-
admin
Cyber Crisis & Communications Planning Training Course
Overview This course discusses how to manage an incident response team, how the first responder act, given the frequency and complexity of today’s cyber attacks, incident response is a critical function for organizations. Incident response is the last line of defense, detecting and efficiently responding to incidents requires strong management processes, and managing an incident response […]
-
admin
NetNORAD Training Course
Overview NetNORAD is a system built by Facebook to troubleshoot network problems via end-to-end probing, independent of device polling. In this instructor-led, live training, participants will learn how NetNORAD and active path testing can help them improve their network troubleshooting methods. By the end of this training, participants will be able to: Audience Format of […]
-
admin
Ethical Hacker Training Course
Overview This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then […]
-
admin
Snyk Training Course
Overview Snyk is a developer security platform that provides tools for scanning, prioritizing, and fixing security vulnerabilities in configuring codes, container images, open-source dependencies, and Infrastructure as a Code (IaC). This instructor-led, live training (online or onsite) is aimed at developers who wish to integrate Snyk into their development tools to find and fix security […]
-
admin
P4 Programming Training Course
Overview P4 is an open source programming language that provides a top-down solution to network operations. P4 lets users tell data plane devices how to process packets for convenient management of network systems. This instructor-led, live training (online or onsite) is aimed at networking engineers and developers who wish to configure, execute and manage programmable […]
-
admin
Practical SIP Telephony Training Course
Overview The 3 day practical course covers the messages and call flows of the Session Initiation Protocol (SIP) and its use in voice networks. This course is a mixture of theory and practice (utilising protocol analyser traces where appropriate for explanation and troubleshooting) with practical VoIP configured using IP telephones, softphones, voice capable Cisco routers […]
-
admin
Practical Voice and Video over IP Training Course
Overview The 3 day practical course covers the fundamentals of the various voice protocols used to carry voice (and video) over a packet switched network. This course is a mixture of theory and practice (utilising Wireshark where appropriate for explanation and troubleshooting) with practical VoIP configured using IP telephones, softphones and voice capable Cisco routers. […]
-
admin
Understanding Multicast using IPv4 Training Course
Overview Transport of baseband audio and video streams across IP networks using multicast signalling protocols is becoming increasingly used in broadcast networks. This 3 day course/workshop covers the theory and practice of implementing these protocols within IP and Ethernet networks. The practical element of the course will use Cisco L3 switches and the multicast streamers […]
-
admin
Basic Network Troubleshooting Using Wireshark Training Course
Overview The purpose of the course is to provide the participant with basic knowledge of the Wireshark protocol analyzer. The course focuses on deep understanding of the tool, as the basics for using it for network troubleshooting. The course starts with packet capturing, capture and display filters, statistical features and the basics of the expert […]
-
admin
OpenVAS Training Course
Overview OpenVAS is an advanced open source framework which consists of several services and tools for network vulnerability scanning and management. In this instructor-led, live training, participants will learn how to use OpenVAS for network vulnerability scanning. By the end of this training, participants will be able to: Audience Format of the course Note Requirements […]