SlideShare a Scribd company logo
JDMDE SPECIALISATION @
KAHO-SINT LIEVEN
Advanced Network Technologies
WHERE IS KAHO SINT-LIEVEN?
 Ghent! (Belgium)
2
WHICH SPECIALISATION DOES KAHO
SINT-LIEVEN OFFER?
 Advanced Network Technologies (ANT)
3
WHAT’S THE MAIN THEME?
 DISTRIBUTION of modern MULTIMEDIA
contents, where a solid INFRASTRUCTURE is
of high importance.
4
WHAT WILL STUDENTS LEARN?
 Set up a reliable network infrastructure
which allows broadcast of highly-
demanding multimedia applications.
 Configure and secure routers, switches and
firewalls.
 They’ll get to play (!) with the newest state-
of-the-art technologies.
5
WHO’S TEACHING?
6
WHICH COURSES ARE IN THIS
SPECIALISATION?
 Data Communication (11)
 Network Managment (4)
 Computer Security Systems (3)
 Advanced Network Technologies (6)
 Project work (6)
 Traineeship (30)
DATA COMMUNICATION (11)
 Intense theoretical and practical training of
networking and IP configuration skills
 Based on the official Cisco CCNA
curriculum.
NETWORK MANAGMENT (4)
 Deployment and configuration of a
Windows server environment.
COMPUTER SECURITY SYSTEMS (3)
 Enabling computer security
 Firewall technologies
 Hacking strategies
ADVANCED NETWORK
TECHNOLOGIES (6)
 Play-time!
 Hands-on experience with emerging
technologies such as VOIP, virtualisation,
QoS, streaming, etc.
PROJECT WORK (6) and
TRAINEESHIP (30)
 Consolidation of the knowledge in a final
team-project and traineeship

More Related Content

What's hot

Cybersecurity Network Security Training (Featured) - Tonex Training
Cybersecurity Network Security Training (Featured)  - Tonex TrainingCybersecurity Network Security Training (Featured)  - Tonex Training
Cybersecurity Network Security Training (Featured) - Tonex Training
Bryan Len
 
Damien dietsch skills v2
Damien dietsch skills v2Damien dietsch skills v2
Damien dietsch skills v2
Damien Dietsch
 
13.Anton-Position-Security-Considerations-23June2015[1]
13.Anton-Position-Security-Considerations-23June2015[1]13.Anton-Position-Security-Considerations-23June2015[1]
13.Anton-Position-Security-Considerations-23June2015[1]
Anton Kaska
 
Security_in_Satellite_Systems_Lisi_2015
Security_in_Satellite_Systems_Lisi_2015Security_in_Satellite_Systems_Lisi_2015
Security_in_Satellite_Systems_Lisi_2015
Marco Lisi
 
Using distributed firewalls in securing LANs
Using distributed firewalls in securing LANsUsing distributed firewalls in securing LANs
Using distributed firewalls in securing LANs
ANTHONY C. OKIGBO
 
Cisco Security Training | Qos Networking | Implementing Cisco Network Security
Cisco Security Training | Qos Networking | Implementing Cisco Network SecurityCisco Security Training | Qos Networking | Implementing Cisco Network Security
Cisco Security Training | Qos Networking | Implementing Cisco Network Security
qosnetworking
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
IEEEFINALSEMSTUDENTPROJECTS
 
Network Simulation Tools Research Thesis
Network Simulation Tools Research ThesisNetwork Simulation Tools Research Thesis
Network Simulation Tools Research Thesis
Network Simulation Tools
 
EU H2020 PRISMACLOUD Project Overview
EU H2020 PRISMACLOUD Project OverviewEU H2020 PRISMACLOUD Project Overview
EU H2020 PRISMACLOUD Project Overview
PRISMACLOUD Project
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
InfinIT - Innovationsnetværket for it
 
SocialUniversity:How Do Universities Use Social Media? An Empirical Survey of...
SocialUniversity:How Do Universities Use Social Media? An Empirical Survey of...SocialUniversity:How Do Universities Use Social Media? An Empirical Survey of...
SocialUniversity:How Do Universities Use Social Media? An Empirical Survey of...
Danube University Krems, Centre for E-Governance
 
Ccna training in cochin | Thrissur | Trivandrum | Kerala
Ccna training in cochin | Thrissur | Trivandrum | KeralaCcna training in cochin | Thrissur | Trivandrum | Kerala
Ccna training in cochin | Thrissur | Trivandrum | Kerala
IndiaOptions Softwares
 
