GPON and FTTx networks training course description Designed to benefit those requiring an in depth knowledge of the principles and applications of Ten Gigabit and Gigabit Passive Optical Networking and Fibre to the X in NG Networks applications and their associated equipment, its flexibility and function within a modern transmission network. Using an effective mix of 'hands on' equipment instruction and correlation to theory based learning the delegate will gain a complete understanding of the equipment and the tasks to be undertaken in a real life situation. What will you learn Compare PON/FTTx systems. Explain network elements and designs. Support applications and network interfaces. List circuit provisioning and bandwidth requirements. Understand upstream & downstream issues. Describe headend & network elements/OLT-ONT. Perform network testing with OTDR test sets. GPON and FTTx networks training course details Who will benefit: Anyone working with GPON and FTTx. Prerequisites: Introduction to data communications and networking. Duration 5 days GPON and FTTx training course contents FTTN, FTTC, FTTH SMF, MMF, Fibre safety and properties (dispersion/attenuation), Fibre reel cables and types, Fibre installation and air blown fibre, Transmitters and receivers - power budget/laser classes. Fibre to the home (FTTH), FTTC (Fibre to the Cabinet), FTTN (Fibre to the node) , FTTD (Fibre to the desk), FFTH topologies and wavelengths, Active or passive optical network. WDM equipment and GPON OSP design Wavelength considerations, WDM/DWDM/CWDM, EDFA optical amplification, AWG (Arrayed Waveguide Grating) splitters , Couplers (splitters) and losses, Optical splitters 1x2, 1x4, 1x8, 1x16, 1x32, 1x64, 2x64. PON variants Gigabit passive optical network (GPON), Gigabit Ethernet passive optical network (GEPON), Time division PON (TDM-PON), Wave Division Multiplexing PON (WDM-PON), 1Gbps, 10Gbps, 40Ggps, 100Gbps FSAN (Full Service Access Network) NGA (Next Generation Access), Strategies for TDM-PON to WDM-PON migration, Architecture of NG-PON (hybrid WDM/TDM PON), Additional services than triple play. GEPON design GPON OSP centralized and distributed design, GPON PON splitters x4 x8 x32, Fibre splice trays /cassette trays & enclosures, GPON field testing and installation verification, GPON physical layer testing, Optical time domain reflectometer (OTDR), Optical power source & meter, Optical return loss (ORL), APON/BPON/GPON/EPON comparisons. GPON ITU-T G.984.1 Reference model, terminology & architecture, Access network system management functions. ONT & OLT functional block examples. FTTx scenarios, 4 switching arrangements for external access network backup. GPON ITU-T G.984.2 Physical layer, Enhancement band, Bit rate and wavelengths, FEC and RAMAN. GPON ITU-T G.984.3 Frame structure, GPON encapsulation method (GEM), GTC adaptation and framing sublayer protocol stack, Status reporting & traffic monitoring DBA (SR-DBA & TM-DBA), Transmission container (T-CONT) types, Downstream & upstream multiplexing, GEM port identifier, Media access control and ONU registration, Extended bandwidth assignment model scheduling architecture, PLOAM & alarm messages, Downstream & Upstream FEC, Process order in a GTC transmit flow. GPON ITU-T G.984.4 and G.988 ONT management and control interface (OMCI) Management interface, Reference model, Typical ONT with SCTE 55-1 or SCTE 55-2 compliancy. GPON ITU-T G.984.5 enhancement band Band options, GPON NGA, Wavelength allocation. GPON ITU-T G.984.6 optical reach extension (G.984.re) Reach extension (RE), OA-based and OEO-based reach extenders, Protection, Reach extender with OTDR blocking filters (BF) and bypass (BYP) filters. GPON ITU-T G.984.7 long reach Quiet Window. 