Software-Defined Wide Area Network (SD-WAN) Management and Operation Training Course
Software-Defined Wide Area Network (SD-WAN) represents a contemporary methodology for administering and enhancing wide area networks (WANs), which link various segments of an organization's infrastructure—such as branch offices, data centers, and cloud services—across extensive geographic regions.
This instructor-led, live training (available online or on-site) targets intermediate-level network professionals aiming to proficiently manage and operate SD-WAN networks, encompassing design, configuration, troubleshooting, and optimization.
Upon completion of this training, participants will be capable of:
- Grasping the core concepts, advantages, and challenges linked to SD-WAN technologies.
- Designing an SD-WAN architecture that aligns with organizational requirements and deploying SD-WAN solutions efficiently.
- Implementing and overseeing security features within an SD-WAN environment.
- Monitoring, managing, and troubleshooting SD-WAN systems.
Course Format
- Interactive lectures and discussions.
- Extensive exercises and practical activities.
- Hands-on implementation within a live laboratory environment.
Customization Options
- To arrange a tailored training session for this course, please contact us.
Course Outline
Introduction to SD-WAN
- Evolution of WAN
- Concepts and benefits of SD-WAN
- SD-WAN architecture and components
Planning and Designing an SD-WAN Network
- Assessing network requirements
- Design considerations and best practices
- Migration strategies from legacy WAN to SD-WAN
In-Depth Exploration of SD-WAN Technology
- Underlay and overlay networks
- Configuration of SD-WAN edge devices
- Setup of controller and management platforms
Managing and Operating SD-WAN
- Traffic management and application steering
- Monitoring tools and analytics
- Implementation of security and QoS policies
Troubleshooting and Optimization
- Common SD-WAN issues and resolutions
- Techniques for optimizing network performance
- Advanced troubleshooting tools
Summary and Next Steps
Requirements
- Foundational knowledge of networking concepts
- Understanding of WAN technologies
Target Audience
- Network engineers
- Network administrators
- IT managers
Open Training Courses require 5+ participants.
Software-Defined Wide Area Network (SD-WAN) Management and Operation Training Course - Booking
Software-Defined Wide Area Network (SD-WAN) Management and Operation Training Course - Enquiry
Software-Defined Wide Area Network (SD-WAN) Management and Operation - Consultancy Enquiry
Testimonials (2)
How trainer deliver knowledge so effectively
Vu Thoai Le - Reply Polska sp. z o. o.
Course - Certified Kubernetes Administrator (CKA) - exam preparation
Interesting labs, help from trainer
Alexey - Tink Poland sp. z o. o.
Course - Certified Kubernetes Application Developer (CKAD) - exam preparation
Upcoming Courses
Related Courses
Akraino
14 HoursThis instructor-led, live training in Serbia (online or onsite) is aimed at programmers who wish to download, install, and set up Akraino Edge Stack blueprints to manage their edge systems.
By the end of this training, participants will be able to install, deploy, manage, and support end-to-end Akraino Edge Stack solutions to improve and organize their edge systems, services, and devices.
Certified Kubernetes Administrator (CKA) - exam preparation
21 HoursThe Certified Kubernetes Administrator (CKA) program was established by The Linux Foundation and the Cloud Native Computing Foundation (CNCF).
Today, Kubernetes stands as a leading platform for container orchestration.
NobleProg has been providing Docker and Kubernetes training since 2015. With over 360 successfully completed training projects, we have become one of the most recognized training providers globally in the field of containerization.
Since 2019, we have also been helping our customers validate their performance in Kubernetes environments by preparing them and encouraging them to pass the CKA and CKAD exams.
This instructor-led, live training (available online or onsite) is designed for System Administrators and Kubernetes users who wish to validate their knowledge by passing the CKA exam.
Additionally, the training focuses on gaining practical experience in Kubernetes Administration, so we recommend participation even if you do not intend to take the CKA exam.
Course Format
- Interactive lectures and discussions.
- Extensive exercises and practice.
- Hands-on implementation in a live lab environment.
Course Customization Options
- To request customized training for this course, please contact us to arrange.
- To learn more about CKA certification, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-administrator-cka
Certified Kubernetes Application Developer (CKAD) - exam preparation
21 HoursThe Certified Kubernetes Application Developer (CKAD) program has been developed by The Linux Foundation and the Cloud Native Computing Foundation (CNCF), the host of Kubernetes.
This instructor-led, live training (online or onsite) is aimed at Developers who wish to confirm their skills in design, build, configure, and expose cloud native applications for Kubernetes.