Towards Deep Programmable Slicing at Netsoft'19 Distinguished Expert Panel
Towards Deep Programmable Slicing at Netsoft'19 Distinguished Expert PanelTowards Deep Programmable Slicing at Netsoft'19 Distinguished Expert Panel
Towards Deep Programmable Slicing at Netsoft'19 Distinguished Expert Panel
Christian Esteve Rothenberg
 
English Curriculum Csirt
English Curriculum  CsirtEnglish Curriculum  Csirt
English Curriculum Csirt
francisco_monserrat
 
Stegonography
StegonographyStegonography
Stegonography
PiryashineeVellasamy
 
Recommendations for ICT Standards in public administration, Andon Stefanovski
Recommendations for ICT Standards in public administration, Andon StefanovskiRecommendations for ICT Standards in public administration, Andon Stefanovski
Recommendations for ICT Standards in public administration, Andon Stefanovski
Metamorphosis
 
E Society Ict En
E Society Ict EnE Society Ict En
E Society Ict En
Metamorphosis
 
Topics in Networking for project and thesis
Topics in Networking for project and thesisTopics in Networking for project and thesis
Topics in Networking for project and thesis
Techsparks
 
Computer Science Dissertation Projects
Computer Science Dissertation ProjectsComputer Science Dissertation Projects
Computer Science Dissertation Projects
Phdtopiccom
 
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
Francesco Flammini
 

What's hot (20)

Cybersecurity Network Security Training (Featured) - Tonex Training
Cybersecurity Network Security Training (Featured)  - Tonex TrainingCybersecurity Network Security Training (Featured)  - Tonex Training
Cybersecurity Network Security Training (Featured) - Tonex Training
 
Damien dietsch skills v2
Damien dietsch skills v2Damien dietsch skills v2
Damien dietsch skills v2
 
13.Anton-Position-Security-Considerations-23June2015[1]
13.Anton-Position-Security-Considerations-23June2015[1]13.Anton-Position-Security-Considerations-23June2015[1]
13.Anton-Position-Security-Considerations-23June2015[1]
 
Security_in_Satellite_Systems_Lisi_2015
Security_in_Satellite_Systems_Lisi_2015Security_in_Satellite_Systems_Lisi_2015
Security_in_Satellite_Systems_Lisi_2015
 
Using distributed firewalls in securing LANs
Using distributed firewalls in securing LANsUsing distributed firewalls in securing LANs
Using distributed firewalls in securing LANs
 
Cisco Security Training | Qos Networking | Implementing Cisco Network Security
Cisco Security Training | Qos Networking | Implementing Cisco Network SecurityCisco Security Training | Qos Networking | Implementing Cisco Network Security
Cisco Security Training | Qos Networking | Implementing Cisco Network Security
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A secure client side deduplication sch...
 
Network Simulation Tools Research Thesis
Network Simulation Tools Research ThesisNetwork Simulation Tools Research Thesis
Network Simulation Tools Research Thesis
 
EU H2020 PRISMACLOUD Project Overview
EU H2020 PRISMACLOUD Project OverviewEU H2020 PRISMACLOUD Project Overview
EU H2020 PRISMACLOUD Project Overview
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
SocialUniversity:How Do Universities Use Social Media? An Empirical Survey of...
SocialUniversity:How Do Universities Use Social Media? An Empirical Survey of...SocialUniversity:How Do Universities Use Social Media? An Empirical Survey of...
SocialUniversity:How Do Universities Use Social Media? An Empirical Survey of...
 
Ccna training in cochin | Thrissur | Trivandrum | Kerala
Ccna training in cochin | Thrissur | Trivandrum | KeralaCcna training in cochin | Thrissur | Trivandrum | Kerala
Ccna training in cochin | Thrissur | Trivandrum | Kerala
 
Towards Deep Programmable Slicing at Netsoft'19 Distinguished Expert Panel
Towards Deep Programmable Slicing at Netsoft'19 Distinguished Expert PanelTowards Deep Programmable Slicing at Netsoft'19 Distinguished Expert Panel
Towards Deep Programmable Slicing at Netsoft'19 Distinguished Expert Panel
 
English Curriculum Csirt
English Curriculum  CsirtEnglish Curriculum  Csirt
English Curriculum Csirt
 
Stegonography
StegonographyStegonography
Stegonography
 
Recommendations for ICT Standards in public administration, Andon Stefanovski
Recommendations for ICT Standards in public administration, Andon StefanovskiRecommendations for ICT Standards in public administration, Andon Stefanovski
Recommendations for ICT Standards in public administration, Andon Stefanovski
 
