Akraino Training Course
Akraino is an open-source stack solution providing blueprint projects centered on edge computing to scale and enhance edge cloud infrastructures and services for carrier, provider, and Internet of Things (IoT) networks.
This instructor-led, live training (available online or onsite) is designed for programmers who want to download, install, and configure Akraino Edge Stack blueprints to manage their edge systems.
Upon completion of this training, participants will be capable of installing, deploying, managing, and supporting end-to-end Akraino Edge Stack solutions to improve and organize their edge systems, services, and devices.
Course Format
- Interactive lecture and discussion.
- Numerous exercises and practice sessions.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request customized training for this course, please contact us to arrange it.
Course Outline
Introduction
Overview of Akraino Features and Architecture
- Key principles (design, build, and run)
- Supported access methodologies
- Akraino community
- Emerging edge technologies
Understanding the Akraino Edge Stack
- Integration projects (blueprints)
- Feature projects (development project)
- Point of delivery (POD)
Exploring Akraino Integration Projects (Blueprints)
- AI/ML and AR/VR applications at the Edge
- Edge video processing
- Integrated Edge Cloud (IEC) blueprint family
- Kubernetes-Native Infrastructure (KNI) blueprint family
- MicroMEC
- Network cloud blueprint family
- StarlingX far edge distributed cloud
- Telco appliance blueprint family
- Time-critical edge compute
- Integrated cloud native NFV/app stack family (short term: ICN)
- The AI Edge blueprint family
- 5G MEC system blueprint family
- Public Cloud Edge Interface (PCEI) blueprint family
- KubeEdge edge service blueprint
- IoT area
- Tami COVID-19 blueprint family
- Automotive area
- Proposed blueprints
Exploring Akraino Feature Projects
- Akraino blueprint validation framework
- Akraino portal feature project
- Akraino profiling
- Akraino regional controller
- API gateway
- Backup and restore (Snappy) feature project
- Cluster Health & Overload Monitoring Platform (CHOMP) feature project
- KONTOUR
- MEC API framework
- Support of OVS-DPDK in Airship
- Proposed feature projects
Deploying Akraino Blueprints to Edge Sites
- Edge location assessment
- Declarative configuration for edge devices
- Large scale deployments
- Use case requirements
Getting Involved in the Akraino Community
- Akraino Wiki page
- Technical Steering Committee (TSC) goals and activities
- Shared community lab, files, and links
- Collaboration with other organizations
- Confluence for collaboration
- Project reporting
Troubleshooting
Summary and Conclusion
Requirements
- An understanding of cloud and edge computing concepts
Audience
- Cloud architects
- Deployment engineers
- DevOps engineers
- Developers
Need help picking the right course?
Akraino Training Course - Enquiry
Testimonials (2)
How trainer deliver knowledge so effectively
Vu Thoai Le - Reply Polska sp. z o. o.
Course - Certified Kubernetes Administrator (CKA) - exam preparation
Interesting labs, help from trainer
Alexey - Tink Poland sp. z o. o.
Course - Certified Kubernetes Application Developer (CKAD) - exam preparation
Upcoming Courses
Related Courses
Certified Kubernetes Administrator (CKA) - exam preparation
21 HoursThe Certified Kubernetes Administrator (CKA) certification program was established by The Linux Foundation and the Cloud Native Computing Foundation (CNCF).
Kubernetes has emerged as the premier platform for container orchestration.
Since 2015, NobleProg has been providing specialized Docker and Kubernetes training. With over 360 successfully completed training projects, we have established ourselves as one of the world's leading training providers in the field of containerization.
Since 2019, we have also been supporting our clients in validating their Kubernetes skills by preparing them to pass the CKA and CKAD exams.
This instructor-led, live training is available either online or onsite and is designed for System Administrators and Kubernetes users who wish to validate their expertise by passing the CKA exam.
Furthermore, the training emphasizes gaining practical experience in Kubernetes Administration. Therefore, we recommend participating even if you do not plan to take the CKA exam.
Course Format
- Interactive lectures and discussions.
- Extensive exercises and practice sessions.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request customized training for this course, please contact us to make arrangements.
- For more information about CKA certification, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-administrator-cka
Certified Kubernetes Application Developer (CKAD) - exam preparation
21 HoursThe Certified Kubernetes Application Developer (CKAD) program was created by The Linux Foundation and the Cloud Native Computing Foundation (CNCF), which serves as the host for Kubernetes.
This instructor-led live training, available either online or onsite, is designed for developers who want to validate their skills in designing, building, configuring, and exposing cloud-native applications for Kubernetes.
Additionally, the training emphasizes gaining practical experience in Kubernetes application development. Therefore, we recommend participating even if you do not plan to take the CKAD exam.
