
Local, instructorled live Networking training courses demonstrate through interactive discussion and handson practice the fundamentals and advanced topics of Networking
Networking training is available as "onsite live training" or "remote live training" Onsite live training can be carried out locally on customer premises in New Zealand or in NobleProg corporate training centers in New Zealand Remote live training is carried out by way of an interactive, remote desktop
NobleProg Your Local Training Provider .
Machine Translated
Testimonials
I liked the network forensics portion to identify unusual network traffic and possible attacks through investigation of cap files.
MINDEF
Course: Advanced Network Troubleshooting Using Wireshark
I generally was benefit from the whole training.
Tassos Papadopoulos
Course: Nessus Manager
The exercises and analysis portion is very enriching and enlightening.
MINDEF
Course: Advanced Network Troubleshooting Using Wireshark
I really liked the rapport and connection that the trainer was able to achieve with the class. And that, on the fly, he was able to shape the class into the things we needed.
Fredrik Lindlöf - Svenska Spel AB
Course: HAProxy Administration
reaffirm my knowledge and learn many new things
Vale of glamorgan council; Vale of glamorgan council
Course: Cisco ASA/Pix Operation
lots of information, all questions ansered, interesting examples
A1 Telekom Austria AG
Course: Deep Learning for Telecom (with Python)
His huge amount of knowledge.
Mirela Ochia - Deutsche Telekom Pan-Net Romania S.R.L.
Course: Practical SIP Telephony
Very well trained and documented. Every question addressed was very well answered.
Deutsche Telekom Pan-Net Romania S.R.L.
Course: Practical SIP Telephony
Trainer is well prepared and dedicated in making us understand. Well done.
Alan Lye - SBS Transit Ltd
Course: Basic Network Troubleshooting Using Wireshark
the trainer adapted his course to answer questions even if the questions where out of the course scope.
Mario Kuik - Netherlands Army
Course: HAProxy Administration
Delivery of laptops by the company. Interesting discussion during classes. Very good discussion of individual layers in the network.
Adrian Chemicz
Course: Basic Network Troubleshooting Using Wireshark
Machine Translated
The knowledge of the teacher, I could go down to any (for me) level of detail of the question and I was given an answer
VULCAN SP. Z O.O.
Course: Basic Network Troubleshooting Using Wireshark
Machine Translated
Personalized and more detailed discussion of some issues
VULCAN SP. Z O.O.
Course: Basic Network Troubleshooting Using Wireshark
Machine Translated
The scope of training and practical approach to the issue seemed very promising. Unfortunately, due to the fact that the lecturer does not deal with the administration of the Linux system on a daily basis - in my opinion, he is not able to thoroughly cover the topic related to Linux Security. He couldn't answer us many practical questions - he was looking for her on Wikipedia. We also make nmap and Nessus scans ourselves and were interested in answers to specific, detailed questions.
Nokia Solutions and Networks Sp. z o.o.
Course: Network Security in Linux
Machine Translated
Knowledge and the method of its transfer
Elavon Financial Services DAC (Sp. z o.o. o Wyznaczonym Przedmiocie Działalności) Oddział w Polsce
Course: SIP protocol in VoIP
Machine Translated
Substantive knowledge of the operator.
Bartosz Bobkiewicz - Volkswagen Poznań Sp. z o.o.; IKEA Industry Poland Sp. z o.o. Oddział Fabryki WEST w Zbąszynku; PKO Bank Polski SA
Course: Basic Network Troubleshooting Using Wireshark
Machine Translated
A large dose of specialized knowledge about the operation of the TCP protocol ..
Marek Woźnica - Volkswagen Poznań Sp. z o.o.; IKEA Industry Poland Sp. z o.o. Oddział Fabryki WEST w Zbąszynku; PKO Bank Polski SA
Course: Basic Network Troubleshooting Using Wireshark
Machine Translated
An unusually competent trainer ...
Mateusz Paczyński - Volkswagen Poznań Sp. z o.o.; IKEA Industry Poland Sp. z o.o. Oddział Fabryki WEST w Zbąszynku; PKO Bank Polski SA
Course: Basic Network Troubleshooting Using Wireshark
Machine Translated
Trainer knowledge, practical examples,
P4 Sp. z o.o
Course: Advanced Network Troubleshooting Using Wireshark
Machine Translated
I like the logic of training.
博世汽车苏州
Course: Practical TCP/IP
Machine Translated
I like TCP/IP.
周 涛 - 博世汽车苏州
Course: Practical TCP/IP
Machine Translated
Examples, practical part.
Vattenfall IT Services Poland Sp. z o.o.
Course: Advanced Network Troubleshooting with Wireshark
Machine Translated
Great coaching knowledge
Vattenfall IT Services Poland Sp. z o.o.
Course: Advanced Network Troubleshooting with Wireshark
Machine Translated
Cases from life
Vattenfall IT Services Poland Sp. z o.o.
