• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

246 Architecture courses in London

REST and RESTCONF

5.0(3)

By Systems & Network Training

REST AND RESTCONF TRAINING COURSE DESCRIPTION An introduction to REST and RESTCONF using Python. The course progresses from how to use them onto how they work and then looks at using them from within Python all the time on network devices. WHAT WILL YOU LEARN * Explain what REST and RESTCONF are. * Use the REST API on network device. * Use RESTCONF. REST AND RESTCONF TRAINING COURSE DETAILS * Who will benefit: Network engineers. * Prerequisites: Python for network engineers. * Duration 1 day REST AND RESTCONF TRAINING COURSE CONTENTS * Using REST Curl, Browser plugins, Postman, RESTClient, Python. Hands on Using the REST API on network devices. * What is REST? What is REST? Architecture, APIs, RESTful APIs, APIs over HTTP/HTTPS, URIs, resources, HTTP methods, GET, POST, PUT, DELETE. CRUD. Comparison with other APIs. Hands on REST analysis with Wireshark. * Rest conventions Passing parameters, return values, HTTP status, JSON. XML. Hands on Configuring REST on network devices, changing format of responses, POST requests, using parameters. * Configuring network devices with REST Invoking multiple RPCs. Hands on Device configuration with REST. * The request library RESTFUL APIs in Python, the request library, Installation, example to retrieve the interface configuration. Hands on Using the Python requests library on network devices. * RESTCONF What is RESTCONF? YANG and NETCONF, relationship with REST, RESTCONF URIs, A RESTCONF example with ietf-interfaces, RESTCONF responses. PATCH. Hands on Using RESTCONF to update a network device configuration.

REST and RESTCONF
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1397

Definitive Firewalls for engineers

5.0(3)

By Systems & Network Training

FIREWALLS TRAINING COURSE DESCRIPTION A technical hands on training course covering firewall technologies. This focuses on the whys and hows of firewall technology rather than looking at manufacturer specific issues. WHAT WILL YOU LEARN * Design secure firewall protected networks. * Test firewalls. * Evaluate firewalls * Configure firewalls FIREWALLS TRAINING COURSE DETAILS * Who will benefit: Technical staff wanting to learn about Filrewalls including: Technical network staff. Technical security staff. * Prerequisites: IP security foundation for engineers * Duration 2 days FIREWALLS TRAINING COURSE CONTENTS * Firewall introduction Security review, what is a firewall? What do firewalls do? Firewall benefits, concepts. Hands on Configuring the network to be used in later labs, launching various attacks on a target. * Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls, blade based firewalls, personal firewalls, which firewall should you use? Firewall products. Hands on Configuring a simple firewall. * Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. * Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on Stateful packet inspection firewalls. * Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall advantages and disadvantages. Hands on Proxy firewalls. * Personal firewalls The role of personal firewalls, Windows XP, Zonealarm. Hands on Configuring a personal firewall. * Firewall architectures Home based, small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. * Securing communications VPNs, IPsec. Firewall configuration of VPNs, integration of dedicated VPN devices and firewalls. Hands on IPSec VPN configuration. * Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls.

Definitive Firewalls for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1727

Securing Linux systems

5.0(3)

By Systems & Network Training

SECURING LINUX SYSTEMS TRAINING COURSE DESCRIPTION This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. WHAT WILL YOU LEARN * Secure Linux accounts. * Secure Linux file systems. * Secure Linux access through the network. SECURING LINUX SYSTEMS TRAINING COURSE DETAILS * Who will benefit: Linux technical staff needing to secure their systems. * Prerequisites: Linux system administration (LPIC-1) * Duration 5 days SECURING LINUX SYSTEMS TRAINING COURSE CONTENTS * Cryptography * Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. * Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. * Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. * DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. * Host Security * Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. * Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. * User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. * FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. * Access Control * Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. * Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. * etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. * Network Security * Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. * Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. * Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd * Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing Linux systems
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

MEF Carrier Ethernet 2.0 Certification

5.0(3)

