Networking Training Courses in Finland

Networking Training Courses

Online or onsite, instructor-led live Networking training courses demonstrate through interactive discussion and hands-on practice the fundamentals and advanced topics of Networking.

Networking training is available as "online live training" or "onsite live training". Online live training (aka "remote live training") is carried out by way of an interactive, remote desktop. Finland onsite live Networking trainings can be carried out locally on customer premises or in NobleProg corporate training centers.

NobleProg -- Your Local Training Provider.

Testimonials

★★★★★
★★★★★

Networking Course Outlines in Finland

Course Name
Duration
Overview
Course Name
Duration
Overview
21 hours
This instructor-led, live training in Finland (online or onsite) is aimed at security professionals who wish to learn how to use Cortex XDR in preventing and stopping the occurrence of sophisticated attacks and threats. By the end of this training, participants will be able to:
  • Understand the architecture and components of Cortex XDR.
  • Create and manage profiles for exploit and malware prevention.
  • Analyze behavioral threats and monitor response actions.
  • Perform basic Cortex app troubleshooting.
21 hours
This instructor-led, live training in Finland (online or onsite) is aimed at security professionals who wish to learn how to troubleshoot Palo Alto Networks' next-generation firewalls. By the end of this training, participants will be able to:
  • Understand the architecture of the next-generation firewall.
  • Investigate and troubleshoot networking issues using firewall tools.
  • Analyze advanced logs to resolve real-life scenarios.
21 hours
This instructor-led, live training in Finland (online or onsite) is aimed at security professionals who wish to learn how to manage firewalls at scale. By the end of this training, participants will be able to:
  • Design, configure, and manage the Panorama FireWall management server.
  • Manage policies using device groups.
  • Roll out network configurations to different firewalls.
14 hours
This instructor-led, live training in Finland (online or onsite) is aimed at systems administrators who wish to learn how to use Zscaler to secure network connections for applications and cloud services. By the end of this training, participants will be able to:
  • Learn and understand the architecture security on Zscaler.
  • Understand the value and baseline features of Zscaler advanced configurations.
  • Use Zscaler to secure network connections for applications and cloud services.
21 hours
This instructor-led, live training in Finland (online or onsite) is aimed at security professionals who wish to learn the fundamentals of managing Palo Alto Networks' next-generation firewalls. By the end of this training, participants will be able to:
  • Configure and manage Palo Alto Networks' firewall essential features.
  • Manage security and NAT policies.
  • Manage threat prevention strategies.
  • Monitor network threats and traffic.
21 hours
The Certified Kubernetes Administrator (CKA) program was created by The Linux Foundation and the Cloud Native Computing Foundation (CNCF). Kubernetes is nowadys a leading platform used for containers orchestration. NobleProg have been delivering Docker & Kubernetes training from 2015. With more than 360 successfully completed training projects, we became one of the best known training companyworldwide in field of containerization. Since 2019 we are also helping our customers to confirm their performance in k8s environment by preparing them and encouraging to pass CKA and CKAD exams. This instructor-led, live training (online or onsite) is aimed at System Administrators, Kubernetes User swho wish to confirm their knowledge by passing CKA exam. On the other hand, training is focused also on gaining practical experience in Kubernetes Administration, so we recommend taking part in it, even if you don't intend to take CKA exam. Format of the Course
  • Interactive lecture and discussion.
  • Lots of exercises and practice.
  • Hands-on implementation in a live-lab environment.
Course Customization Options
  • To request a customized training for this course, please contact us to arrange.
  • To learn more about CKA certification, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-administrator-cka/
21 hours
The Certified Kubernetes Application Developer (CKAD) program has been developed by The Linux Foundation and the Cloud Native Computing Foundation (CNCF), the host of Kubernetes. This instructor-led, live training (online or onsite) is aimed at Developers who wish to confirm their skills in design, build, configure, and expose cloud native applications for Kubernetes.  On the other hand, training is also focused on gaining practical experience in Kubernetes application development, so we recommend taking part in it, even if you don't intend to take CKAD exam. NobleProg have been delivering Docker & Kubernetes training from 2015. With more than 360 successfully completed training projects, we became one of the best known training company worldwide in field of containerization. Since 2019 we are also helping our customers to confirm their performance in k8s environment by preparing them and encouraging to pass CKA and CKAD exams. Format of the Course
