Computer networking is evolving at lightning speed and our instructors are continuing to develop content just as fast as the industry changes. INE Networking experts Keith Bogart, Rohit Pardasani and Piotr Kaluzny have produced new material for students interested in filtering techniques, route redistribution, border gateway patrol, switching security and more.
With INE, you’re in charge of your own training schedule and can access these in-depth trainings on-demand. Once you’ve mastered the material, you can test your knowledge with training exercises and quizzes designed to reinforce what you’ve learned.
IGP Routing Control with Filtering & Redistribution - As IP networks continue to grow and routing protocols are tasked with maintaining more and more routing entries, there sometimes comes a need to implement route filtering. This course will introduce you to why IGP route filtering is needed in modern networks and then proceed to show you filtering techniques protocol-by-protocol. You'll compare and contrast examples of how to filter RIP, EIGRP, OSPF and IS-IS routes on both Cisco and Juniper platforms as well as have the opportunity to do the labs yourself. In addition to route filtering, larger networks often have a need to redistribute routes from one IGP into another. The course will explain the concept of route redistribution as well as limitations you may encounter in various protocols. You will also be given the opportunity to follow along with the instructor as he shows you how to redistribute routes into RIP, EIGRP, OSPF and IS-IS.
Fundamentals of Implementing, Optimizing, and Scaling Border Gateway Protocol - This course covers understanding, optimizing and configuring BGP. In this course, you will learn to build EBGP/IBGP neighborship and how route-reflectors work on different platforms like Cisco and Juniper. Students who want to deepen their understanding of BGP and learn the basics of BGP will benefit from this course.
Switching Security - Layer 2 of the OSI model provides the functional and procedural means to transfer data between network entities with interoperability and interconnectivity to other layers. This makes it one of the most critical components in the network communication chain that presents its own security challenges. This course explains many vulnerabilities related to Ethernet switching and examines the integrated L2 security features available on Cisco & Juniper switches.
Ready to get started with INE's on-demand Networking training? Instantly access these courses and thousands of others in Networking, Cyber Security, Data Science and Cloud technologies with a subscription from INE.