{"id":92,"date":"2022-03-16T08:37:45","date_gmt":"2022-03-16T08:37:45","guid":{"rendered":"https:\/\/new.ipv6forummalaysia.my\/?page_id=92"},"modified":"2025-10-02T05:58:32","modified_gmt":"2025-10-02T05:58:32","slug":"certification","status":"publish","type":"page","link":"https:\/\/ipv6forummalaysia.my\/index.php\/certification\/","title":{"rendered":"Certification"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"92\" class=\"elementor elementor-92\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b2e4a1e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b2e4a1e\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9a926fb\" data-id=\"9a926fb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e3bbf33 elementor-widget elementor-widget-heading\" data-id=\"e3bbf33\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Certification<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-07a49f9 elementor-widget elementor-widget-text-editor\" data-id=\"07a49f9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>IPv6 Forum Logo Certification Program<\/strong><\/p><p>All the training courses are delivered via instructor-led approach with hands-on lab.\u00a0<span style=\"font-style: inherit; font-weight: inherit; font-family: var( --e-global-typography-text-font-family ), Sans-serif; background-color: var(--ast-global-color-5);\">As these are certification programs, candidates are required to pass both the written and hands-on evaluation to qualify for the certificate.<\/span><\/p><p><b>Instructor-Led Training<\/b><\/p><p>\u00a0<\/p><p>Set in an interactive classroom environment, the instructor will introduce concepts and guide students with detailed explanations and interesting examples to meet the student expectations and requirements and at the same time keep the students engaged.<\/p><p><b style=\"font-style: inherit; font-family: var( --e-global-typography-text-font-family ), Sans-serif; background-color: var(--ast-global-color-5);\">Hands-on Lab:<\/b><\/p><p>Step-by-step hands-on labs with detail instructions and guide are provided to reinforce all key concepts. It allows the student to reinforce concepts by performing the tasks they have just learned.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-49831c9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"49831c9\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-36854e4\" data-id=\"36854e4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-943667d elementor-widget__width-initial elementor-tabs-view-horizontal elementor-widget elementor-widget-tabs\" data-id=\"943667d\" data-element_type=\"widget\" data-widget_type=\"tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-tabs\">\n\t\t\t<div class=\"elementor-tabs-wrapper\" role=\"tablist\" >\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1551\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"elementor-tab-content-1551\" aria-expanded=\"false\">CNE6 Silver<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1552\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1552\" aria-expanded=\"false\">CNE6 Gold<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1553\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1553\" aria-expanded=\"false\">CSE6 Silver<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1554\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1554\" aria-expanded=\"false\">CSE6 Gold<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1555\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1555\" aria-expanded=\"false\">CNP6<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1556\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"6\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1556\" aria-expanded=\"false\">CSA6<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1557\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"7\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1557\" aria-expanded=\"false\">Trainer<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1558\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"8\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1558\" aria-expanded=\"false\">CIoTF<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-1559\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"9\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1559\" aria-expanded=\"false\">CIoTS<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-15510\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"10\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-15510\" aria-expanded=\"false\">C5GDE6<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-15511\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"11\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-15511\" aria-expanded=\"false\">CSDN5G<\/div>\n\t\t\t\t\t\t\t\t\t<div id=\"elementor-tab-title-15512\" class=\"elementor-tab-title elementor-tab-desktop-title\" aria-selected=\"false\" data-tab=\"12\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-15512\" aria-expanded=\"false\">CASE6<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<div class=\"elementor-tabs-content-wrapper\" role=\"tablist\" aria-orientation=\"vertical\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"elementor-tab-content-1551\" aria-expanded=\"false\">CNE6 Silver<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1551\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1551\" tabindex=\"0\" hidden=\"false\"><p><strong>Certified Network Engineer For I<\/strong><img decoding=\"async\" class=\"size-medium alignleft\" style=\"font-weight: inherit;\" src=\"https:\/\/nltvcedu.com\/wp-content\/uploads\/2021\/03\/cnesilver.jpg\" alt=\"Silver\" width=\"100\" height=\"124\" \/><b><span style=\"font-size: 16px;\">P<\/span><span style=\"font-size: 16px;\">v6 (CNE6) Silver<\/span><\/b><\/p><p class=\"has-normal-font-size\"><strong>Introduction:<\/strong><\/p><p>The CNE6 Silver training program is designed to provide foundation information on IPv6 technology and exposure the participants on the technical knowhow to start the IPv6 implementation.<\/p><p class=\"has-normal-font-size\"><strong>Who should attend?<\/strong><\/p><p>This course is ideal for network administrations, network support personnel, network designers, networking consultants, IT managers and IT directors.<\/p><p class=\"has-normal-font-size\"><strong>What Will You Learn?<\/strong><\/p><ul><li>Why need to move IPv6 platform?