Software-Defined Wide Area Network (SD-WAN) Management and Operation Training Course
Software-Defined Wide Area Network (SD-WAN) represents a contemporary methodology for overseeing and enhancing wide area networks (WANs). These networks link various segments of an organization's infrastructure—such as branch offices, data centers, and cloud services—across extensive geographical areas.
This live, instructor-led training session (available online or in-person) is designed for intermediate network professionals aiming to proficiently manage and operate SD-WAN networks, covering design, configuration, troubleshooting, and optimization.
Upon completion of this training, participants will be capable of:
- Gaining insight into the core concepts, advantages, and challenges inherent to SD-WAN technologies.
- Designing SD-WAN architectures aligned with organizational requirements and deploying SD-WAN solutions effectively.
- Implementing and managing security features within an SD-WAN environment.
- Monitoring, managing, and troubleshooting SD-WAN setups.
Course Format
- Engaging lectures and discussions.
- Extensive exercises and practical application.
- Practical implementation within a live laboratory environment.
Customization Options
- To request a tailored training program for this course, please reach out to us to make arrangements.
Course Outline
Introduction to SD-WAN
- Evolution of WAN
- SD-WAN concepts and benefits
- SD-WAN architecture and components
Planning and Designing an SD-WAN Network
- Assessing network requirements
- Design considerations and best practices
- Migration strategies from legacy WAN to SD-WAN
Deep Dive into SD-WAN Technology
- Underlay and overlay networks
- Configuration of SD-WAN edge devices
- Setup of controller and management platform
Managing and Operating SD-WAN
- Traffic management and application steering
- Monitoring tools and analytics
- Implementing security and QoS policies
Troubleshooting and Optimization
- Common SD-WAN issues and resolutions
- Network performance optimization techniques
- Advanced troubleshooting tools
Summary and Next Steps
Requirements
- Foundational knowledge of networking concepts
- Awareness of WAN technologies
Target Audience
- Network engineers
- Network administrators
- IT managers
Open Training Courses require 5+ participants.
Software-Defined Wide Area Network (SD-WAN) Management and Operation Training Course - Booking
Software-Defined Wide Area Network (SD-WAN) Management and Operation Training Course - Enquiry
Software-Defined Wide Area Network (SD-WAN) Management and Operation - Consultancy Enquiry
Testimonials (2)
How trainer deliver knowledge so effectively
Vu Thoai Le - Reply Polska sp. z o. o.
Course - Certified Kubernetes Administrator (CKA) - exam preparation
Interesting labs, help from trainer
Alexey - Tink Poland sp. z o. o.
Course - Certified Kubernetes Application Developer (CKAD) - exam preparation
Upcoming Courses
Related Courses
Akraino
14 HoursThis instructor-led, live training in Turkey (online or onsite) is designed for developers who want to download, install, and configure Akraino Edge Stack blueprints to manage their edge systems.
Upon completion of this training, participants will be capable of installing, deploying, managing, and supporting end-to-end Akraino Edge Stack solutions to optimize and organize their edge systems, services, and devices.
Certified Kubernetes Administrator (CKA) - exam preparation
21 HoursThe Certified Kubernetes Administrator (CKA) program was established by The Linux Foundation and the Cloud Native Computing Foundation (CNCF).
Kubernetes has now become a leading platform for container orchestration.
NobleProg has been delivering Docker & Kubernetes training since 2015. With more than 360 successfully completed training projects, we have become one of the best-known training companies worldwide in the field of containerization.
Since 2019, we have also been helping our customers confirm their performance in k8s environments by preparing them and encouraging them to pass the CKA and CKAD exams.
This instructor-led, live training (available online or onsite) is aimed at System Administrators and Kubernetes users who wish to confirm their knowledge by passing the CKA exam.
On the other hand, the training is also focused on gaining practical experience in Kubernetes Administration, so we recommend participating in it even if you do not intend to take the CKA exam.
Format of the Course
- Interactive lecture and discussion.
- Abundant exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request customized training for this course, please contact us to arrange.
- To learn more about CKA certification, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-administrator-cka
Certified Kubernetes Application Developer (CKAD) - exam preparation
21 HoursThe Certified Kubernetes Application Developer (CKAD) program is developed by The Linux Foundation and the Cloud Native Computing Foundation (CNCF), the host of Kubernetes.
This instructor-led, live training (online or onsite) is aimed at Developers who wish to confirm their skills in design, build, configure, and expose cloud native applications for Kubernetes.
