Online or onsite, instructor-led live Networking training courses demonstrate through interactive discussion and hands-on practice the fundamentals and advanced topics of Networking.
Networking training is available as "online live training" or "onsite live training". Online live training (aka "remote live training") is carried out by way of an interactive, remote desktop. Innsbruck onsite live Networking trainings can be carried out locally on customer premises or in NobleProg corporate training centers.
NobleProg -- Your Local Training Provider.
NobleProg Innsbruck
Valiergasse 58, Innsbruck, Austria, 6020
Overview
Our training facilities are located at Valiergasse 58 in Innsbruck and offer opt...
Overview
Our training facilities are located at Valiergasse 58 in Innsbruck and offer optimal training conditions for your needs.
Directions
The NobleProg training facilities are conveniently located near the main train station, the A12 and A13 motorways are easily accessible.
Parking spaces
There are parking spaces in the surrounding streets around our training rooms.
Local infrastructure
There are numerous restaurants in the downtown area and hotels are also within walking distance.
This instructor-led, live training in Innsbruck (online or onsite) is aimed at beginner-level network administrators who wish to use FortiGate 1100E to manage and secure their network environments effectively.By the end of this training, participants will be able to:
Understand the basic architecture and features of FortiGate 1100E.
Learn how to deploy FortiGate 1100E in various network environments.
Gain hands-on experience with basic configuration and management tasks.
This instructor-led, live training in Innsbruck (online or onsite) is aimed at intermediate-level network administrators who wish to manage and secure their networks using FortiGate firewalls.By the end of this training, participants will be able to:
Understand Fortigate features and functionalities, particularly those introduced or enhanced in version 7.4.
Configure and manage FortiGate devices and implement advanced security features.
Deploy and manage advanced security measures like IPS, antivirus, web filtering, and threat management.
Monitor network activities, analyze logs, and generate reports for auditing and compliance.
This instructor-led, live training in Innsbruck (online or onsite) is aimed at intermediate-level technical professionals who wish to delve deeper into the technical aspects and functionalities of Fortinet’s product line to effectively recommend, sell, and implement Fortinet security solutions.By the end of this training, participants will be able to:
Gain in-depth knowledge of Fortinet’s advanced security solutions and products.
Understand the technical features, benefits, and deployment scenarios for each core Fortinet product.
Configure, manage, and troubleshoot Fortinet solutions in diverse environments.
Apply Fortinet products to address complex security challenges and requirements.
This instructor-led, live training in Innsbruck (online or onsite) is aimed at beginner-level technical professionals who wish to learn the concept of the Security Fabric and how it evolved to address the cybersecurity needs of organizations.By the end of this training, participants will be able to:
Learn the evolution of cybersecurity and how it has shaped current security technologies.
Use Fortinet products to protect against specific types of cyber threats and attacks.
Understand the integration and automation capabilities of Fortinet solutions in providing a coordinated response to cyber incidents.
This instructor-led, live training in Innsbruck (online or onsite) is aimed at security professionals who wish to learn how to use Cortex XDR in preventing and stopping the occurrence of sophisticated attacks and threats.
By the end of this training, participants will be able to:
Understand the architecture and components of Cortex XDR.
Create and manage profiles for exploit and malware prevention.
Analyze behavioral threats and monitor response actions.
This instructor-led, live training in Innsbruck (online or onsite) is aimed at beginner-level network security professionals who wish to learn the concept of cybersecurity and the current global threat landscape.By the end of this training, participants will be able to:
Understand the current global threat landscape and identify the main types of cyber adversaries.
Recognize the primary types of malware and the mechanics of cyber attacks.
Understand the basics of network security and the importance of a layered security approach.
Learn about Fortinet's Security Fabric and how it addresses modern cybersecurity challenges.
This instructor-led, live training in Innsbruck (online or onsite) is aimed at security professionals who wish to learn how to troubleshoot Palo Alto Networks' next-generation firewalls.By the end of this training, participants will be able to:
Understand the architecture of the next-generation firewall.
