Cursos de Networking

Cursos de Networking

Os cursos de treinamento em rede locais e instruídos demonstram, por meio de discussões interativas e práticas práticas, os fundamentos e os tópicos avançados do trabalho em rede O treinamento em rede está disponível como "treinamento ao vivo no local" ou "treinamento remoto ao vivo" Treinamento ao vivo no local pode ser realizado localmente nas instalações do cliente em Brasil ou nos centros de treinamento corporativo da NobleProg em Brasil O treinamento ao vivo remoto é realizado por meio de uma área de trabalho remota e interativa NobleProg seu provedor de treinamento local.

Machine Translated

Declaração de Clientes

★★★★★
★★★★★

Nossos Clientes

Programas do curso Networking

Nome do Curso
Duração
Visão geral
Nome do Curso
Duração
Visão geral
21 horas
Visão geral
The Certified Kubernetes Administrator (CKA) program was created by The Linux Foundation and the Cloud Native Computing Foundation (CNCF).

Kubernetes is nowadys a leading platform used for containers orchestration.

NobleProg have been delivering Docker & Kubernetes training from 2015. With more than 360 successfully completed training projects, we became one of the best known training companyworldwide in field of containerization.

Since 2019 we are also helping our customers to confirm their performance in k8s environment by preparing them and encouraging to pass CKA and CKAD exams.

This instructor-led, live training (online or onsite) is aimed at System Administrators, Kubernetes User swho wish to confirm their knowledge by passing CKA exam.

On the other hand, training is focused also on gaining practical experience in Kubernetes Administration, so we recommend taking part in it, even if you don't intend to take CKA exam.

Format of the Course

- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.

Course Customization Options

- To request a customized training for this course, please contact us to arrange.
- To learn more about CKA certification, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-administrator-cka/
28 horas
Visão geral
Este curso de 4 dias enolve uma mistura de experimentos de teste e verificação de redes TCPIP. Os aspectos gerais do protocolo do TCPIP sao cubertos, incluindo subnetting, supernetting e running dynamic routing protocols.
14 horas
Visão geral
Um curso teórico de 2 dias (com algumas demonstrações práticas) cobrindo os fundamentos do Internet Protocol v6 - incluindo endereçamento, formatos de protocolo, ICMP v6, processos de descoberta e roteamento IP v6.

Público:

Planejadores de Rede, Designers e Engenheiros que exigem um entendimento do IP v6. Aqueles que exigem uma visão geral abrangente do IP v6 e o processo de migração de um ambiente IP v4.
14 horas
Visão geral
This 2 day course investigates the theory and technology associated with IPSec VPN’s.VPN’s are setup using Cisco IOS Routers and ASA Firewalls using the web interface. The workings of the protocols are examined using debug commands and protocol analyser traces of relevant negotiations.

Audience:

Suitable for network planners, engineers or anyone interested in IPSec VPNs

Course is approximately 40% practical
28 horas
Visão geral
Um curso prático de 4 dias ministrado por instrutor projetado para familiarizar os delegados com o CLI do Cisco ASA Firewall e o ASDM. O curso detalha os principais comandos usados ​​para configurar e proteger redes usando o ASA Firewall com v8 do sistema operacional e a versão 6 do ASDM.

Os delegados configuram o ASA usando a porta do console, o servidor TFTP, o telnet e o SSH usando a autenticação local e RADIUS. O dispositivo será configurado para utilizar o Syslog e o SNMP.

Os firewalls ASA também serão configurados para usar listas de acesso, conversão de endereços de rede e VPNs usando protocolos IPSec. O curso cobrirá a teoria de chaves públicas / privadas, chaves secretas compartilhadas e seu uso na formação de VPN de site a site entre Firewalls ASA usando IKE e IPSec. Os alunos irão configurar as unidades para criar VPNs de acesso remoto, VPNs de site para site, usando o Cisco Secure VPN Client e o Web VPN. O curso cobrirá a teoria do failover e os delegados configurarão o failover Ativo / Standby no ASA.