By Systems & Network Training

MEF CARRIER ETHERNET TRAINING COURSE DESCRIPTION The course progresses from a overview of the Carrier Ethernet service and how it works onto looking at the concepts in depth. Service attributes and management follow with the course finishing with studies of practical Carrier Ethernet. WHAT WILL YOU LEARN * Discuss and understand key Carrier Ethernet Concepts. * Understand tasks related to designing, deploying and maintaining a Carrier Ethernet network. * Offer effective solutions to implementing a Carrier Ethernet enterprise network given available customer resources and requirements. * Carry out informed discussions using industry Carrier Ethernet 'vocabulary. * Pass the MEF CECP 2.0 professional accreditation exam. MEF CARRIER ETHERNET TRAINING COURSE DETAILS * Who will benefit: Anyone working with Carrier Ethernet * Prerequisites: The course attendees need to be conversant with data networks, as well as Ethernet and IP technologies. * Duration 5 days MEF CARRIER ETHERNET TRAINING COURSE CONTENTS * Section One: Introduction to Carrier Ethernet * Introduction to Carrier Ethernet: What is Carrier Ethernet? Evolution, advantages, The MEF, MEF specifications; UNI, EVC, OVC, EPL/EVPL, EP-LAN/ EVP-LAN, EP-Tree/EVP-Tree, etc, overview. * How Carrier Ethernet Works: Service Frame Handling. Carrier Ethernet at Customer Premises, metro and core. Carrier Ethernet Workings, UNI attributes, Service Attributes (EVC and EVC per UNI attributes), Bandwidth Profiles, service multiplexing, L2 protocol processing; Carrier Ethernet equipment, CPE, aggregation and homing nodes, core equipment; management systems. * The Setting Up of a Carrier Ethernet Service: Step 1: Choose service type, EPL/EVPL, EP-LAN/EVP-LAN, EPTree/EVP-Tree, EVLine...; Step 2: CPE tasks, UNI-C tasks (UNI attributes, service attributes (EVC and EVC per UNI) and bandwidth profiles), UNI-N tasks (L2 protocol handling). Step 3: Non-CPE tasks, Access, metro and core connections set up. * Section Two: Carrier Ethernet Concepts in depth * Carrier Ethernet Definitions in Depth: UNI, UNI I & II, UNI-N and UNI-C, etc.; NNI/ENNI; EVC; OVC, OVC type (P2P, M2M, Rooted MP), OVC end point (root, leaf, trunk), OVC end point map, OVC end point bundling; Service types in detail, EPL/EVPL, EP-LAN/EVP-LAN, EP-Tree/EVP-Tree, EVLine, Access EPL, Access EVPL . * Carrier Ethernet Service Frame Handling: Unicast, multicast and broadcast frame delivery, Tagged, untagged and priority; Tagging, C and S-Tags, 802.3, 802.1d, 802.1q, 802.1ad, 802.1ah evolution, VLAN ID translation/preservation. CoS preservation. * Other Key Carrier Ethernet Concepts: MTU, MTU at UNI, MTU at ENNI; Physical Layer Attributes, FE, GbE and 10GbE, Service Multiplexing and Bundling Concept and detail, rules and implications; Hairpin Switching * Managing Bandwidth in a Carrier Ethernet Network: Token Bucket Algorithm, EIR, CIR, CBS, EBS, Coupling Flag; Frame Colors, recoloring, Color Awareness attribute, Color Forwarding; Bandwidth Profiles, rules and concepts. MEF CoS identifiers, DEI bit (in S-Tag), PCP bit (in C-Tag or S-Tag), or DSCP (in IP header), Multiflow bandwidth concepts; CoS Label/Color Identification. * Section Three: Carrier Ethernet Service Attributes Overview: Carrier Ethernet 2.0; Blueprint C Service Attributes: Per UNI, Physical interfaces, Frame format, Ingress/egress Bandwidth Profiles, CEVLAN ID/EVC Map, UNI protection. EVC per UNI, Ingress/egress Bandwidth Profiles, etc.; Per EVC, CEVLAN ID Preservation, CoS ID Preservation, Relationship between SLA and SLP, Class of Service, etc. OVC, ENNI, OVC End Point per UNI and OVC End Point per ENNI, Ingress/egress bandwidth profiles, etc. * Section Four: Managing Carrier Ethernet Networks Overview: MEF Service Lifecycle. Carrier Ethernet maintenance: Port, Link & NE failure, Service Protection Technologies, Fault Identification and Recovery, LAG, Active/Standby EVC, Single EVC with transport protection, G.8031, G.8032, MPLS FRR. * SOAMs: Connectivity fault management, connectivity Monitoring, Loopback, Linktrace; Performance Management, Frame Delay, Inter Frame Delay Variation, Availability, Frame Loss Ratio, Resiliency, HLI, DMM, DMR, SLM, SLR; Key Concepts, Single vs dual ended, ordered UNI pair calculations. * LOAMs: Link discovery, link monitoring, etc. * Terminology and Concepts: MEG levels, MIPs. * Section Five: Practical Carrier Ethernet Carrier Ethernet Transport Technologies: Layer 1: SDH. Layer 2: Bridging, provider bridging, PBB, PBBTE. Layer 2.5: MPLS VPWS, MPLS VPLS, MPLS-TP. * Carrier Ethernet Access Technologies: fiber, SDH, active fiber, PON, GPON, 10G PON, OTN, WDM; copper, PDH, G-SDSL, 10Pass-TS, HFC; packet radio. * Optimising mobile backhaul with Carrier Ethernet Key challenges solutions: Market pressure, LTE evolution, elements and architecture (RAN BS, NC, GWIF.), synchronization, bandwidth management. * Circuit Emulation over Ethernet: Purpose, needs and applications. Synchronization: Phased, ToD, External Reference source, SynchE ,NTP, IEEE-1588 v2/ PTP, ACR; MEF Service Definitions for emulated circuits. * Applying what you know: Practical examples and scenarios, Carrier Ethernet solutions; Practice Scenarios, Given a scenario, determine appropriate Ethernet services