Investigate and troubleshoot networking issues using firewall tools.
Analyze advanced logs to resolve real-life scenarios.
This instructor-led, live training in Innsbruck (online or onsite) is aimed at intermediate-level network engineers who wish to gain the skills needed to design, install, and maintain fiber optic networks.By the end of this training, participants will be able to:
Understand the fundamentals of fiber optic technology.
Apply network design principles for point-to-point and FTTH networks.
Install and maintain fiber optic cables and connectors.
This instructor-led, live training in Innsbruck (online or onsite) is aimed at intermediate-level network and security professionals who wish to effectively manage and secure networks using Fortigate 600E equipment, with a specific focus on HA configurations for enhanced reliability and performance.By the end of this training, participants will be able to:
Understand the features, specifications, and operating principles of the Fortigate 600E firewall.
Perform the initial setup of the Fortigate 600E, including basic configuration tasks like setting up interfaces, routing, and initial firewall policies.
Configure and manage advanced security features such as SSL VPN, user authentication, antivirus, IPS, web filtering, and anti-malware capabilities to protect against a variety of network threats.
Troubleshoot common issues in HA setups and effectively manage HA environments.
This instructor-led, live training in Innsbruck (online or onsite) is aimed at security professionals who wish to learn how to manage firewalls at scale.
By the end of this training, participants will be able to:
Design, configure, and manage the Panorama FireWall management server.
Manage policies using device groups.
Roll out network configurations to different firewalls.
This instructor-led, live training in Innsbruck (online or onsite) is aimed at intermediate-level network engineers who wish to use, maintain, and troubleshoot microwave networks effectively.By the end of this training, participants will be able to:
Understand the principles and operation of microwave communication systems.
Design and implement point-to-point and point-to-multipoint microwave links.
Perform link budget analysis and network planning.
Operate, maintain, and troubleshoot microwave networks effectively.
This instructor-led, live training in Innsbruck (online or onsite) is aimed at experienced network security managers who wish to gain the knowledge and skills needed to deploy, manage, and troubleshoot Fortinet's FortiGate security appliances running on FortiOS 7.2 as an NSE4 Network Security Professional.
By the end of this training, participants will be able to:
Understand Fortinet's product portfolio and the role of FortiOS in network security.
This instructor-led, live training in Innsbruck (online or onsite) is aimed at security professionals who wish to learn the fundamentals of managing Palo Alto Networks' next-generation firewalls.By the end of this training, participants will be able to:
Configure and manage Palo Alto Networks' firewall essential features.
This instructor-led, live training in Innsbruck (online or onsite) is aimed at intermediate-level telecommunications engineers who wish to gain the knowledge and skills necessary to design, implement, and maintain telecommunication networks with a focus on link integration, ensuring seamless communication and data transfer across networks.By the end of this training, participants will be able to:
Understand the fundamentals of telecommunication networks.
This instructor-led, live training in Innsbruck (online or onsite) is aimed at engineers who wish to optimize networking for Kubernetes clusters.
By the end of this training, participants will be able to:
Install and configure Calico.
Understand how Calico differs from traditional overlay networks.
Understand how Calico combines internet routing protocols with consensus-based data stores.
Use Calico to create a container networking solution for Kubernetes clusters.
Use Calico to provide network policy for Kubernetes.
In this instructor-led, live training in Innsbruck, participants will learn how to implement deep learning models for telecom using Python as they step through the creation of a deep learning credit risk model.By the end of this training, participants will be able to:
Understand the fundamental concepts of deep learning.
Learn the applications and uses of deep learning in telecom.
Use Python, Keras, and TensorFlow to create deep learning models for telecom.
Build their own deep learning customer churn prediction model using Python.