Serão usados ​​comandos privilegiados e rastreadores de analisador de protocolo, quando necessário, para depurar protocolos e garantir a operação adequada do ASA Firewall. Os alunos também realizarão operações de recuperação de senha.

Este curso envolverá a interface do ASA com outros equipamentos de rede, como roteadores e switches, como seria esperado em um ambiente de rede.

Público:

Curso é adequado para qualquer pessoa envolvida na configuração de firewall ASA e segurança de rede

O curso é aproximadamente 50% prático
14 horas
Visão geral
In this instructor-led, live training in Brasil, participants will learn the critical features of DNS while carrying out exercises in the setup and configuration of a BIND DNS server on Linux. The course starts with a refresher on key networking principles, then digs into hands-on practice with setup and configuration. Steadily, the discussion and practices move towards more complex topics such as security, availability, debugging and troubleshooting.
7 horas
Visão geral
Shadowsocks is an open-source, secure socks5 proxy.

In this instructor-led, live training, participants will learn how to secure an internet connection through a Shadowsocks proxy.

By the end of this training, participants will be able to:

- Install and configure Shadowsocks on any of a number of supported platforms, including Windows, Linux, Mac, Android, iOS, and OpenWrt.
- Deploy Shadosocks with package manager systems, such as pip, aur, freshports and others.
- Run Shadowsocks on mobile devices and wireless networks.
- Understand how Shadowsocks encrypts messages and ensures integrity and authenticity.
- Optimize a Shadowsocks server

Audience

- Network engineers
- System Administrators
- Computer technicians

Format of the course

- Part lecture, part discussion, exercises and heavy hands-on practice
28 horas
Visão geral
This 4 day coursework is intended for Telecom management and technology professionals who
have to maintain MetroEthernet services across the globe. The course introduces all the
prevailing standards, Troubleshooting guides, vendor options and evolving technologies in
Metro Ethernet domain.
35 horas
Visão geral
VoIP (Voice over Internet Protocol) is a technology that makes it possible for users to make voice calls over an Internet connection instead of through a regular phone line.

In this instructor-led, live training, participants will learn how to set up a VoIP system using Cisco CallManager Express.

By the end of this training, participants will be able to:

- Understand fundamental VoIP concepts
- Learn how to use VoIP equipment
- Configure CISCO routers for VoIP
- Implement VoIP and CallManager Express into their network
- Configure CME features for SIP, SCCP, and soft phones
- Work with advanced configuration settings and features of CME

Audience

- Managers
- System administrators
- Software and support system developers
- Technicians
- Network engineers

Format of the course

- Part lecture, part discussion, exercises and heavy hands-on practice
14 horas
Visão geral
Tinc VPN is an open source peer-to-peer virtual private network (VPN) daemon that is compatible with most operating systems. Tinc VPN makes use of tunneling and encryption to build a secure private network between hosts.

In this instructor-led, live training, participants will learn the fundamentals of working with Tinc VPN.

By the end of this training, participants will be able to:

- Install, configure, run, test, and troubleshoot Tinc VPN on any operating system
- Deploy a Tinc Mesh VPN
- Use Tinc VPN for Centralized Cloud Interconnection

Audience

- Developers
- Network engineers

Format of the course

- Part lecture, part discussion, exercises and heavy hands-on practice

Note

- To request a customized training for this course, please contact us to arrange.
14 horas
Visão geral
This instructor-led, live training in Brasil (online or onsite) is aimed at engineers who wish to optimize networking for Kubernetes clusters.

By the end of this training, participants will be able to:

- Install and configure Calico.
- Understand how Calico differs from traditional overlay networks.
- Understand how Calico combines internet routing protocols with consensus-based data stores.
- Use Calico to create a container networking solution for Kubernetes clusters.
- Use Calico to provide network policy for Kubernetes.
14 horas
Visão geral
This instructor-led, live training in Brasil (online or onsite) is aimed at network engineers who wish to maintain, manage, and design computer networks with Python.