NobleProg has been delivering Docker & Kubernetes training since 2015. With over 360 successfully completed training projects, we have become one of the most recognized training companies globally in the field of containerization. Since 2019, we have also been helping our customers validate their performance in Kubernetes environments by preparing and encouraging them to pass the CKA and CKAD exams.
Course Format
- Interactive lectures and discussions.
- Extensive exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request customized training for this course, please contact us to arrange.
- To learn more about CKAD, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-application-developer-ckad/
CompTIA Network+ N10-008 exam prep with Exam (accredited training course with exam)
35 HoursIn this course, you will explore the major networking technologies and systems used in modern networks, and learn to configure, manage, and troubleshoot them effectively.
- You will:
- Explain the OSI and TCP/IP Models.
- Describe the properties of network traffic.
- Install and configure switched networks.
- Configure IP networks.
- Install and configure routed networks.
- Configure and monitor ports and protocols.
- Explain network application and storage challenges.
- Monitor and troubleshoot networks.
- Explain network attacks and mitigation strategies.
- Install and configure security devices.
- Explain authentication and access controls.
- Deploy and troubleshoot cabling solutions.
- Implement and troubleshoot wireless technologies.
- Compare and contrast WAN technologies.
- Use remote access methods.
- Identify site policies and best practices.
Jitsi Meet: Self-Hosted Video Conferencing Replacing Zoom and Microsoft Teams
14 HoursJitsi Meet is a fully encrypted, 100% open-source video conferencing platform that allows you to host it on your own infrastructure. It offers HD video capabilities, screen sharing, collaborative editing, and live streaming, all without the need for user accounts or exposing meeting data to external third-party services.
This instructor-led, live training, available online or onsite, targets intermediate DevOps engineers and system administrators looking to implement Jitsi Meet as a substitute for Zoom, Microsoft Teams, and Google Meet.
Upon completing this training, participants will be able to:
- Install and configure Jitsi Meet utilizing Docker or Debian packages.
- Configure Prosody, Jicofo, and Jitsi Videobridge to ensure optimal performance.
- Establish TURN servers to facilitate NAT traversal and ensure firewall compatibility.
- Secure meetings through password protection, lobby features, and end-to-end encryption.
- Integrate Jitsi with LDAP, SSO, and calendar applications.
Course Format
- Interactive lectures and discussions.
- Numerous exercises and practical sessions.
- Hands-on implementation within a live lab environment.
Course Customization Options
- To request tailored training for this course, please contact us to make arrangements.
LEDE: Set Up a Linux Wireless Router
7 HoursThe LEDE Project (Linux Embedded Development Environment) is a Linux operating system rooted in OpenWrt. It serves as a comprehensive alternative to the firmware provided by vendors for numerous wireless routers and non-network devices.
Through this instructor-led live training, attendees will gain the skills necessary to configure a LEDE-based wireless router.
Target Audience
- Network administrators and technicians
Course Format
- A blend of lectures, discussions, exercises, and extensive hands-on practice
Matrix + Element: Decentralized Enterprise Chat to Replace Slack and Teams
14 HoursMatrix is an open protocol for secure, decentralized, real-time communication. Organizations are increasingly adopting Matrix with the Element client as an alternative to Slack and Microsoft Teams to maintain end-to-end encryption, on-premise data residency, and federation with external trusted partners.
Nessus Manager
28 HoursNessus is a highly versatile vulnerability scanning platform designed for detecting and managing security risks. Beyond standard vulnerability detection, it supports baseline auditing, comparing your system configurations against established hardening standards.
In this instructor-led course, we will explore the core components and diverse functionalities of the solution. Each module within the application will be thoroughly explained, with its practical use cases clearly outlined.
By the end of the course, participants will be equipped to perform both authenticated and unauthenticated vulnerability scans across nearly all IP-based systems. You will learn to analyze scan results to eliminate false positives, prioritize findings based on risk, and recommend appropriate compensating controls. This training will enable you to assess your systems' security posture using Nessus and determine the most effective remediation strategies.
Audience:
- Infrastructure managers
- System administrators
- System auditors
- Compliance officers
- Vulnerability managers
- Cybersecurity managers
Format:
A blend of lectures, discussions, and hands-on practical exercises.
Network Monitoring Without Vendor Lock-in: LibreNMS and Zabbix
28 HoursThis instructor-led, live training in Abu Dhabi (online or onsite) is aimed at network and system administrators who wish to implement enterprise-grade network monitoring using open-source tools without vendor dependencies.
By the end of this training, participants will be able to deploy LibreNMS and Zabbix, monitor network devices, create dashboards and alerts, implement distributed monitoring, and integrate with external systems.
Network Security Administrator
35 HoursTarget Audience:
This course is designed for System Administrators, Network Administrators, and any professionals interested in learning about defensive network security technologies.