  • Interactive lecture and discussion.
  • Lots of exercises and practice.
  • Hands-on implementation in a live-lab environment.
Course Customization Options
  • To request a customized training for this course, please contact us to arrange.
  • To learn more about CKAD, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-application-developer-ckad/
14 hours
This instructor-led, live training in Finland (online or onsite) is aimed at engineers who wish to optimize networking for Kubernetes clusters. By the end of this training, participants will be able to:
  • Install and configure Calico.
  • Understand how Calico differs from traditional overlay networks.
  • Understand how Calico combines internet routing protocols with consensus-based data stores.
  • Use Calico to create a container networking solution for Kubernetes clusters.
  • Use Calico to provide network policy for Kubernetes.
28 hours
In this instructor-led, live training in Finland, participants will learn how to implement deep learning models for telecom using Python as they step through the creation of a deep learning credit risk model. By the end of this training, participants will be able to:
  • Understand the fundamental concepts of deep learning.
  • Learn the applications and uses of deep learning in telecom.
  • Use Python, Keras, and TensorFlow to create deep learning models for telecom.
  • Build their own deep learning customer churn prediction model using Python.
14 hours
The aim of this course is twofold - gain solid knowledge about OpenStack architecture and acquire profound troubleshooting skills. In the architecture part you will learn how to design the hardware for the public and private cloud, prepare high-availability control plane, choose proper size of the flavours, and safely overcommit cloud resources, among other things. Getting knowledge about the internals of Neutron (Networking Service) is another essential part in OpenStack architecture. Next the participant will be introduced into methods of troubleshooting issues in OpenStack clusters starting from general tips, through network troubleshooting up to caveats of main OpenStack services. Around 75% of the course comprises of hands-on workshops in the real OpenStack training environment.
28 hours
The course is a comprehensive training on OpenStack. It starts with the introduction to the system, then through hands-on workshops it gives practical knowledge on managing private clouds based on OpenStack, finally troubleshooting and advanced, architectural topics are present. The goal of this course is to familiarize with the OpenStack ecosystem as well as to give a strong background for further expansion and refinement of the OpenStack clouds. The course comprises all topics necessary to accomplish the Certificate OpenStack Administrator exam. 75% of the course is based on hands-on workshop in the real OpenStack training environment.
35 hours
The course is a comprehensive training on OpenStack, extended version of the OpenStack Bootcamp course includes extra excercises, troubleshooting and sample examination tasks. Extended content is highlited in bold in the course outline. It starts with the introduction to the system, then through hands-on workshops it gives practical knowledge on managing private clouds based on OpenStack, finally troubleshooting and advanced, architectural topics are present. The goal of this course is to familiarize with the OpenStack ecosystem as well as to give a strong background for further expansion and refinement of the OpenStack clouds. The course comprises all topics necessary to accomplish the Certificate OpenStack Administrator exam. 75% of the course is based on hands-on workshop in the real OpenStack training environment. After the course participants get all the materials and training environment for self-study and feature/troubleshooting excercises. Customization options The full course is to be meant for at least 5 days. It could be shortened if some of the topics are not relevant for the customer. In case the participants are beginners to OpenStack (slower pace) it is recommended to expand the course for 6 days or remove some advanced topics. The course can be also extended with 1 more day when OVN topics can be presented.  
14 hours
The course is providing practical knowledge on OpenStack and private cloud security. It starts from the introduction to the system, then the participants are getting practical knowledge on security in private clouds and securing OpenStack installation. During the course, each of the core OpenStack modules is presented, participants are building up virtual identity, image, network, compute and storage resources while discussing relevant security topics. Each participant is getting their own training environment with a complete OpenStack installation based on selected cloud architecture (eg. storage, networking). The training could be highly customized based on the needs of the client. Customization options
The training can be contracted to 2 days, focusing on core aspects relevant for the customer. The training can be also extended regarding administrative, design, networking and/or troubleshooting topics concerning OpenStack deployments
 
