Software-Defined Wide Area Network (SD-WAN) Management and Operation Training Course
Software-Defined Wide Area Network (SD-WAN) represents a contemporary approach to managing and optimizing Wide Area Networks (WANs), which link various components of an organization's infrastructure – such as branch offices, data centers, and cloud services – across extensive geographical distances.
This instructor-led, live training (available online or onsite) targets intermediate-level network professionals seeking to effectively manage and operate SD-WAN networks, encompassing design, configuration, troubleshooting, and optimization.
Upon completion of this training, participants will be able to:
- Grasp the fundamental concepts, benefits, and challenges associated with SD-WAN technologies.
- Design SD-WAN architectures tailored to organizational requirements and deploy SD-WAN solutions effectively.
- Implement and manage security features within an SD-WAN environment.
- Monitor, manage, and troubleshoot SD-WAN environments.
Course Format
- Interactive lectures and discussions.
- Extensive exercises and practical practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request customized training for this course, please contact us to arrange.
Course Outline
Introduction to SD-WAN
- Evolution of WAN
- SD-WAN concepts and benefits
- SD-WAN architecture and components
Planning and Designing an SD-WAN Network
- Assessing network requirements
- Design considerations and best practices
- Migration strategies from legacy WAN to SD-WAN
SD-WAN Technology Deep Dive
- Underlay and overlay networks
- SD-WAN edge devices configuration
- Controller and management platform setup
Managing and Operating SD-WAN
- Traffic management and application steering
- Monitoring tools and analytics
- Implementing security and QoS policies
Troubleshooting and Optimization
- Common SD-WAN issues and resolutions
- Network performance optimization techniques
- Advanced troubleshooting tools
Summary and Next Steps
Requirements
- Basic understanding of networking concepts
- Familiarity with WAN technologies
Audience
- Network engineers
- Network administrators
- IT managers
Open Training Courses require 5+ participants.
Software-Defined Wide Area Network (SD-WAN) Management and Operation Training Course - Booking
Software-Defined Wide Area Network (SD-WAN) Management and Operation Training Course - Enquiry
Software-Defined Wide Area Network (SD-WAN) Management and Operation - Consultancy Enquiry
Testimonials (2)
How trainer deliver knowledge so effectively
Vu Thoai Le - Reply Polska sp. z o. o.
Course - Certified Kubernetes Administrator (CKA) - exam preparation
knowledge of the instructor
Grzegorz - Centrum Informatyki Resortu Finansow
Course - Network Troubleshooting with Wireshark
Upcoming Courses
Related Courses
Akraino
14 HoursThis instructor-led, live training in Slovakia (online or onsite) is aimed at programmers who wish to download, install, and set up Akraino Edge Stack blueprints to manage their edge systems.
By the end of this training, participants will be able to install, deploy, manage, and support end-to-end Akraino Edge Stack solutions to improve and organize their edge systems, services, and devices.
Certified Kubernetes Administrator (CKA) - exam preparation
21 HoursThe Certified Kubernetes Administrator (CKA) certification program was established by The Linux Foundation in partnership with the Cloud Native Computing Foundation (CNCF).
Kubernetes has become the dominant platform for container orchestration.
Since 2015, NobleProg has been providing Docker and Kubernetes training. With over 360 successfully completed training projects, we have established ourselves as one of the leading training providers globally in the field of containerization.
Since 2019, we have also assisted our clients in validating their expertise in Kubernetes environments by preparing them to successfully pass the CKA and CKAD exams.
This instructor-led, live training (available online or onsite) is designed for System Administrators and Kubernetes users who wish to validate their knowledge by passing the CKA exam.
Additionally, the training focuses on gaining practical experience in Kubernetes Administration. Therefore, we recommend attending, even if you do not plan to take the CKA exam.
Course Format
- Interactive lectures and discussions.
- Extensive exercises and practice sessions.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request customized training for this course, please contact us to arrange.
- For more information about CKA certification, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-administrator-cka
Certified Kubernetes Application Developer (CKAD) - exam preparation
21 HoursThe Certified Kubernetes Application Developer (CKAD) certification program was established by The Linux Foundation and the Cloud Native Computing Foundation (CNCF), the organization responsible for hosting Kubernetes.
This instructor-led, live training (available online or on-site) is designed for Developers who want to validate their skills in designing, building, configuring, and exposing cloud-native applications for Kubernetes.
Additionally, the training emphasizes gaining practical experience in Kubernetes application development; therefore, we recommend participating even if you do not plan to take the CKAD exam.
