Nectar Network Knowledge

IP Technologies Training
  • Home
  • About
  • Course Information
  • Resources
Home Course Information

Courses

Course Information

PDF Print E-mail

IT Courses can be designed to suit your needs, click the eMail link above for more information.  Here are the outlines of some of the courses that have been designed for customers:

 

Designing & Implementing Voice-Enabled IP Networks

PDF Print E-mail

As PABX vendors implement the latest and greatest VoIP strategies in their PABX systems, an unfortunate design problem often occurs because the phone system is implemented on top of an existing data network system designed for PC and server use, but not for IP phone use.

The Designing & Implementing a Voice-Enabled IP Network course has been designed with three primary goals:

 

  1. To equip businesses with the necessary network knowledge to plan for and implement current or future VoIP deployment.
  2. To inform the student of the various VoIP networking standards currently used in the industry
  3. To present a selection of implementation strategies suitable for VoIP implementation.

Read more...

 

Troubleshooting TCP/IP

PDF Print E-mail

Students who attend this course will be able to:

• Run diagnostic analysis test on networks using the Wireshark Network Analyser

• Find design faults in small switched and routed networks

• Identify Security zones within a small-medium sized network

• Diagnose security weaknesses in small networks using security tools such as NMAP and ZENMAP

• Design a small network for maximum security

Read more...

 

Designing & Implementing Secure Networks

PDF Print E-mail

A five day workshop course designed to give engineers and IT administrators the hands-on experience necessary to design secure networks using devices such as firewalls, Intrusion Detection/Prevention Systems (IDS/IPS), email filters and Virtual Private Networks (VPNs).  Beyond the design aspect, students will build and configure secure networks using VLANs to create security zones and Firewall hardware to both secure network access and to terminate Virtual Private Networks (VPNs).  Basic traffic handling theory is covered, as is the security concepts required to understand the operation of VPNs.

Read more...

 



  • Forgot your password?
  • Forgot your username?

Copyright © 2009 ---.
All Rights Reserved.

Template by Joomla Templates | by Tecko Gecko Small Business Websites | Web Design Brisbane.