Software-Defined Wide Area Network (SD-WAN) Management and Operation Training Course
A Software-Defined Wide Area Network (SD-WAN) represents an advanced method for managing and enhancing wide area networks (WANs), which link various segments of an organization's network—such as branch offices, data centers, and cloud services—across extensive geographical areas.
This instructor-led training session, conducted either online or at your premises, is designed for intermediate-level networking professionals who want to effectively manage and operate SD-WAN networks. This includes the design, configuration, troubleshooting, and optimization of these networks.
Upon completion of this course, participants will be able to:
- Grasp the core concepts, advantages, and challenges related to SD-WAN technologies.
- Create an SD-WAN architecture that meets organizational requirements and deploy SD-WAN solutions efficiently.
- Incorporate and manage security features within an SD-WAN environment.
- Monitor, administer, and resolve issues in SD-WAN environments.
Course Format
- Engaging lectures and discussions.
- Numerous exercises and practical applications.
- Hands-on implementation within a live-lab setting.
Customization Options for the Course
- To request a tailored training session, please contact us to make arrangements.
Course Outline
Introduction to SD-WAN
- Evolution of WAN
- SD-WAN concepts and benefits
- SD-WAN architecture and components
Planning and Designing an SD-WAN Network
- Assessing network requirements
- Design considerations and best practices
- Migration strategies from legacy WAN to SD-WAN
SD-WAN Technology Deep Dive
- Underlay and overlay networks
- SD-WAN edge devices configuration
- Controller and management platform setup
Managing and Operating SD-WAN
- Traffic management and application steering
- Monitoring tools and analytics
- Implementing security and QoS policies
Troubleshooting and Optimization
- Common SD-WAN issues and resolutions
- Network performance optimization techniques
- Advanced troubleshooting tools
Summary and Next Steps
Requirements
- Basic understanding of networking concepts
- Familiarity with WAN technologies
Audience
- Network engineers
- Network administrators
- IT managers
Need help picking the right course?
Software-Defined Wide Area Network (SD-WAN) Management and Operation Training Course - Enquiry
Testimonials (2)
How trainer deliver knowledge so effectively
Vu Thoai Le - Reply Polska sp. z o. o.
Course - Certified Kubernetes Administrator (CKA) - exam preparation
knowledge of the instructor
Grzegorz - Centrum Informatyki Resortu Finansow
Course - Network Troubleshooting with Wireshark
Upcoming Courses
Related Courses
Akraino
14 HoursThis instructor-led, live training in the UAE (online or onsite) is aimed at programmers who wish to download, install, and set up Akraino Edge Stack blueprints to manage their edge systems.
By the end of this training, participants will be able to install, deploy, manage, and support end-to-end Akraino Edge Stack solutions to improve and organize their edge systems, services, and devices.
Certified Kubernetes Administrator (CKA) - exam preparation
21 HoursThe Certified Kubernetes Administrator (CKA) program was developed by The Linux Foundation and the Cloud Native Computing Foundation (CNCF).
Kubernetes is currently a leading platform for container orchestration.
NobleProg has been providing Docker & Kubernetes training since 2015. With over 360 successfully completed training projects, we have become one of the most recognized training providers globally in the field of containerization.
Since 2019, we have also assisted our clients in validating their proficiency in k8s environments by preparing them and motivating them to pass the CKA and CKAD exams.
This instructor-led live training (online or on-site) is designed for System Administrators and Kubernetes users who wish to validate their knowledge through the CKA exam.
Additionally, the course focuses on gaining practical experience in Kubernetes Administration. Therefore, we recommend participating even if you do not plan to take the CKA exam.
Course Format
- Interactive lectures and discussions.
- A multitude of exercises and practice sessions.
- Hands-on implementation in a live-lab environment.
Customization Options for the Course
- To request a customized training, please contact us to arrange it.
- To learn more about CKA certification, visit: https://training.linuxfoundation.org/certification/certified-kubernetes-administrator-cka
Certified Kubernetes Application Developer (CKAD) - exam preparation
21 HoursThe Certified Kubernetes Application Developer (CKAD) program has been created by The Linux Foundation and the Cloud Native Computing Foundation (CNCF), which oversees Kubernetes.
This instructor-led training session, whether online or in person, is designed for Developers looking to validate their abilities in designing, building, configuring, and deploying cloud-native applications on Kubernetes.
Moreover, the training emphasizes practical experience in developing Kubernetes applications. Therefore, we recommend participating even if you do not plan to take the CKAD exam.
