SlideShare una empresa de Scribd logo
1 de 12
Descargar para leer sin conexión
JDMDE SPECIALISATION @
KAHO-SINT LIEVEN
Advanced Network Technologies
WHERE IS KAHO SINT-LIEVEN?
 Ghent! (Belgium)
2
WHICH SPECIALISATION DOES KAHO
SINT-LIEVEN OFFER?
 Advanced Network Technologies (ANT)
3
WHAT’S THE MAIN THEME?
 DISTRIBUTION of modern MULTIMEDIA
contents, where a solid INFRASTRUCTURE is
of high importance.
4
WHAT WILL STUDENTS LEARN?
 Set up a reliable network infrastructure
which allows broadcast of highly-
demanding multimedia applications.
 Configure and secure routers, switches and
firewalls.
 They’ll get to play (!) with the newest state-
of-the-art technologies.
5
WHO’S TEACHING?
6
WHICH COURSES ARE IN THIS
SPECIALISATION?
 Data Communication (11)
 Network Managment (4)
 Computer Security Systems (3)
 Advanced Network Technologies (6)
 Project work (6)
 Traineeship (30)
DATA COMMUNICATION (11)
 Intense theoretical and practical training of
networking and IP configuration skills
 Based on the official Cisco CCNA
curriculum.
NETWORK MANAGMENT (4)
 Deployment and configuration of a
Windows server environment.
COMPUTER SECURITY SYSTEMS (3)
 Enabling computer security
 Firewall technologies
 Hacking strategies
ADVANCED NETWORK
TECHNOLOGIES (6)
 Play-time!
 Hands-on experience with emerging
technologies such as VOIP, virtualisation,
QoS, streaming, etc.
PROJECT WORK (6) and
TRAINEESHIP (30)
 Consolidation of the knowledge in a final
team-project and traineeship

Más contenido relacionado

La actualidad más candente

Cybersecurity Network Security Training (Featured) - Tonex Training
Cybersecurity Network Security Training (Featured)  - Tonex TrainingCybersecurity Network Security Training (Featured)  - Tonex Training
Cybersecurity Network Security Training (Featured) - Tonex TrainingBryan Len
 
Damien dietsch skills v2
Damien dietsch skills v2Damien dietsch skills v2
Damien dietsch skills v2Damien Dietsch
 
13.Anton-Position-Security-Considerations-23June2015[1]
13.Anton-Position-Security-Considerations-23June2015[1]13.Anton-Position-Security-Considerations-23June2015[1]
13.Anton-Position-Security-Considerations-23June2015[1]Anton Kaska
 
Security_in_Satellite_Systems_Lisi_2015
Security_in_Satellite_Systems_Lisi_2015Security_in_Satellite_Systems_Lisi_2015
Security_in_Satellite_Systems_Lisi_2015Marco Lisi
 
Using distributed firewalls in securing LANs
Using distributed firewalls in securing LANsUsing distributed firewalls in securing LANs
Using distributed firewalls in securing LANsANTHONY C. OKIGBO
 
Cisco Security Training | Qos Networking | Implementing Cisco Network Security
Cisco Security Training | Qos Networking | Implementing Cisco Network SecurityCisco Security Training | Qos Networking | Implementing Cisco Network Security
Cisco Security Training | Qos Networking | Implementing Cisco Network Securityqosnetworking
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...IEEEFINALSEMSTUDENTPROJECTS
 
EU H2020 PRISMACLOUD Project Overview
EU H2020 PRISMACLOUD Project OverviewEU H2020 PRISMACLOUD Project Overview
EU H2020 PRISMACLOUD Project OverviewPRISMACLOUD Project
 
Ccna training in cochin | Thrissur | Trivandrum | Kerala
Ccna training in cochin | Thrissur | Trivandrum | KeralaCcna training in cochin | Thrissur | Trivandrum | Kerala
Ccna training in cochin | Thrissur | Trivandrum | KeralaIndiaOptions Softwares
 
