Software-Defined Wide Area Network (SD-WAN) Management and Operation Training Course
Software-Defined Wide Area Network (SD-WAN) is a contemporary method for managing and optimizing wide area networks (WANs), which link various parts of an organization's network—such as branch offices, data centers, and cloud services—across extensive geographical distances.
This instructor-led, live training (online or onsite) is designed for intermediate-level network professionals who aim to effectively manage and operate SD-WAN networks, including design, configuration, troubleshooting, and optimization.
By the end of this training, participants will be able to:
- Grasp the essential concepts, benefits, and challenges associated with SD-WAN technologies.
- Create an SD-WAN architecture that meets organizational needs and deploy SD-WAN solutions effectively.
- Implement and manage security features within an SD-WAN environment.
- Monitor, manage, and troubleshoot SD-WAN systems.
Format of the Course
- Interactive lectures and discussions.
- Ample exercises and practice sessions.
- Hands-on implementation in a live-lab setting.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
Course Outline
Introduction to SD-WAN
- Evolution of WAN
- SD-WAN concepts and benefits
- SD-WAN architecture and components
Planning and Designing an SD-WAN Network
- Assessing network requirements
- Design considerations and best practices
- Migration strategies from legacy WAN to SD-WAN
SD-WAN Technology Deep Dive
- Underlay and overlay networks
- SD-WAN edge devices configuration
- Controller and management platform setup
Managing and Operating SD-WAN
- Traffic management and application steering
- Monitoring tools and analytics
- Implementing security and QoS policies
Troubleshooting and Optimization
- Common SD-WAN issues and resolutions
- Network performance optimization techniques
- Advanced troubleshooting tools
Summary and Next Steps
Requirements
- Basic understanding of networking concepts
- Familiarity with WAN technologies
Audience
- Network engineers
- Network administrators
- IT managers
Open Training Courses require 5+ participants.
Software-Defined Wide Area Network (SD-WAN) Management and Operation Training Course - Booking
Software-Defined Wide Area Network (SD-WAN) Management and Operation Training Course - Enquiry
Software-Defined Wide Area Network (SD-WAN) Management and Operation - Consultancy Enquiry
Testimonials (2)
How trainer deliver knowledge so effectively
Vu Thoai Le - Reply Polska sp. z o. o.
Course - Certified Kubernetes Administrator (CKA) - exam preparation
knowledge of the instructor
Grzegorz - Centrum Informatyki Resortu Finansow
Course - Network Troubleshooting with Wireshark
Upcoming Courses
Related Courses
Akraino
14 HoursThis instructor-led, live training in Norway (online or onsite) is aimed at programmers who wish to download, install, and set up Akraino Edge Stack blueprints to manage their edge systems.
By the end of this training, participants will be able to install, deploy, manage, and support end-to-end Akraino Edge Stack solutions to improve and organize their edge systems, services, and devices.
Certified Kubernetes Administrator (CKA) - exam preparation
21 HoursThe Certified Kubernetes Administrator (CKA) program was established by The Linux Foundation and the Cloud Native Computing Foundation (CNCF).
Kubernetes has become a leading platform for container orchestration today.
NobleProg has been providing Docker and Kubernetes training since 2015. With over 360 successfully completed training projects, we have become one of the most recognized training companies globally in the field of containerization.
Since 2019, we have also been assisting our customers in validating their performance in k8s environments by preparing them and encouraging them to pass the CKA and CKAD exams.
This instructor-led, live training (available online or onsite) is designed for System Administrators and Kubernetes users who wish to confirm their knowledge by passing the CKA exam.
Additionally, the training focuses on gaining practical experience in Kubernetes Administration. We highly recommend participating in this course even if you do not plan to take the CKA exam.
Format of the Course
- Interactive lectures and discussions.
- Extensive exercises and practice sessions.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
- To learn more about CKA certification, visit: https://training.linuxfoundation.org/certification/certified-kubernetes-administrator-cka
Certified Kubernetes Application Developer (CKAD) - exam preparation
21 HoursThe Certified Kubernetes Application Developer (CKAD) program has been developed by The Linux Foundation and the Cloud Native Computing Foundation (CNCF), which hosts Kubernetes.
This instructor-led, live training (available online or on-site) is aimed at Developers who wish to validate their skills in designing, building, configuring, and exposing cloud-native applications for Kubernetes.