On the other hand, training is also focused on gaining practical experience in Kubernetes application development, so we recommend taking part in it, even if you don't intend to take CKAD exam.
NobleProg have been delivering Docker & Kubernetes training from 2015. With more than 360 successfully completed training projects, we became one of the best known training company worldwide in field of containerization. Since 2019 we are also helping our customers to confirm their performance in k8s environment by preparing them and encouraging to pass CKA and CKAD exams.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
- To learn more about CKAD, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-application-developer-ckad/
CompTIA Network+ N10-008 exam prep with Exam (accredited training course with exam)
35 HoursIn this course, you will describe the major networking technologies and systems of modern networks, and learn to configure, manage, and troubleshoot them.
- You will:
- Explain the OSI and TCP/IP Models.
- Explain properties of network traffic.
- Install and configure switched networks.
- Configure IP networks.
- Install and configure routed networks.
- Configure and monitor ports and protocols.
- Explain network application and storage issues.
- Monitor and troubleshoot networks.
- Explain network attacks and mitigations.
- Install and configure security devices.
- Explain authentication and access controls.
- Deploy and troubleshoot cabling solutions.
- Implement and troubleshoot wireless technologies.
- Compare and contrast WAN technologies.
- Use remote access methods.
- Identify site policies and best practices.
Jitsi Meet: Self-Hosted Video Conferencing Replacing Zoom and Microsoft Teams
14 HoursJitsi Meet offers a fully encrypted, open-source video conferencing platform that organizations can host on their own infrastructure. It provides high-definition video, screen sharing, collaborative editing, and live streaming capabilities, all without the need for user accounts or the risk of exposing meeting data to third-party services.
This instructor-led training session, available online or onsite, is designed for intermediate DevOps engineers and system administrators looking to deploy Jitsi Meet as a secure alternative to Zoom, Microsoft Teams, and Google Meet.
Upon completion of this course, participants will be equipped to:
- Install and configure Jitsi Meet utilizing Docker or Debian packages.
- Optimize performance by configuring Prosody, Jicofo, and Jitsi Videobridge.
- Establish TURN servers to ensure NAT traversal and firewall compatibility.
- Enhance meeting security through passwords, lobby rooms, and end-to-end encryption.
- Integrate Jitsi seamlessly with LDAP, single sign-on (SSO), and calendar systems.
Course Format
- Interactive lectures and discussions.
- Extensive exercises and practical practice.
- Hands-on implementation within a live-lab environment.
Customization Options
- For those requiring a tailored training experience, please contact us to arrange customization.
LEDE: Set Up a Linux Wireless Router
7 HoursThe LEDE Project (Linux Embedded Development Environment) is a Linux operating system based on OpenWrt. It serves as a comprehensive replacement for the vendor-provided firmware of various wireless routers and non-network devices.
During this instructor-led live training, participants will learn how to set up a LEDE-based wireless router.
Audience
- Network administrators and technicians
Course Format
- Combination of lectures, discussions, exercises, and extensive hands-on practice
Matrix + Element: Decentralized Enterprise Chat to Replace Slack and Teams
14 HoursMatrix is an open protocol designed for secure, decentralized, real-time communication. Organizations are increasingly adopting Matrix paired with the Element client as a viable alternative to Slack and Microsoft Teams. This approach allows them to maintain end-to-end encryption, ensure on-premise data residency, and facilitate federation with external trusted partners.
Nessus Manager
28 HoursThe Nessus vulnerability scanner is a highly versatile platform designed for detecting and managing security flaws. Its capabilities extend beyond mere vulnerability identification; it also supports baseline auditing, where your system configuration is evaluated against established hardening standards.
In this instructor-led course, we will introduce the core components of the solution and its various functionalities. Each module within the application will be thoroughly explained, along with its specific use cases.
By the end of the course, participants will be capable of performing both authenticated and unauthenticated vulnerability scans on nearly all IP-based systems. They will learn to analyze scan results to eliminate false positives, prioritize findings based on risk, and recommend compensating controls. This training will enable participants to assess the security posture of their systems using Nessus and determine the most effective remediation strategies.
Audience:
- Infrastructure managers
- System administrators
- System auditors
- System compliance officers
- Vulnerability managers
- Cybersecurity managers
Format:
A blend of lectures, discussions, and hands-on practice
Network Monitoring Without Vendor Lock-in: LibreNMS and Zabbix
28 HoursThis instructor-led, live training in Serbia (online or onsite) is aimed at network and system administrators who wish to implement enterprise-grade network monitoring using open-source tools without vendor dependencies.