E Society Ict En
E Society Ict EnE Society Ict En
E Society Ict En
 
Topics in Networking for project and thesis
Topics in Networking for project and thesisTopics in Networking for project and thesis
Topics in Networking for project and thesis
 
Computer Science Dissertation Projects
Computer Science Dissertation ProjectsComputer Science Dissertation Projects
Computer Science Dissertation Projects
 
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
 

Viewers also liked

test
test		test
About the band presentation
About the band presentationAbout the band presentation
About the band presentation
rebecca
 
Prezentare informatica-ACROBAT.com
Prezentare informatica-ACROBAT.comPrezentare informatica-ACROBAT.com
Prezentare informatica-ACROBAT.com
ciobanuaurelia
 
Presentation1
Presentation1Presentation1
Presentation1
rebecca
 
Wimax
WimaxWimax
How To Survive Heart Attack Urself 1205755169344183 2
How To Survive Heart Attack Urself 1205755169344183 2How To Survive Heart Attack Urself 1205755169344183 2
How To Survive Heart Attack Urself 1205755169344183 2
csucsu2004
 
An opportunity in memories preservation and sharing is for sale at auction
An opportunity in memories preservation and sharing is for sale at auctionAn opportunity in memories preservation and sharing is for sale at auction
An opportunity in memories preservation and sharing is for sale at auction
Memories Preservation Council
 
crm
crm		crm
Economic Indicators
Economic  IndicatorsEconomic  Indicators
Economic Indicators
Tok School
 
MPC Invitation
MPC InvitationMPC Invitation
Business Case Summary
Business Case SummaryBusiness Case Summary
Business Case Summary
JArangote_Consulting
 
Saki
SakiSaki
JUVI Preterite Notes
JUVI Preterite NotesJUVI Preterite Notes
JUVI Preterite Notes
HCHS
 
Example of Strategic Alliance Development by GCI Research, inc.
Example of Strategic Alliance Development by GCI Research, inc.Example of Strategic Alliance Development by GCI Research, inc.
Example of Strategic Alliance Development by GCI Research, inc.
Memories Preservation Council
 
Įmonės veiklos vertinimas taikant subalansuotų rodiklių metodą - Karolina 2008
Įmonės veiklos vertinimas taikant subalansuotų rodiklių metodą - Karolina 2008Įmonės veiklos vertinimas taikant subalansuotų rodiklių metodą - Karolina 2008
Įmonės veiklos vertinimas taikant subalansuotų rodiklių metodą - Karolina 2008Kudrevicius Geraldas
 
Economic Indicators
Economic IndicatorsEconomic Indicators
Economic Indicators
Tok School
 

Viewers also liked (17)

test
test		test
test
 
About the band presentation
About the band presentationAbout the band presentation
About the band presentation
 
Prezentare informatica-ACROBAT.com
Prezentare informatica-ACROBAT.comPrezentare informatica-ACROBAT.com
Prezentare informatica-ACROBAT.com
 
Presentation1
Presentation1Presentation1
Presentation1
 
Wimax
WimaxWimax
Wimax
 
How To Survive Heart Attack Urself 1205755169344183 2
How To Survive Heart Attack Urself 1205755169344183 2How To Survive Heart Attack Urself 1205755169344183 2
How To Survive Heart Attack Urself 1205755169344183 2
 
An opportunity in memories preservation and sharing is for sale at auction
An opportunity in memories preservation and sharing is for sale at auctionAn opportunity in memories preservation and sharing is for sale at auction
An opportunity in memories preservation and sharing is for sale at auction
 
crm
crm		crm
crm
 
Economic Indicators
Economic  IndicatorsEconomic  Indicators
Economic Indicators
 
Ch8(J)
Ch8(J)Ch8(J)
Ch8(J)
 
MPC Invitation
MPC InvitationMPC Invitation
MPC Invitation
 
Business Case Summary
Business Case SummaryBusiness Case Summary
Business Case Summary
 
Saki
SakiSaki
Saki
 
JUVI Preterite Notes
JUVI Preterite NotesJUVI Preterite Notes
JUVI Preterite Notes
 
Example of Strategic Alliance Development by GCI Research, inc.
Example of Strategic Alliance Development by GCI Research, inc.Example of Strategic Alliance Development by GCI Research, inc.
Example of Strategic Alliance Development by GCI Research, inc.
 
