-
Despite the complexity of network technology, there is a clear trend: As much as possible is being done with Ethernet and IP. This is particularly pronounced in the next generation networks of providers, but the same trend can also be observed in enterprise networks. This course shows current approaches without going into too much detail. After attending the course, you will understand the architecture and functionality of networks and will have gained an initial insight into Ethernet and IP.
-
Course Contents
-
- Basic concepts of network technology
- Switching and transmission
- Packets and protocols
- The architecture of LANs
- Ethernet and wireless LAN (WLAN)
- Routers and switches
- WAN connections
- IP addresses, domain names and IP routing
- Providers and the Internet
- VPNs
- Voice and video over IP
- Client/server applications
- Next generation networks
The detailed digital documentation package, consisting of an e-book and PDF, is included in the price of the course.
Premium Course Documents
In addition to the digital documentation package, the exclusive Premium Print Package is also available to you.
- High-quality color prints of the ExperTeach documentation
- Exclusive folder in an elegant design
- Document pouch in backpack shape
- Elegant LAMY ballpoint pen
- Practical notepad
The Premium Print Package can be added during the ordering process for € 150,- plus VAT (only for classroom participation). -
Target Group
-
This is the right place for anyone looking for an introduction to modern network technology without too much technical baggage.
-
Knowledge Prerequisites
-
Special prior knowledge is not required to successfully complete the course. What is important is an interest in the subject matter and a willingness to engage conceptually with technical content.
-
Alternatives
-
If you are looking for a technical overview of the network world, we recommend the course Network Technologies - Everything you need to know at a glance!
1 | Communication with IP—Three Examples |
1.1 | Access to a Website |
1.1.1 | World Wide Web—Information from All over the World |
1.1.2 | Fragment by Fragment: Communication Acknowledgment |
1.1.3 | Data Switching with Routers |
1.1.4 | IPv6 |
1.1.5 | Domain Name System: Who has the information? |
1.1.6 | First Choice in a LAN: Ethernet |
1.1.7 | Wireless LAN |
1.2 | Telephony: Voice over IP |
1.2.1 | Everything Digital |
1.2.2 | Encapsulation into Packets |
1.2.3 | Packet-switched Telephony |
1.2.4 | A Phone Call |
1.3 | Internet of Things (IoT): Definition |
1.3.1 | Chances and Challenges |
1.3.2 | Fields of Application |
1.3.3 | Example: Smart City |
2 | Internet-based Solutions |
2.1 | Internet Access |
2.1.1 | Access Technologies—DSL |
2.1.2 | Network Registration |
2.1.3 | Private IP Addresses |
2.1.4 | Cable Networks |
2.1.5 | Cellular Mobile Communications: from 1G to 5G |
2.2 | Internet Service Providers (ISP) |
2.2.1 | Regional and Global ISPs |
2.2.2 | Access Provider |
2.2.3 | The Network of an ISP |
2.2.4 | Exchanges |
2.2.5 | Top Level Domains |
3 | Real-time-based Solutions |
3.1 | VoIP—Voice Networks in Times of Change |
3.1.1 | Enterprise |
3.1.2 | Provider |
3.1.3 | VoIP Architecture |
3.1.4 | Real Time Services |
3.1.5 | Who knows the right phone number? |
3.1.6 | SIP Trunk |
3.1.7 | Cloud PBX |
3.2 | Video over IP |
3.2.1 | Private Customers—TV |
3.2.2 | Conferences |
4 | Solutions in Local Area Networks |
4.1 | Infrastructure |
4.1.1 | Workstations |
4.1.2 | Servers & Bulk Storage |
4.1.3 | Cabling |
4.1.4 | Network Design with Ethernet |
4.2 | Cyber Security—Typology of the Attackers |
4.2.1 | Viruses, Worms, and Trojan Horses |
4.2.2 | Firewall, Next Generation Firewall |
4.2.3 | Proxy Server |
4.2.4 | Intrusion Detection and Prevention |
4.2.5 | DMZ |
4.3 | Virtualization |
4.3.1 | Server Virtualization |
4.3.2 | Cloud Computing Service Models |
5 | Solutions for Site Interconnection |
5.1 | Interconnection of Company Sites |
5.1.1 | Demands Made on VPNs |
5.1.2 | Point-to-Point or Any-to-Any |
5.2 | MPLS VPNs |
5.2.1 | The VPN Access |
5.2.2 | Protection against Attacks |
5.2.3 | Quality of Service |
5.3 | IPsec VPNs and SSL VPNs |
5.3.1 | IPsec VPNs |
5.3.2 | TLS VPNs |
5.4 | Carrier Ethernet Services |
5.4.1 | Any-to-Any VPN: The E-LAN |
5.4.2 | Point-to-Point VPN: E-Line |
5.4.3 | Quality of Service |
5.5 | Software-defined WAN |
5.6 | Comparison of Technologies |
A | List of Abbreviations |
-
Classroom training
- Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!
-
Hybrid training
- Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.
-
Online training
- You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.
-
Tailor-made courses
-
You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.