<\/li><li>IPv6 addressing architecture<\/li><li>IPv6 packet structure and header format<\/li><li>IPv6 address assignment using Neighbour Discovery protocol<\/li><li>IPv6 transitions mechanisms \u00a0<\/li><\/ul><p class=\"has-normal-font-size\"><strong>Prerequisites:<\/strong><\/p><ul><li>A good knowledge of general networking concepts<\/li><li>Knowledge in IPv4 addressing<\/li><\/ul><p class=\"has-normal-font-size\"><strong>Duration:<\/strong><\/p><p>4 days<\/p><p class=\"has-normal-font-size\"><strong>Training Approach:<\/strong><\/p><ul><li>This class covers both theoretical and practical knowledge.<\/li><li>The practical classes are conducted in online laboratory environment.<\/li><li>Quiz will be conducted during the class to test the knowledge of participants about a particular sub topic<\/li><li>Professional examination both theoretical and practical will conducted to test the participants knowledge towards end of the class<\/li><li>All the participants that passed the examination will be awarded certificate that endorsed by Global IPv6 Forum and WIDE Japan<\/li><\/ul><p class=\"has-normal-font-size\"><strong>Course Content:<\/strong><\/p><p>\u00a0The following is the outline of the course:<\/p><div class=\"wp-block-columns\"><div class=\"wp-block-column\"><p class=\"has-normal-font-size\"><strong>Introduction to IPv6<\/strong><\/p><ul><li>Global IP Address Resource Management<\/li><li>Issues with IPv4 Addressing<\/li><li>Comparison between IPv4 and IPv6<\/li><li>General IPv6 features<\/li><\/ul><p class=\"has-normal-font-size\"><strong>IPv6 Addressing Architecture<\/strong><\/p><ul><li>IPv6 Address Type<\/li><li>IPv6 Address Representation<\/li><li>IPv6 Address Scope<\/li><li>IPv6 Addressing Hierarchy<\/li><li>IPv6 Auto-configuration<\/li><li>IPv6 Special Address<\/li><li>Comparison summary between IPv4 and IPv6<\/li><\/ul><p class=\"has-normal-font-size\"><strong>IPv6 Packet Structure and Header Formats<\/strong><\/p><ul><li>Comparison between IPv4 and IPv6 headers<\/li><li>IPv6 Extension Headers<\/li><\/ul><p class=\"has-normal-font-size\"><strong>ICMPv6 and Neighbour Discovery<\/strong><\/p><ul><li>ICMPv6 Header<\/li><li>ICMPv6 Header Type<\/li><li>Neighbour Discovery Protocol (NDP)<ol><li>Router Discovery<\/li><li>Prefix Discovery<\/li><li>Parameter Discovery<\/li><li>Address Auto configuration<\/li><li>Address resolution<\/li><li>Next-hop determination<\/li><li>Neighbor Unreachability Detection<\/li><li>Duplicate Address Detection<\/li><li>Redirect<\/li><\/ol><\/li><\/ul><\/div><div class=\"wp-block-column\"><p class=\"has-normal-font-size\"><strong>Transition Mechanisms<\/strong><\/p><ul><li>Co-existence<ol><li>Dual-stack<\/li><li>Dual IP Layers<\/li><li>Bump In Stack<\/li><\/ol><\/li><\/ul><ul><li>Translation<ol><li>NAT64<\/li><\/ol><\/li><\/ul><ul><li>Tunnelling<ol><li>Manual tunnels<\/li><li>6over4<\/li><li>6to4<\/li><li>ISATAP<\/li><li>GRE<\/li><li>Tunnel Broker<\/li><\/ol><\/li><\/ul><ul><li>Dual Stack Transition Case Studies<ol><li>Lesson learn from the past<\/li><li>Tunnel MTU and Path Discovery<\/li><li>Key Factors for successful transition<\/li><li>Transition Security Issues<\/li><\/ol><\/li><\/ul><p class=\"has-normal-font-size\"><strong>Hands-on Lab<\/strong><\/p><ul><li>Address autoconfiguration<\/li><li>Configuring static route<\/li><li>Configuring IPv6 manual tunnel<\/li><li>Configuring 6to4<\/li><li>Configuring ISATAP<\/li><\/ul><\/div><\/div><p>Disclaimer: Course contents are subject to changes without prior notice.<\/p><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1552\" aria-expanded=\"false\">CNE6 Gold<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1552\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1552\" tabindex=\"0\" hidden=\"hidden\"><p><strong>Certified Network Engineer For IPv6 (CNE6) Gold<\/strong><strong><img decoding=\"async\" class=\"size-medium alignleft\" src=\"https:\/\/nltvcedu.com\/wp-content\/uploads\/2021\/03\/cnegold.jpg\" alt=\"Gold\" width=\"100\" height=\"123\" \/><\/strong><\/p><p class=\"has-normal-font-size\"><strong>Introduction:<\/strong><\/p><p>The CNE6 Gold is advanced level training program for IPv6 network engineering program. This course is designed to provide in-depth knowledge how to design, implement and operate IPv6 networks.<\/p><p class=\"has-normal-font-size\"><strong>Who should attend?<\/strong><\/p><p>This course is ideal for network administrations, network support personnel, network designers, networking consultants, IT managers and IT directors.<\/p><p class=\"has-normal-font-size\"><strong>What Will You Learn?<\/strong><\/p><ul><li>IPv6 Refresher<\/li><li>IPv6 Routing<\/li><li>IPV6 Transition revisit<\/li><li>DHCPv6<\/li><li>IPv6 Mobility<\/li><li>IPSec<\/li><li>IPv6 Security Considerations<\/li><li>IPv6 Deployment Case Studies<\/li><\/ul><p class=\"has-normal-font-size\"><strong>Prerequisites:<\/strong><\/p><ul><li>CNE6 Silver certification or equivalent<\/li><li>A good knowledge of general networking concepts<\/li><li>Knowledge in IPv4 addressing<\/li><\/ul><p class=\"has-normal-font-size\"><strong>Duration:<\/strong><\/p><p>4 days<\/p><p class=\"has-normal-font-size\"><strong>Training Approach:<\/strong><\/p><ul><li>This class covers both theoretical and practical knowledge.<\/li><li>The practical classes are conducted in a laboratory environment.<\/li><li>The participants will have hands on experience using the actual equipments.\u00a0<\/li><li>Quiz will conducted during the class to test the knowledge of participants about a particular sub topics<\/li><li>Professional examination both theoretical and practical will conducted to test the participants knowledge towards end of the class<\/li><li>All the participants that passed the examination will be awarded certificate that endorsed by Global IPv6 Forum and WIDE Japan.