The aim of this course is twofold - gain solid knowledge about OpenStack architecture and acquire profound troubleshooting skills. In the architecture part you will learn how to design the hardware for the public and private cloud, prepare high-availability control plane, choose proper size of the flavours, and safely overcommit cloud resources, among other things. Getting knowledge about the internals of Neutron (Networking Service) is another essential part in OpenStack architecture. Next the participant will be introduced into methods of troubleshooting issues in OpenStack clusters starting from general tips, through network troubleshooting up to caveats of main OpenStack services. Around 75% of the course comprises of hands-on workshops in the real OpenStack training environment.
The course is a comprehensive training on OpenStack. It starts with the introduction to the system, then through hands-on workshops it gives practical knowledge on managing private clouds based on OpenStack, finally troubleshooting and advanced, architectural topics are present. The goal of this course is to familiarize with the OpenStack ecosystem as well as to give a strong background for further expansion and refinement of the OpenStack clouds. The course comprises all topics necessary to accomplish the Certificate OpenStack Administrator exam. 75% of the course is based on hands-on workshop in the real OpenStack training environment.
The course is a comprehensive training on OpenStack, extended version of the OpenStack Bootcamp course includes extra excercises, troubleshooting and sample examination tasks. Extended content is highlited in bold in the course outline. It starts with the introduction to the system, then through hands-on workshops it gives practical knowledge on managing private clouds based on OpenStack, finally troubleshooting and advanced, architectural topics are present. The goal of this course is to familiarize with the OpenStack ecosystem as well as to give a strong background for further expansion and refinement of the OpenStack clouds. The course comprises all topics necessary to accomplish the Certificate OpenStack Administrator exam. 75% of the course is based on hands-on workshop in the real OpenStack training environment. After the course participants get all the materials and training environment for self-study and feature/troubleshooting excercises.
Customization options
The full course is to be meant for at least 5 days. It could be shortened if some of the topics are not relevant for the customer. In case the participants are beginners to OpenStack (slower pace) it is recommended to expand the course for 6 days or remove some advanced topics. The course can be also extended with 1 more day when OVN topics can be presented.
The course is a profound training on OpenStack networking. It starts with the introduction to OpenStack and its architecture, then clarifies core OpenStack projects as Identity service (Keystone), Image service (Glance), Compute service (Nova), Block storage (Cinder) in order to describe the surroundings of the networks in OpenStack and mainly focus on Networking project (Neutron). Virtual network infrastructure is described and based on the Open Virtual Network project, Open vSwitch and OpenFlow. The goal of the course is to understand basic operations and architecture of OpenStack as well as to familiarize participants with various networking technologies behind OpenStack, extending information about OVN and underlying flows, resources and tools.
Customization options
The training can be contracted to 2 days, focusing on core aspects relevant for the customer. The training can be also extended regarding administrative, design, networking and/or troubleshooting topics concerning OpenStack deployments. It is possible to describe other underlying SDN solutions like Linux Bridge or OvS.
A 4 day instructor-led practical course designed to familiarise delegates with the Cisco ASA Firewall CLI and ASDM. The course details the key commands used to configure and secure networks using the ASA Firewall with v8 of the operating system and version 6 of the ASDM.
Delegates will configure the ASA using the console port, TFTP server, telnet and SSH using local and RADIUS authentication. The device will be configured to utilise Syslog and SNMP.
ASA Firewalls will also be configured to use Access-Lists, Network Address Translation and VPN's utilising IPSec protocols. The course will cover the theory of Public/Private Keys, shared secret keys and their use in forming Site to site VPN's between ASA Firewalls using IKE and IPSec. Students will configure the units to create site to site VPN's, remote access VPN's using the Cisco Secure VPN Client and Web VPN's. The course will cover the theory of failover and delegates will configure Active/Standby failover on the ASA.
Privileged commands and protocol analyser traces will be used, where necessary, to debug protocols and ensure proper operation of the ASA Firewall. Students will also perform password recovery operations.
This course will involve interfacing the ASA with other network equipment, such as routers and switches, as would be expected in a network environment.
