Course Code: 100837
Want to advance your career? Learn the foundational knowledge & skills necessary to install, configure, and operate a small to medium-sized Cisco network.
Learn the commands, settings and products you need to set up a RADIUS server for authentication, authorization and accounting services.
Discover the prospects of Network Functions Virtualization (NFV) as it evolves from a hardware-centric approach to a software-driven model. This paper also examines the future market implications and how NFV can help organizations to achieve their goals.
Course Code: 821655
The five-day instructor-led Hands-on Meraki Full Stack MX SDWAN/Security, Meraki MS, and Catalyst Switches, Meraki Access Points, Meraki Smart Camera, Meraki Sensors, and Meraki Systems Manager. Students learn how to deploy, manage, and secure a network infrastructur...
Course Code: 3603
In the Enterprise Wi-Fi Administration course, gain a full understanding of how radio frequency affects networking so you can perform site surveys, design a high-performance network, and protect both users and sensitive data from potential intruders. Enroll in CWNA training at Global Knowledge.
Examine the OSI model, the features assigned to each layer, and examples of common protocols or technologies associated with the OSI layers.
Examine addressing classifications for IPV6 in detail and outline their functions within the context of the protocol.
The move from IPv4 to IPv6 will take a number of years to complete, and network engineering professionals already proficient in the use of IPv6, as well as the available coexistence mechanisms, will undoubtedly stay in high demand throughout this process.
See how Session Initiation Protocol (SIP), an internet signaling protocol, is used in the converged Unified Communications environment.
The ability to interpret and understand IP addresses and subnet masks is critical for an IT professional. This skill is the foundation for troubleshooting numerous problems, from the assignment of an IP address to a host to routing problems to access-control list problems. It is also necessary for designing and configuring efficient IP networks.