Software-Defined Wide Area Network (SD-WAN) Management and Operation Training Course
Software-Defined Wide Area Network (SD-WAN) represents a contemporary approach to managing and optimizing Wide Area Networks (WANs), which link various parts of an organization's infrastructure—such as branch offices, data centers, and cloud services—across extensive geographical distances.
This instructor-led, live training (available online or onsite) targets intermediate-level network professionals seeking to effectively manage and operate SD-WAN networks, covering design, configuration, troubleshooting, and optimization.
Upon completing this training, participants will be able to:
- Grasp the core concepts, advantages, and challenges associated with SD-WAN technologies.
- Design an SD-WAN architecture tailored to organizational requirements and deploy SD-WAN solutions effectively.
- Implement and manage security features within an SD-WAN environment.
- Monitor, manage, and troubleshoot SD-WAN setups.
Course Format
- Interactive lectures and discussions.
- Extensive exercises and practice sessions.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request customized training for this course, please contact us to arrange.
Course Outline
Introduction to SD-WAN
- Evolution of WAN
- SD-WAN concepts and benefits
- SD-WAN architecture and components
Planning and Designing an SD-WAN Network
- Assessing network requirements
- Design considerations and best practices
- Migration strategies from legacy WAN to SD-WAN
SD-WAN Technology Deep Dive
- Underlay and overlay networks
- SD-WAN edge devices configuration
- Controller and management platform setup
Managing and Operating SD-WAN
- Traffic management and application steering
- Monitoring tools and analytics
- Implementing security and QoS policies
Troubleshooting and Optimization
- Common SD-WAN issues and resolutions
- Network performance optimization techniques
- Advanced troubleshooting tools
Summary and Next Steps
Requirements
- Basic understanding of networking concepts
- Familiarity with WAN technologies
Audience
- Network engineers
- Network administrators
- IT managers
Open Training Courses require 5+ participants.
Software-Defined Wide Area Network (SD-WAN) Management and Operation Training Course - Booking
Software-Defined Wide Area Network (SD-WAN) Management and Operation Training Course - Enquiry
Software-Defined Wide Area Network (SD-WAN) Management and Operation - Consultancy Enquiry
Testimonials (2)
How trainer deliver knowledge so effectively
Vu Thoai Le - Reply Polska sp. z o. o.
Course - Certified Kubernetes Administrator (CKA) - exam preparation
Interesting labs, help from trainer
Alexey - Tink Poland sp. z o. o.
Course - Certified Kubernetes Application Developer (CKAD) - exam preparation
Upcoming Courses
Related Courses
Akraino
14 HoursThis instructor-led, live training in Taiwan (online or onsite) is designed for programmers who want to download, install, and configure Akraino Edge Stack blueprints to manage their edge systems.
By the end of this training, participants will be able to install, deploy, manage, and support end-to-end Akraino Edge Stack solutions to improve and organize their edge systems, services, and devices.
Certified Kubernetes Administrator (CKA) - exam preparation
21 HoursThe Certified Kubernetes Administrator (CKA) program was established by The Linux Foundation and the Cloud Native Computing Foundation (CNCF).
Kubernetes has emerged as a leading platform for container orchestration.
NobleProg has been delivering Docker & Kubernetes training since 2015. With over 360 successfully completed training projects, we have become one of the most renowned training providers globally in the field of containerization.
Since 2019, we have also been assisting our customers in validating their performance in k8s environments by preparing them for and encouraging them to pass the CKA and CKAD exams.
This instructor-led, live training (available online or onsite) is designed for System Administrators and Kubernetes users who wish to validate their knowledge by passing the CKA exam.
Additionally, the training focuses on gaining practical experience in Kubernetes Administration, so we recommend participating even if you do not intend to take the CKA exam.
Course Format
- Interactive lecture and discussion.
- Extensive exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request customized training for this course, please contact us to arrange.
- To learn more about CKA certification, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-administrator-cka
Certified Kubernetes Application Developer (CKAD) - exam preparation
21 HoursThe Certified Kubernetes Application Developer (CKAD) credential was established by The Linux Foundation and the Cloud Native Computing Foundation (CNCF), the governing body for Kubernetes.
This instructor-led live training (available online or onsite) is designed for developers who want to validate their ability to design, build, configure, and expose cloud-native applications on Kubernetes.
Additionally, the training emphasizes practical experience in Kubernetes application development, so we highly recommend attending even if you do not plan to take the CKAD exam.
