BGP Configuration and Design
Introduction and processing in the BGP routing protocol and its components. Design and implementation of BGP routing, filtering and path selection optimization on Cisco IOS routers.
Configuration of Switches
The course is designed for participants who need to acquire basic theoretical and practical (configuration) knowledge of Cisco switches used in Ethernet LAN networks. After completing, the participant will be ...
Internetworking and Configuration of Routers
This course is suitable for those who want to become administrators of Cisco routers. Participants will acquire theoretical knowledge necessary to perform the most common tasks required to manage Cisco routers.
Cloud Operations on AWS
In this course, you will learn how to: Use standard AWS infrastructure features such as Amazon Virtual Private Cloud (Amazon VPC), Amazon Elastic Compute Cloud (Amazon EC2), Elastic Load Balancing (ELB), and AWS ...
Cisco Cloud Managed Networking using Cisco Meraki
The goal of this course is to provide the students with overall information about the Cisco Meraki technology and products. During the three days of this training, students will become familiar with the Cisco Meraki ...
IS-IS Protocol Configuration
Understanding the IS-IS protocol basics, implementation of IS-IS and its components on Cisco Systems routers..
Data Networks Security
The course is best suited for network administrators and network security engineers. The participants wil learn the basic principles of network security and its implementation of Cisco routers.
Nexus 9300/9500 and Application Centric Infrastruct.
This instructor-led training is designed for technical professionals who have responsibilities installing, configuring, and operating Nexus 9500/9300 in ACI mode. Upon completion of this course, you should be ...
Multicast Basics
The course is designed for candidates who need to have theoretical and practical knowledge to implement multicast in IP networks. It focuses on obtaining the necessary foundations for multicast, which can then be ...
Administering BIG-IP
At the end of this course, the student should be able to: Set up, Start/restart, license, and provision the BIG-IP systemout-of-the-box Use the Configuration utility and TMOS Shell (tmsh) to configure and manage ...
Network Security – Ethical Hacking
This five-day advanced course introduces and explains common hacking technics commonly used on current wired as well as wireless intranets which interconnect systems based on Microsoft Windows operating system platform.
Advanced VPN for Cisco Routers
S4 is a four-day instructor-led course focused on VPN configuration of Cisco technologies. The curriculum covers detailed explanation of IPsec and IKEv2 protocol. The course also introduces the concept of IPsec VPN ...
Configuring BIG-IP Local Traffic Manager (LTM)
By the end of this course, the student should be able to use both the graphical user interface and command line to configure and manage BIG-IP LTM systems in an application delivery network.