Additionally, the training focuses on gaining practical experience in Kubernetes application development. We recommend participating in it, even if you do not plan to take the CKAD exam.
NobleProg has been providing Docker & Kubernetes training since 2015. With over 360 successfully completed training projects, we have become one of the best-known training companies worldwide in the field of containerization. Since 2019, we have also been helping our customers confirm their performance in k8s environments by preparing them and encouraging them to pass CKA and CKAD exams.
Format of the Course
- Interactive lectures and discussions.
- Plenty of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
- To learn more about CKAD, visit: https://training.linuxfoundation.org/certification/certified-kubernetes-application-developer-ckad/
LEDE: Set Up a Linux Wireless Router
7 HoursThe LEDE Project (Linux Embedded Development Environment) is a Linux-based operating system derived from OpenWrt. It serves as a comprehensive replacement for the manufacturer-provided firmware on a variety of wireless routers and non-network devices.
In this instructor-led, live training session, participants will learn how to configure a wireless router using LEDE.
Audience
- Network administrators and technicians
Course Format
- A combination of lectures, discussions, exercises, and extensive hands-on practice
Nessus Manager
28 HoursThe Nessus vulnerability scanner is a highly versatile platform for detecting and managing vulnerabilities. It can do much more than just identify vulnerabilities; it also performs baseline auditing, comparing your system configuration with the best hardening standards.
In this instructor-led course, we will introduce the components of the solution and its various functionalities. Each module in the application will be explained, along with its practical use cases.
By the end of the course, participants will be able to conduct both authenticated and unauthenticated vulnerability scans on almost all IP-based systems and analyze the scan results to eliminate false positives. They will learn how to prioritize findings based on risk and recommend compensating controls. This course will help participants assess the security posture of their systems using Nessus and determine the best course of action for remediation.
Audience:
- Infrastructure Managers
- System Administrators
- System Auditors
- System Compliance Officers
- Vulnerability Managers
- Cybersecurity Managers
Format:
A combination of lectures, discussions, and hands-on practice.
Network Security Administrator
35 HoursAudience:
System Administrators, Network Administrators, and anyone with an interest in defensive network security technologies.
ONAP for Network Orchestration and Automation
28 HoursIn this instructor-led, live training in Norway (online or onsite), participants will learn how to use ONAP to automate networking services.
By the end of this training, participants will be able to:
- Understand, install and configure the various components in the ONAP ecosystem.
- Carry out real-time, policy-driven orchestration and automation of physical and virtual network functions.
- Design, create, orchestrate, and monitor VNFs, SDNs and other network services.
- Efficiently manage the entire networking lifecycle using a software-driven approach.
- Develop, deploy, and scale a network using the latest open source technologies and practices.
OpenUEM Advanced: Automation, Security & Compliance
14 HoursOpenUEM is an open-source endpoint management platform designed to enable advanced automation, enhance endpoint security, and provide robust compliance reporting to secure and streamline enterprise operations.
This instructor-led, live training (available online or on-site) is targeted at advanced IT and security professionals who aim to leverage OpenUEM for automation, security hardening, compliance management, and integration with enterprise monitoring tools.
By the end of this training, participants will be able to:
- Automate endpoint management tasks such as software deployment, updates, and reporting.
- Implement security hardening policies and ensure endpoint compliance.
- Integrate OpenUEM with enterprise security and monitoring tools for a centralized view.
- Generate compliance reports and enforce regulatory or organizational standards.
Format of the Course
- Interactive lectures and discussions.
- Practical exercises and real-world scenarios.
- Implementation in a lab environment with actual endpoints.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
OpenUEM Fundamentals: Endpoint Management Essentials
14 HoursOpenUEM is an open-source unified endpoint management platform that enables organizations to efficiently deploy, configure, and maintain endpoint devices.
This instructor-led, live training (available online or onsite) is designed for beginner-level IT professionals who want to acquire foundational skills in managing endpoints using OpenUEM. Participants will learn how to install, configure, and manage basic device operations with the platform.
By the end of this training, participants will be able to:
- Install and set up OpenUEM server and agents on various endpoint platforms.
- Efficiently enroll, organize, and manage endpoints within the OpenUEM console.