21 hours
The course is a profound training on OpenStack networking. It starts with the introduction to OpenStack and its architecture, then clarifies core OpenStack projects as Identity service (Keystone), Image service (Glance), Compute service (Nova), Block storage (Cinder) in order to describe the surroundings of the networks in OpenStack and mainly focus on Networking project (Neutron). Virtual network infrastructure is described and based on the Open Virtual Network project, Open vSwitch and OpenFlow. The goal of the course is to understand basic operations and architecture of OpenStack as well as to familiarize participants with various networking technologies behind OpenStack, extending information about OVN and underlying flows, resources and tools. Customization options The training can be contracted to 2 days, focusing on core aspects relevant for the customer. The training can be also extended regarding administrative, design, networking and/or troubleshooting topics concerning OpenStack deployments. It is possible to describe other underlying SDN solutions like Linux Bridge or OvS.
28 hours
This 4 day course involves a mixture of expository based (utilising protocol analyser traces where appropriate) and practical experiments to test and verify the operation of TCP/IP networks. The major aspects of the TCP/IP protocol stack are covered, including subnetting, supernetting and running dynamic routing protocols. TCP and UDP will be compared and contrasted, covering the end-to-end reliability and congestion avoidance capabilities of the TCP/IP stack. Some application layer protocols (HTTP, TLS, DNS, DHCP etc) will be investigated during the course. Network security in the form of TLS will be covered both from a theoretical and practical standpoint. The practical exercises are designed to augment the theory and enhance both the understanding of the underlying protocols and also the problem solving abilities of the delegates. Audience: Suitable for anyone looking for an understanding of TCP/IP. Course is approximately 50% practical.
14 hours
A 2 day theoretical course (with some practical demonstrations) covering the fundamentals of Internet Protocol v6 – including addressing, protocol formats, ICMP v6, discovery processes and IP v6 routing. Audience: Network Planners, Designers, and Engineers requiring an understanding of IP v6. Those requiring a comprehensive overview of IP v6 and the migration process from an IP v4 environment.
14 hours
This 2 day course investigates the theory and technology associated with IPSec VPN’s.VPN’s are setup using Cisco IOS Routers and ASA Firewalls using the web interface. The workings of the protocols are examined using debug commands and protocol analyser traces of relevant negotiations. Audience: Suitable for network planners, engineers or anyone interested in IPSec VPNs Course is approximately 40% practical
35 hours
A 5 day practical networking course designed to familiarise students with Cisco IOS (version 12). The course details the key commands used to configure and secure Cisco routers and switches, and covers the CCNA syllabus - including wired and wireless LAN access. Students will inter-connect networks by implementing static routes, distance-vector and link-state based dynamic routing protocols. The devices will be configured to route traffic across LAN/VLAN//WAN boundaries, by encapsulating datagrams across serial data links using various WAN protocols, such as HDLC, Frame Relay, ISDN and PPP (with CHAP authentication). VLAN encapsulation/tagging will be via IEEE802.1Q/P. Standard and Extended Access Control Lists will be configured and applied to router interfaces to filter traffic based on IP address and/or traffic type. Students will configure static and dynamic NAT to route between private and public networks and cover the theory of Virtual Private Networks (VPN's) Students will copy router configurations and IOS images to/from a TFTP Server. Privileged commands will be used to debug TCP/IP protocols to ensure proper operation of the routers. Students will also perform password recovery operations. The course is primarily aimed at IP v4 but does give an overview of IP v6 addressing and covers migration from an IP v4 to an IP v6 network. Other protocols and technologies (VPN's / Wireless) may be demonstrated if time permits. Course can be customised to precise requirements of customer. Audience: This course is suitable for anyone looking for a basic understanding of internetworking with Cisco devices and covers the CCNA syllabus. Course is approximately 50% practical
28 hours
A 4 day instructor-led practical course designed to familiarise delegates with the Cisco ASA Firewall CLI and ASDM. The course details the key commands used to configure and secure networks using the ASA Firewall with v8 of the operating system and version 6 of the ASDM. Delegates will configure the ASA using the console port, TFTP server, telnet and SSH using local and RADIUS authentication. The device will be configured to utilise Syslog and SNMP. ASA Firewalls will also be configured to use Access-Lists, Network Address Translation and VPN's utilising IPSec protocols. The course will cover the theory of Public/Private Keys, shared secret keys and their use in forming Site to site VPN's between ASA Firewalls using IKE and IPSec. Students will configure the units to create site to site VPN's, remote access VPN's using the Cisco Secure VPN Client and Web VPN's. The course will cover the theory of failover and delegates will configure Active/Standby failover on the ASA. Privileged commands and protocol analyser traces will be used, where necessary, to debug protocols and ensure proper operation of the ASA Firewall. Students will also perform password recovery operations. This course will involve interfacing the ASA with other network equipment, such as routers and switches, as would be expected in a network environment. Audience: Course is suitable for anyone involved in ASA firewall configuration and network security Course is approximately 50% practical
14 hours
In this instructor-led, live training in Finland, participants will learn the critical features of DNS while carrying out exercises in the setup and configuration of a BIND DNS server on Linux. The course starts with a refresher on key networking principles, then digs into hands-on practice with setup and configuration. Steadily, the discussion and practices move towards more complex topics such as security, availability, debugging and troubleshooting.