By the end of this training, participants will be able to:

- Optimize and leverage Paramiko, Netmiko, Napalm, Telnet, and pyntc for network automation with Python.
- Master multi-threading and multiprocessing in network automation.
- Use GNS3 and Python for network programming.
14 horas
Visão geral
This instructor-led, live training in Brasil (online or onsite) is aimed at network engineers who wish to converge storage infrastructures with SAN and NAS.

By the end of this training, participants will be able to:

- Perform configurations of SAN and NAS storage on a storage system.
- Connect to storage systems and devices from a client.
- Compare SAN and NAS solutions for centralized storage.
21 horas
Visão geral
This instructor-led, live training in Brasil (online or onsite) is aimed at anyone who wish to understand and implement a network and various types of servers under Linux.

By the end of this training, participants will be able to:

- Understand how networking works under Linux.
- Set up a sample LAN.
- Understand the various protocols used on the internet and implement each one under Linux.
- Secure a networking and various types of servers, such as a webs server.
35 horas
Visão geral
A 5 day practical networking course designed to familiarise students with Cisco IOS (version 12). The course details the key commands used to configure and secure Cisco routers and switches, and covers the CCNA syllabus - including wired and wireless LAN access.

Students will inter-connect networks by implementing static routes, distance-vector and link-state based dynamic routing protocols.

The devices will be configured to route traffic across LAN/VLAN//WAN boundaries, by encapsulating datagrams across serial data links using various WAN protocols, such as HDLC, Frame Relay, ISDN and PPP (with CHAP authentication). VLAN encapsulation/tagging will be via IEEE802.1Q/P.

Standard and Extended Access Control Lists will be configured and applied to router interfaces to filter traffic based on IP address and/or traffic type.

Students will configure static and dynamic NAT to route between private and public networks and cover the theory of Virtual Private Networks (VPN's)

Students will copy router configurations and IOS images to/from a TFTP Server. Privileged commands will be used to debug TCP/IP protocols to ensure proper operation of the routers. Students will also perform password recovery operations.

The course is primarily aimed at IP v4 but does give an overview of IP v6 addressing and covers migration from an IP v4 to an IP v6 network. Other protocols and technologies (VPN's / Wireless) may be demonstrated if time permits.

Course can be customised to precise requirements of customer.

Audience:

This course is suitable for anyone looking for a basic understanding of internetworking with Cisco devices and covers the CCNA syllabus.

Course is approximately 50% practical
21 horas
Visão geral
Este curso consiste em duas partes complementares, uma teórica e outra prática. A primeira é uma introdução de um dia, que cobre motivação, filosofia, e as regras fundamentais de operação do SIP e as formas de utilização para implementar serviços de telecom com enfoque em telefonía IP e VoIP.
O segundo dia de curso permite aos participantes aprender os aspectos práticos da operação do serviço com uma framework com exercícios práticos de laboratório, proporcionando um insight detalhado na configuração dos componentes da arquitetura da telefonía SIP, SIP signalling em sequencia de mensagens e mensagens estruturais internas e ajuda a entender os problemas típicos incluindo aspectos de fraudes em segurança e telecom.
O treinamento é direcionado a participantes com conhecimento e experiencia básicos em serviços de telecomunicações.
21 horas
Visão geral
SD-WAN is a software-defined approach to managing a WAN (Wide Area Network).

This instructor-led, live training (online or onsite) is aimed at engineers who wish to use Cisco SD-WAN products to set up and operate a software defined network.

By the end of this training, participants will be able to:

- Install and configure a Cisco SD-WAN.
- Create policies to control network traffic.
- Understand and implement overlay routing.
- Simplify the management of the network used for public cloud applications.

Format of the Course

- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.

Course Customization Options

- To request a customized training for this course, please contact us to arrange.
14 horas
Visão geral
Este curso foi específicamente desenhado para que os participantes possam contar com as ferramentas necessárias para desenvolver as seguintes habilidades:
Como ir da rede ao servidor, como monitorar a rede, como configurar um firewall, como utilizar conexões encriptadas, como criar tuneis, como logar em packets, como escanear ports, como reduzir el numero de serviços inecessários no servidor.
14 horas
Visão geral
Since all applications today heavily rely on communication and networks, there is no application security without network security.

