If you have a training need, we can meet it! Westcon Comstor Academy offers a wide range of vendor training options for individuals and partners. With our unparalleled range of technical programmes, we will help you expand your capabilities and keep you ahead of the competition. If you're new to certification, we understand that the various vendors and tracks can be overwhelming. We can help you choose a training path that best fits your interest, needs and goals, so if you're not sure what you need please contact us for further information or training advice.

Please click on the Individual Certification pages to see the list of training courses associated with your chosen track.

Refine Search

Courses

Learn about hackers and cyber defense strategies required in today's critical infrastructure. EC-Council has reviewed the entire CND space as designated by the Department of Defense as IAT I, II, III and IAM I, II, III as well as the NICE Framework KSA’s as they relate to cyber defense and day-to-day cyber operations. With each of these considered, they built their exam blueprint, overall training scope, and got to work building the next certification we believe will be a game changer for cyber security professionals – Certified Network Defender. The class is a professional level introduction to the cyber defense strategies needed in today's critical infrastructure. This course includes one exam voucher for the CND - Certified Network Defender exam (312-38).
The ECSA Program is a 5-day complete hands-on training program. This Penetration Testing training course uses real-time scenarios to train students in penetration testing methodologies.
Students will be introduced to Network Management and Visibility using the Extreme Networks Management tool, Extreme Management Center, for managing network devices. Using the Open Systems Interconnection (OSI) Network Management Model (NMM), students have these concepts reinforced with a hands-on lab experience working with a pre-configured network. Students will perform real world tasks around the areas of configuration, fault, performance, accounting, and security management functions.
Students will learn methods to properly configure and manage their Extreme Wireless WLAN environments using network management software (Extreme Management Center and the Wireless Assistant) applications. This knowledge will be reinforced through actual hands-on experience with wireless equipment in a lab environment, where students will perform real world tasks configuring access points, security parameters, filtering and privacy settings, as well managing their wireless network.
Students will learn methods to properly configure and manage their ExtremeWireless WiNG WLAN environments using the online Web Interface. This knowledge will be reinforced through hands-on experience with wireless equipment in a lab environment, where students will perform real world tasks configuring access points, security parameters, filtering and privacy settings, as well managing their wireless network.
The ExtremeEOS Fundamentals training course provides Extreme Networks® customers and partners with instructor-led lectures and extensive hands-on laboratory exercises using the ExtremeEOS Switches. This course presents the concepts, skills and tools required to deploy the Extreme Networks products in the most common situations for Layer 2 and Layer 3 networks.
The ExtremeXOS Fundamentals training course provides Extreme Networks® customers and partners with instructor-led lectures and extensive hands-on laboratory exercises using the Extreme Networks operating system EXOS. This course presents the concepts, skills and tools required to deploy the Extreme Networks products in the most common situations for Layer 2 and Layer 3 networks.
v13.1 Course Topics- Getting started with the BIG-IP system- Traffic processing with BIG-IP Local Traffic Manager (LTM)- Using the TMSH (TMOS Shell) command line interface- Using NATs and SNATs- Monitoring application health and managing object status- Modifying traffic behavior with profiles, including SSL offload and re-encryption- Modifying traffic behavior with persistence, including source address affinity and cookie persistence- Troubleshooting the BIG-IP system, including logging (local, high-speed, and legacy remote logging), and using tcpdump- User roles and administrative partitions- vCMP concepts- Customizing application delivery with iRules
This course gives network administrators, network operators, and network engineers a functional understanding of BIG-IP Advanced Firewall Manager.
This course gives network administrators, network operators, and network engineers a functional understanding of BIG-IP Access Policy Manager.
The BIG-IP Application Security Manager course provides participants with the expertise needed to detect, mitigate, and prevent HTTP-based attacks on web applications. The four-day lab intensive course starts at the simplest level for quickly configuring and implementing an application security policy and progresses through more complex configurations. This course is intended for security and network administrators who will be responsible for the installation, deployment, tuning, and day-to-day maintenance of the Application Security Manager.
This course is designed for networking professionals to renew their understanding of DNS network systems and wide-area networks, master pre-installation information gathering, and apply this information to the process of installing a GTM System.
This three-day course gives networking professionals a functional understanding of the BIG-IP LTM system as it is commonly used, as well as an in-depth understanding of advanced features.
This course includes an overview of chassis platforms, hardware options, Clustered Multi-Processing (CMP) and virtual CMP (vCMP) deployment options. This course includes lectures, demonstrations, hands-on labs and discussions.
This course gives networking professionals hands-on knowledge of how to troubleshoot a BIG-IP LTM system using a number of troubleshooting techniques as well as troubleshooting and system tools. This course includes lectures, labs, and discussions.