NobleProg has been providing Docker and Kubernetes training since 2015. With over 360 successfully completed training projects, we have become one of the most recognized training providers globally in the field of containerization. Since 2019, we have also helped our customers validate their performance in Kubernetes environments by preparing and encouraging them to pass the CKA and CKAD exams.
Course Format
- Interactive lectures and discussions.
- Extensive exercises and practice.
- Hands-on implementation in a live laboratory environment.
Course Customization Options
- To request customized training for this course, please contact us to arrange.
- To learn more about CKAD, please visit: https://training.linuxfoundation.org/certification/certified-kubernetes-application-developer-ckad/
Jitsi Meet: Self-Hosted Video Conferencing Replacing Zoom and Microsoft Teams
14 HoursJitsi Meet is a fully encrypted, 100% open-source video conferencing solution that you can self-host on your own servers. It supports HD video, screen sharing, collaborative editing, and live streaming without requiring accounts or exposing meeting data to third-party platforms.
This instructor-led, live training (online or onsite) is aimed at intermediate DevOps and system administrators who wish to deploy Jitsi Meet as a replacement for Zoom, Microsoft Teams, and Google Meet.
By the end of this training, participants will be able to:
- Install and configure Jitsi Meet using Docker or Debian packages.
- Configure Prosody, Jicofo, and Jitsi Videobridge for optimal performance.
- Set up TURN servers for NAT traversal and firewall compatibility.
- Secure meetings with passwords, lobby rooms, and end-to-end encryption.
- Integrate Jitsi with LDAP, SSO, and calendar systems.
Course Format
- Interactive lecture and discussion.
- Lots of exercises and practice.
- Hands-on implementation in a live-lab environment.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
LEDE: Set Up a Linux Wireless Router
7 HoursThe LEDE Project (Linux Embedded Development Environment) is a Linux operating system based on OpenWrt. It serves as a comprehensive alternative to the proprietary firmware provided by manufacturers for a broad spectrum of wireless routers and network-related devices.
In this instructor-led live training, participants will learn how to set up a LEDE-based wireless router.
Audience
- Network administrators and technicians
Format of the course
- A blend of lectures, discussions, exercises, and extensive hands-on practice
Matrix + Element: Decentralized Enterprise Chat to Replace Slack and Teams
14 HoursMatrix is an open protocol designed for secure, decentralized, and real-time communication. Organizations are increasingly choosing Matrix paired with the Element client as a viable alternative to Slack and Microsoft Teams. This allows them to preserve end-to-end encryption, maintain on-premise data residency, and enable federation with external trusted partners.
Nessus Manager
28 HoursTenable Nessus is a highly versatile platform for detecting and managing vulnerabilities. Its capabilities extend far beyond simple vulnerability detection; it also supports baseline auditing. In this context, your system configuration is compared against established hardening best practices.
In this instructor-led course, we will introduce the solution's components and its various functionalities. Each module within the application will be explained, along with its specific use cases.
Upon completing the course, participants will be able to perform authenticated and unauthenticated vulnerability scans on nearly all IP-based systems. You will learn to analyze scan results to eliminate false positives, prioritize findings based on risk, and recommend compensating controls. This training will enable participants to assess their systems' security posture using Nessus and determine the most effective remediation strategies.
Audience:
- Infrastructure managers
- System administrators
- System auditors
- System compliance officers
- Vulnerability managers
- Cybersecurity managers
Format:
A blend of lectures, discussions, and hands-on practice
Network Monitoring Without Vendor Lock-in: LibreNMS and Zabbix
28 HoursThis instructor-led, live training in Taiwan (online or onsite) is aimed at network and system administrators who wish to implement enterprise-grade network monitoring using open-source tools without vendor dependencies.
By the end of this training, participants will be able to deploy LibreNMS and Zabbix, monitor network devices, create dashboards and alerts, implement distributed monitoring, and integrate with external systems.
Network Security Administrator
35 HoursAudience:
System Administrators, Network Administrators, and individuals interested in defensive network security technologies.
ONAP for Network Orchestration and Automation
28 HoursIn this instructor-led, live training in Taiwan (online or on-site), participants will learn how to use ONAP to automate networking services.
Upon completion of this training, participants will be able to:
- Understand, install, and configure the various components within the ONAP ecosystem.
- Perform real-time, policy-driven orchestration and automation of physical and virtual network functions.
