Software-Defined Wide Area Network (SD-WAN) Management and Operation Training Course
Software-Defined Wide Area Network (SD-WAN) represents a contemporary approach to managing and optimizing wide area networks (WANs), which link various segments of an organization's infrastructure—such as branch offices, data centers, and cloud services—across extensive geographical areas.
This instructor-led, live training (available online or on-site) targets intermediate-level network professionals seeking to proficiently manage and operate SD-WAN networks, covering design, configuration, troubleshooting, and optimization.
Upon completion of this training, participants will be capable of:
- Grasping the core concepts, advantages, and challenges linked to SD-WAN technologies.
- Designing an SD-WAN architecture aligned with organizational requirements and deploying SD-WAN solutions efficiently.
- Implementing and managing security features within an SD-WAN framework.
- Monitoring, managing, and troubleshooting SD-WAN environments.
Course Format
- Interactive lectures and discussions.
- Extensive exercises and practical application.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request customized training for this course, please contact us to arrange.
Course Outline
Introduction to SD-WAN
- Evolution of WAN
- SD-WAN concepts and benefits
- SD-WAN architecture and components
Planning and Designing an SD-WAN Network
- Assessing network requirements
- Design considerations and best practices
- Migration strategies from legacy WAN to SD-WAN
SD-WAN Technology Deep Dive
- Underlay and overlay networks
- SD-WAN edge devices configuration
- Controller and management platform setup
Managing and Operating SD-WAN
- Traffic management and application steering
- Monitoring tools and analytics
- Implementing security and QoS policies
Troubleshooting and Optimization
- Common SD-WAN issues and resolutions
- Network performance optimization techniques
- Advanced troubleshooting tools
Summary and Next Steps
Requirements
- Fundamental understanding of networking concepts
- Familiarity with WAN technologies
Audience
- Network engineers
- Network administrators
- IT managers
Open Training Courses require 5+ participants.
Software-Defined Wide Area Network (SD-WAN) Management and Operation Training Course - Booking
Software-Defined Wide Area Network (SD-WAN) Management and Operation Training Course - Enquiry
Software-Defined Wide Area Network (SD-WAN) Management and Operation - Consultancy Enquiry
Testimonials (2)
How trainer deliver knowledge so effectively
Vu Thoai Le - Reply Polska sp. z o. o.
Course - Certified Kubernetes Administrator (CKA) - exam preparation
Interesting labs, help from trainer
Alexey - Tink Poland sp. z o. o.
Course - Certified Kubernetes Application Developer (CKAD) - exam preparation
Upcoming Courses
Related Courses
Akraino
14 HoursThis instructor-led, live training in Romania (online or onsite) is designed for developers who want to download, install, and configure Akraino Edge Stack blueprints to manage their edge systems.
By the end of this training, participants will be able to install, deploy, manage, and support end-to-end Akraino Edge Stack solutions to improve and organize their edge systems, services, and devices.
Certified Kubernetes Administrator (CKA) - exam preparation
21 HoursThe Certified Kubernetes Administrator (CKA) certification was established by The Linux Foundation in collaboration with the Cloud Native Computing Foundation (CNCF).
Kubernetes has emerged as the premier platform for container orchestration.
Since 2015, NobleProg has specialized in Docker and Kubernetes training. With over 360 successfully delivered training projects, we have become one of the world’s most recognized training providers in the field of containerization.
Since 2019, we have further supported our customers by preparing them to validate their performance in Kubernetes environments through the CKA and CKAD exams.
This instructor-led, live training (available online or onsite) is designed for System Administrators and Kubernetes users who wish to validate their knowledge by passing the CKA exam.
Additionally, the training focuses on gaining practical experience in Kubernetes Administration. Therefore, we recommend participating even if you do not plan to take the CKA exam.
Course Format
- Interactive lectures and discussions.
- Extensive exercises and practice sessions.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request customized training for this course, please contact us to arrange it.
- For more information about CKA certification, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-administrator-cka
Certified Kubernetes Application Developer (CKAD) - exam preparation
21 HoursThe Certified Kubernetes Application Developer (CKAD) program was established by The Linux Foundation and the Cloud Native Computing Foundation (CNCF), which hosts Kubernetes.
This instructor-led live training (available online or onsite) targets developers who wish to validate their ability to design, build, configure, and expose cloud-native applications on Kubernetes.