This course focuses on network security with a software security viewpoint, and discusses common network attacks and defenses on different OSI layers, with an emphasis on application layer issues, tackling topics like session management or denial of service.

As cryptography is a critical aspect of network security, the most important cryptographic algorithms in symmetric cryptography, hashing, asymmetric cryptography, and key agreement are also discussed. Instead of presenting an in-depth mathematical and theoretical background, these elements are discussed from a merely practical, engineering perspective, showing typical use-case examples and practical considerations related to the use of crypto, such as public key infrastructures. Security protocols in many areas of secure communication are introduced, with an in-depth discussion on the most widely-used protocol families such as IPSEC and SSL/TLS.

Finally, typical crypto vulnerabilities are discussed – both related to certain crypto algorithms and cryptographic protocols, such as BEAST, CRIME, TIME, BREACH, FREAK, Logjam, Padding oracle, Lucky Thirteen, POODLE and similar, as well as the RSA timing attack. In each case, the practical considerations and potential consequences are described for each problem, again, without going into deep mathematical details.

Participants attending this course will

- Understand basic concepts of security, IT security and secure coding
- Learn about network attacks and defenses at different OSI layers
- Have a practical understanding of cryptography
- Understand essential security protocols
- Understand some recent attacks against cryptosystems
- Get information about some recent related vulnerabilities
- Get sources and further readings on secure coding practices

Audience

Developers, Professionals
35 horas
Visão geral
Audience:

System Administrators and Network Administrators as well as anyone who is interested in defensive network security technologies.
14 horas
Visão geral
BeyondCorp is an open source Zero Trust security framework that allows employees to work securely from any location without the need for a traditional VPN.

In this instructor-led, live training, participants will learn hands-on how to set up a Zero Security system as they set up and deploy BeyondCorop in a live-lab environment.

By the end of this training, participants will be able to:

- Assess their organization's existing security model.
- Shift access controls from the perimeter to individual devices and users.
- Deploy applications using a user and device-centric authentication and authorization workflow.
- Understand, plan and implement a Zero Trust network within their organization.

Audience

- Network engineers
- Cyber security professionals
- System architects
- IT managers

Format of the Course

- Part lecture, part discussion, exercises and heavy hands-on practice

Note

- To request a customized training for this course, please contact us to arrange.
35 horas
Visão geral
This instructor-led, live training in Brasil (online or onsite) is aimed at technical persons who wish to apply the most suitable tools and techniques to secure both telecom as well as wireless networks.
14 horas
Visão geral
OpenVAS is an advanced open source framework which consists of several services and tools for network vulnerability scanning and management.

In this instructor-led, live training, participants will learn how to use OpenVAS for network vulnerability scanning.

By the end of this training, participants will be able to:

- Install and configure OpenVAS
- Learn the fundamental features and components of OpenVAS
- Configure and implement network vulnerability scans with OpenVAS
- Review and interpret OpenVAS scan results

Audience

- Network engineers
- Network administrators

Format of the course

- Part lecture, part discussion, exercises and heavy hands-on practice

Note

- To request a customized training for this course, please contact us to arrange.
21 horas
Visão geral
This instructor-led, live training in Brasil (online or onsite) is aimed at developers who wish to prevent malware intrusion with Palo Alto Networks.

By the end of this training, participants will be able to:

- Set up the necessary development environment to start developing firewalls.
- Deploy a Palo Alto firewall in a cloud server.
- Manage packet flow through Palo Alto firewalls.
- Interpret QoS classifications and types.
14 horas
Visão geral
This instructor-led, live training in Brasil (online or onsite) is aimed at software testers who wish to protect their organization's network with Nmap.

By the end of this training, participants will be able to:

- Set up the necessary testing environment to start using Nmap.
- Scan network systems for security vulnerabilities.
- Discover active and vulnerable hosts.
21 horas
Visão geral
This instructor-led, live training in Brasil (online or onsite) is aimed at security engineers and system administrators who wish to use FortiGate NGFW's advanced security-driven network systems to protect their organization from internal and external threats.