MEF Carrier Ethernet 2.0 Certification
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

Essential DHCP for engineers

5.0(3)

By Systems & Network Training

ESSENTIAL DHCP TRAINING COURSE DESCRIPTION Almost all businesses use DHCP. This course builds on delegates existing IP knowledge and focuses on IP Address management using DHCP. Also covered is the role of DHCP in plug and play environments. WHAT WILL YOU LEARN * Explain how DHCP works. * Configure DHCP servers. * Troubleshoot DHCP. ESSENTIAL DHCP TRAINING COURSE DETAILS * Who will benefit: Anyone working with TCP/IP. * Prerequisites: TCP/IP Foundation for engineers * Duration 1 day ESSENTIAL DHCP TRAINING COURSE CONTENTS * Introduction What is DHCP?, IP configuration: Address, mask, default gateway, DNS. History of DHCP: RARP, BOOTP. Hands on Client configuration, releasing and renewing. * DHCP servers Installation. Base configuration: Scope. Lease period. DHCP options. Hands on Server setup, Impact of lease times. Server monitoring. * How DHCP works Client states. Obtaining, renewing leases. DHCP messages: DISCOVER, OFFER, REQUEST, NAK, ACK, DECLINE, RELEASE, INFORM. Hands on Troubleshooting DHCP using Wireshark. * DHCP architecture DHCP relay agents. Server platforms, resilience, DHCP fail over, split scopes. Dynamic DNS and DHCP. Hands on DDNS, routers, Troubleshooting.

Essential DHCP for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£967

Essential SD-WAN

5.0(3)

By Systems & Network Training

ESSENTIAL SD-WAN TRAINING COURSE DESCRIPTION SD-WAN is rapidly growing in use. This vendor neutral course starts with an introduction to what SD-WAN is and when it is useful. Each main area of SD-WAN is then studied in more detail to enable delegates to recognise the technologies used in SD-WAN and then use this information to evaluate SD-WAN products. WHAT WILL YOU LEARN * Describe what SD-WAN is (and isn't). * Explain how SD-WAN works. * Evaluate SD-WAN products. * Compare and contrast SD-WAN with other technologies such as MPLS, Ethernet, SDN, NFV and WAN optimisation. ESSENTIAL SD-WAN TRAINING COURSE DETAILS * Who will benefit: Anyone wishing to learn about SD-WAN. * Prerequisites: Network fundamentals. * Duration 1 day ESSENTIAL SD-WAN TRAINING COURSE CONTENTS * What is SD-WAN? What is SD and SDN? What is WAN? Branch/ Office. MPLS, MPLS vs Internet, Ethernet, Broadband, LTE/4G, Cable, Satellite. The impact of the cloud. Single console, Dynamic path selection, automation. Why SD-WAN? * Single console Network management, orchestration, administration. Example GUI interfaces. Northbound and southbound APIs. * Dynamic path selection SD-WAN transports, Overlay networks, security. VPNs, IPsec. QoS and prioritization. Policies, traffic path rules. Application specific routing, bonding, optimisation. * Automation Time saving, removing errors. Zero touch, ZOOM, ZTP. The role of the orchestrator. Real time monitoring of the network. APIs. * Architecture and products Hardware solutions, software solutions, virtual appliances. Clouds. SD-WAN edge devices, SDWAN controllers, Orchestrators. HA and SD-WAN. Riverbed, Cisco, Juniper, others. * Summary SD-WAN doesn't replace MPLS, virtualisation and SD-WAN. Relationship with SDN and NFV. SDWAN versus WAN optimisation.