<\/li><\/ul><p class=\"has-normal-font-size\"><strong>Course Outline<\/strong>:<\/p><div class=\"wp-block-columns\"><div class=\"wp-block-column\"><p class=\"has-normal-font-size\"><strong>IPv6 Refresher<\/strong><\/p><ul><li>IPv6 addressing architecture<\/li><li>IPv6 packet structure and header format<\/li><li>IPv6 address assignment using Neighbour Discovery protocol<\/li><li>IPv6 transitions mechanisms\u00a0<\/li><\/ul><p class=\"has-normal-font-size\"><strong>IPv6 Routing<\/strong><\/p><ul><li>Static Routing<\/li><li>RIPng<\/li><li>IS-IS for IPv6<\/li><li>OSPFv3<\/li><li>MP-BGP<\/li><li>EIGRP for IPv6<\/li><\/ul><p class=\"has-normal-font-size\"><strong>IPv6 Transition Revisit<\/strong><\/p><ul><li>Revisit CNE6 Silver Transition Mechanisms<\/li><li>CGN (large-scale NAT 44)<\/li><li>NAT 444 (CGN + CPE NAT 44)<\/li><li>DS-Lite (NAT44 + 4over6 Tunnel)<\/li><li>A+P (DS-Lite with preconfigured port ranges)<\/li><li>NAT64<\/li><li>IPv6 Rapid Development (6RD)<\/li><li>Tunnel Setup Protocol (TSP)<\/li><li>6over4<\/li><\/ul><p class=\"has-normal-font-size\"><strong>IPSec<\/strong><\/p><ul><li>Security Policy<\/li><li>Security Association (SA)<\/li><li>Key Management<\/li><li>Internet Key Exchange (IKE)<\/li><li>Architecture<\/li><li>Operation Mode<\/li><\/ul><p class=\"has-normal-font-size\"><strong>IPv6 Security Consideration<\/strong><\/p><ul><li>Concerns regarding security in IPv6<\/li><li>Common Misunderstanding<\/li><li>Attack vectors<\/li><li>Attack Types<ol><li>Reconnaissance<\/li><li>Denial of service<\/li><li>Covert channels<\/li><\/ol><\/li><\/ul><\/div><div class=\"wp-block-column\"><p class=\"has-normal-font-size\"><strong>DHCPV6<\/strong><\/p><ul><li>DHCPv6 Standard<\/li><li>DHCPv6 Operational model<\/li><li>Understanding DUID<\/li><li>Understanding Identity Association (IA)<\/li><li>DHCPv6 Message Types<\/li><li>DHCPv6 to DHCPv4 Message Comparison<\/li><li>DHCPv6 Protocol<\/li><li>How It Works<\/li><li>Stateless DHCPv6<\/li><li>DHCPv6 Deployment Considerations<\/li><li>DHCPv6 Server Configurations<\/li><li>DHCPv6 Client Configurations<\/li><li>DHCPv6 Relay Configurations<\/li><\/ul><p class=\"has-normal-font-size\"><strong>Mobility<\/strong><\/p><ul><li>What\u2019s Mobility?<\/li><li>Components of MIPv6<\/li><li>How it works?<\/li><li>How CN and MN communicates<\/li><li>Route optimization mode<\/li><li>Bidirectional tunneling mode<\/li><li>Implementations<\/li><\/ul><p class=\"has-normal-font-size\"><strong>Campus IPv6 Deployment<\/strong><\/p><ul><li>Campus deployment strategy<\/li><li>Campus IPv6 address allocation<\/li><li>Campus deployment topology \u2013 options Campus services<\/li><li>Service provider deployment considerations<\/li><\/ul><p class=\"has-normal-font-size\"><strong>Hands-on lab<\/strong><\/p><ul><li>Configuring static route<\/li><li>Configuring RIPng<\/li><li>Configuring OSPFv3<\/li><li>Configuring BGP4+<\/li><li>Configuring DHCPv6<\/li><li>Configuring IPSec<\/li><li>Configuring IPv6 Services<\/li><li>Configuring a DNS Server<\/li><li>Configuring Host-To-Host IPSec (Transport mode)<\/li><li>Configuring FTP File Sharing<\/li><li>Configuring Video Streaming<\/li><\/ul><\/div><\/div><p><strong>Disclaimer :<\/strong>\u00a0Course contents are subject to change without prior notice<\/p><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1553\" aria-expanded=\"false\">CSE6 Silver<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1553\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1553\" tabindex=\"0\" hidden=\"hidden\"><p><img decoding=\"async\" class=\"size-medium alignleft\" src=\"https:\/\/nltvcedu.com\/wp-content\/uploads\/2021\/03\/cnesilver.jpg\" alt=\"Silver\" width=\"100\" height=\"124\" \/><strong>Certified Security Engineer for IPv6(CSE6) Silver<\/strong><\/p><p class=\"has-normal-font-size\"><strong>Introduction:<\/strong><\/p><p>The CSE6 Silver training program is designed to provide fundamental information on the implementation of security parameters in the transition from IPv4 to IPv6 and expose the participants on the security issues in the deployment of IPv6 in the organization network. This course would provide fundamental understanding about security issue revolving around IPv6 and will be one of the pre-requisite for Certified Security Engineer for IPv6 (CSE6) Gold.<\/p><p class=\"has-normal-font-size\"><strong>Who should attend?<\/strong><\/p><p>This course is ideal for<\/p><p>\u2013 Security enthusiast<br \/>\u2013 Decision makers for IT Security spending<br \/>-Network\/Security Architect<br \/>-IT administrator<br \/>-Network\/IT support technicians<\/p><p class=\"has-normal-font-size\"><strong>What Will You Learn?<\/strong><\/p><ul><li>Revisit IPv6<\/li><li>IPv6 Security issues<\/li><li>IPv6 Security features<\/li><li>IPv6 attacks<\/li><\/ul><p class=\"has-normal-font-size\"><strong>Prerequisites:<\/strong><\/p><ul><li>A good knowledge of general network security concepts<\/li><li>Knowledge in IPv4 security<\/li><\/ul><p class=\"has-normal-font-size\"><strong>Duration:<\/strong><\/p><p>4 days<\/p><p class=\"has-normal-font-size\"><strong>Training Approach:<\/strong><\/p><ul><li>This class covers both theoretical and practical knowledge.<\/li><li>The practical classes are conducted in a laboratory environment.<\/li><li>The participants will have hands on experience using the actual equipment.\u00a0<\/li><li>Quiz will have conducted during the class to test the knowledge of participants about a particular sub topic<\/li><li>Professional examination both theoretical and practical will conducted to test the participant\u2019s knowledge towards end of the class<\/li><li>All the participants that passed the examination will be awarded certificate that endorsed by Global IPv6 Forum and WIDE Japan<\/li><\/ul><p class=\"has-normal-font-size\"><strong>Course Content:<\/strong><\/p><p>\u00a0The following is the outline of the course:<\/p><div class=\"wp-block-columns\"><div class=\"wp-block-column\"><p class=\"has-normal-font-size\"><strong>IPv6 Revisited<\/strong><\/p><ul><li>Introduction to IPv6<\/li><li>Packet Structure and Header Format<\/li><li>IPv6 Addressing Architecture<\/li><li>Understanding ICMPv6 &amp; Neighbour Discovery<\/li><\/ul><p class=\"has-normal-font-size\"><strong>IPv6 Security Issues<\/strong><\/p><ul><li>Security Advantages of IPv6 Over IPv4<\/li><li>IPv6 Security \u2013 Areas of Concern<\/li><li>IPv6 Security \u2013 Similarities to IPv4 Security<\/li><li>IPv6 Security \u2013 Differences from IPv4 Security<\/li><li>Threats Countered by SEND<\/li><\/ul><p class=\"has-normal-font-size\"><strong>IPv6 Security Features<\/strong><\/p><ul><li>General Security Concepts<\/li><li>Encryption \u2013 Secret Key Cryptography<\/li><li>IPSec<\/li><li>Secure Neighbour Discovery (SeND)<\/li><li>Cryptographically Generated Addresses (CGA)<\/li><li>Unique Local Address<\/li><\/ul><\/div><div class=\"wp-block-column\"><p class=\"has-normal-font-size\"><strong>IPv6\u00a0<\/strong><strong>Attacks<\/strong>\u00a0<strong>and tools kit<\/strong><\/p><ul><li>IPv6 Attacks<\/li><li>Man in Middle Attacks<\/li><li>Known ICMPv4 Attacks<\/li><li>Unique ICMPv4 Attacks<\/li><li>Unique ICMPv6 Attacks<\/li><li>IPv6 Hacking Tools<\/li><\/ul><p class=\"has-normal-font-size\"><strong>Hands-on Lab<\/strong><\/p><ul><li>Preparing for the hands-on lab<\/li><li>Initial Setup<\/li><li>Server installation<\/li><li>Server Configuration<\/li><li>Connecting Kali server to GNS3<\/li><li>Demonstration of several IPv6 attacks<\/li><\/ul><\/div><\/div><p>Disclaimer: Course contents are subject to changes without prior notice.