Towards Deep Programmable Slicing at Netsoft'19 Distinguished Expert Panel
Towards Deep Programmable Slicing at Netsoft'19 Distinguished Expert PanelTowards Deep Programmable Slicing at Netsoft'19 Distinguished Expert Panel
Towards Deep Programmable Slicing at Netsoft'19 Distinguished Expert PanelChristian Esteve Rothenberg
 
Recommendations for ICT Standards in public administration, Andon Stefanovski
Recommendations for ICT Standards in public administration, Andon StefanovskiRecommendations for ICT Standards in public administration, Andon Stefanovski
Recommendations for ICT Standards in public administration, Andon StefanovskiMetamorphosis
 
Topics in Networking for project and thesis
Topics in Networking for project and thesisTopics in Networking for project and thesis
Topics in Networking for project and thesisTechsparks
 
Computer Science Dissertation Projects
Computer Science Dissertation ProjectsComputer Science Dissertation Projects
Computer Science Dissertation ProjectsPhdtopiccom
 
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021Francesco Flammini
 

La actualidad más candente (20)

Cybersecurity Network Security Training (Featured) - Tonex Training
Cybersecurity Network Security Training (Featured)  - Tonex TrainingCybersecurity Network Security Training (Featured)  - Tonex Training
Cybersecurity Network Security Training (Featured) - Tonex Training
 
Damien dietsch skills v2
Damien dietsch skills v2Damien dietsch skills v2
Damien dietsch skills v2
 
13.Anton-Position-Security-Considerations-23June2015[1]
13.Anton-Position-Security-Considerations-23June2015[1]13.Anton-Position-Security-Considerations-23June2015[1]
13.Anton-Position-Security-Considerations-23June2015[1]
 
Security_in_Satellite_Systems_Lisi_2015
Security_in_Satellite_Systems_Lisi_2015Security_in_Satellite_Systems_Lisi_2015
Security_in_Satellite_Systems_Lisi_2015
 
Using distributed firewalls in securing LANs
Using distributed firewalls in securing LANsUsing distributed firewalls in securing LANs
Using distributed firewalls in securing LANs
 
Cisco Security Training | Qos Networking | Implementing Cisco Network Security
Cisco Security Training | Qos Networking | Implementing Cisco Network SecurityCisco Security Training | Qos Networking | Implementing Cisco Network Security
Cisco Security Training | Qos Networking | Implementing Cisco Network Security
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
 
Network Simulation Tools Research Thesis
Network Simulation Tools Research ThesisNetwork Simulation Tools Research Thesis
Network Simulation Tools Research Thesis
 
EU H2020 PRISMACLOUD Project Overview
EU H2020 PRISMACLOUD Project OverviewEU H2020 PRISMACLOUD Project Overview
EU H2020 PRISMACLOUD Project Overview
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
SocialUniversity:How Do Universities Use Social Media? An Empirical Survey of...
SocialUniversity:How Do Universities Use Social Media? An Empirical Survey of...SocialUniversity:How Do Universities Use Social Media? An Empirical Survey of...
SocialUniversity:How Do Universities Use Social Media? An Empirical Survey of...
 
Ccna training in cochin | Thrissur | Trivandrum | Kerala
Ccna training in cochin | Thrissur | Trivandrum | KeralaCcna training in cochin | Thrissur | Trivandrum | Kerala
Ccna training in cochin | Thrissur | Trivandrum | Kerala
 
Towards Deep Programmable Slicing at Netsoft'19 Distinguished Expert Panel
Towards Deep Programmable Slicing at Netsoft'19 Distinguished Expert PanelTowards Deep Programmable Slicing at Netsoft'19 Distinguished Expert Panel
Towards Deep Programmable Slicing at Netsoft'19 Distinguished Expert Panel
 
English Curriculum Csirt
English Curriculum  CsirtEnglish Curriculum  Csirt
English Curriculum Csirt
 