On the other hand, training is also focused on gaining practical experience in Kubernetes application development, so we recommend taking part in it, even if you don't intend to take CKAD exam.
NobleProg have been delivering Docker & Kubernetes training from 2015. With more than 360 successfully completed training projects, we became one of the best known training company worldwide in field of containerization. Since 2019 we are also helping our customers to confirm their performance in k8s environment by preparing them and encouraging to pass CKA and CKAD exams.
Format of the Course
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
- To learn more about CKAD, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-application-developer-ckad/
Jitsi Meet: Self-Hosted Video Conferencing Replacing Zoom and Microsoft Teams
14 HoursJitsi Meet is a fully encrypted, 100% open-source video conferencing platform that allows you to self-host it on your own servers. It offers HD video, screen sharing, collaborative editing, and live streaming capabilities without the need for accounts and without exposing meeting data to third-party platforms.
This instructor-led, live training (available online or onsite) is designed for intermediate DevOps professionals and system administrators who want to deploy Jitsi Meet as a replacement for Zoom, Microsoft Teams, and Google Meet.
Upon completion of this training, participants will be able to:
- Install and configure Jitsi Meet using Docker or Debian packages.
- Configure Prosody, Jicofo, and Jitsi Videobridge for optimal performance.
- Set up TURN servers to ensure NAT traversal and firewall compatibility.
- Secure meetings with passwords, lobby rooms, and end-to-end encryption.
- Integrate Jitsi with LDAP, SSO, and calendar systems.
Course Format
- Interactive lectures and discussions.
- Numerous exercises and practice sessions.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request customized training for this course, please contact us to arrange.
LEDE: Set Up a Linux Wireless Router
7 HoursThe LEDE Project (Linux Embedded Development Environment) is a Linux-based operating system built upon OpenWrt. It serves as a comprehensive replacement for the default firmware provided by manufacturers across a broad spectrum of wireless routers and non-networking devices.
During this instructor-led live training, participants will acquire the skills needed to configure a LEDE-powered wireless router.
Target Audience
- Network administrators and technicians
Course Format
- A blend of lectures, discussions, exercises, and extensive hands-on practice
Matrix + Element: Decentralized Enterprise Chat to Replace Slack and Teams
14 HoursMatrix is an open protocol designed for secure, decentralized, and real-time communication. Organizations are increasingly adopting Matrix paired with the Element client as a robust alternative to Slack and Microsoft Teams, enabling them to maintain end-to-end encryption, ensure on-premise data residency, and facilitate federation with external trusted partners.
Nessus Manager
28 HoursNessus is a highly versatile vulnerability scanner platform designed for detecting and managing security flaws. Beyond standard vulnerability detection, it also supports baseline auditing, where your system configuration is compared against best-in-class hardening standards.
Through this instructor-led course, we will introduce the solution's core components and various functionalities. Each module within the application will be explained, along with its specific use cases.
By the end of the course, participants will be capable of performing authenticated and unauthenticated vulnerability scans on nearly all IP-based systems. They will learn to analyze scan results to eliminate false positives, prioritize findings based on risk, and recommend compensating controls. This training will empower participants to assess their systems' security posture using Nessus and determine the most effective remediation strategies.
Audience:
- Infrastructure Managers
- System Administrators
- System Auditors
- System Compliance Officers
- Vulnerability Managers
- Cybersecurity Managers
Format:
A blend of lectures, discussions, and hands-on practice.
Network Monitoring Without Vendor Lock-in: LibreNMS and Zabbix
28 HoursThis instructor-led, live training in Turkey (online or onsite) is aimed at network and system administrators who wish to implement enterprise-grade network monitoring using open-source tools without vendor dependencies.
By the end of this training, participants will be able to deploy LibreNMS and Zabbix, monitor network devices, create dashboards and alerts, implement distributed monitoring, and integrate with external systems.
Network Security Administrator
35 HoursTarget Audience:
System Administrators and Network Administrators, as well as any professionals interested in defensive network security technologies.
ONAP for Network Orchestration and Automation
28 HoursIn this instructor-led live training in Turkey (online or onsite), participants will learn how to use ONAP to automate networking services.
By the end of this training, participants will be able to:
- Understand, install and configure the various components in the ONAP ecosystem.
- Carry out real-time, policy-driven orchestration and automation of physical and virtual network functions.