Audience:
Course is suitable for anyone involved in ASA firewall configuration and network security
Course is approximately 50% practical
In this instructor-led, live training in Innsbruck, participants will learn the critical features of DNS while carrying out exercises in the setup and configuration of a BIND DNS server on Linux. The course starts with a refresher on key networking principles, then digs into hands-on practice with setup and configuration. Steadily, the discussion and practices move towards more complex topics such as security, availability, debugging and troubleshooting.
This 2 day course investigates the theory and technology associated with IPSec VPN’s.VPN’s are setup using Cisco IOS Routers and ASA Firewalls using the web interface. The workings of the protocols are examined using debug commands and protocol analyser traces of relevant negotiations.
Audience:
Suitable for network planners, engineers or anyone interested in IPSec VPNs
Course is approximately 40% practical
A 2 day theoretical course (with some practical demonstrations) covering the fundamentals of Internet Protocol v6 – including addressing, protocol formats, ICMP v6, discovery processes and IP v6 routing.
Audience:
Network Planners, Designers, and Engineers requiring an understanding of IP v6. Those requiring a comprehensive overview of IP v6 and the migration process from an IP v4 environment.
This 4 day coursework is intended for Telecom management and technology professionals who
have to maintain MetroEthernet services across the globe. The course introduces all the
prevailing standards, Troubleshooting guides, vendor options and evolving technologies in
Metro Ethernet domain.
This instructor-led, live training in Innsbruck (online or onsite) is aimed at network engineers who wish to maintain, manage, and design computer networks with Python.
By the end of this training, participants will be able to:
Optimize and leverage Paramiko, Netmiko, Napalm, Telnet, and pyntc for network automation with Python.
Master multi-threading and multiprocessing in network automation.
This instructor-led, live training in Innsbruck (online or onsite) is aimed at anyone who wish to understand and implement a network and various types of servers under Linux.
By the end of this training, participants will be able to:
Understand how networking works under Linux.
Set up a sample LAN.
Understand the various protocols used on the internet and implement each one under Linux.
Secure a networking and various types of servers, such as a webs server.
This course introduces you to how to install, operate, configure, and verify a basic Internet Protocol version 4 (IPv4), including configuring a LAN switch, configuring an IP router, connecting to a WAN, and identifying basic security threats
This course will help you:
Install, operate, configure, and verify a basic IPv4 network
Perform basic troubleshooting steps in enterprise branch office
Format of the Course
Interactive lecture and discussion.
Lots of exercises and practice.
Hands-on implementation in a live-lab environment.
Course Customization Options
To request a customized training for this course, please contact us to arrange.
This instructor-led, live training in Innsbruck (online or onsite) is aimed at network engineers who wish to converge storage infrastructures with SAN and NAS.
By the end of this training, participants will be able to:
Perform configurations of SAN and NAS storage on a storage system.
Connect to storage systems and devices from a client.
Compare SAN and NAS solutions for centralized storage.
Shadowsocks is an open-source, secure socks5 proxy.In this instructor-led, live training, participants will learn how to secure an internet connection through a Shadowsocks proxy.By the end of this training, participants will be able to:
Install and configure Shadowsocks on any of a number of supported platforms, including Windows, Linux, Mac, Android, iOS, and OpenWrt.
Deploy Shadosocks with package manager systems, such as pip, aur, freshports and others.
Run Shadowsocks on mobile devices and wireless networks.
Understand how Shadowsocks encrypts messages and ensures integrity and authenticity.
Optimize a Shadowsocks server
Audience
Network engineers
System Administrators
Computer technicians
Format of the course
Part lecture, part discussion, exercises and heavy hands-on practice
This 4 day course involves a mixture of expository based (utilising protocol analyser traces where appropriate) and practical experiments to test and verify the operation of TCP/IP networks. The major aspects of the TCP/IP protocol stack are covered, including subnetting, supernetting and running dynamic routing protocols. TCP and UDP will be compared and contrasted, covering the end-to-end reliability and congestion avoidance capabilities of the TCP/IP stack. Some application layer protocols (HTTP, TLS, DNS, DHCP etc) will be investigated during the course. Network security in the form of TLS will be covered both from a theoretical and practical standpoint. The practical exercises are designed to augment the theory and enhance both the understanding of the underlying protocols and also the problem solving abilities of the delegates.