NobleProg has been delivering Docker & Kubernetes training since 2015. With over 360 successfully completed training projects, we have become one of the most well-known training providers globally in the field of containerization. Since 2019, we have also assisted our customers in verifying their performance in k8s environments by preparing and encouraging them to pass the CKA and CKAD exams.
Course Format
- Interactive lectures and discussions.
- Extensive exercises and practice sessions.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request customized training for this course, please contact us to arrange it.
- To learn more about CKAD, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-application-developer-ckad/
LEDE: Set Up a Linux Wireless Router
7 HoursThe LEDE Project (Linux Embedded Development Environment) is a Linux operating system derived from OpenWrt. It serves as a comprehensive alternative to the proprietary firmware typically provided by vendors for a wide array of wireless routers and non-networking devices.
During this instructor-led live training, participants will gain the knowledge and skills needed to configure a LEDE-based wireless router.
Target Audience
- Network administrators and technicians
Course Format
- A blend of lectures, discussions, exercises, and extensive hands-on practice
Nessus Manager
28 HoursThe Nessus vulnerability scanner is a highly versatile platform designed for the detection and management of security weaknesses. Its capabilities extend beyond simple vulnerability detection, encompassing baseline auditing as well. In this context, your system configuration is evaluated against established hardening standards to ensure optimal security posture.
In this instructor-led course, we will introduce the core components of the solution and explore its various functionalities. Each module within the application will be thoroughly explained, with its specific use cases clearly outlined.
Upon completion of the course, participants will be equipped to perform both authenticated and unauthenticated vulnerability scans on a wide range of IP-based systems. You will learn to analyze scan results to filter out false positives, prioritize findings based on risk levels, and recommend appropriate compensating controls. This training will empower you to assess the security status of your systems using Nessus and determine the most effective remediation strategies.
Audience:
- Infrastructure managers
- System administrators
- System auditors
- System compliance officers
- Vulnerability managers
- Cybersecurity managers
Format:
A blend of lectures, discussions, and hands-on practice
Network Monitoring Without Vendor Lock-in: LibreNMS and Zabbix
28 HoursThis instructor-led, live training in Slovakia (online or onsite) targets network and system administrators who aim to implement enterprise-grade network monitoring using open-source tools without relying on vendor-specific dependencies.
By the end of this training, participants will be capable of deploying LibreNMS and Zabbix, monitoring network devices, creating dashboards and alerts, implementing distributed monitoring, and integrating with external systems.
Network Security Administrator
35 HoursAudience:
This course is designed for System Administrators, Network Administrators, and any professionals seeking to gain in-depth knowledge of defensive network security technologies.
ONAP for Network Orchestration and Automation
28 HoursIn this instructor-led, live training in Slovakia (online or onsite), participants will learn how to use ONAP to automate networking services.
Upon completion of this training, participants will be able to:
- Understand, install and configure the various components in the ONAP ecosystem.
- Carry out real-time, policy-driven orchestration and automation of physical and virtual network functions.
- Design, create, orchestrate, and monitor VNFs, SDNs and other network services.
- Efficiently manage the entire networking lifecycle using a software-driven approach.
- Develop, deploy, and scale a network using the latest open source technologies and practices.
OpenUEM Advanced: Automation, Security & Compliance
14 HoursOpenUEM is an open-source endpoint management platform designed to facilitate advanced automation, strengthen endpoint security, and streamline compliance reporting, thereby securing and optimizing enterprise operations.
This instructor-led training session, available both online and on-site, targets advanced IT and security professionals seeking to utilize OpenUEM for automating processes, hardening security, managing compliance, and integrating with enterprise monitoring solutions.
Upon completion of this course, participants will be capable of:
- Automating endpoint management activities such as software deployment, system updates, and reporting.
- Implementing security hardening policies and verifying endpoint compliance.
- Integrating OpenUEM with enterprise security and monitoring systems to achieve centralized visibility.
- Producing compliance reports and enforcing regulatory or organizational standards.
Course Format
- Interactive lectures and discussions.
- Practical exercises and real-world scenarios.
- Lab-based implementation using actual endpoints.
Customization Options
- For tailored training on this topic, please contact us to arrange.
OpenUEM Fundamentals: Endpoint Management Essentials
14 HoursOpenUEM is an open-source unified endpoint management platform designed to help organizations efficiently deploy, configure, and maintain endpoint devices.
This instructor-led live training (available online or onsite) targets beginner-level IT professionals seeking foundational skills in endpoint management with OpenUEM, covering installation, configuration, and basic device administration.