- Design, create, orchestrate, and monitor VNFs, SDNs and other network services.
- Efficiently manage the entire networking lifecycle using a software-driven approach.
- Develop, deploy, and scale a network using the latest open source technologies and practices.
OpenUEM Advanced: Automation, Security & Compliance
14 HoursOpenUEM serves as an open-source endpoint management platform designed to facilitate advanced automation, endpoint hardening, and compliance reporting, thereby securing and streamlining enterprise operations.
This instructor-led live training, available either online or onsite, targets advanced-level IT and security professionals seeking to utilize OpenUEM for automation, security hardening, compliance management, and integration with enterprise monitoring solutions.
Upon completion of this training, participants will be capable of:
- Automating endpoint management activities, including software deployment, updates, and reporting.
- Implementing security hardening policies and ensuring endpoint compliance.
- Integrating OpenUEM with enterprise security and monitoring tools to achieve centralized visibility.
- Producing compliance reports and enforcing regulatory or organizational standards.
Course Format
- Interactive lectures and discussions.
- Hands-on exercises and practical scenarios.
- Lab implementation using real endpoints.
Customization Options
- For tailored training on this course, please reach out to us to make arrangements.
OpenUEM Fundamentals: Endpoint Management Essentials
14 HoursOpenUEM is an open-source unified endpoint management solution that allows organizations to efficiently deploy, configure, and maintain their endpoint devices.
This instructor-led training, available both online and onsite, targets beginner-level IT professionals seeking to build foundational skills in OpenUEM endpoint management. The curriculum covers installation, configuration, and basic device administration.
Upon completion, participants will be able to:
- Install and configure the OpenUEM server and agents across various endpoint platforms.
- Efficiently enroll, organize, and manage endpoints via the OpenUEM console.
- Deploy software, patches, and updates to managed devices.
- Monitor device health, generate reports, and execute basic troubleshooting tasks.
Course Format
- Interactive lectures and discussions.
- Practical exercises and real-world scenarios.
- Hands-on implementation in a lab environment using real endpoints.
Customization Options
- For customized training requests, please contact us to arrange your schedule.
OpenUEM Intermediate: Agent Deployment, Inventory & Policy Management
14 HoursOpenUEM is an open-source endpoint management platform that enables organizations to efficiently deploy agents, maintain precise device inventories, and enforce endpoint policies.
This instructor-led live training, available online or onsite, targets intermediate IT professionals seeking to develop practical expertise in deploying agents, managing inventories, and implementing policies across endpoint devices using OpenUEM.
Upon completion of this training, participants will be able to:
- Deploy OpenUEM agents effectively across various endpoint platforms.
- Maintain and manage accurate asset inventories for all managed devices.
- Create, assign, and enforce policies to ensure compliance and security.
- Distribute software, updates, and patches to endpoints efficiently.
Course Format
- Interactive lectures and discussions.
- Hands-on exercises and practice scenarios.
- Implementation in a lab environment with real endpoints.
Customization Options
- To request a customized training for this course, please contact us to arrange.
OpenStack and NFV (with OVN and OpenFlow)
21 HoursThis course delivers in-depth training on OpenStack networking. It begins with an overview of OpenStack and its architecture, then explores core OpenStack projects—Identity service (Keystone), Image service (Glance), Compute service (Nova), and Block storage (Cinder)—to contextualize the network environment within OpenStack, with a primary focus on the Networking project (Neutron). The curriculum covers virtual network infrastructure based on the Open Virtual Network (OVN) project, utilizing Open vSwitch and OpenFlow. The objective is to help participants understand the fundamental operations and architecture of OpenStack while gaining familiarity with the various networking technologies underpinning it, including detailed insights into OVN, underlying flows, resources, and tools.
Customization options
The training can be condensed into a 2-day session focusing on the core aspects most relevant to the customer. Alternatively, it can be expanded to cover administrative, design, networking, and/or troubleshooting topics related to OpenStack deployments. Other underlying SDN solutions, such as Linux Bridge or OvS, can also be included in the discussion.
Synapse and Element: Self-Hosted Chat Replacing Slack and Microsoft Teams
14 HoursSynapse serves as the reference homeserver implementation for the Matrix protocol, enabling decentralized, end-to-end encrypted messaging. This instructor-led live training (available online or onsite) is designed for intermediate DevOps engineers and system administrators who wish to utilize Synapse and Element to replace cloud chat platforms with a self-hosted, federated messaging infrastructure.