By the end of this training, participants will be able to deploy LibreNMS and Zabbix, monitor network devices, create dashboards and alerts, implement distributed monitoring, and integrate with external systems.
Network Security Administrator
35 HoursAudience:
This course is designed for System Administrators and Network Administrators, as well as any professionals interested in defensive network security technologies.
ONAP for Network Orchestration and Automation
28 HoursIn this instructor-led, live training held in Serbia (online or onsite), participants will learn how to utilize ONAP to automate networking services.
By the conclusion of this training, participants will be able to:
- Understand, install, and configure the various components within the ONAP ecosystem.
- Perform real-time, policy-driven orchestration and automation of physical and virtual network functions.
- Design, create, orchestrate, and monitor VNFs, SDNs, and other network services.
- Efficiently manage the entire networking lifecycle using a software-driven approach.
- Develop, deploy, and scale a network using the latest open source technologies and practices.
OpenUEM Advanced: Automation, Security & Compliance
14 HoursOpenUEM serves as an open-source endpoint management platform designed to facilitate advanced automation, strengthen endpoint security, and provide detailed compliance reporting, thereby securing and streamlining enterprise operations.
This instructor-led live training, available both online and onsite, targets advanced IT and security professionals who aim to utilize OpenUEM for automation, security hardening, compliance management, and integration with enterprise monitoring tools.
Upon completion of this training, participants will be capable of:
- Automating key endpoint management tasks, such as software deployment, updates, and reporting.
- Implementing security hardening policies and ensuring endpoint compliance.
- Integrating OpenUEM with enterprise security and monitoring solutions to achieve centralized visibility.
- Producing compliance reports and enforcing regulatory or organizational standards.
Course Format
- Interactive lectures and discussions.
- Hands-on exercises and practical scenarios.
- Implementation within a lab environment using real endpoints.
Customization Options
- For those seeking customized training for this course, please contact us to arrange.
OpenUEM Fundamentals: Endpoint Management Essentials
14 HoursOpenUEM is an open-source unified endpoint management platform that enables organizations to deploy, configure, and maintain endpoint devices efficiently.
This instructor-led, live training (online or onsite) is aimed at beginner-level IT professionals who wish to gain foundational skills in managing endpoints using OpenUEM, including installation, configuration, and basic device management.
By the end of this training, participants will be able to:
- Install and configure OpenUEM server and agents across multiple endpoint platforms.
- Enroll, organize, and manage endpoints efficiently within the OpenUEM console.
- Deploy software, patches, and updates to managed devices.
- Monitor device health, generate reports, and perform basic troubleshooting tasks.
Format of the Course
- Interactive lecture and discussion.
- Hands-on exercises and practice scenarios.
- Implementation in a lab environment with real endpoints.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
OpenUEM Intermediate: Agent Deployment, Inventory & Policy Management
14 HoursOpenUEM is an open-source endpoint management platform that enables organizations to efficiently deploy agents, maintain precise device inventories, and enforce endpoint policies.
This instructor-led live training (available online or onsite) is designed for intermediate-level IT professionals seeking to develop practical skills in deploying agents, managing inventories, and implementing policies across endpoint devices using OpenUEM.
Upon completion of this training, participants will be able to:
- Efficiently deploy OpenUEM agents across various endpoint platforms.
- Maintain and manage accurate asset inventories for all managed devices.
- Create, assign, and enforce policies to ensure compliance and security.
- Effectively distribute software, updates, and patches to endpoints.
Course Format
- Interactive lectures and discussions.
- Hands-on exercises and practical scenarios.
- Implementation within a lab environment using real endpoints.
Customization Options
- To request customized training for this course, please contact us to arrange.
OpenStack and NFV (with OVN and OpenFlow)
21 HoursThis course offers an in-depth training on OpenStack networking. It begins with an introduction to OpenStack and its architecture, then clarifies the core OpenStack projects: Identity service (Keystone), Image service (Glance), Compute service (Nova), and Block storage (Cinder). This provides context for understanding the network environment within OpenStack, with a primary focus on the Networking project (Neutron). The virtual network infrastructure is described based on the Open Virtual Network project, Open vSwitch, and OpenFlow. The course goal is to help participants understand the basic operations and architecture of OpenStack, as well as familiarize them with various networking technologies behind OpenStack, including detailed information about OVN, underlying flows, resources, and tools.
Customization options
The training can be contracted for 2 days, focusing on core aspects relevant to the customer. It can also be extended regarding administrative, design, networking, and/or troubleshooting topics concerning OpenStack deployments. Other underlying SDN solutions, such as Linux Bridge or OvS, can also be covered.