Stegonography
StegonographyStegonography
Stegonography
 
Recommendations for ICT Standards in public administration, Andon Stefanovski
Recommendations for ICT Standards in public administration, Andon StefanovskiRecommendations for ICT Standards in public administration, Andon Stefanovski
Recommendations for ICT Standards in public administration, Andon Stefanovski
 
E Society Ict En
E Society Ict EnE Society Ict En
E Society Ict En
 
Topics in Networking for project and thesis
Topics in Networking for project and thesisTopics in Networking for project and thesis
Topics in Networking for project and thesis
 
Computer Science Dissertation Projects
Computer Science Dissertation ProjectsComputer Science Dissertation Projects
Computer Science Dissertation Projects
 
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
 

Destacado

About the band presentation
About the band presentationAbout the band presentation
About the band presentationrebecca
 
Prezentare informatica-ACROBAT.com
Prezentare informatica-ACROBAT.comPrezentare informatica-ACROBAT.com
Prezentare informatica-ACROBAT.comciobanuaurelia
 
Presentation1
Presentation1Presentation1
Presentation1rebecca
 
How To Survive Heart Attack Urself 1205755169344183 2
How To Survive Heart Attack Urself 1205755169344183 2How To Survive Heart Attack Urself 1205755169344183 2
How To Survive Heart Attack Urself 1205755169344183 2csucsu2004
 
An opportunity in memories preservation and sharing is for sale at auction
An opportunity in memories preservation and sharing is for sale at auctionAn opportunity in memories preservation and sharing is for sale at auction
An opportunity in memories preservation and sharing is for sale at auctionMemories Preservation Council
 
Economic Indicators
Economic  IndicatorsEconomic  Indicators
Economic IndicatorsTok School
 
JUVI Preterite Notes
JUVI Preterite NotesJUVI Preterite Notes
JUVI Preterite NotesHCHS
 
Example of Strategic Alliance Development by GCI Research, inc.
Example of Strategic Alliance Development by GCI Research, inc.Example of Strategic Alliance Development by GCI Research, inc.
Example of Strategic Alliance Development by GCI Research, inc.Memories Preservation Council
 
Įmonės veiklos vertinimas taikant subalansuotų rodiklių metodą - Karolina 2008
Įmonės veiklos vertinimas taikant subalansuotų rodiklių metodą - Karolina 2008Įmonės veiklos vertinimas taikant subalansuotų rodiklių metodą - Karolina 2008
Įmonės veiklos vertinimas taikant subalansuotų rodiklių metodą - Karolina 2008Kudrevicius Geraldas
 
Economic Indicators
Economic IndicatorsEconomic Indicators
Economic IndicatorsTok School
 

Destacado (17)

test
test		test
test
 
About the band presentation
About the band presentationAbout the band presentation
About the band presentation
 
Prezentare informatica-ACROBAT.com
Prezentare informatica-ACROBAT.comPrezentare informatica-ACROBAT.com
Prezentare informatica-ACROBAT.com
 
Presentation1
Presentation1Presentation1
Presentation1
 
Wimax
WimaxWimax
Wimax
 
How To Survive Heart Attack Urself 1205755169344183 2
How To Survive Heart Attack Urself 1205755169344183 2How To Survive Heart Attack Urself 1205755169344183 2
How To Survive Heart Attack Urself 1205755169344183 2
 
An opportunity in memories preservation and sharing is for sale at auction
An opportunity in memories preservation and sharing is for sale at auctionAn opportunity in memories preservation and sharing is for sale at auction
An opportunity in memories preservation and sharing is for sale at auction
 
crm
crm		crm
crm
 
Economic Indicators
Economic  IndicatorsEconomic  Indicators
Economic Indicators
 
Ch8(J)
Ch8(J)Ch8(J)
Ch8(J)
 
MPC Invitation
MPC InvitationMPC Invitation
MPC Invitation
 
Business Case Summary
Business Case SummaryBusiness Case Summary
Business Case Summary
 
Saki
SakiSaki
Saki
 
JUVI Preterite Notes
JUVI Preterite NotesJUVI Preterite Notes
JUVI Preterite Notes
 
Example of Strategic Alliance Development by GCI Research, inc.
Example of Strategic Alliance Development by GCI Research, inc.Example of Strategic Alliance Development by GCI Research, inc.
Example of Strategic Alliance Development by GCI Research, inc.
 