Additionally, the training emphasizes gaining practical experience in Kubernetes application development, so we encourage participation even if you do not plan to take the CKAD exam.
NobleProg has delivered Docker and Kubernetes training since 2015. With over 360 successfully completed training projects, we have become one of the most recognized training companies globally in the field of containerization. Since 2019, we have also assisted our customers in validating their performance in Kubernetes environments by preparing and encouraging them to pass the CKA and CKAD exams.
Format of the Course
- Interactive lecture and discussion.
- Ample exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request customized training for this course, please contact us to arrange.
- To learn more about CKAD, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-application-developer-ckad/
Jitsi Meet: Self-Hosted Video Conferencing Replacing Zoom and Microsoft Teams
14 HoursJitsi Meet is a fully encrypted, 100% open-source video conferencing solution that allows you to self-host on your own servers. It offers HD video, screen sharing, collaborative editing, and live streaming capabilities without requiring user accounts or exposing meeting data to third-party platforms.
This instructor-led, live training (available online or onsite) is designed for intermediate DevOps engineers and system administrators who aim to deploy Jitsi Meet as a replacement for Zoom, Microsoft Teams, and Google Meet.
Upon completion of this training, participants will be able to:
- Install and configure Jitsi Meet using Docker or Debian packages.
- Configure Prosody, Jicofo, and Jitsi Videobridge for optimal performance.
- Set up TURN servers to ensure NAT traversal and firewall compatibility.
- Secure meetings using passwords, lobby rooms, and end-to-end encryption.
- Integrate Jitsi with LDAP, SSO, and calendar systems.
Course Format
- Interactive lectures and discussions.
- Numerous exercises and practice sessions.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training session for this course, please contact us to arrange it.
LEDE: Set Up a Linux Wireless Router
7 HoursThe LEDE Project (Linux Embedded Development Environment) is a Linux operating system derived from OpenWrt. It serves as a comprehensive alternative to vendor-provided firmware for numerous wireless routers and non-network devices.
During this instructor-led live training, participants will learn how to configure a LEDE-based wireless router.
Audience
- Network administrators and technicians
Course Format
- A blend of lectures, discussions, exercises, and extensive hands-on practice
Matrix + Element: Decentralized Enterprise Chat to Replace Slack and Teams
14 HoursMatrix is an open protocol designed for secure, decentralized, real-time communication. Organizations are increasingly adopting the Matrix protocol paired with the Element client as an alternative to Slack and Microsoft Teams. This shift helps maintain end-to-end encryption, ensure on-premise data residency, and enable federation with external trusted partners.
Nessus Manager
28 HoursThe Nessus vulnerability scanner is a highly versatile platform designed for detecting and managing vulnerabilities. Its capabilities extend far beyond simple vulnerability detection, also encompassing baseline auditing. This involves comparing your system configurations against established hardening standards.
In this instructor-led course, we will introduce the core components of the solution and its various functionalities. Each module within the application will be explained, along with its specific use cases.
Upon completing the course, participants will be able to conduct both authenticated and unauthenticated vulnerability scans on nearly all IP-based systems. They will learn to analyze scan results to eliminate false positives, prioritize findings based on risk, and recommend compensating controls. This course will empower participants to assess the security posture of their systems using Nessus and determine the most effective remediation strategies.
Audience:
- Infrastructure managers
- System administrators
- System auditors
- System compliance officers
- Vulnerability managers
- Cybersecurity managers
Format:
A blend of lectures, discussions, and hands-on practice
Network Monitoring Without Vendor Lock-in: LibreNMS and Zabbix
28 HoursThis instructor-led, live training in Romania (online or onsite) is aimed at network and system administrators who wish to implement enterprise-grade network monitoring using open-source tools without vendor dependencies.
By the end of this training, participants will be able to deploy LibreNMS and Zabbix, monitor network devices, create dashboards and alerts, implement distributed monitoring, and integrate with external systems.
Network Security Administrator
35 HoursTarget Audience:
System and Network Administrators, as well as any professionals interested in defensive network security technologies.
ONAP for Network Orchestration and Automation
28 HoursIn this instructor-led, live training in Romania (online or onsite), participants will learn how to use ONAP to automate networking services.
By the end of this training, participants will be able to:
- Understand, install and configure the various components in the ONAP ecosystem.
- Carry out real-time, policy-driven orchestration and automation of physical and virtual network functions.
- Design, create, orchestrate, and monitor VNFs, SDNs and other network services.