Course: Advanced Network Troubleshooting with Wireshark
Machine Translated
Networking Subcategories in New Zealand
Networking Course Outlines in New Zealand
By the end of this training, participants will be able to:
- Understand the 5G architecture and the challenges it poses to testing.
- Select and utilize the technology, tools, and applications available for 5G development and testing.
- Implement 5G testing practices to prevent failures at any of the different elements of a 5G network.
- Predict problems and optimize performance of 5G.
In this instructor-led, live training, participants will learn how to secure an internet connection through a Shadowsocks proxy.
By the end of this training, participants will be able to:
- Install and configure Shadowsocks on any of a number of supported platforms, including Windows, Linux, Mac, Android, iOS, and OpenWrt.
- Deploy Shadosocks with package manager systems, such as pip, aur, freshports and others.
- Run Shadowsocks on mobile devices and wireless networks.
- Understand how Shadowsocks encrypts messages and ensures integrity and authenticity.
- Optimize a Shadowsocks server
Audience
- Network engineers
- System Administrators
- Computer technicians
Format of the course
- Part lecture, part discussion, exercises and heavy hands-on practice
By the end of this training, participants will be able to:
- Set up the necessary testing environment to start using Nmap.
- Scan network systems for security vulnerabilities.
- Discover active and vulnerable hosts.
In this instructor-led, live training (onsite or remote), participants will learn how to use ONAP to automate networking services.
By the end of this training, participants will be able to:
- Understand, install and configure the various components in the ONAP ecosystem
- Carry out real-time, policy-driven orchestration and automation of physical and virtual network functions
- Design, create, orchestrate, and monitor VNFs, SDNs and other network services
- Efficiently manage the entire networking lifecycle using a software-driven approach
- Develop, deploy, and scale a network using the latest open source technologies and practices
Audience
- IT engineers
- Network engineers
- Developers
Format of the Course
- Interactive lecture and discussion
- Lots of exercises and practice
- Hands-on implementation in a live-lab environment
Course Customization Options
- This training is based on the latest version of ONAP
- To request a customized training for this course, please contact us to arrange.
- To learn more about ONAP, please visit: https://www.onap.org/
By the end of this training, participants will be able to:
- Plan, deploy, and administer OpenStack as a private cloud.
- Understand IaaS architecture and its implementation under OpenStack.
- Replace physical routers and servers with virtual machines running in a private cloud.
- Reduce infrastructure and maintenance costs through virtualization and cloud computing.
- Expedite the rollout of new services to customers.
In this instructor-led, live training, participants will learn how to use OpenVAS for network vulnerability scanning.
By the end of this training, participants will be able to:
- Install and configure OpenVAS
- Learn the fundamental features and components of OpenVAS
- Configure and implement network vulnerability scans with OpenVAS
- Review and interpret OpenVAS scan results
Audience
- Network engineers
- Network administrators
Format of the course
- Part lecture, part discussion, exercises and heavy hands-on practice
Note
- To request a customized training for this course, please contact us to arrange.
OSS/BSS is at the heart of operation of any Telecom operator. Given growth of Big Data in recent time,
area of OSS/BSS has undergone disruptive changes specially with virtualization of the OSS/BSS and given
the fact, many of the new OTT ( Over the top) services are newly developed web/mobile based services
that do not fit into legacy OSS. In this current course, which consists of 4 days, first 3 days are spent
extensively to develop background in legacy OSS/BSS, while last 5 modules, are dedicated to explain
emerging Big Data analytics application in OSS/BSS layer
Target Audience:
- Telecom/Cellular Operation People
- Telecom Sales professionals
- Telecom Operation vendors/contractors
- CXO, VP, Director level managers in TELECOM
By the end of this training, participants will be able to:
- Set up the necessary development environment to start developing firewalls.
- Deploy a Palo Alto firewall in a cloud server.
- Manage packet flow through Palo Alto firewalls.
- Interpret QoS classifications and types.
By the end of this training, participants will be able to:
- Install and configure ProxySQL.
- Enable thousands of concurrent database connections over multiple backend servers.
- Deploy multiple ProxySQL proxies spanning numerous database instances.
- Optimize the performance of a MySQL cluster, without altering the querying applications.
Audience
This course is suitable for developers and engineers who work with preexisting Samba instances, or who intend to integrate Samba into their work flow.
No two courses are delivered the same. Each course is tailored to your specific requirements.
Audience:
Network Planners, Designers, and Engineers requiring an understanding of SIP.
The course is around 40% practical.
System Administrators and Network Administrators as well as anyone who is interested in defensive network security technologies.
Audience:
Suitable for anyone looking for an understanding of TCP/IP.
Course is approximately 50% practical.
In this instructor-led, live training, participants will learn the fundamentals of working with Tinc VPN.