<\/p><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1554\" aria-expanded=\"false\">CSE6 Gold<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1554\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1554\" tabindex=\"0\" hidden=\"hidden\"><p><strong><img decoding=\"async\" class=\"size-medium alignleft\" src=\"https:\/\/nltvcedu.com\/wp-content\/uploads\/2021\/03\/cnegold.jpg\" alt=\"Gold\" width=\"100\" height=\"123\" \/>Certified Security Engineer for IPv6 (CSE6) Gold<\/strong><\/p><p class=\"has-normal-font-size\"><strong>Introduction:<\/strong><\/p><p>The CSE6 Gold training program is the advanced training program in IPv6 Security that was designed to provide in-depth information on IPv6 security design and implementation in the IPv6 network.<\/p><p class=\"has-normal-font-size\"><strong>Who should attend?<\/strong><\/p><p>This course is ideal for<\/p><p>\u2013 Security enthusiast<br \/>\u2013 Decision makers for IT Security spending<br \/>-Network\/Security Architect<br \/>-IT administrator<br \/>-Network\/IT support technicians<\/p><p class=\"has-normal-font-size\"><strong>What Will You Learn?<\/strong><\/p><ul><li>Revisit IPv6 Security<\/li><li>Threat against CPE and recommendation<\/li><li>IPv6 Firewall configuration and policies<\/li><\/ul><p class=\"has-normal-font-size\"><strong>Prerequisites:<\/strong><\/p><ul><li>CSE6 Silver certification or any equivalent certifications<\/li><li>A good knowledge of general network security concepts<\/li><li>Knowledge in IPv4 security<\/li><\/ul><p class=\"has-normal-font-size\"><strong>Duration:<\/strong><\/p><p>4 days<\/p><p class=\"has-normal-font-size\"><strong>Training Approach:<\/strong><\/p><ul><li>This class covers both theoretical and practical knowledge.<\/li><li>The practical classes are conducted in a laboratory environment.<\/li><li>The participants will have hands on experience using the actual equipment.\u00a0<\/li><li>Quiz will be conducted during the class to test the knowledge of participants about a particular sub topic<\/li><li>Professional examination both theoretical and practical will conducted to test the participant\u2019s knowledge towards end of the class<\/li><li>All the participants that passed the examination will be awarded certificate that endorsed by Global IPv6 Forum and WIDE Japan<\/li><\/ul><p class=\"has-normal-font-size\"><strong>Course Content:<\/strong><\/p><p>\u00a0The following is the outline of the course:<\/p><div class=\"wp-block-columns\"><div class=\"wp-block-column\"><p class=\"has-normal-font-size\"><strong>IPv6 Security Revisited<\/strong><\/p><ul><li>IPv6 Security Issues<\/li><li>IPv6 Security Features<\/li><li>IPv6 Attacks<\/li><\/ul><p class=\"has-normal-font-size\"><strong>Threats against<\/strong><strong>\u00a0IPv6 CPE and Recommandations<\/strong><\/p><ul><li>Customer Premise Equipment (CPE)<\/li><li>Universal Threat Mitigation (UTM)<\/li><li>Type of Threat and Mitigation the Threat<\/li><li>IPv6 Intrusion Protection System (IPS)<\/li><li>Rules for Security Policy<\/li><li>Security in Mobile IPv6<\/li><\/ul><p class=\"has-normal-font-size\"><strong>Hands-on Lab<\/strong><\/p><ul><li>Demonstration of Man in The Middle Attack<\/li><li>Setting-Up and Testing IPv6 Firewall<\/li><\/ul><\/div><div class=\"wp-block-column\"><p class=\"has-normal-font-size\"><strong>IPv6 and firewall configuration<\/strong><strong>\u00a0Policies<\/strong><\/p><ul><li>Host Based Firewalls<\/li><li>Gateway Firewalls<\/li><li>Firewall Policy Separation<\/li><li>Policy Merging<\/li><li>Inbound ICMPv6 Service<\/li><li>Inbound TCP Services for the Firewall<\/li><li>Inbound TCP Services for All Machines, including Firewall<\/li><li>Inbound UDP Services for the Firewall<\/li><li>Firewall basics with IPtables<\/li><li>Policy Chain Default Behaviour<\/li><li>Connection \u2013 specific responses<\/li><li>Connection States<\/li><\/ul><p>Configuring IPv6 Rules and Policies with ip6tables<\/p><\/div><\/div><p>Disclaimer: Course contents are subject to changes without prior notice.<\/p><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1555\" aria-expanded=\"false\">CNP6<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1555\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1555\" tabindex=\"0\" hidden=\"hidden\"><p><img decoding=\"async\" class=\"size-medium alignleft\" src=\"https:\/\/nltvcedu.com\/wp-content\/uploads\/2021\/03\/cnegold.jpg\" alt=\"Gold\" width=\"100\" height=\"123\" \/><strong>Certified Network Programmer for IPv6(CNP6)<\/strong><\/p><div class=\"entry-content\"><h4>\u00a0<\/h4><h4>Introduction:<\/h4><p>This course is an advanced training course for those who need deeper understanding of IPv6 network programming and testing. The course covers topics such as socket API, IPv4 vs. IPv6 prgramming in C\/C++ and Visual C#.NET. This course focuses on the differences in IPv6 programming from traditional network programming and assumes prior knowledge in basic network programming. Upon completion of this course, each participant will receive the \u201cCNP6 Certified Network Programmer\u201d certificate.<\/p><h4>Training Approach:<\/h4><p>For any kind of training to have a lasting and measurable impact, the course conents have been designed and delivered in the context of the client\u2019s specific environment and business need. NLTVC has customized the content with leading edge and time-honored training approaches that includes instructor-led, mentor learning hands-on approach, to meet the specific learning style of the individual and the complex learning objectives of organizations.<\/p><h4>Who Should Attend?<\/h4><p>This course is designed for software and\/or computer engineers (designers\/developers, testers etc.) and programmers who develop and test IP-applications and require deeper knowledge on how to build IPv6 solutions\/applications as well as porting existing IPv4 applications to support IPv6.<\/p><p>Disclaimer: Course contents are subject to changes without prior notice.