ONAP for Network Orchestration and Automation
28 HoursIn this instructor-led live training in the UAE (online or onsite), participants will learn how to utilize ONAP to automate networking services.
By the end of this training, participants will be able to:
- Understand, install, and configure the various components in the ONAP ecosystem.
- Carry out real-time, policy-driven orchestration and automation of physical and virtual network functions.
- Design, create, orchestrate, and monitor VNFs, SDNs, and other network services.
- Efficiently manage the entire networking lifecycle using a software-driven approach.
- Develop, deploy, and scale a network using the latest open-source technologies and practices.
OpenUEM Advanced: Automation, Security & Compliance
14 HoursOpenUEM is an open-source endpoint management platform that empowers organizations with advanced automation, endpoint hardening, and compliance reporting capabilities to secure and streamline enterprise operations.
This instructor-led training session, available both online and onsite, is designed for advanced IT and security professionals looking to leverage OpenUEM for automation, security hardening, compliance management, and integration with enterprise monitoring tools.
Upon completing this training, participants will be equipped to:
- Automate key endpoint management tasks, such as software deployment, system updates, and reporting.
- Implement security hardening policies and ensure endpoint compliance.
- Integrate OpenUEM with enterprise security and monitoring solutions for centralized visibility.
- Produce compliance reports and enforce organizational or regulatory standards.
Course Format
- Interactive lectures and discussions.
- Practical exercises and scenario-based practice.
- Lab-based implementation using real endpoints.
Course Customization Options
- For customized training requests, please contact us to arrange.
OpenUEM Fundamentals: Endpoint Management Essentials
14 HoursOpenUEM is an open-source unified endpoint management platform that empowers organizations to efficiently deploy, configure, and maintain their endpoint devices.
This instructor-led live training (available online or onsite) is designed for beginner-level IT professionals seeking to build foundational skills in managing endpoints via OpenUEM, covering installation, configuration, and basic device management.
Upon completion of this training, participants will be able to:
- Install and configure the OpenUEM server and agents across various endpoint platforms.
- Enroll, organize, and manage endpoints effectively using the OpenUEM console.
- Deploy software, patches, and updates to managed devices.
- Monitor device health, generate reports, and perform basic troubleshooting tasks.
Course Format
- Interactive lectures and discussions.
- Hands-on exercises and practical scenarios.
- Implementation within a lab environment using real endpoints.
Course Customization Options
- To request customized training for this course, please contact us to arrange your schedule.
OpenUEM Intermediate: Agent Deployment, Inventory & Policy Management
14 HoursOpenUEM is an open-source endpoint management platform that enables organizations to efficiently deploy agents, maintain precise device inventories, and enforce endpoint policies.
This instructor-led, live training (available online or onsite) is designed for intermediate-level IT professionals seeking to develop practical skills in deploying agents, managing inventories, and implementing policies across endpoint devices using OpenUEM.
Upon completing this training, participants will be able to:
- Deploy OpenUEM agents effectively across various endpoint platforms.
- Maintain and manage accurate asset inventories for all managed devices.
- Create, assign, and enforce policies to ensure compliance and security.
- Distribute software, updates, and patches to endpoints efficiently.
Course Format
- Interactive lectures and discussions.
- Hands-on exercises and practice scenarios.
- Implementation within a lab environment using real endpoints.
Course Customization Options
- To request customized training for this course, please contact us to make arrangements.
OpenStack and NFV (with OVN and OpenFlow)
21 HoursThis course provides comprehensive training on OpenStack networking. It begins by introducing OpenStack and its architecture, then details core OpenStack projects such as the Identity service (Keystone), Image service (Glance), Compute service (Nova), and Block storage (Cinder). This establishes the context for OpenStack networks, with a primary focus on the Networking project (Neutron). The course explains virtual network infrastructure based on the Open Virtual Network project, Open vSwitch, and OpenFlow. The objective is to help participants understand the fundamental operations and architecture of OpenStack while gaining familiarity with the networking technologies that support it. Additional information covers OVN, underlying flows, resources, and tools.
Customization options
The training can be contracted for 2 days, concentrating on core aspects relevant to the customer. The training can also be extended to cover administrative, design, networking, and/or troubleshooting topics related to OpenStack deployments. Other underlying SDN solutions, such as Linux Bridge or OvS, can also be described.
Software-Defined Wide Area Network (SD-WAN) Management and Operation
7 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at intermediate-level network professionals who wish to effectively manage and operate SD-WAN networks, including design, configuration, troubleshooting, and optimization.
By the end of this training, participants will be able to:
- Understand the fundamental concepts, benefits, and challenges associated with SD-WAN technologies.
- Design an SD-WAN architecture tailored to organizational needs and deploy SD-WAN solutions effectively.
- Implement and manage security features within an SD-WAN.
- Monitor, manage, and troubleshoot SD-WAN environments.