Essential SD-WAN
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1397

Total SMTP and email for engineers

5.0(3)

By Systems & Network Training

SMTP TRAINING COURSE DESCRIPTION A hands on course focusing on the workings of email systems and the standard protocols that they use. The course is not specific to any particular implementation, but some vendor specifics are noted. Linux and Microsoft machines are used in hands on sessions to reinforce the theory of major sessions. The course concentrates on troubleshooting and interworking using network sniffing and protocol inspection rather than "which buttons to push". WHAT WILL YOU LEARN * Describe and explain SMTP MIME POP3 IMAP PGP, GPG, S/MIME SPF, DKIM, DMARC * Configure mail routing * Secure email systems SMTP TRAINING COURSE DETAILS * Who will benefit: Technical staff responsible for email systems. * Prerequisites: TCP/IP foundation for engineers. * Duration 3 days SMTP TRAINING COURSE CONTENTS * SMTP architecture What is SMTP, email before SMTP, SMTP history, the different protocols, clients, servers. Email composition, transmission, delivering emails, storing and reading emails. MUAs, MTAs, POP3, IMAP, SMTP, DNS, webmail. Hands on Setting up MTAs and MUAs and sending a simple email using telnet. * The SMTP protocol SMTP protocol stack, SMTP headers, HELO, SMTP mail, MAIL FROM, RCPT TO, DATA, SMTPUTF8, 8BITMIME, TURN, EHLO, ETRN, 3 digit replies. Hands on Analysing SMTP packets on a network. * DNS and SMTP SMTP forwarding, SMTP relays, interoperation, how SMTP uses DNS, MX records. Hands on Setting up mail relays. * SMTP headers IMF data, From, to, cc, bcc, sender and recipient headers, message Ids, received trails, in-reply-to, received-SPF, mail list headers. Hands on Using clients to analyse details from mail headers, including true originators and path of emails. * MIME Email attachments, MIME versions, content type headers, encoding, base 64, binary data, multi part headers, troubleshooting attachments. Hands on Analysing MIME headers and attachments. * POP3 What is POP3, where to use POP3, authorisation, transactions, POP3 commands: USER, PASS, STAT, LIST, RETR, DELE. Hands on Setting up a POP3 server, analysing POP3 packets on a network. * IMAP and IMAPS What is IMAP, where to use IMAP, authorisation, mailbox structure, IMAP commands: LOGIN, AUTHENTICATE, LIST, CREATE, Examine (message flags), SELECT, STORE. Hands on Setting up an IMAP server and analysing IMAP packets on a network. * Interoperation Mail gateways, addressing, Exchange, sendmail. * Email security Basics, Transport level: STARTTLS. Content: PGP/GPG, mail signing and encryption, S/MIME, digital certificates, secure email submission. Hands on Setting up and using a PGP key, configure MTAs to use TLS. * Email authentication and spam prevention Mail relays, grey listing, block list & RBL, DNSBL (Real-time Black hole List), White list, SPF, Domain Keys Identified Mail (DKIM), Author Domain Signing Practices (ADSP), Abuse Report Format (ARF), Domain-based Message Authentication, Reporting and Conformance (DMARC). Hands on Relay spamming and the blocking spamming.

Total SMTP and email for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2367

Introduction to the Junos Operating System

5.0(3)