<\/p><\/div><footer class=\"entry-footer\"><div class=\"entry-meta\">\u00a0<\/div><\/footer><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"6\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1556\" aria-expanded=\"false\">CSA6<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1556\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1556\" tabindex=\"0\" hidden=\"hidden\"><p><strong>IPv6 System Administration<\/strong><\/p><ul><li>Certified System Administrator for IPv6 (CSA6) Silver<\/li><li>Certified System Administrator for IPv6 (CSA6) Gold<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"7\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1557\" aria-expanded=\"false\">Trainer<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1557\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"7\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1557\" tabindex=\"0\" hidden=\"hidden\"><ul><li>Certified Network Engineer For IPv6 (CNE6) Trainer<\/li><li>Certified Security Engineer for IPv6 (CSE6) Trainer<\/li><li>Certified Network Programmer for IPv6 (CNP6) Trainer<\/li><li>Certified System Administrator for IPv6 (CSA6) Trainer<\/li><li>IPv6 Forum Certified Trainer Gold<\/li><\/ul><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"8\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1558\" aria-expanded=\"false\">CIoTF<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1558\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"8\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1558\" tabindex=\"0\" hidden=\"hidden\"><p><strong>Certified IoT Fundamental<\/strong><\/p><p><strong>Introduction<\/strong><\/p><p>The Internet of Things (IoT) Fundamental training course provides an overview and insight into the emerging technology. The course covers the basic concepts, terminology, and key components of IoT. It explains the business perspectives of IoT including the advantages of early adoption and monetization models. It further expands on the technologies enabling IoT and the various challenges to expect. Several scenarios describe the use cases and applications of IoT that result in smart applications and services to inspire organizations making the move to IoT. The course provides future insights in IoT and forecasts the status of the connected world in 2030.\u00a0<\/p><p><strong>Training Approach<\/strong><\/p><p>The training would involve both theory and practical led by the instructor. Easy to understand case study-based approach. In depth knowledge from experienced trainer.<\/p><p><strong>Who Should Attend<\/strong><\/p><p>The Internet of Things Fundamental course is most interesting for business and management professionals, including:<\/p><div class=\"wp-block-columns\"><div class=\"wp-block-column\"><ul id=\"block-7b3df599-fd8a-481b-9281-b209671f8e4b\"><li>Application Consultant<\/li><li>Business Analyst<\/li><li>Business Process Architect<\/li><li>Developer<\/li><li>Developer Consultant<\/li><li>Enterprise Architect<\/li><\/ul><\/div><div class=\"wp-block-column\"><ul id=\"block-7b3df599-fd8a-481b-9281-b209671f8e4b\"><li>Program \/ Project Manager<\/li><li>Solution Architect<\/li><li>System Administrator<\/li><li>System Architect<\/li><li>Technology Consultant<\/li><li>User<\/li><\/ul><\/div><\/div><p><strong>Prerequisites<\/strong>:<\/p><p>It is expected that students will have a basic knowledge of Internet concepts (Difference between Internet and Web, URL, Http\/Https, DNS, etc.), Networking concepts (LAN\/WAN\/MAN, routers, protocols, topologies, etc.), programming devices using C \/ C++ \/ Python, as well as knowledge of computer fundamentals.<\/p><p><strong>Training Duration<\/strong><\/p><p>4 days<\/p><p><strong>Course Outline:<\/strong><\/p><div class=\"wp-block-columns\"><div class=\"wp-block-column\"><p><strong>Concepts and Terminologies<\/strong><\/p><ul><li>Introduction: Internet, Things and IoT<\/li><li>IoT Types, History and Evolution of IoT<\/li><li>Cyber-Physical Systems and differences among IoE, M2M. and IoT<\/li><li>Facts and Figures Around IoT Application Areas<\/li><\/ul><p><strong>Business Orientation<\/strong><\/p><ul><li>Drivers of IoT<\/li><li>Benefits of a Connected World<\/li><li>IoT Business:<ul><li>Opportunities, Benefits, and Challenges<\/li><\/ul><\/li><li>IoT Monetization Strategies and Models<\/li><\/ul><p><strong>Basic Building Block of IoT \u2013Architecture:<\/strong><\/p><ul><li>Architecture of IoT components<\/li><li>Network components within IoT<\/li><\/ul><p><strong>Enabling Technologies of IoT:<\/strong><\/p><ul><li>Role of Social Media and Mobility in IoT<\/li><li>Role of Big Data and Analytics in IoT<\/li><li>Role of Cloud Computing in IoT<\/li><\/ul><\/div><div class=\"wp-block-column\"><p><strong>IoT Security and Top Governance Issues:<\/strong><\/p><ul><li>IoT Security Challenges<\/li><li>Causes of IoT Security Breaches<\/li><li>IoT Security Risks<\/li><\/ul><p><strong>IoT Case Studies and Future Predictions:<\/strong><\/p><ul><li>IoT Usage Scenarios<\/li><li>IoT Growth Perspectives<\/li><li>IoT Future Predictions<\/li><\/ul><p><strong>Hands-on Lab<\/strong><\/p><ul><li>Setup IoT software and hardware<\/li><li>Setup and configure IoT hardware together with other sensor devices<\/li><li>Coding to program the IoT software and hardware<\/li><\/ul><p>Setup the testbed for IoT AUTOMATIC WATERING PLANT SYSTEM using the IoT software and hardware.<\/p><\/div><\/div><p><strong>Disclaimer :<\/strong>\u00a0Course contents are subject to change without prior notice<\/p><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"9\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-1559\" aria-expanded=\"false\">CIoTS<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1559\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"9\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1559\" tabindex=\"0\" hidden=\"hidden\"><p><strong>Certified IoT Security Silver<\/strong><\/p><div class=\"entry-content\"><p><strong>Introduction<\/strong><\/p><p>The ability to connect, communicate with, and remotely manage an incalculable number of networked, automated devices (approximately 26 Billion by 2020) via the Internet is becoming pervasive, from the factory floor to the hospital operating room to the residential basement. The transition from closed networks to enterprise IT networks to the public Internet is accelerating at an alarming pace\u2014and justly raising alarms about security. As we become increasingly reliant on intelligent, interconnected devices in every aspect of our lives, how do we protect potentially billions of them from intrusions and interference that could compromise personal privacy or threaten public safety?