- Deploy software, patches, and updates to managed devices.
- Monitor device health, generate reports, and perform basic troubleshooting tasks.
Format of the Course
- Interactive lectures and discussions.
- Hands-on exercises and practice scenarios.
- Implementation in a lab environment with real endpoints.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
OpenUEM Intermediate: Agent Deployment, Inventory & Policy Management
14 HoursOpenUEM is an open-source endpoint management platform that enables organizations to efficiently deploy agents, maintain precise device inventories, and enforce endpoint policies.
This instructor-led, live training (online or on-site) is designed for intermediate-level IT professionals who want to develop practical skills in deploying agents, managing inventories, and implementing policies across endpoint devices using OpenUEM.
By the end of this training, participants will be able to:
- Efficiently deploy OpenUEM agents on multiple endpoint platforms.
- Maintain and manage accurate asset inventories for all managed devices.
- Create, assign, and enforce policies to ensure compliance and security.
- Distribute software, updates, and patches to endpoints effectively.
Format of the Course
- Interactive lectures and discussions.
- Hands-on exercises and practice scenarios.
- Implementation in a lab environment with real endpoints.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
OpenStack and NFV (with OVN and OpenFlow)
21 HoursThe course provides an in-depth training on OpenStack networking. It begins with an introduction to OpenStack and its architecture, then delves into the core OpenStack projects such as the Identity service (Keystone), Image service (Glance), Compute service (Nova), and Block storage (Cinder) to set the stage for understanding the network environment in OpenStack. The primary focus is on the Networking project (Neutron). The course also covers virtual network infrastructure, including the Open Virtual Network (OVN) project, Open vSwitch, and OpenFlow. The aim is to provide a solid understanding of the basic operations and architecture of OpenStack, while familiarizing participants with various networking technologies behind it, particularly OVN and its underlying flows, resources, and tools.
Customization Options
The training can be tailored to fit a 2-day schedule, focusing on the core aspects most relevant to the customer. Alternatively, the course can be extended to cover additional topics such as administrative tasks, design considerations, networking, and troubleshooting related to OpenStack deployments. It is also possible to explore other underlying SDN solutions like Linux Bridge or OvS.
Varnish: Speeding Up Your Website with HTTP Reverse Proxy Caching
7 HoursVarnish is a reverse proxy designed for content-heavy dynamic websites. Unlike Squid, which started as a client-side cache, or web servers like Apache and nginx, Varnish was specifically developed as an HTTP accelerator. Varnish focuses solely on HTTP, unlike other proxy servers that handle protocols such as FTP, SMTP, and others. High-profile websites like Wikipedia, The New York Times, Facebook, and Twitter use Varnish to enhance their performance.
In this course, participants will gain a deep understanding of Varnish's features and caching strategies while hands-on practicing the setup and configuration of a Varnish proxy on Linux. The training begins with a review of essential networking principles, then delves into setup and configuration topics, gradually progressing to more complex implementations. By the end of the course, participants will know when and where it is appropriate to deploy Varnish and will have practical experience in setting up their own Varnish proxy solutions.
Audience
- Network technicians
- Network designers
- System administrators
Format of the course
- A combination of lectures, discussions, extensive hands-on practice and implementation, and occasional quizzes to track progress
Network Troubleshooting with Wireshark
21 HoursNetwork packet analysis is a technique used to monitor the raw data being transmitted and received over a network interface in real time. This method is particularly useful for diagnosing issues related to network configuration and application performance. Wireshark, a free and open-source packet analyzer, is widely used for troubleshooting these types of network problems.
In this instructor-led, live training, participants will gain hands-on experience using Wireshark to assess the functionality and performance of a network, as well as the performance of various networked applications. Participants will learn fundamental network troubleshooting principles and practice techniques for capturing and analyzing TCP/IP request and response traffic between different clients and servers.
By the end of this training, participants will be able to:
- Analyze network functionality and performance in diverse environments under varying conditions
- Evaluate whether different server applications are performing satisfactorily
- Identify the primary sources of network performance issues
- Diagnose and address the most common causes of performance problems in TCP/IP communications
Audience
- Network engineers
- Network and computer technicians
Format of the Course
- Part lecture, part discussion, exercises, and extensive hands-on practice
Note
- To request a customized training for this course, please contact us to arrange.