Įmonės veiklos vertinimas taikant subalansuotų rodiklių metodą - Karolina 2008
Įmonės veiklos vertinimas taikant subalansuotų rodiklių metodą - Karolina 2008Įmonės veiklos vertinimas taikant subalansuotų rodiklių metodą - Karolina 2008
Įmonės veiklos vertinimas taikant subalansuotų rodiklių metodą - Karolina 2008
 
Economic Indicators
Economic IndicatorsEconomic Indicators
Economic Indicators
 

Similar a JDMDE Specialisation KaHo Sint-Lieven

AHMED+MORSY+ABD+EL+BAKI+v1.1+updated+2016
AHMED+MORSY+ABD+EL+BAKI+v1.1+updated+2016AHMED+MORSY+ABD+EL+BAKI+v1.1+updated+2016
AHMED+MORSY+ABD+EL+BAKI+v1.1+updated+2016Ahmed Morsy
 
Md Sohrab Khan(Resume)
Md Sohrab Khan(Resume)Md Sohrab Khan(Resume)
Md Sohrab Khan(Resume)Md Sohrab khan
 
JITHIN_JOY_RESUME_JuniperTAC
JITHIN_JOY_RESUME_JuniperTACJITHIN_JOY_RESUME_JuniperTAC
JITHIN_JOY_RESUME_JuniperTACJITHIN JOY
 
A Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network ProcessorsA Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network Processorsaciijournal
 
A Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network ProcessorsA Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network Processorsaciijournal
 
A Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network ProcessorsA Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network Processorsaciijournal
 
santoskumaarResume - updated
santoskumaarResume - updatedsantoskumaarResume - updated
santoskumaarResume - updatedSantos Kumaar.S
 
A COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORS
A COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORSA COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORS
A COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORSaciijournal
 
Ecole Polytechnique Federale de Lausanne (EPFL)
Ecole Polytechnique Federale de Lausanne (EPFL)Ecole Polytechnique Federale de Lausanne (EPFL)
Ecole Polytechnique Federale de Lausanne (EPFL)Cisco Case Studies
 
Michael Zaytsev-resume-Verint-2013-v3
Michael Zaytsev-resume-Verint-2013-v3Michael Zaytsev-resume-Verint-2013-v3
Michael Zaytsev-resume-Verint-2013-v3Michael Zaytsev
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsFinalyearprojects Toall
 
Connectivity for the data centric era
Connectivity for the data centric eraConnectivity for the data centric era
Connectivity for the data centric eraDESMOND YUEN
 
Developing Web-based Interactive Teaching System for Core Network Technology ...
Developing Web-based Interactive Teaching System for Core Network Technology ...Developing Web-based Interactive Teaching System for Core Network Technology ...
Developing Web-based Interactive Teaching System for Core Network Technology ...drboon
 
Networking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training InstituteNetworking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training InstituteNetworking Training
 

Similar a JDMDE Specialisation KaHo Sint-Lieven (20)

AHMED+MORSY+ABD+EL+BAKI+v1.1+updated+2016
AHMED+MORSY+ABD+EL+BAKI+v1.1+updated+2016AHMED+MORSY+ABD+EL+BAKI+v1.1+updated+2016
AHMED+MORSY+ABD+EL+BAKI+v1.1+updated+2016
 