<\/p><p>This training covers the basics and Intermediate levels of IoT landscape and takes you through IoT Security Challenges and vulnerabilities and teaches you the steps to hack and harden the IoT devices, applications and ecosystem.<\/p><p><strong>Training Approach<\/strong><\/p><p>The training would involve both theory and practical led by the instructor. Easy to understand case study-based real-life approach. In depth knowledge from experienced trainer.<\/p><p><strong>Who Should Attend?<\/strong><\/p><p>This course is recommended for IoT Enthusiasts, IoT Designers, IoT Developers, IoT Implementers, IT Managers, IT Auditors and anyone who is ready to master the steps required to secure IOT Implementations.<\/p><p><strong>Prerequisites<\/strong><\/p><p>1. Should be involved in the IT field.<\/p><p>2. Should be familiar with using Windows, Linux and VMWare.<\/p><p>3. Should understand programming concepts, but programming experience is not mandatory.<\/p><p>4. Background knowledge in reverse code engineering and vulnerability assessment will be helpful, but not required.<\/p><p>5. Enthusiasm is a must.<\/p><p><strong>Training Duration<\/strong><\/p><p>4 days<\/p><p><strong>Course Outline<\/strong><\/p><div class=\"wp-block-columns\"><div class=\"wp-block-column\"><p><strong>Overview of IOT technologies<\/strong><\/p><p>What is IoT?<\/p><p>IoT Architecture &amp; Ecosystem<\/p><p>Hardware &amp; Software Platforms<\/p><p>Communication Channels &amp; Protocols<\/p><p>Cloud &amp; IoT<\/p><p>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Cloud &amp; RESTful Web Services<\/p><p>Data Streaming &amp; IoT<\/p><p>IoT Myths<\/p><p>IoT Applications<\/p><p>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \u2013 Agriculture<\/p><p>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \u2013 Medical<\/p><p>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \u2013 Meteorology<\/p><p><strong>IoT Security Overview<\/strong><\/p><p>Overview of IOT Security<\/p><p>IoT Threats<\/p><p>Challenges to Secure IoT Deployments<\/p><p>Types of IoT Attacks<\/p><p><strong>Baseline Policies for IoT Security<\/strong><\/p><p>IoT Security Controls Lifecyle<\/p><p>Authentication \/ Authorization<\/p><p>Logging &amp; Audit Framework<\/p><p>Privacy by Design<\/p><p>Data Protection Policies<\/p><p><strong>IoT Security Recommendations<\/strong><\/p><p>High Priority Security Recommendations<\/p><p>Medium Priority Recommendations<\/p><p>Low Priority Recommendations<\/p><p>5G based IoT Endpoint Security Recommendations\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/p><\/div><div class=\"wp-block-column\"><p><strong>IoT Vulnerabilities<\/strong><\/p><p>Insecure Web Interface<\/p><p>Insufficient Authentication\/Authorization<\/p><p>Insecure Network Services<\/p><p>Lack of Transport Encryption<\/p><p>Privacy concerns<\/p><p>Insecure Cloud Interface<\/p><p>Insecure Mobile Interface<\/p><p>Insufficient Security Configurability<\/p><p>Insecure Software\/Firmware<\/p><p>Poor Physical Security<\/p><p><strong>IoT Endpoint Security Guidelines<\/strong><\/p><p>IoT Endpoint Security Challenges<\/p><p>IoT Endpoint Security Model and Recommendations.<\/p><p>Secure the IoT Systems<\/p><p>Securing the IoT Network.<\/p><p>IPv4 Based Security Guidelines<\/p><p>IPv6 Based Security Guidelines<\/p><p>Data Link Layer Based Network Guidelines<\/p><p><strong>Hands On Lab<\/strong><\/p><p>IoT Lab installation (install Kali Linux, install required tools)<\/p><p>IoT OS (Windows) security test<\/p><p>IoT OS (Linux) security test<\/p><p>WiFi for IoT security test<\/p><p>Bluetooth for IoT security test<\/p><p>IoT vulnerability search engine<\/p><\/div><\/div><p><strong>Disclaimer :<\/strong>\u00a0Course contents are subject to change without prior notice<\/p><\/div><footer class=\"entry-footer\"><div class=\"entry-meta\">\u00a0<\/div><\/footer><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"10\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-15510\" aria-expanded=\"false\">C5GDE6<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-15510\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"10\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-15510\" tabindex=\"0\" hidden=\"hidden\"><p><strong>Certified 5G Deployment Engineers for IPv6 (C5GDE6) \u2013 Silver<\/strong><\/p><p><strong>Introduction<\/strong><\/p><p>Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet. IPv6 was developed by the Internet Engineering Task Force (IETF) to deal with the long-anticipated problem of IPv4 address exhaustion. IPv6 is intended to replace IPv4. In December 1998, IPv6 became a Draft Standard for the IETF, who subsequently ratified it as an Internet Standard on 14 July 2017.<\/p><p>5G (from \u201c5th Generation\u201d) is the latest generation of cellular mobile communications. It succeeds the 4G (LTE-A, WiMax), 3G (UMTS, LTE) and 2G (GSM) systems. 5G performance targets high data rate, reduced latency, energy saving, cost reduction, higher system capacity, and massive device connectivity.<\/p><p>This training will provide detailed deployment strategy of how to implement IPv6 addressing in the 5G networks.<\/p><p><strong>Training Approach<\/strong><\/p><p>The training would involve both theory and practical led by the instructor. Easy to understand case study-based approach. In depth knowledge from experienced trainer.<\/p><p><strong>Who Should Attend<\/strong><\/p><p>This course is ideal for telecommunication engineers, telecommunication network architects, network administrations, network support personnel, network designers, networking consultants, IT managers, IT directors and anyone who is ready to learn about 5G technology.<\/p><p><strong>Prerequisites<\/strong><\/p><p>The engineers whom attend this course should have the following basic knowledge on the following<\/p><ol type=\"a\"><li>Basic knowledge on network and network devices<\/li><li>Basic knowledge on mobile network such as 2.5, 3G and 4G would be added advantage<\/li><li>Basic knowledge on security<\/li><\/ol><p><strong>Training Duration<\/strong><\/p><p>4 days<\/p><p><strong>Course Outline:<\/strong><\/p><div class=\"wp-block-columns\"><div class=\"wp-block-column\"><p><strong>5G Introduction\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/strong><\/p><p>What is 5G<strong>?