- Design, create, orchestrate, and monitor VNFs, SDNs, and other network services.
- Efficiently manage the entire networking lifecycle using a software-driven approach.
- Develop, deploy, and scale networks using the latest open-source technologies and best practices.
OpenUEM Advanced: Automation, Security & Compliance
14 HoursOpenUEM is an open-source endpoint management platform that enables advanced automation, endpoint hardening, and compliance reporting to secure and streamline enterprise operations.
This instructor-led, live training (online or onsite) is aimed at advanced-level IT and security professionals who wish to leverage OpenUEM for automation, security hardening, compliance management, and integration with enterprise monitoring tools.
By the end of this training, participants will be able to:
- Automate endpoint management tasks including software deployment, updates, and reporting.
- Apply security hardening policies and ensure endpoint compliance.
- Integrate OpenUEM with enterprise security and monitoring tools for centralized visibility.
- Generate compliance reports and enforce regulatory or organizational standards.
Format of the Course
- Interactive lecture and discussion.
- Hands-on exercises and practice scenarios.
- Implementation in a lab environment with real endpoints.
Course Customization Options
- To request a customized training for this course, please contact us to arrange.
OpenUEM Fundamentals: Endpoint Management Essentials
14 HoursOpenUEM is an open-source unified endpoint management platform that empowers organizations to efficiently deploy, configure, and maintain their endpoint devices.
This instructor-led live training, available both online and onsite, is designed for beginner-level IT professionals seeking to build foundational skills in endpoint management using OpenUEM. The curriculum covers essential topics such as installation, configuration, and fundamental device management.
Upon completing this training, participants will be able to:
- Install and configure the OpenUEM server and agents across various endpoint platforms.
- Efficiently enroll, organize, and manage endpoints via the OpenUEM console.
- Deploy software, patches, and updates to managed devices.
- Monitor device health, generate reports, and execute basic troubleshooting tasks.
Course Format
- Interactive lectures and discussions.
- Hands-on exercises and practical scenarios.
- Implementation in a lab environment utilizing real endpoints.
Customization Options
- For customized training arrangements, please contact us.
OpenUEM Intermediate: Agent Deployment, Inventory & Policy Management
14 HoursOpenUEM is an open-source endpoint management platform that enables organizations to efficiently deploy agents, maintain precise device inventories, and enforce endpoint policies.
This instructor-led live training (available online or onsite) is designed for intermediate IT professionals seeking to acquire practical skills in deploying agents, managing inventories, and implementing policies across endpoint devices using OpenUEM.
Upon completing this training, participants will be able to:
- Efficiently deploy OpenUEM agents across multiple endpoint platforms.
- Maintain and manage accurate asset inventories for all managed devices.
- Create, assign, and enforce policies to ensure compliance and security.
- Effectively distribute software, updates, and patches to endpoints.
Course Format
- Interactive lectures and discussions.
- Hands-on exercises and practice scenarios.
- Implementation within a lab environment utilizing real endpoints.
Course Customization Options
- To request customized training for this course, please contact us to make arrangements.
OpenStack and NFV (with OVN and OpenFlow)
21 HoursThis course offers comprehensive training on OpenStack networking. It begins by introducing OpenStack and its architecture, then clarifies core OpenStack projects such as the Identity service (Keystone), Image service (Glance), Compute service (Nova), and Block storage (Cinder) to describe the network environment in OpenStack, with a primary focus on the Networking project (Neutron). The course describes virtual network infrastructure based on the Open Virtual Network project, Open vSwitch, and OpenFlow. The goal of the course is to understand basic operations and architecture of OpenStack as well as to familiarize participants with various networking technologies behind OpenStack, extending information about OVN and underlying flows, resources and tools.
Customization options
The training can be contracted to 2 days, focusing on core aspects relevant for the customer. The training can be also extended regarding administrative, design, networking and/or troubleshooting topics concerning OpenStack deployments. It is possible to describe other underlying SDN solutions like Linux Bridge or OvS.
Synapse and Element: Self-Hosted Chat Replacing Slack and Microsoft Teams
14 HoursSynapse is the reference homeserver implementation for the Matrix protocol, enabling decentralized, end-to-end encrypted messaging. This instructor-led, live training (online or onsite) targets intermediate DevOps engineers and system administrators who wish to use Synapse and Element to replace cloud chat platforms with a self-hosted, federated messaging infrastructure.