By Systems & Network Training

JUNOS OPERATING SYSTEM TRAINING COURSE DESCRIPTION This course provides students with the foundational knowledge required to work with the Junos OS and to configure Junos devices. The course provides a brief overview of the Junos device families and discusses the key architectural components of the software. The course then delves into foundational routing knowledge and configuration examples including general routing concepts, routing policy, and firewall filters. Delegates will gain experience in configuring and monitoring the Junos OS and monitoring basic device operations. This course is based on Junos OS Release 15.1X49. WHAT WILL YOU LEARN * Describe the design architecture of the Junos OS. * Navigate within the Junos CLI and perform tasks within the CLI operational and configuration modes. * Configure and monitor network interfaces. * Navigate within the Junos J-Web interface. * Identify where you might use firewall filters. * Explain basic routing operations and concepts. * Identify key factors in Juniper Networks' security. JUNOS OPERATING SYSTEM TRAINING COURSE DETAILS * Who will benefit: This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. * Prerequisites: TCP/IP foundation for engineers * Duration 3 days JUNOS OPERATING SYSTEM TRAINING COURSE CONTENTS * Junos Operating System Fundamentals The Junos OS Traffic Processing Overview of Junos Devices * User Interface Options-The Junos CLI User Interface Options The Junos CLI: CLI Basics The Junos CLI: Operational Mode The Junos CLI: Configuration Mode * User Interface Options-The J-Web Interface The J-Web GUI Configuration Lab 1: User Interface Options * Initial Configuration Factory-Default Configuration Initial Configuration Interface Configuration Lab 2: Initial System Configuration * Secondary System Configuration User Configuration and Authentication System Logging and Tracing Network Time Protocol Archiving Configurations SNMP Lab 3: Secondary System Configuration * Operational Monitoring and Maintenance Monitoring Platform and Interface Operation Network Utilities Maintaining the Junos OS Password Recovery System Clean-Up Lab 4: Operational Monitoring and Maintenance * Interface Configuration Examples Review of the Interface Configuration Hierarchy Interface Configuration Examples Using Configuration Groups * Routing Fundamentals Routing Concepts: Overview of Routing Routing Concepts: The Routing Table Routing Concepts: Routing Instances Static Routing Dynamic Routing Lab 5: Routing Fundamentals * Routing Policy Routing Policy Overview Case Study: Routing Policy Lab 6: Routing Policy * Firewall Filters Firewall Filters Overview Case Study: Firewall Filters Unicast Reverse-Path-Forwarding Checks Lab 7: Firewall Filters * Class of Service CoS Overview Traffic Classification Traffic Queueing Traffic Scheduling Case Study: CoS Lab 8: Class of Service * JTAC Procedures Opening a Support Case Customer Support Tools Transferring Files to JTAC * Juniper Security Concepts Security Challenges Juniper's Security Focus * Appendix A: IPv6 Fundamentals IPv6 Addressing Protocols and Services Configuration

Introduction to the Junos Operating System
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2367

Total OSPF for engineers

5.0(3)

By Systems & Network Training

OSPF TRAINING COURSE DESCRIPTION A detailed hands on examination of OSPF. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. The course starts with a recap of reading routing tables and then jumps straight in with simple OSPF configuration. OSPF features are then studied and configured before moving onto how OSPF works within an area. Multi area OSPF is then studied before looking at OSPF operation in detail by analysing OSPF packets. Finally areas are covered again in more detail followed by troubleshooting. WHAT WILL YOU LEARN * Design OSPF networks. * Design IP addressing schemes suitable for route summarisation. * Troubleshoot OSPF networks. * Describe the operation of OSPF. OSPF TRAINING COURSE DETAILS * Who will benefit: Technical staff working with OSPF. * Prerequisites: TCP/IP Foundation for engineers * Duration 3 days OSPF TRAINING COURSE CONTENTS * Basic routing and OSPF Reading routing tables, routing protocols, What is OSPF? Process IDs, passive interfaces. Hands on Simple OSPF configuration. * OSPF History of OSPF, metrics, costs, convergence, Distance Vector vs. Link state routing protocols, IGPs, classless, OSPF features, load sharing, per packet/destination, OSPF authentication. Hands on Configuring OSPF features. * OSPF within an area How OSPF works, LSDB, LSDB benefits and disadvantages, LSA types, Type 1 and 2, LSA propagation, router IDs, hellos, configuring hellos, the exchange protocol. Hands on Investigating OSPF structures. * Areas Scalability, why areas? Area IDs, area 0, ABRs, ABR resilience, areas & LSDBs, areas & LSAs, Type 3 LSAs, virtual links. Hands on Multi area OSPF. * Redistribution Multiple routing protocols, common scenarios, routing distance, External LSAs, E1 and E2. Type 4 LSAs. OSPF and default routes. Hands on Configuring static route redistribution. * Route aggregation Route summarisation. How to aggregate, ABR summarisation, ASBR summarisation. Hands on OSPF address summarisation. * OSPF packet formats OSPF packets, protocol stack, OSPF stages, packet flows, packet types, the OSPF header, multicasts, Hello, DDB, LS request, LS update, LS ACK, LSA header, LSA formats, neighbours, neighbour states, DRs, adjacencies, BDRs, DR election. Hands on Analysing OSPF packets, troubleshooting. * OSPF network types BMA, NBMA, Point to point links. Hands on Configuring OSPF over Frame Relay. * OSPF stub areas LSA types, area types, area architecture, stub areas, default routes, benefits and disadvantages of stub areas, TSSAs, NSSAs, Type 7 LSAs. Hands on Stub and TSSA configuration. * The OSPF MIB SNMP overview, MIB 2, the OSPF MIB, OSPF MIB groups, useful objects, OSPF traps. Hands on the OSPF MIB. troubleshooting. * Summary RFCs, OSPF design guidelines. * OSPF variants (appendix) OSPF on demand, MOSPF, multicast overview, Type 6 LSAs, OSPF for IPv6 (OSPFv3).