<\/strong><\/p><p>5G Standards\u00a0<\/p><p>5G Air Interface\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/p><p>5G Overall Architecture\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/p><p>5G Services, Applications and Use Cases<\/p><p>Network Slicing\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/p><p>Programmability &amp; Softwarization\u00a0\u00a0\u00a0<\/p><p>Management and Orchestration\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/p><p>5G Security Architecture<\/p><p><strong>IPv6 Address Allocation Schemes for 5G\u00a0\u00a0\u00a0\u00a0\u00a0<\/strong><\/p><p>Addressing Types\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/p><p>Infrastructure Addressing\u00a0\u00a0\u00a0\u00a0\u00a0<\/p><p>Subscriber addressing<\/p><p>Deployment Consideration\u00a0\u00a0\u00a0 IPv6 Addressing Types<strong>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/strong><\/p><\/div><div class=\"wp-block-column\"><p><strong>IPv6 Routing for 5G Transport\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/strong><\/p><p>IPv6 Routing Tables\u00a0\u00a0\u00a0<\/p><p>MP-BGP and OSPFv3\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/p><p><strong>\u00a0IPv6 Transition Strategies for 5G<\/strong>\u00a0\u00a0\u00a0\u00a0\u00a0<\/p><p>IPv6 Provider Edge (6PE)\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/p><p>IPv6 VPN Provider Edge (6VPE)\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/p><p>6PE &amp; 6VPE<\/p><p>464XLAT Technology\u00a0<\/p><p>IPv6 3GPP Standards for 5G<\/p><p><strong>\u00a0Hands On Lab<\/strong><\/p><p>IPv6 address assignment and Connectivity Lab<\/p><p>Design and deploy 5G network architecture.<\/p><p>Assigning IPv6 addresses to mobile IPv6 nodes in 5G network using different address allocation methods.<\/p><p>Monitor the IPv6 traffic over the 5G network using network monitoring software.<\/p><\/div><\/div><p><strong>Disclaimer :<\/strong>\u00a0Course contents are subject to change without prior notice.<\/p><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"11\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-15511\" aria-expanded=\"false\">CSDN5G<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-15511\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"11\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-15511\" tabindex=\"0\" hidden=\"hidden\"><p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1850\" src=\"https:\/\/ipv6forummalaysia.my\/wp-content\/uploads\/2025\/09\/5G-wa-2-3D-finalnew-01-300x82.jpg\" alt=\"\" width=\"133\" height=\"36\" srcset=\"https:\/\/ipv6forummalaysia.my\/wp-content\/uploads\/2025\/09\/5G-wa-2-3D-finalnew-01-300x82.jpg 300w, https:\/\/ipv6forummalaysia.my\/wp-content\/uploads\/2025\/09\/5G-wa-2-3D-finalnew-01-1024x281.jpg 1024w, https:\/\/ipv6forummalaysia.my\/wp-content\/uploads\/2025\/09\/5G-wa-2-3D-finalnew-01-768x211.jpg 768w, https:\/\/ipv6forummalaysia.my\/wp-content\/uploads\/2025\/09\/5G-wa-2-3D-finalnew-01.jpg 1333w\" sizes=\"(max-width: 133px) 100vw, 133px\" \/><\/p><p><strong>Certified SDN for 5G (CSDN5G)\u00a0<\/strong><\/p><p><strong>Introduction<\/strong><\/p><p>The Certified SDN for 5G course is designed to equip participants with the knowledge and skills to understand, design, and apply Software-Defined Networking (SDN) concepts in the context of 5G networks. As 5G transforms industries with ultra-low latency, massive connectivity, and network slicing, SDN emerges as the key enabler that allows networks to be programmable, flexible, and service-oriented.<\/p><p><strong>Training Approach<\/strong><\/p><p>The training would involve both theory and practical led by the instructor. Easy to understand case study-based approach. In depth knowledge from experienced trainer.<\/p><p><strong>Who Should Attend<\/strong><\/p><p>This course is recommended for Enterprise IT &amp; Network Teams, Telecom &amp; Mobile Network Professionals, Vendors &amp; System Integrators, Cloud &amp; Data Center Specialists, Government, Regulators &amp; Policy Makers, and Students.<\/p><p><strong>Prerequisites<\/strong><\/p><p>The engineers whom attend this course should have the following basic knowledge on the following<\/p><ol type=\"a\"><li>Basic understanding of IP networking (TCP\/IP, routing, switching).<\/li><li>Awareness of 5G concepts (Core, RAN, Edge, Network Slicing).<\/li><li>Basic familiarity with Linux environments and virtualization (VMs, containers).<\/li><\/ol><p><strong>Training Duration<\/strong><\/p><p>4 days<\/p><p><strong>Course Outline:<\/strong><\/p><div class=\"wp-block-columns\"><div class=\"wp-block-column\"><p><strong>Introduction to SDN &amp; 5G\u00a0 \u00a0 \u00a0 \u00a0 \u00a0<\/strong><\/p><p>Background of 5G<br \/>Background of SDN<\/p><p><strong>Networking Concepts<\/strong>\u00a0 \u00a0 \u00a0<\/p><p>Function of routers and switches<br \/>Ethernet networks<br \/>Collision domains and broadcast domains<br \/>IP packets, TCP, and UDP (Connection-oriented vs. connectionless protocols)<br \/>IPv4 and IPv6 fundamentals (Layer 3 \/ IP addressing subnet)<br \/>Routing Protocols (RIP, OSPF, ISIS, BGP)<br \/>Longest match routing<br \/>IP Network Services (DHCP, DNS, ARP, NAT, ICMP)<br \/>Optical network fundamentals \u2013 SONET\/SDH, OTN<br \/>Packet Filtering with Match\/Action Pairs (forwarding in a traditional network)<\/p><p><strong>Introduction to Software Defined Networks(SDN)\u00a0 \u00a0 \u00a0<\/strong><\/p><p>Challenges of the Traditional Network<br \/>Need for a new network architecture<br \/>Traditional networking Vs SDN networking<br \/>What is the SDN and OpenFlow?<br \/>SDN Value Proposition<br \/>SDN Revolution<br \/>&#8211; SDN in the Data Center<br \/>&#8211; SDN in Campus Networks<br \/>&#8211; SDN in the Service Providers<br \/>&#8211; SDN Use Cases in the Enterprise<br \/>&#8211; SDN Use Cases in the Mobile Networks<br \/>Major 6 technical differences between SDN and traditional networks<br \/>The six characteristics of an SDN Solution<br \/>What is NFV? \u00a0 \u00a0 \u00a0<\/p><\/div><div class=\"wp-block-column\"><p><strong>SDN Architecture for 5G\u00a0<\/strong><strong>\u00a0 \u00a0 \u00a0 \u00a0<\/strong><\/p><p><span style=\"font-size: 16px;\">OpenFlow Switch (Data layer)<br \/>&#8211; OpenFlow Table in detail<br \/>&#8211; Meter Table<br \/>&#8211; Group Table<br \/>OpenFlow Controller (Control Layer)<br \/>&#8211; Southbound Interface<br \/>OpenFlow Protocol<br \/>Messages between SDN controller and OpenFlow switch<br \/>&#8211; OpenFlow Application (Application Layer)<br \/>Northbound Interface<br \/>SDN in 5G Architecture \u00a0 \u00a0 \u00a0 \u00a0<\/span><\/p><p><strong>\u00a0SDN Controller &amp; API for 5G<\/strong>\u00a0\u00a0\u00a0\u00a0\u00a0<\/p><p>5G ONOS controller<br \/>What is 5G ONOS?