NobleProg has been providing Docker & Kubernetes training since 2015. With over 360 successfully completed projects, we have become one of the leading training providers globally in containerization. Since 2019, we have also assisted our clients in demonstrating their proficiency in k8s environments by preparing them for and encouraging them to pass CKA and CKAD exams.
Course Format
- Interactive lectures and discussions.
- Numerous exercises and practice sessions.
- Hands-on implementation in a live-lab setting.
Customization Options for the Course
- To request customized training, please contact us to arrange it.
- For more information on CKAD, visit: https://training.linuxfoundation.org/certification/certified-kubernetes-application-developer-ckad/
CompTIA Network+ N10-008 exam prep with Exam (accredited training course with exam)
35 HoursIn this course, you will describe the major networking technologies and systems of modern networks and configure, manage, and troubleshoot modern networks.
- You will:
- Explain the OSI and TCP/IP Models.
- Explain properties of network traffic.
- Install and configure switched networks.
- Configure IP networks.
- Install and configure routed networks.
- Configure and monitor ports and protocols.
- Explain network application and storage issues.
- Monitor and troubleshoot networks.
- Explain network attacks and mitigations.
- Install and configure security devices.
- Explain authentication and access controls.
- Deploy and troubleshoot cabling solutions.
- Implement and troubleshoot wireless technologies.
- Compare and contrast WAN technologies.
- Use remote access methods.
- Identify site policies and best practices.
LEDE: Set Up a Linux Wireless Router
7 HoursThe LEDE Project (Linux Embedded Development Environment) is a Linux operating system derived from OpenWrt. It serves as a comprehensive alternative to the default firmware for various wireless routers and non-network devices.
During this instructor-led live training, participants will learn how to configure a wireless router using LEDE.
Audience
- Network administrators and technicians
Course Format
- The course includes lectures, discussions, exercises, and extensive hands-on practice.
Nessus Manager
28 HoursThe Nessus vulnerability scanner is a highly adaptable platform for identifying and managing vulnerabilities. It offers more than just vulnerability detection; it also supports baseline auditing by comparing your system configuration against the highest security standards.
In this instructor-led course, we will cover the various components of the solution and their functionalities. Each module within the application will be thoroughly explained along with its specific use cases.
By the end of the course, participants will be able to perform both authenticated and unauthenticated vulnerability scans on almost all IP-based systems and analyze scan results to filter out false positives. They will also learn how to prioritize findings based on risk levels and recommend appropriate compensating controls. This course will equip participants with the skills needed to assess their system's security posture using Nessus and determine effective remediation strategies.
Audience:
- Infrastructure managers
- System administrators
- System auditors
- Compliance officers for systems
- Vulnerability managers
- Cybersecurity managers
Format:
The course includes a mix of lectures, discussions, and hands-on practice.
Network Security Administrator
35 HoursAudience:
This course is designed for System Administrators, Network Administrators, and any individual with an interest in defensive network security technologies.
ONAP for Network Orchestration and Automation
28 HoursIn this instructor-led, live training in the UAE (online or onsite), participants will learn how to use ONAP to automate networking services.
By the end of this training, participants will be able to:
- Understand, install and configure the various components in the ONAP ecosystem.
- Carry out real-time, policy-driven orchestration and automation of physical and virtual network functions.
- Design, create, orchestrate, and monitor VNFs, SDNs and other network services.
- Efficiently manage the entire networking lifecycle using a software-driven approach.
- Develop, deploy, and scale a network using the latest open source technologies and practices.
OpenUEM Advanced: Automation, Security & Compliance
14 HoursOpenUEM is an open-source endpoint management platform that enables advanced automation, endpoint hardening, and compliance reporting to secure and streamline enterprise operations.
This instructor-led, live training (online or onsite) is aimed at advanced-level IT and security professionals who wish to leverage OpenUEM for automation, security hardening, compliance management, and integration with enterprise monitoring tools.
By the end of this training, participants will be able to:
- Automate endpoint management tasks including software deployment, updates, and reporting.
- Apply security hardening policies and ensure endpoint compliance.
- Integrate OpenUEM with enterprise security and monitoring tools for centralized visibility.
- Generate compliance reports and enforce regulatory or organizational standards.
Format of the Course
- Interactive lecture and discussion.
- Hands-on exercises and practice scenarios.
- Implementation in a lab environment with real endpoints.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
OpenUEM Fundamentals: Endpoint Management Essentials
14 HoursOpenUEM is an open-source unified endpoint management platform that enables organizations to deploy, configure, and maintain endpoint devices efficiently.