Audience:
Suitable for anyone looking for an understanding of TCP/IP.
Course is approximately 50% practical.
Tinc VPN is an open source peer-to-peer virtual private network (VPN) daemon that is compatible with most operating systems. Tinc VPN makes use of tunneling and encryption to build a secure private network between hosts.
In this instructor-led, live training, participants will learn the fundamentals of working with Tinc VPN.
By the end of this training, participants will be able to:
Install, configure, run, test, and troubleshoot Tinc VPN on any operating system
Deploy a Tinc Mesh VPN
Use Tinc VPN for Centralized Cloud Interconnection
Audience
Developers
Network engineers
Format of the course
Part lecture, part discussion, exercises and heavy hands-on practice
Note
To request a customized training for this course, please contact us to arrange.
This instructor-led, live training in Innsbruck (online or onsite) is aimed at beginner-level to intermediate-level IT professionals who wish to understand the basics and principles of modern information and communication technologies and their applications.
By the end of this training, participants will be able to:
Explain the main components and functions of the internet architecture and how they interact.
Describe the features and benefits of modern network solutions and implementations, such as fiber technology, clustering, and internet of things.
Understand the concepts and models of cloud computing and its services, such as infrastructure as a service and virtualization.
Identify the future trends and directions of information and communication technologies and their implications.
VoIP (Voice over Internet Protocol) is a technology that makes it possible for users to make voice calls over an Internet connection instead of through a regular phone line.
In this instructor-led, live training, participants will learn how to set up a VoIP system using Cisco CallManager Express.
By the end of this training, participants will be able to:
Understand fundamental VoIP concepts
Learn how to use VoIP equipment
Configure CISCO routers for VoIP
Implement VoIP and CallManager Express into their network
Configure CME features for SIP, SCCP, and soft phones
Work with advanced configuration settings and features of CME
Audience
Managers
System administrators
Software and support system developers
Technicians
Network engineers
Format of the course
Part lecture, part discussion, exercises and heavy hands-on practice
In this instructor-led, live training in Innsbruck (online or onsite), participants will learn how to use ONAP to automate networking services.By the end of this training, participants will be able to:
Understand, install and configure the various components in the ONAP ecosystem.
Carry out real-time, policy-driven orchestration and automation of physical and virtual network functions.
Design, create, orchestrate, and monitor VNFs, SDNs and other network services.
Efficiently manage the entire networking lifecycle using a software-driven approach.
Develop, deploy, and scale a network using the latest open source technologies and practices.
This instructor-led, live training in Innsbruck (online or onsite) is aimed at telecom engineers, developers, and IT personnel who wish to use ONAP and optimize telecommunication network functions.By the end of this training, participants will be able to:
Install Open Network Automation Platform and configure the necessary frameworks.
Understand the components and concepts foundational to the ONAP environment.
Build and automate physical and virtual telecommunication network functions.
Manage and optimize the life cycles of systems and operations executed through ONAP.
Leverage the features of ONAP and overcome the challenges to telecommunication applications.
This instructor-led, live training in Innsbruck (online or onsite) is aimed at security engineers and system administrators who wish to use FortiGate NGFW's advanced security-driven network systems to protect their organization from internal and external threats.By the end of this training, participants will be able to:
Install and configure the preferred FortiGate NGFW software and hardware model.
Operate and employ FortiGate NGFW to improve the efficiency of system administration tasks.
Manage various forms of external and internal threats using FortiGate features.
Integrate FortiGate security fabric with the entire IT infrastructure to provide quick automated protection.
Ensure long-term protection from attacks with independent and continuous FortiGate threat intelligence.
Troubleshoot the most common firewall system setup errors relevant to FortiGate NGFWs.
Implement Fortinet security solutions in other enterprise applications.