<br \/>ONOS 5G Architecture<br \/>&#8211; Distributed Core<br \/>&#8211; Southbound abstraction\/APIs<br \/>&#8211; Northbound abstraction\/APIs<br \/>API to 5G elements<br \/>What are APIs?<br \/>Types of APIs<br \/>5G RESTful API<br \/>5G ONOS APIs<\/p><p><strong>5G-based P4 Programming (Programming Protocol-Independent Packet<\/strong> <strong>Processors)<\/strong><\/p><p>Traditional Network Devices<br \/>&#8211; Traditional Network Devices: Bottom-up design<br \/>&#8211; A new Network Device: Top-down design<br \/>&#8211; Traditional Packer Process Pipeline Vs P4 Process Pipeline<br \/>Comparison between P4 and SDN with OpenFlow<br \/>&#8211; Benefits of Data Plane Programmability<br \/>What is P4?<br \/>&#8211; P4 Features<br \/>&#8211; P4 vs. OpenFlow<br \/>&#8211; P4 in Industry<br \/>&#8211; P4 characteristics<br \/>&#8211; P4_16 Approach<br \/>5G based P4 general architecture model<br \/>&#8211; Protocol Independent Switching Architecture (PISA)<br \/>&#8211; Portable Switch Architecture (PSA)<br \/>&#8211; V1 Model Architecture<\/p><p><strong>\u00a0Hands On Lab<\/strong><\/p><\/div><\/div><p><strong>Disclaimer :<\/strong>\u00a0Course contents are subject to change without prior notice.<\/p><\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-tab-title elementor-tab-mobile-title\" aria-selected=\"false\" data-tab=\"12\" role=\"tab\" tabindex=\"-1\" aria-controls=\"elementor-tab-content-15512\" aria-expanded=\"false\">CASE6<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-15512\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"12\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-15512\" tabindex=\"0\" hidden=\"hidden\"><h3><img decoding=\"async\" class=\"size-medium alignleft\" style=\"font-weight: inherit;\" src=\"https:\/\/nltvcedu.com\/wp-content\/uploads\/2021\/03\/cnesilver.jpg\" alt=\"Silver\" width=\"100\" height=\"124\" \/><\/h3><h3>Certified Application and Security Engineer for IPv6 (CASE6)<\/h3><p class=\"has-normal-font-size\"><strong>Introduction:<\/strong><\/p><p>The CASE6 training program is the advanced training program in IPv6 Application &amp; Security that is developed to provide in-depth information and hands-on training on IPv6 security and applications for network engineers and IT staff.<\/p><p class=\"has-normal-font-size\"><strong>Who should attend?<\/strong><\/p><p>This course is recommended for Network\/Security Architect, IT Administrator, Network\/IT support technicians, Decision makers for IT Security spending, Security enthusiast.\u00a0<\/p><p class=\"has-normal-font-size\"><strong>Prerequisites:<\/strong><\/p><ul><li>Knowledge of general network security and application concepts.<\/li><li>Knowledge in IPv6 security.<\/li><li>Knowledge of IPv6 applications and services.<\/li><\/ul><p class=\"has-normal-font-size\"><strong>Duration:<\/strong><\/p><p>2 days<\/p><p class=\"has-normal-font-size\"><strong>Training Approach:<\/strong><\/p><ul><li>This class covers both theoretical and practical knowledge.<\/li><li>The practical classes are conducted in online laboratory environment.<\/li><li>Quiz will be conducted during the class to test the knowledge of participants about a particular sub topic<\/li><li>Professional examination both theoretical and practical will conducted to test the participants knowledge towards end of the class<\/li><li>All the participants that passed the examination will be awarded certificate that endorsed by Global IPv6 Forum and WIDE Japan<\/li><\/ul><p class=\"has-normal-font-size\"><strong>Course Content:<\/strong><\/p><p>\u00a0The following is the outline of the course:<\/p><div class=\"wp-block-columns\"><div class=\"wp-block-column\"><p><strong>Network Side<\/strong><\/p><ul><li>Interfacing with ISP Router<\/li><li>Firewall<\/li><li>Network Address Translation (NAT)<\/li><li>Dynamic Host Configuration Protocol (DHCP)<\/li><li>Domain Name System (DNS )<\/li><li>Network Management Software (NMS)<\/li><li>Monitor all layer 3 network components<\/li><li>Testing &amp; compliance study<\/li><\/ul><p><strong>Server Side<\/strong><\/p><ul><li>Email<\/li><li>File Sharing<\/li><li>Web Server<\/li><li>General Servers\/OS<\/li><\/ul><p class=\"has-normal-font-size\"><strong>Client Side<\/strong><\/p><ul><li>PC\/Laptop<br \/>Apps<br \/>Mobile Phone<\/li><\/ul><p><strong>IPv6 Security<\/strong><\/p><ul><li>General Security Concepts<\/li><li>Security Advantages of IPv6<\/li><li>IPv6 Security Areas of Concern<\/li><li>IPv6 Security Similarities &amp; Differences Compared to IPv4 Security<\/li><\/ul><\/div><div class=\"wp-block-column\"><p class=\"has-normal-font-size\"><strong>Hands-on Configuration Workshop<\/strong><\/p><ul><li>Setting up and Configuring IPv6 on TM Unifi Fiberhome Bundled BTU &amp; Router<\/li><\/ul><\/div><\/div><p>Disclaimer: Course contents are subject to changes without prior notice.<\/p><\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Certification IPv6 Forum Logo Certification Program All the training courses are delivered via instructor-led approach with hands-on lab.\u00a0As these are certification programs, candidates are required to pass both the written and hands-on evaluation to qualify for the certificate. Instructor-Led Training \u00a0 Set in an interactive classroom environment, the instructor will introduce concepts and guide students &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/ipv6forummalaysia.my\/index.php\/certification\/\"> <span class=\"screen-reader-text\">Certification<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_eb_attr":"","site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-global-header-display":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":""},"class_list":["post-92","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/ipv6forummalaysia.my\/index.php\/wp-json\/wp\/v2\/pages\/92","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ipv6forummalaysia.my\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ipv6forummalaysia.my\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ipv6forummalaysia.my\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ipv6forummalaysia.my\/index.php\/wp-json\/wp\/v2\/comments?post=92"}],"version-history":[{"count":109,"href":"https:\/\/ipv6forummalaysia.my\/index.php\/wp-json\/wp\/v2\/pages\/92\/revisions"}],"predecessor-version":[{"id":1871,"href":"https:\/\/ipv6forummalaysia.my\/index.php\/wp-json\/wp\/v2\/pages\/92\/revisions\/1871"}],"wp:attachment":[{"href":"https:\/\/ipv6forummalaysia.my\/index.php\/wp-json\/wp\/v2\/media?parent=92"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}