This instructor-led, live training (online or onsite) is aimed at beginner-level IT professionals who wish to gain foundational skills in managing endpoints using OpenUEM, including installation, configuration, and basic device management.
By the end of this training, participants will be able to:
- Install and configure OpenUEM server and agents across multiple endpoint platforms.
- Enroll, organize, and manage endpoints efficiently within the OpenUEM console.
- Deploy software, patches, and updates to managed devices.
- Monitor device health, generate reports, and perform basic troubleshooting tasks.
Format of the Course
- Interactive lecture and discussion.
- Hands-on exercises and practice scenarios.
- Implementation in a lab environment with real endpoints.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
OpenUEM Intermediate: Agent Deployment, Inventory & Policy Management
14 HoursOpenUEM is an open-source endpoint management platform that allows organizations to efficiently deploy agents, maintain accurate device inventories, and enforce endpoint policies.
This instructor-led, live training (online or onsite) is aimed at intermediate-level IT professionals who wish to gain practical skills in deploying agents, managing inventories, and implementing policies across endpoint devices using OpenUEM.
By the end of this training, participants will be able to:
- Deploy OpenUEM agents efficiently across multiple endpoint platforms.
- Maintain and manage accurate asset inventories for all managed devices.
- Create, assign, and enforce policies to ensure compliance and security.
- Distribute software, updates, and patches to endpoints effectively.
Format of the Course
- Interactive lecture and discussion.
- Hands-on exercises and practice scenarios.
- Implementation in a lab environment with real endpoints.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
OpenStack and NFV (with OVN and OpenFlow)
21 HoursThis course offers an in-depth exploration of OpenStack networking. It begins with an introduction to OpenStack and its architecture, followed by explanations of key OpenStack projects such as Identity service (Keystone), Image service (Glance), Compute service (Nova), and Block storage (Cinder). This provides a comprehensive overview of the network environment within OpenStack, with particular emphasis on the Networking project (Neutron). The course also delves into virtual network infrastructure using the Open Virtual Network project, Open vSwitch, and OpenFlow. The aim is to provide participants with a solid understanding of the fundamental operations and architecture of OpenStack, as well as familiarity with various networking technologies that underpin it, including detailed insights into OVN and its associated flows, resources, and tools.
Customization Options
The training can be tailored to a two-day format, focusing on core elements pertinent to the customer’s needs. Additionally, the course can be expanded to cover administrative, design, networking, or troubleshooting aspects related to OpenStack deployments. Other underlying SDN solutions such as Linux Bridge or OvS can also be discussed.
Varnish: Speeding Up Your Website with HTTP Reverse Proxy Caching
7 HoursVarnish serves as a reverse proxy specifically designed for content-heavy dynamic web sites. Unlike Squid, which was initially developed as a client-side cache, or web servers such as Apache and nginx, Varnish focuses on accelerating HTTP traffic. It is dedicated solely to HTTP, in contrast to other proxy servers that support additional protocols like FTP and SMTP. Notable users of Varnish include Wikipedia, The New York Times, Facebook, and Twitter.
This course will cover the features and caching techniques of Varnish while providing hands-on experience with setting up and configuring a Varnish proxy on Linux. It begins with a review of essential networking concepts before delving into setup and configuration specifics, gradually progressing to more advanced implementations. By the conclusion of the training, participants will be equipped with the knowledge to determine appropriate scenarios for deploying Varnish and will have gained practical experience in setting up their own Varnish proxy solutions.
Target Audience
- Network technicians
- Network designers
- System administrators
Course Format
- A blend of lectures, discussions, extensive hands-on practice and implementation, with occasional quizzes to assess progress.
Network Troubleshooting with Wireshark
21 HoursNetwork packet analysis is a method used to monitor raw data transmitted over a network interface in real time. This technique is invaluable for diagnosing issues related to network configurations and applications. Wireshark, a free open-source tool, is widely utilized for this purpose.
In this instructor-led training session, participants will learn how to use Wireshark effectively to diagnose the functionality of networks and the performance of various networked applications. They will also gain an understanding of fundamental principles in network troubleshooting and practice methods for capturing and analyzing TCP/IP traffic between clients and servers.
Upon completion of this training, participants will be able to:
- Evaluate network functionality and performance across different environments and conditions
- Determine if various server applications are operating satisfactorily
- Pinpoint the main sources of network performance issues
- Identify and resolve common causes of performance problems in TCP/IP communications
Audience
- Network engineers
- Network and computer technicians
Format of the Course
- The course includes lectures, discussions, exercises, and extensive hands-on practice.
Note
- To request a customized training for this course, please contact us to arrange.