7 hours
Shadowsocks is an open-source, secure socks5 proxy. In this instructor-led, live training, participants will learn how to secure an internet connection through a Shadowsocks proxy. By the end of this training, participants will be able to:
  • Install and configure Shadowsocks on any of a number of supported platforms, including Windows, Linux, Mac, Android, iOS, and OpenWrt.
  • Deploy Shadosocks with package manager systems, such as pip, aur, freshports and others.
  • Run Shadowsocks on mobile devices and wireless networks.
  • Understand how Shadowsocks encrypts messages and ensures integrity and authenticity.
  • Optimize a Shadowsocks server
Audience
  • Network engineers
  • System Administrators
  • Computer technicians
Format of the course
  • Part lecture, part discussion, exercises and heavy hands-on practice
28 hours
This 4 day coursework is intended for Telecom management and technology professionals who
have to maintain MetroEthernet services across the globe. The course introduces all the
prevailing standards, Troubleshooting guides, vendor options and evolving technologies in
Metro Ethernet domain.
35 hours
VoIP (Voice over Internet Protocol) is a technology that makes it possible for users to make voice calls over an Internet connection instead of through a regular phone line. In this instructor-led, live training, participants will learn how to set up a VoIP system using Cisco CallManager Express. By the end of this training, participants will be able to:
  • Understand fundamental VoIP concepts
  • Learn how to use VoIP equipment
  • Configure CISCO routers for VoIP
  • Implement VoIP and CallManager Express into their network
  • Configure CME features for SIP, SCCP, and soft phones
  • Work with advanced configuration settings and features of CME
Audience
  • Managers
  • System administrators
  • Software and support system developers
  • Technicians
  • Network engineers
Format of the course
  • Part lecture, part discussion, exercises and heavy hands-on practice
14 hours
Tinc VPN is an open source peer-to-peer virtual private network (VPN) daemon that is compatible with most operating systems. Tinc VPN makes use of tunneling and encryption to build a secure private network between hosts. In this instructor-led, live training, participants will learn the fundamentals of working with Tinc VPN. By the end of this training, participants will be able to:
  • Install, configure, run, test, and troubleshoot Tinc VPN on any operating system
  • Deploy a Tinc Mesh VPN
  • Use Tinc VPN for Centralized Cloud Interconnection
Audience
  • Developers
  • Network engineers
Format of the course
  • Part lecture, part discussion, exercises and heavy hands-on practice
Note
  • To request a customized training for this course, please contact us to arrange.
14 hours
This instructor-led, live training in Finland (online or onsite) is aimed at network engineers who wish to maintain, manage, and design computer networks with Python. By the end of this training, participants will be able to:
  • Optimize and leverage Paramiko, Netmiko, Napalm, Telnet, and pyntc for network automation with Python.
  • Master multi-threading and multiprocessing in network automation.
  • Use GNS3 and Python for network programming.
14 hours
This instructor-led, live training in Finland (online or onsite) is aimed at network engineers who wish to converge storage infrastructures with SAN and NAS. By the end of this training, participants will be able to:
  • Perform configurations of SAN and NAS storage on a storage system.
  • Connect to storage systems and devices from a client.
  • Compare SAN and NAS solutions for centralized storage.
21 hours
This instructor-led, live training in Finland (online or onsite) is aimed at anyone who wish to understand and implement a network and various types of servers under Linux. By the end of this training, participants will be able to:
  • Understand how networking works under Linux.
  • Set up a sample LAN.
  • Understand the various protocols used on the internet and implement each one under Linux.
  • Secure a networking and various types of servers, such as a webs server.
21 hours
The course consists of two complementary parts – a theoretical and a practical one. The first is a one day introduction covering motivation, philosophy, fundamentals and rules of operation of the SIP protocol and ways it is used to implement telecom services with focus on IP telephony and VoIP. The second two-day part enables participants to learn practical aspects of service operation within a framework of hand-on laboratory exercises giving detailed insight into configuration of components of SIP telephony architecture, SIP signalling at both message sequence chart and internal message structure levels, and assists in understanding of typical problems and troubleshooting including security and telecom fraud aspects. The trainers will share their experience in launching, operation and management of SIP telephony covering also virtualization and cloud based solutions. Practical part is presented using both SIP hardphones and softphones and IP telephony servers (Asterisk and Freeswitch). Participants can take advantage of the fact trainers have got rich technical and business experience in IP telephony and submit their own problems and questions. They will be included in the agenda at wrap-up as a supplement to the training to meet current urgent needs of clients. Training is addressed to participants with basic knowledge and experience in telecom services – specifically in VoIP and IP networking.
21 hours
SD-WAN is a software-defined approach to managing a WAN (Wide Area Network). This instructor-led, live training (online or onsite) is aimed at engineers who wish to use Cisco SD-WAN products to set up and operate a software defined network. By the end of this training, participants will be able to:
  • Install and configure a Cisco SD-WAN.
  • Create policies to control network traffic.
  • Understand and implement overlay routing.
  • Simplify the management of the network used for public cloud applications.
Format of the Course
  • Interactive lecture and discussion.
  • Lots of exercises and practice.
  • Hands-on implementation in a live-lab environment.
Course Customization Options
  • To request a customized training for this course, please contact us to arrange.

