Layer 2, or switched networks, brings in many great features, such as redundancy. The first step in the Westermo Certified Training program welcomes you to understand redundancy, VLANs and how to use WeConfig to configure your network
Course Overview
Prerequisite | Confident with IP and completion of course introduction to WeOS |
Level | |
Language | Available in English, German and French |
Training Equipment |
1 x L210-F2G |
Topics covered |
|
What you will learn | Confidently configuring and managing a redundant layer 2 network |
Exam | Yes |
Certification | Yes |
How to attend | In person |
Duration of course | 3 days |
What our attendees are saying
"Comprehensive, hands on learning in a relaxed and friendly environment"
– Steve Spring, Scottish and Southern Energy
"Ant took me from having very little knowledge of working on Westermo devices to a confident level over the 3 days. The training was thorough and throughout practical work we were given time to solve issues we came across. Much appreciated."
– Chris Canty, Scottish and Southern Energy
"A great course with really relevant content excellently delivered."
– Mark Ellis, MCS Control Systems
"'Informative course with plenty of practical exercises to cement techniques and principles imparted upon the learner. Very enjoyable."
– Lizz Van Ek, Dwr Cymru Welsh Water
Hi, my name is Christopher!
I am one of the technical trainers at Westermo and I am based in Sydney Australia. I thoroughly enjoy technical challenges and one thing paramount to success is solid technical training. I look forward to meeting you on one of our courses!
If you have any questions about this or another course, don't hesitate to contact me at academy@westermo.com.
This course welcomes you into the Westermo Certified Program and gives you the basic skills in order to understand industrial networks.
This course introduces you to WeOS and how to set up your WeOS device as well as presents our industrial networking configuration tool, WeConfig.
The Introduction to Cybersecurity course covers common threats and best practices to secure and harden your devices and networks.
Nuri Shakeer
International sales
For support inquiries, click here to contact Technical Support