If you have a training need, we can meet it! Westcon Comstor Academy offers a wide range of vendor training options for individuals and partners. With our unparalleled range of technical programmes, we will help you expand your capabilities and keep you ahead of the competition. If you're new to certification, we understand that the various vendors and tracks can be overwhelming. We can help you choose a training path that best fits your interest, needs and goals, so if you're not sure what you need please contact us for further information or training advice.

Please click on the Individual Certification pages to see the list of training courses associated with your chosen track.

Refine Search

Courses

The Blue Coat Certified PacketShaper Professional (BCPSP) course is intended for IT professionals who wish to develop and master the skills to properly install, operate and configure PacketShaper
In the Blue Coat Certified Proxy Administrator (BCCPA) course intended for students who wish to master the fundamentals of Blue Coat ProxySG.
In the Blue Coat Certified Proxy Professional (BCCPP) course, you will learn to configure your Blue Coat Proxy appliance for high availability and multi-site deployments and advance policy features.
The Blue Coat Certified WAN Acceleration Administrator (BCWAA) Course is intended for students who want to use new ProxySG features enabling application acceleration.
The Blue Coat SSL Visibility Appliance course is intended for students who wish to learn about configuring and managing the SSL Visibility Appliance.
Students will learn methods to properly configure, deploy, manage and troubleshoot their Extreme Networks switching and routing environments using the Extreme Networks operating systems (XOS) CLI.
The Deploying Cisco Service Provider Network Routing (SPROUTE) v1.2 course is designed to helpstudents prepare for the Cisco CCNP SP certification. The SPROUTE course is a component of the CCNP SP curriculum.The SPROUTE course is designed to provide service provider professionals with information on the use of advanced routing in implementing scalability for Cisco routers that are connected to LANs and WANs. The goal is to train professionals to dramatically increase the number of routers and sites using these techniques instead of redesigning the network when additional sites or wiring configurations are added. The SPROUTE training reinforces the instruction by providing students with hands-on labs to ensure that they thoroughly understand how to implement advanced routing within their networks.The course also includes classroom activities with remote labs that are useful to gain practical skills on deploying Cisco IOS, IOS XE, and IOS XR features to operate and support the service provider network.
This course will enable students to perform the conceptual, intermediate and details design of a network infrastructure that supports desired network solutions over intelligent network services, to achieve effective performance, scalability and availability. ARCH enables students, applying solid Cisco network solution models and recommended design practices, to provide viable, stable Enterprise internetworking solutions. The course presents concepts and examples necessary to design converged enterprise networks. New in version 3.0 is the addition of content addressing software defined networks (SDN). It is recommended that the students only attend this course after they mastered DESGN v3.0 topics and have passed DESGN 200-301 exam.
In addition to general approaches and technologies for network design, this course promotes Cisco solutions in designing and implementing scalable internetworks.
Students will be introduced to Network Management and Visibility using the Extreme Networks Management tool, Extreme Management Center, for managing network devices. Using the Open Systems Interconnection (OSI) Network Management Model (NMM), students have these concepts reinforced with a hands-on lab experience working with a pre-configured network. Students will perform real world tasks around the areas of configuration, fault, performance, accounting, and security management functions.
Students will learn methods to properly configure and manage their Extreme Wireless WLAN environments using network management software (Extreme Management Center and the Wireless Assistant) applications. This knowledge will be reinforced through actual hands-on experience with wireless equipment in a lab environment, where students will perform real world tasks configuring access points, security parameters, filtering and privacy settings, as well managing their wireless network.
Students will learn methods to properly configure and manage their ExtremeWireless WiNG WLAN environments using the online Web Interface. This knowledge will be reinforced through hands-on experience with wireless equipment in a lab environment, where students will perform real world tasks configuring access points, security parameters, filtering and privacy settings, as well managing their wireless network.
The ExtremeEOS Fundamentals training course provides Extreme Networks® customers and partners with instructor-led lectures and extensive hands-on laboratory exercises using the ExtremeEOS Switches. This course presents the concepts, skills and tools required to deploy the Extreme Networks products in the most common situations for Layer 2 and Layer 3 networks.
The ExtremeXOS Fundamentals training course provides Extreme Networks® customers and partners with instructor-led lectures and extensive hands-on laboratory exercises using the Extreme Networks operating system EXOS. This course presents the concepts, skills and tools required to deploy the Extreme Networks products in the most common situations for Layer 2 and Layer 3 networks.
v13.1 Course Topics- Getting started with the BIG-IP system- Traffic processing with BIG-IP Local Traffic Manager (LTM)- Using the TMSH (TMOS Shell) command line interface- Using NATs and SNATs- Monitoring application health and managing object status- Modifying traffic behavior with profiles, including SSL offload and re-encryption- Modifying traffic behavior with persistence, including source address affinity and cookie persistence- Troubleshooting the BIG-IP system, including logging (local, high-speed, and legacy remote logging), and using tcpdump- User roles and administrative partitions- vCMP concepts- Customizing application delivery with iRules