This instructor-led, live training in Innsbruck (online or onsite) is aimed at software testers who wish to protect their organization's network with Nmap.By the end of this training, participants will be able to:
Set up the necessary testing environment to start using Nmap.
Scan network systems for security vulnerabilities.
This instructor-led, live training in Innsbruck (online or onsite) is aimed at developers who wish to prevent malware intrusion with Palo Alto Networks.By the end of this training, participants will be able to:
Set up the necessary development environment to start developing firewalls.
OpenVAS is an advanced open source framework which consists of several services and tools for network vulnerability scanning and management.In this instructor-led, live training, participants will learn how to use OpenVAS for network vulnerability scanning.By the end of this training, participants will be able to:
Install and configure OpenVAS
Learn the fundamental features and components of OpenVAS
Configure and implement network vulnerability scans with OpenVAS
Review and interpret OpenVAS scan results
Audience
Network engineers
Network administrators
Format of the course
Part lecture, part discussion, exercises and heavy hands-on practice
Note
To request a customized training for this course, please contact us to arrange.
This instructor-led, live training in Innsbruck (online or onsite) is aimed at networking engineers and developers who wish to configure, execute and manage programmable networking resources using P4.By the end of this training, participants will be able to:
Learn the fundamentals of the P4 language.
Program network devices.
Set up a server for traffic management.
Compile and execute a P4 program to control plane applications.
Manage network congestion using monitoring and debugging methods.
This instructor-led, live training in Innsbruck (online or onsite) is aimed at network engineers who wish to use Linux for network engineering.
By the end of this training, participants will be able to:
This instructor-led, live training in Innsbruck (online or onsite) is aimed at system administrators, network engineers, and developers who wish to install, configure, and manage controllers, applications, and networking devices under an SDN.By the end of this training, participants will be able to:
Set up a virtual network.
Create applications.
Use controllers to operate a software-defined network.
AI is a collection of technologies for building intelligent systems capable of understanding data and the activities surrounding the data to make "intelligent decisions". For Telecom providers, building applications and services that make use of AI could open the door for improved operations and servicing in areas such as maintenance and network optimization.In this course we examine the various technologies that make up AI and the skill sets required to put them to use. Throughout the course, we examine AI's specific applications within the Telecom industry.Audience
In this instructor-led, live training in Innsbruck, we examine the core principles behind Blockchain technology and gain an understanding of its overall architecture and functionality. Throughout the course, we examine Blockchain technology's specific applications within the Telecom industry. Scenarios include security, payment systems, and user verification.
BSS Course Contents : This course is primarily aimed at managers in Telecom operation who need to have 360 view of a) legacy BSS in eTOM b) emerging BSS in NGOSS c) Billing system including mediation, rating and CDR in details. This course also introduces in new topics like advanced big data based CRM, Churn management and Fraud Management.
This instructor-led, live training in Innsbruck (online or onsite) is aimed at engineers, architects and managers who wish to deploy an OpenStack cloud to manage their Telecom infrastructure.By the end of this training, participants will be able to:
Plan, deploy, and administer OpenStack as a private cloud.
Understand IaaS architecture and its implementation under OpenStack.
Replace physical routers and servers with virtual machines running in a private cloud.
Reduce infrastructure and maintenance costs through virtualization and cloud computing.
Expedite the rollout of new services to customers.
Introduction:OSS/BSS is at the heart of operation of any Telecom operator. Given growth of Big Data in recent time, area of OSS/BSS has undergone disruptive changes specially with virtualization of the OSS/BSS and given the fact, many of the new OTT ( Over the top) services are newly developed web/mobile based services that do not fit into legacy OSS. In this current course, which consists of 4 days, first 3 days are spent extensively to develop background in legacy OSS/BSS, while last 5 modules, are dedicated to explain emerging Big Data analytics application in OSS/BSS layerTarget Audience:
This instructor-led, live training in Innsbruck (online or onsite) is aimed at technical persons who wish to apply the most suitable tools and techniques to secure both telecom as well as wireless networks.