- Efficiently manage the entire networking lifecycle using a software-driven approach.
- Develop, deploy, and scale a network using the latest open source technologies and practices.
OpenUEM Advanced: Automation, Security & Compliance
14 HoursOpenUEM serves as an open-source endpoint management platform designed to enhance security and streamline enterprise operations through advanced automation, endpoint hardening, and comprehensive compliance reporting.
This instructor-led live training, available either online or onsite, targets advanced IT and security professionals eager to harness OpenUEM for automation, security hardening, compliance management, and integration with enterprise monitoring solutions.
Upon completion of this training, participants will possess the capability to:
- Automate critical endpoint management functions, such as software deployment, system updates, and reporting.
- Implement security hardening policies to ensure endpoint compliance.
- Integrate OpenUEM with enterprise security and monitoring tools to achieve centralized visibility.
- Produce compliance reports and enforce regulatory or organizational standards.
Course Format
- Interactive lectures and discussions.
- Practical exercises and scenario-based practice.
- Lab-based implementation using real endpoints.
Customization Options
- For tailored training needs, please contact us to arrange a customized session.
OpenUEM Fundamentals: Endpoint Management Essentials
14 HoursOpenUEM serves as an open-source unified endpoint management solution, allowing organizations to efficiently deploy, configure, and maintain their endpoint devices.
This instructor-led training session, available both online and onsite, is designed for IT professionals at the beginner level who aim to build foundational expertise in managing endpoints via OpenUEM, covering installation, configuration, and essential device management tasks.
Upon completion of this training, participants will be capable of:
- Installing and configuring the OpenUEM server and agents across various endpoint platforms.
- Enrolling, organizing, and managing endpoints effectively within the OpenUEM console.
- Deploying software, patches, and updates to managed devices.
- Monitoring device health, generating reports, and executing basic troubleshooting procedures.
Training Format
- Interactive lectures and discussions.
- Practical exercises and real-world scenarios.
- Hands-on implementation in a lab environment featuring real endpoints.
Customization Options
- For requests regarding customized training for this course, please contact us to arrange.
OpenUEM Intermediate: Agent Deployment, Inventory & Policy Management
14 HoursOpenUEM is an open-source endpoint management platform that enables organizations to efficiently deploy agents, maintain precise device inventories, and enforce endpoint policies.
This instructor-led, live training (available online or onsite) targets intermediate-level IT professionals aiming to develop practical skills in deploying agents, managing inventories, and implementing policies across endpoint devices using OpenUEM.
By the conclusion of this training, participants will be able to:
- Efficiently deploy OpenUEM agents across various endpoint platforms.
- Maintain and manage accurate asset inventories for all managed devices.
- Create, assign, and enforce policies to ensure compliance and security.
- Effectively distribute software, updates, and patches to endpoints.
Format of the Course
- Interactive lecture and discussion.
- Hands-on exercises and practice scenarios.
- Implementation in a lab environment with real endpoints.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
OpenStack and NFV (with OVN and OpenFlow)
21 HoursThis course provides in-depth training on OpenStack networking. It begins with an overview of OpenStack and its architecture, then details core OpenStack projects—including the Identity service (Keystone), Image service (Glance), Compute service (Nova), and Block storage (Cinder)—to contextualize the networking environment within OpenStack. The primary focus is on the Networking project (Neutron). The curriculum covers virtual network infrastructure, leveraging the Open Virtual Network project, Open vSwitch, and OpenFlow. By the end of the course, participants will understand the fundamental architecture and operations of OpenStack and gain familiarity with the diverse networking technologies underpinning it, including detailed insights into OVN, its underlying flows, resources, and tools.
Customization options
The training can be condensed into a 2-day format, concentrating on core aspects most relevant to the customer’s needs. Alternatively, the scope can be expanded to cover administrative, design, networking, and troubleshooting topics related to OpenStack deployments. Other underlying SDN solutions, such as Linux Bridge or OvS, can also be included.
Synapse and Element: Self-Hosted Chat Replacing Slack and Microsoft Teams
14 HoursSynapse serves as the reference homeserver implementation for the Matrix protocol, facilitating decentralized, end-to-end encrypted messaging. This instructor-led, live training (available online or onsite) is designed for intermediate DevOps engineers and system administrators who aim to leverage Synapse and Element to replace cloud-based chat platforms with a self-hosted, federated messaging infrastructure.