Upon completion of this training, participants will be able to:
- Install and configure the OpenUEM server and agents across various endpoint platforms.
- Enroll, organize, and manage endpoints effectively using the OpenUEM console.
- Deploy software, patches, and updates to managed devices.
- Monitor device health, generate reports, and perform basic troubleshooting tasks.
Course Format
- Interactive lectures and discussions.
- Hands-on exercises and practical scenarios.
- Lab-based implementation using real endpoint devices.
Course Customization Options
- To request customized training for this course, please contact us to arrange.
OpenUEM Intermediate: Agent Deployment, Inventory & Policy Management
14 HoursOpenUEM is an open-source endpoint management platform enabling organizations to efficiently deploy agents, maintain precise device inventories, and enforce endpoint policies.
This instructor-led, live training (available online or onsite) is designed for intermediate IT professionals seeking practical skills in deploying agents, managing inventories, and implementing policies across endpoint devices using OpenUEM.
Upon completing this training, participants will be able to:
- Efficently deploy OpenUEM agents across multiple endpoint platforms.
- Maintain and manage accurate asset inventories for all managed devices.
- Create, assign, and enforce policies to ensure compliance and security.
- Distribute software, updates, and patches to endpoints effectively.
Course Format
- Interactive lectures and discussions.
- Hands-on exercises and practice scenarios.
- Implementation within a lab environment using real endpoints.
Course Customization Options
- To request customized training for this course, please contact us to arrange.
OpenStack and NFV (with OVN and OpenFlow)
21 HoursThis course provides comprehensive training on OpenStack networking. It begins with an introduction to OpenStack and its architecture, then clarifies core OpenStack projects such as Identity service (Keystone), Image service (Glance), Compute service (Nova), and Block storage (Cinder) to describe the surrounding context of networks in OpenStack and mainly focus on the Networking project (Neutron). Virtual network infrastructure is described based on the Open Virtual Network project, Open vSwitch, and OpenFlow. The goal of the course is to understand basic operations and architecture of OpenStack as well as to familiarize participants with various networking technologies behind OpenStack, extending information about OVN and underlying flows, resources and tools.
Customization options
The training can be contracted to 2 days, focusing on core aspects relevant for the customer. The training can be also extended regarding administrative, design, networking and/or troubleshooting topics concerning OpenStack deployments. It is possible to describe other underlying SDN solutions like Linux Bridge or OvS.
Varnish: Speeding Up Your Website with HTTP Reverse Proxy Caching
7 HoursVarnish serves as a reverse proxy specifically optimized for content-intensive dynamic websites. Distinct from Squid, which functioned primarily as a client-side cache, or web servers like Apache and nginx, Varnish was engineered from the ground up as an HTTP accelerator. Unlike general-purpose proxy servers that handle multiple protocols such as FTP and SMTP, Varnish focuses exclusively on HTTP traffic. It is trusted by major high-traffic platforms including Wikipedia, The New York Times, Facebook, and Twitter.
Through this course, participants will explore Varnish’s core features and caching strategies while gaining practical experience in setting up and configuring a Varnish proxy on Linux. The curriculum begins with a review of essential networking principles before progressing through setup and configuration topics, gradually advancing to more complex implementations. By the conclusion of the training, participants will know exactly when and where Varnish is best deployed and will have acquired the hands-on skills needed to implement their own Varnish proxy solutions.
Audience
- Network technicians
- Network designers
- System administrators
Course Format
- A blend of lectures, discussions, extensive hands-on practice, and implementation exercises, supplemented by periodic quizzes to assess progress
Network Troubleshooting with Wireshark
21 HoursNetwork packet analysis is a method for observing the raw data transmitted and received across a network interface in real time. This capability is essential for diagnosing issues related to network configuration and application performance. Wireshark, a free and open-source packet analyzer, is widely used to resolve such network challenges.
In this instructor-led live training, participants will learn how to leverage Wireshark to troubleshoot network functionality and evaluate the performance of various networked applications. Attendees will master network troubleshooting principles and practice techniques for capturing and analyzing TCP/IP request and response traffic between clients and servers.
Upon completion of this training, participants will be able to:
- Assess network functionality and performance across diverse environments and conditions
- Evaluate whether different server application instances are performing satisfactorily
- Pinpoint the primary sources of network performance degradation
- Identify and resolve the most frequent causes of performance issues in TCP/IP communications
Audience
- Network engineers
- Network and computer technicians
Format of the Course
- A blend of lectures, discussions, exercises, and extensive hands-on practice
Note
- For requests regarding customized training for this course, please contact us to make arrangements.