Įmonės veiklos vertinimas taikant subalansuotų rodiklių metodą - Karolina 2008
Įmonės veiklos vertinimas taikant subalansuotų rodiklių metodą - Karolina 2008Įmonės veiklos vertinimas taikant subalansuotų rodiklių metodą - Karolina 2008
Įmonės veiklos vertinimas taikant subalansuotų rodiklių metodą - Karolina 2008
 
Economic Indicators
Economic IndicatorsEconomic Indicators
Economic Indicators
 

Similar to JDMDE Specialisation KaHo Sint-Lieven

AHMED+MORSY+ABD+EL+BAKI+v1.1+updated+2016
AHMED+MORSY+ABD+EL+BAKI+v1.1+updated+2016AHMED+MORSY+ABD+EL+BAKI+v1.1+updated+2016
AHMED+MORSY+ABD+EL+BAKI+v1.1+updated+2016
Ahmed Morsy
 
Datasheet
DatasheetDatasheet
Datasheet
Carlos urrea
 
Telecom Italia
Telecom ItaliaTelecom Italia
Telecom Italia
Cisco Case Studies
 
Nat report103
Nat report103Nat report103
Nat report103
Davinder Chauhan
 
Md Sohrab Khan(Resume)
Md Sohrab Khan(Resume)Md Sohrab Khan(Resume)
Md Sohrab Khan(Resume)
Md Sohrab khan
 
JITHIN_JOY_RESUME_JuniperTAC
JITHIN_JOY_RESUME_JuniperTACJITHIN_JOY_RESUME_JuniperTAC
JITHIN_JOY_RESUME_JuniperTAC
JITHIN JOY
 
A Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network ProcessorsA Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network Processors
aciijournal
 
A Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network ProcessorsA Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network Processors
aciijournal
 
A Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network ProcessorsA Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network Processors
aciijournal
 
santoskumaarResume - updated
santoskumaarResume - updatedsantoskumaarResume - updated
santoskumaarResume - updated
Santos Kumaar.S
 
A COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORS
A COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORSA COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORS
A COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORS
aciijournal
 
Ecole Polytechnique Federale de Lausanne (EPFL)
Ecole Polytechnique Federale de Lausanne (EPFL)Ecole Polytechnique Federale de Lausanne (EPFL)
Ecole Polytechnique Federale de Lausanne (EPFL)
Cisco Case Studies
 
Michael Zaytsev-resume-Verint-2013-v3
Michael Zaytsev-resume-Verint-2013-v3Michael Zaytsev-resume-Verint-2013-v3
Michael Zaytsev-resume-Verint-2013-v3
Michael Zaytsev
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
Finalyearprojects Toall
 
Resume_Mimouni
Resume_MimouniResume_Mimouni
Resume_Mimouni
Mohammed Mimouni
 
Connectivity for the data centric era
Connectivity for the data centric eraConnectivity for the data centric era
Connectivity for the data centric era
DESMOND YUEN
 
Updated resume
Updated resumeUpdated resume
Updated resume
Maysarah Ibrahim
 
Developing Web-based Interactive Teaching System for Core Network Technology ...
Developing Web-based Interactive Teaching System for Core Network Technology ...Developing Web-based Interactive Teaching System for Core Network Technology ...
Developing Web-based Interactive Teaching System for Core Network Technology ...
drboon
 
Networking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training InstituteNetworking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training Institute
Networking Training
 
Scott A Boggs
Scott A BoggsScott A Boggs

Similar to JDMDE Specialisation KaHo Sint-Lieven (20)

AHMED+MORSY+ABD+EL+BAKI+v1.1+updated+2016
AHMED+MORSY+ABD+EL+BAKI+v1.1+updated+2016AHMED+MORSY+ABD+EL+BAKI+v1.1+updated+2016
AHMED+MORSY+ABD+EL+BAKI+v1.1+updated+2016
 
Datasheet
DatasheetDatasheet
Datasheet
 
Telecom Italia
Telecom ItaliaTelecom Italia
Telecom Italia
 
Nat report103
Nat report103Nat report103
Nat report103
 
Md Sohrab Khan(Resume)
Md Sohrab Khan(Resume)Md Sohrab Khan(Resume)
Md Sohrab Khan(Resume)
 
JITHIN_JOY_RESUME_JuniperTAC
JITHIN_JOY_RESUME_JuniperTACJITHIN_JOY_RESUME_JuniperTAC
JITHIN_JOY_RESUME_JuniperTAC
 
A Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network ProcessorsA Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network Processors
 
A Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network ProcessorsA Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network Processors
 
A Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network ProcessorsA Comparison of Four Series of CISCO Network Processors
A Comparison of Four Series of CISCO Network Processors
 
santoskumaarResume - updated
santoskumaarResume - updatedsantoskumaarResume - updated
santoskumaarResume - updated
 
A COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORS
A COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORSA COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORS
A COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORS
 
Ecole Polytechnique Federale de Lausanne (EPFL)
Ecole Polytechnique Federale de Lausanne (EPFL)Ecole Polytechnique Federale de Lausanne (EPFL)
Ecole Polytechnique Federale de Lausanne (EPFL)
 
Michael Zaytsev-resume-Verint-2013-v3
Michael Zaytsev-resume-Verint-2013-v3Michael Zaytsev-resume-Verint-2013-v3
Michael Zaytsev-resume-Verint-2013-v3
 
Providing user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure cloudsProviding user security guarantees in public infrastructure clouds
Providing user security guarantees in public infrastructure clouds
 
Resume_Mimouni
Resume_MimouniResume_Mimouni
Resume_Mimouni
 
Connectivity for the data centric era
Connectivity for the data centric eraConnectivity for the data centric era
Connectivity for the data centric era
 
Updated resume
Updated resumeUpdated resume
Updated resume
 
Developing Web-based Interactive Teaching System for Core Network Technology ...
Developing Web-based Interactive Teaching System for Core Network Technology ...Developing Web-based Interactive Teaching System for Core Network Technology ...
Developing Web-based Interactive Teaching System for Core Network Technology ...
 
Networking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training InstituteNetworking Course in bangalore | CCNA training Institute
Networking Course in bangalore | CCNA training Institute
 
Scott A Boggs
Scott A BoggsScott A Boggs
Scott A Boggs
 

Recently uploaded

GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
DianaGray10
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Ukraine
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
ScyllaDB
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
Ortus Solutions, Corp
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
ScyllaDB
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)
HarpalGohil4
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
leebarnesutopia
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsGetting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
ScyllaDB
 

Recently uploaded (20)

GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
 
Discover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched ContentDiscover the Unseen: Tailored Recommendation of Unwatched Content
Discover the Unseen: Tailored Recommendation of Unwatched Content
 
Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!Introducing BoxLang : A new JVM language for productivity and modularity!
Introducing BoxLang : A new JVM language for productivity and modularity!
 
ScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking ReplicationScyllaDB Tablets: Rethinking Replication
ScyllaDB Tablets: Rethinking Replication
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)
 
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdfLee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
Lee Barnes - Path to Becoming an Effective Test Automation Engineer.pdf
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's TipsGetting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
Getting the Most Out of ScyllaDB Monitoring: ShareChat's Tips
 

JDMDE Specialisation KaHo Sint-Lieven

  • 1. JDMDE SPECIALISATION @ KAHO-SINT LIEVEN Advanced Network Technologies
  • 2. WHERE IS KAHO SINT-LIEVEN?  Ghent! (Belgium) 2
  • 3. WHICH SPECIALISATION DOES KAHO SINT-LIEVEN OFFER?  Advanced Network Technologies (ANT) 3
  • 4. WHAT’S THE MAIN THEME?  DISTRIBUTION of modern MULTIMEDIA contents, where a solid INFRASTRUCTURE is of high importance. 4
  • 5. WHAT WILL STUDENTS LEARN?  Set up a reliable network infrastructure which allows broadcast of highly- demanding multimedia applications.  Configure and secure routers, switches and firewalls.  They’ll get to play (!) with the newest state- of-the-art technologies. 5
  • 7. WHICH COURSES ARE IN THIS SPECIALISATION?  Data Communication (11)  Network Managment (4)  Computer Security Systems (3)  Advanced Network Technologies (6)  Project work (6)  Traineeship (30)
  • 8. DATA COMMUNICATION (11)  Intense theoretical and practical training of networking and IP configuration skills  Based on the official Cisco CCNA curriculum.
  • 9. NETWORK MANAGMENT (4)  Deployment and configuration of a Windows server environment.
  • 10. COMPUTER SECURITY SYSTEMS (3)  Enabling computer security  Firewall technologies  Hacking strategies
  • 11. ADVANCED NETWORK TECHNOLOGIES (6)  Play-time!  Hands-on experience with emerging technologies such as VOIP, virtualisation, QoS, streaming, etc.
  • 12. PROJECT WORK (6) and TRAINEESHIP (30)  Consolidation of the knowledge in a final team-project and traineeship