By the end of this training, participants will be able to:
- Install, configure, run, test, and troubleshoot Tinc VPN on any operating system
- Deploy a Tinc Mesh VPN
- Use Tinc VPN for Centralized Cloud Interconnection
Audience
- Developers
- Network engineers
Format of the course
- Part lecture, part discussion, exercises and heavy hands-on practice
Note
- To request a customized training for this course, please contact us to arrange.
In this course, participants will learn about Varnish's features and caching approach while practicing in the setup and configuration of a Varnish proxy on Linux. The course starts with a refresher on key networking principles, then digs into setup and configuration topics and moves steadily towards complex implementations. By the end of the training participants will understand when and where it makes sense to deploy Varnish and will have the necessary practice to deploy their own Varnish proxy solutions.
Audience
- Network technicians
- Network designers
- System administrators
Format of the course
- Part lecture, part discussion, heavy hands-on practice and implementation, occasional quizing to measure progress
In this instructor-led, live training, participants will learn how to set up a VoIP system using Cisco CallManager Express.
By the end of this training, participants will be able to:
- Understand fundamental VoIP concepts
- Learn how to use VoIP equipment
- Configure CISCO routers for VoIP
- Implement VoIP and CallManager Express into their network
- Configure CME features for SIP, SCCP, and soft phones
- Work with advanced configuration settings and features of CME
Audience
- Managers
- System administrators
- Software and support system developers
- Technicians
- Network engineers
Format of the course
- Part lecture, part discussion, exercises and heavy hands-on practice
The course is approximately 40% practical.
By the end of this training, participants will be able to:
- Understand and apply different forensic acquisition techniques to inspect web and mobile data.
- Select the most effective forensic tools to web and mobile data.
- Understand how to access and decode different types of data structures in web servers, databases, and mobile phones for analysis.
- Methodically extract, reconstruct, and inspect data as potential evidence of cybercrime.
- Understand the legal implications of surrounding digital forensic analysis.
In this instructor-led, live training, participants will learn how to use Wireshark to troubleshoot the functionality of a network as well as the performance of differente networked applications. Participants will learn network troubleshooting principles and practice techniques for capturing and analyzing TCP/IP request and response traffic between different clients and the servers.
By the end of this training, participants will be able to:
- Analyze network functionality and performance in various environments under different conditions
- Determine whether instances of different server applications are performing acceptably
- Identify the primary sources of network performance problems
- Identify and troubleshoot the most common causes of performance problems in TCP/IP communications
Audience
- Network engineers
- Network and computer technicians
Format of the Course
- Part lecture, part discussion, exercises and heavy hands-on practice
Note
- To request a customized training for this course, please contact us to arrange.
In this instructor-led, live training, participants will learn how NetNORAD and active path testing can help them improve their network troubleshooting methods.
By the end of this training, participants will be able to:
- Understand how NetNORAD works
- Learn the design principles behind NetNORAD
- Use open-source NetNORAD tools with their own code to implement a fault detection system
Audience
- Network engineers
- Developers
- System engineers
Format of the course
- Part lecture, part discussion, exercises and heavy hands-on practice
In this course we examine the various technologies that make up AI and the skill sets required to put them to use. Throughout the course, we examine AI's specific applications within the Telecom industry.
Audience
- Network engineers
- Network operations personnel
- Telecom technical managers
Format of the course
- Part lecture, part discussion, hands-on exercises
By the end of this training, participants will be able to:
- Understand the fundamental concepts of deep learning.
- Learn the applications and uses of deep learning in telecom.
- Use Python, Keras, and TensorFlow to create deep learning models for telecom.
- Build their own deep learning customer churn prediction model using Python.
In this instructor-led, live training, participants will learn hands-on how to set up a Zero Security system as they set up and deploy BeyondCorop in a live-lab environment.
By the end of this training, participants will be able to:
- Assess their organization's existing security model.
- Shift access controls from the perimeter to individual devices and users.
- Deploy applications using a user and device-centric authentication and authorization workflow.
- Understand, plan and implement a Zero Trust network within their organization.
Audience
- Network engineers
- Cyber security professionals
- System architects
- IT managers
Format of the Course
- Part lecture, part discussion, exercises and heavy hands-on practice
Note
- To request a customized training for this course, please contact us to arrange.
This course is primarily aimed at managers in Telecom operation who need to have 360
view of a) legacy BSS in eTOM b) emerging BSS in NGOSS c) Billing system including
mediation, rating and CDR in details. This course also introduces in new topics like
advanced big data based CRM, Churn management and Fraud Management.
By the end of this training, participants will be able to:
- Install and configure Calico.
- Understand how Calico differs from traditional overlay networks.
- Understand how Calico combines internet routing protocols with consensus-based data stores.
- Use Calico to create a container networking solution for Kubernetes clusters.
- Use Calico to provide network policy for Kubernetes.

























.jpg)








.jpg)
