Total OSPF for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2367

Python for network engineers

5.0(3)

By Systems & Network Training

PYTHON TRAINING COURSE DESCRIPTION This Python course focusses on teaching Python for use in network automation and network DevOps. We focus on getting delegates up and running with Python and network automation as quickly as possible rather than making them great programmers. In other words we concentrate on enabling delegates to use network automation libraries such as netmiko, NAPALM and Nornir, and APIs such as NETCONF and RESTCONF rather than enabling delegates to produce object oriented programs. Hands on sessions use Cisco and Juniper devices. WHAT WILL YOU LEARN * Run Python programs. * Read Python programs. * Write Python programs. * Debug Python programs. * Automate network tasks with Python programs. * Configure network devices with Python. * Collect data from network devices with Python. PYTHON TRAINING COURSE DETAILS * Who will benefit: Network engineers. * Prerequisites: TCP/IP Foundation * Duration 5 days PYTHON TRAINING COURSE CONTENTS * What is Python? Programming languages, Why Python? Python in interactive mode, Python scripts, ipython, Python version 2 versus version 3. A simple Python script. Comments. Hands on Installing Python, Hello world. * A network example On box vs off box Python. telnet, ssh, NETCONF, HTTP, APIs, manufacturers and API support, analysis of a simple telnetlib program. Hands on Using Python to retrieve the configuration from a network device. Using wireshark to analyse the actions. * Python basics I/O, operators, variables and assignment, types, indentation, loops and conditionals. Hands on Modifying the telnet program, changing configurations on a network devices. * Functions, classes and methods What are functions, calling functions, builtin functions, useful builtin functions, file handling, classes, objects, creating instances. Hands on Storing configurations in files, configuring devices from files, using an inventory file to work on multiple devices. * Libraries and modules Modules, files and packages, import, from-import, Python standard library, other packages, pip install, executing other programs. Managing python libraries. Hands on Using pip, installing and using ipaddress, subprocess to access netsnmp. For the more advanced, using the sockets library. * Paramiko and netmiko SSH, enabling SSH on devices, keys. Paramiko versus netmiko, example scripts. pexpect. Hands on Configuring VLANs from Python. * pySNMP Gathering facts using previous methods, SNMP review, pySNMP GET, pySNMP and SNMPv3. easySNMP library. Hands on Walking a MIB from Python. * NETCONF What is NETCONF? Enabling NETCONF on devices, A first ncclient script, device handlers, get_config, edit_config, copy_config, delete_config, commit, validate, pyEZ, utils_config, utils.sw. Hands on Configuration using ncclient and PyEZ. This session is expanded for those interesting in JunOS automation. * Manipulating configuration files Builtin functions, string handling. Unicode. Sequences, strings, lists, tuples. Dictionaries. TextFSM. Regular expressions. JSON, YAML, XML, YANG, Jinja2, templates. Hands on Jinja2 templating with Python to configure network devices. * NAPALM Getters, configuration operations, supported devices, NAPALM transport, Config-replace, Config-merge, Compare config, Atomic changes, rollback. Example NAPLAM scripts. Hands on Using NAPALM to gather facts, Using NAPALM for configuration management * REST and RESTCONF What is REST, HTTP methods, GET, POST, cURL, Postman, Python requests library. RESTCONF, a RESTCONF example. Hands on Modifying a configuration using RESTCONF. * Scapy What is scapy, Scapy in interactive mode, Scapy as a module. Hands on Packet crafting from Python. * Warning Errors and exceptions, Exception handling, try, except. Memory management. Garbage collection. Context management, With. Hands on Improving Python code. * Nornir What is Nornir? A network automation framework, inventories, connection management and parallelization. Nornir architecture and other libraires. Hands on Setting up nornir, nornir fact gathering, nornir tasks. * Optional Writing your own functions, Writing your own classes. pyntc. Hands on Writing reusable code.

Python for network engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697