This instructor-led, live training in Innsbruck (online or onsite) is aimed at engineers who wish to use a proxy approach to ensure high availability for MySQL based databases.By the end of this training, participants will be able to:
Install and configure ProxySQL.
Enable thousands of concurrent database connections over multiple backend servers.
The course is providing practical knowledge on OpenStack and private cloud security. It starts from the introduction to the system, then the participants are getting practical knowledge on security in private clouds and securing OpenStack installation. During the course, each of the core OpenStack modules is presented, participants are building up virtual identity, image, network, compute and storage resources while discussing relevant security topics. Each participant is getting their own training environment with a complete OpenStack installation based on selected cloud architecture (eg. storage, networking). The training could be highly customized based on the needs of the client.
Customization options
The training can be contracted to 2 days, focusing on core aspects relevant for the customer. The training can be also extended regarding administrative, design, networking and/or troubleshooting topics concerning OpenStack deployments
Read more...
Last Updated:
Testimonials (18)
Experience of the trainor and interaction
Michael Angelo - Metropolitan Bank and Trust Company
Course - Cisco CCNA Syllabus in 5 Days
trainer listen to participants
Bartosz - ATOS PGS sp. z o.o.
Course - Advanced Network Troubleshooting Using Wireshark
The trainer was extremely knowledgable and helpful. While walking through the exercises, I wasn't rushed and was allowed to make mistakes (to a point) and then help was given to correct to them where needed.
The labs are more interesting as we get to run, create and learn the different commands.
Derrick Mahlangu - Netcampus
Course - SAN and NAS Storage
Information about new application and updates from cisco
Muhammad Al-Hafidzi - Unit4 Business Software Holding B.V.
Course - Cisco ASA/Pix Operation
communication, knowledge from experience, solve problems,
Marcin Walewski - Intel Technology Poland Sp. z o.o.
Course - OpenStack Bootcamp
good knowledge of technical issues, very detailed explanation of topics
Marcin Brzozowski - Asseco Business Solutions S.A.
Course - Deploying a Cisco SD-WAN
Trainer knows very well the subject. He try to give a lot of examples in order that we understand "how" it is working.
He answer to all questions raised. Very available.
christel salve - BICS
Course - Blockchain for Telecom
The varied topics
Daniel Lindh - Tele 2 Sverige AB
Course - OpenStack for Telecom
To get a better understanding about OpenStack.
Jan Gustafsson - Polystar OSIX
Course - OpenStack Architecture and Troubleshooting
Trainer is well prepared and dedicated in making us understand. Well done.
Alan Lye - SBS Transit Ltd
Course - Basic Network Troubleshooting Using Wireshark
His huge amount of knowledge.
Mirela Ochia - Deutsche Telekom Pan-Net Romania S.R.L.
Course - Practical SIP Telephony
I really liked the rapport and connection that the trainer was able to achieve with the class. And that, on the fly, he was able to shape the class into the things we needed.
Fredrik Lindlöf - Svenska Spel AB
Course - HAProxy Administration
The course build up the whole picture and helped me understand in depth how to deal with everyday tasks I perform with Tenable Census Manager.
Konstantinos Papadopoulos
Course - Nessus Manager
Hands on and setup were nicely done and practical knowledge thoroughly imparted. Trainer was really helpful throughout.
Online Networking training in Innsbruck, Networking training courses in Innsbruck, Weekend Networking courses in Innsbruck, Evening Networking training in Innsbruck, Networking instructor-led in Innsbruck, Weekend Networking training in Innsbruck, Evening Networking courses in Innsbruck, Online Networking training in Innsbruck, Networking classes in Innsbruck, Networking coaching in Innsbruck, Networking on-site in Innsbruck, Networking trainer in Innsbruck, Networking instructor-led in Innsbruck, Networking one on one training in Innsbruck, Networking boot camp in Innsbruck, Networking private courses in Innsbruck, Networking instructor in Innsbruck