweb, Microsoft and Cisco Page 16 of 17