Datasheet
DatasheetDatasheet
Datasheet
 
Telecom Italia
Telecom ItaliaTelecom Italia
Telecom Italia
 
Nat report103
Nat report103Nat report103
Nat report103
 
Md Sohrab Khan(Resume)
Md Sohrab Khan(Resume)Md Sohrab Khan(Resume)
Md Sohrab Khan(Resume)
 
JITHIN_JOY_RESUME_JuniperTAC
JITHIN_JOY_RESUME_JuniperTACJITHIN_JOY_RESUME_JuniperTAC
JITHIN_JOY_RESUME_JuniperTAC
 
A Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network ProcessorsA Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network Processors
 
A Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network ProcessorsA Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network Processors
 
A Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network ProcessorsA Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network Processors
 
santoskumaarResume - updated
santoskumaarResume - updatedsantoskumaarResume - updated
santoskumaarResume - updated
 
A COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORS
A COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORSA COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORS
A COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORS
 
Ecole Polytechnique Federale de Lausanne (EPFL)
Ecole Polytechnique Federale de Lausanne (EPFL)Ecole Polytechnique Federale de Lausanne (EPFL)
Ecole Polytechnique Federale de Lausanne (EPFL)
 
Michael Zaytsev-resume-Verint-2013-v3
Michael Zaytsev-resume-Verint-2013-v3Michael Zaytsev-resume-Verint-2013-v3
Michael Zaytsev-resume-Verint-2013-v3
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
 
Resume_Mimouni
Resume_MimouniResume_Mimouni
Resume_Mimouni
 
Connectivity for the data centric era
Connectivity for the data centric eraConnectivity for the data centric era
Connectivity for the data centric era
 
Updated resume
Updated resumeUpdated resume
Updated resume
 
Developing Web-based Interactive Teaching System for Core Network Technology ...
Developing Web-based Interactive Teaching System for Core Network Technology ...Developing Web-based Interactive Teaching System for Core Network Technology ...
Developing Web-based Interactive Teaching System for Core Network Technology ...
 
Networking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training InstituteNetworking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training Institute
 
Scott A Boggs
Scott A BoggsScott A Boggs
Scott A Boggs
 

Último

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 

Último (20)

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 

JDMDE Specialisation KaHo Sint-Lieven

  • 1. JDMDE SPECIALISATION @ KAHO-SINT LIEVEN Advanced Network Technologies
  • 2. WHERE IS KAHO SINT-LIEVEN?  Ghent! (Belgium) 2
  • 3. WHICH SPECIALISATION DOES KAHO SINT-LIEVEN OFFER?  Advanced Network Technologies (ANT) 3
  • 4. WHAT’S THE MAIN THEME?  DISTRIBUTION of modern MULTIMEDIA contents, where a solid INFRASTRUCTURE is of high importance. 4
  • 5. WHAT WILL STUDENTS LEARN?  Set up a reliable network infrastructure which allows broadcast of highly- demanding multimedia applications.  Configure and secure routers, switches and firewalls.  They’ll get to play (!) with the newest state- of-the-art technologies. 5
  • 7. WHICH COURSES ARE IN THIS SPECIALISATION?  Data Communication (11)  Network Managment (4)  Computer Security Systems (3)  Advanced Network Technologies (6)  Project work (6)  Traineeship (30)
  • 8. DATA COMMUNICATION (11)  Intense theoretical and practical training of networking and IP configuration skills  Based on the official Cisco CCNA curriculum.
  • 9. NETWORK MANAGMENT (4)  Deployment and configuration of a Windows server environment.
  • 10. COMPUTER SECURITY SYSTEMS (3)  Enabling computer security  Firewall technologies  Hacking strategies
  • 11. ADVANCED NETWORK TECHNOLOGIES (6)  Play-time!  Hands-on experience with emerging technologies such as VOIP, virtualisation, QoS, streaming, etc.
  • 12. PROJECT WORK (6) and TRAINEESHIP (30)  Consolidation of the knowledge in a final team-project and traineeship