-
Despite the complexity of network technology, there is a clear trend: As much as possible is being done with Ethernet and IP. This is particularly pronounced in the next generation networks of providers, but the same trend can also be observed in enterprise networks. This course shows current approaches without going into too much detail. After attending the course, you will understand the architecture and functionality of networks and will have gained an initial insight into Ethernet and IP.
-
Course Contents
-
- Basic concepts of network technology
- Switching and transmission
- Packets and protocols
- The architecture of LANs
- Ethernet and wireless LAN (WLAN)
- Routers and switches
- WAN connections
- IP addresses, domain names and IP routing
- Providers and the Internet
- VPNs
- Voice and video over IP
- Client/server applications
- Next generation networks
The detailed digital documentation package, consisting of an e-book and PDF, is included in the price of the course.
Premium Course Documents
In addition to the digital documentation package, the exclusive Premium Print Package is also available to you.
- High-quality color prints of the ExperTeach documentation
- Exclusive folder in an elegant design
- Document pouch in backpack shape
- Elegant LAMY ballpoint pen
- Practical notepad
The Premium Print Package can be added during the ordering process for € 150,- plus VAT (only for classroom participation). -
Target Group
-
This is the right place for anyone looking for an introduction to modern network technology without too much technical baggage.
-
Knowledge Prerequisites
-
Special prior knowledge is not required to successfully complete the course. What is important is an interest in the subject matter and a willingness to engage conceptually with technical content.
-
Alternatives
-
If you are looking for a technical overview of the network world, we recommend the course Network Technologies - Everything you need to know at a glance!
1 | Communication with IP—Three Examples |
1.1 | Access to a Website |
1.1.1 | World Wide Web—Information from All over the World |
1.1.2 | Fragment by Fragment: Communication Acknowledgment |
1.1.3 | Data Switching with Routers |
1.1.4 | IPv6 |
1.1.5 | Domain Name System: Who has the information? |
1.1.6 | First Choice in a LAN: Ethernet |
1.1.7 | Wireless LAN |
1.2 | Telephony: Voice over IP |
1.2.1 | Everything Digital |
1.2.2 | Encapsulation into Packets |
1.2.3 | Packet-switched Telephony |
1.2.4 | A Phone Call |
1.3 | Internet of Things (IoT): Definition |
1.3.1 | Chances and Challenges |
1.3.2 | Fields of Application |
1.3.3 | Example: Smart City |
2 | Internet-based Solutions |
2.1 | Internet Access |
2.1.1 | Access Technologies—DSL |
2.1.2 | Network Registration |
2.1.3 | Private IP Addresses |
2.1.4 | Cable Networks |
2.1.5 | Cellular Mobile Communications: from 1G to 5G |
2.2 | Internet Service Providers (ISP) |
2.2.1 | Regional and Global ISPs |
2.2.2 | Access Provider |
2.2.3 | The Network of an ISP |
2.2.4 | Exchanges |
2.2.5 | Top Level Domains |
3 | Real-time-based Solutions |
3.1 | VoIP—Voice Networks in Times of Change |
3.1.1 | Enterprise |
3.1.2 | Provider |
3.1.3 | VoIP Architecture |
3.1.4 | Real Time Services |
3.1.5 | Who knows the right phone number? |
3.1.6 | SIP Trunk |
3.1.7 | Cloud PBX |
3.2 | Video over IP |
3.2.1 | Private Customers—TV |
3.2.2 | Conferences |
4 | Solutions in Local Area Networks |
4.1 | Infrastructure |
4.1.1 | Workstations |
4.1.2 | Servers & Bulk Storage |
4.1.3 | Cabling |
4.1.4 | Network Design with Ethernet |
4.2 | Cyber Security—Typology of the Attackers |
4.2.1 | Viruses, Worms, and Trojan Horses |
4.2.2 | Firewall, Next Generation Firewall |
4.2.3 | Proxy Server |
4.2.4 | Intrusion Detection and Prevention |
4.2.5 | DMZ |
4.3 | Virtualization |
4.3.1 | Server Virtualization |
4.3.2 | Cloud Computing Service Models |
5 | Solutions for Site Interconnection |
5.1 | Interconnection of Company Sites |
5.1.1 | Demands Made on VPNs |
5.1.2 | Point-to-Point or Any-to-Any |
5.2 | MPLS VPNs |
5.2.1 | The VPN Access |
5.2.2 | Protection against Attacks |
5.2.3 | Quality of Service |
5.3 | IPsec VPNs and SSL VPNs |
5.3.1 | IPsec VPNs |
5.3.2 | TLS VPNs |
5.4 | Carrier Ethernet Services |
5.4.1 | Any-to-Any VPN: The E-LAN |
5.4.2 | Point-to-Point VPN: E-Line |
5.4.3 | Quality of Service |
5.5 | Software-defined WAN |
5.6 | Comparison of Technologies |
A | List of Abbreviations |
-
Classroom training
- Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!
-
Hybrid training
- Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.
-
Online training
- You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.
-
Tailor-made courses
-
You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