Last Updated:

Online Networking courses, Weekend Networking courses, Evening Networking training, Networking boot camp, Networking instructor-led, Weekend Networking training, Evening Networking courses, Networking coaching, Networking instructor, Networking trainer, Networking training courses, Networking classes, Networking on-site, Networking private courses, Networking one on one training

Course Discounts

No course discounts for now.

Course Discounts Newsletter

We respect the privacy of your email address. We will not pass on or sell your address to others.
You can always change your preferences or unsubscribe completely.

Some of our clients

is growing fast!

We are looking for a good mixture of IT and soft skills in Finland!

As a NobleProg Trainer you will be responsible for:

  • delivering training and consultancy Worldwide
  • preparing training materials
  • creating new courses outlines
  • delivering consultancy
  • quality management

At the moment we are focusing on the following areas:

  • Statistic, Forecasting, Big Data Analysis, Data Mining, Evolution Alogrithm, Natural Language Processing, Machine Learning (recommender system, neural networks .etc...)
  • SOA, BPM, BPMN
  • Hibernate/Spring, Scala, Spark, jBPM, Drools
  • R, Python
  • Mobile Development (iOS, Android)
  • LAMP, Drupal, Mediawiki, Symfony, MEAN, jQuery
  • You need to have patience and ability to explain to non-technical people

To apply, please create your trainer-profile by going to the link below:

Apply now!

This site in other countries/regions