By the end of this training, participants will be able to:

- Install and configure the preferred FortiGate NGFW software and hardware model.
- Operate and employ FortiGate NGFW to improve the efficiency of system administration tasks.
- Manage various forms of external and internal threats using FortiGate features.
- Integrate FortiGate security fabric with the entire IT infrastructure to provide quick automated protection.
- Ensure long-term protection from attacks with independent and continuous FortiGate threat intelligence.
- Troubleshoot the most common firewall system setup errors relevant to FortiGate NGFWs.
- Implement Fortinet security solutions in other enterprise applications.
21 horas
Visão geral
O propósito deste curso é proporcionar ao participante os conhecimentos basicos necessários para a analise do protocolo Wireshark. O curso se enfoca num entendimento profundo da ferramenta, assim como as bases para utiliza-lo para a resolução de problemas em redes. O curso começa com uma captura de pacote, filtros de captura e as utilidades estadísticas.
21 horas
Visão geral
Este curso é uma continuação do curso básico que nos oferecemos acerca do Wireshark, neste curso o aluno terá uma visão mais aprofundada da plataforma, e terão capacidades avançadas para o diagnóstico de redes utilizando o programa. O curso proporcionará um conhecimento profundo do comportamento das redes e seus problemas, além de suas capacidades de isolar e resolver problemas de segurança nas aplicações. O curso é baseado em teoria, classe, exercício e laboratorios.
21 horas
Visão geral
Transport of baseband audio and video streams across IP networks using multicast signalling protocols is becoming increasingly used in broadcast networks.

This 3 day course/workshop covers the theory and practice of implementing these protocols within IP and Ethernet networks. The practical element of the course will use Cisco L3 switches and the multicast streamers and receivers will use the cross -platform VLC application. It is not necessary to have any expertise in the Cisco command line as the configuration of the devices can be instructor-led if required. However the course is intended to have at least 50% practical content and can be customised or even lengthened (to examine the protocols in more detail) if run as a single company event.
21 horas
Visão geral
Network packet analysis is a technique used to view, in real time, the raw data sent and received over a network interface. This is useful for troubleshooting network configuration and network application problems. Wireshark is a free open source packet analyzer used for troubleshooting such network issues.

In this instructor-led, live training, participants will learn how to use Wireshark to troubleshoot the functionality of a network as well as the performance of differente networked applications. Participants will learn network troubleshooting principles and practice techniques for capturing and analyzing TCP/IP request and response traffic between different clients and the servers.

By the end of this training, participants will be able to:

- Analyze network functionality and performance in various environments under different conditions
- Determine whether instances of different server applications are performing acceptably
- Identify the primary sources of network performance problems
- Identify and troubleshoot the most common causes of performance problems in TCP/IP communications

Audience

- Network engineers
- Network and computer technicians

Format of the Course

- Part lecture, part discussion, exercises and heavy hands-on practice

Note

- To request a customized training for this course, please contact us to arrange.

Próximos Cursos de Networking

Cursos de fim de semana de Networking, Treinamento tardiurno de Networking, Treinamento em grupo de Networking, Networking guiado por instrutor, Treinamento de Networking de fim de semana, Cursos de Networking tardiurnos, coaching de Networking, Instrutor de Networking, Treinador de Networking, Cursos de treinamento de Networking, Aulas de Networking, Networking no local do cliente, Cursos privados de Networking, Treinamento individual de Networking

Descontos em Cursos

Boletim Informativo de Descontos

Nós respeitamos a privacidade dos seus dados. Nós não vamos repassar ou vender o seu email para outras empresas.
Você sempre poderá editar as suas preferências ou cancelar a sua inscriçāo.

is growing fast!

We are looking to expand our presence in Brazil!

As a Business Development Manager you will:

  • expand business in Brazil
  • recruit local talent (sales, agents, trainers, consultants)
  • recruit local trainers and consultants

We offer:

  • Artificial Intelligence and Big Data systems to support your local operation
  • high-tech automation
  • continuously upgraded course catalogue and content
  • good fun in international team

If you are interested in running a high-tech, high-quality training and consulting business.

Apply now!

This site in other countries/regions