10-GPON ITU-T G.987.1 (XG-PON) Scenarios, reference access network architecture, XG-PON with G-PON through WDM1r, G-PON and XG-PON wavelength allocation, G-PON and XG-PON co-existence with video overlay option, RE migration scenarios. G.989 40Gbps XG-PON2 Functional reference architecture, NG-PON2 system coexistence with legacy systems, Definitions of legacy compatibility terminology. GPON issues and standards GPON components GPON OLT / GPON ONT, GPON management, Operational support systems (OSS), Network management systems (NMS), OMCI (ONT Management control interface), RG (Residential gateway), Data and prioritised voice channel product, GPON broadband-forum standards, Broadband-forum , TR-069 and TR-156, HPNA (home phone network alliance), Powerline carrier (PLC), GPON DLNI G.hn or G.9960, MOCA, FTTH council certification standard for network certification. Fibre-connected home badge, Ethernet in the first mile (EFM), GPON frame synchronization to network timing, Direct clock synchronization interface (BITS), Multiservice access platform (MSAP), Software planning tool, Superconnected cities / voucher scheme. Hands on practical assignments Single and multimode fibre recognition, Fibre Cleaning methods, Checking cleaning with an optical microscope, Optical light source and optical power meter referencing, PON splitter and fibre drum testing with an optical power meter, 6km classroom passive optical network testing with an OTDR at 1310/1550nm, Using decibels (dB's) and decibel milliwats (dBm's), Designing networks up to 20km long using vendor specifications (power budget), Fault finding with a visible fault locator.
Duration 5 Days 30 CPD hours Earning your SHRM Certified Professional (SHRM-CP) or SHRM Senior Certified Professional (SHRM-SCP) credential makes you a recognized expert and leader in the HR field and a valuable asset to your organization, keeping you and your organization more competitive in today's economy. This professional distinction sets you apart from your colleagues, proving your high level of knowledge and skills. Students will be able to identify areas of strength and build on them. They will also see where they will need further concentrated study in preparation for their exam. 1 - INTRODUCTION The SHRM Body of Competency and Knowledge? (BoCK) The SHRM-CP and SHRM-SCP Certifications The SHRM Learning System© for SHRM-CP/SHRM-SCP 2 - HR COMPETENCIES Behavioral Competencies 3 - DOMAIN 1: PEOPLE Functional Area #1: HR Strategic Planning Functional Area #2: Talent Acquisition Functional Area #3: Employee Engagement and Retention Functional Area #4: Learning and Development Functional Area #5: Total Rewards 4 - DOMAIN 2: ORGANIZATION Functional Area #6: Structure of the HR Function Functional Area #7: Organizational Effectiveness and Development Functional Area #8: Workforce Management Functional Area #9: Employee and Labor Relations Functional Area #10: Technology Management 5 - DOMAIN 3: WORKPLACE Functional Area #11: HR in the Global Context Functional Area #12: Diversity and Inclusion Functional Area #13: Risk Management Functional Area #14: Corporate Social Responsibly Functional Area #15: U.S. Employment Law and Regulations 6 - FINAL EXAM/REVIEW/DISCUSSION Additional course details: Nexus Humans SHRM-CP/SHRM-SCP Certification Preparation training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SHRM-CP/SHRM-SCP Certification Preparation course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
We offer the most advanced “Certified Six Sigma Green Belt Course” as per the curriculum outline of The ASQ Body of Knowledge and accredited by top international Lean & Six Sigma accreditation bodies. Six Sigma Green Belt Deliverables: 22+ hours of Instructor-led interactive virtual classroom session on the weekend Access to 45+ hours of Module based Six Sigma lectures via LMS 100+ Toolkits and Project Templates for Analysis and Implementation Soft copy of Lean Six Sigma Green Belt Body of Knowledge Live Data-oriented project, with Scenario and Analysis Methodology 20+ Dummy Projects and Case studies for Lean Six Sigma Application Support via subject expert through telephonic discussion on the weekend Sample Questions and Examination Guide for Certification Preparation Pre and Post assignments for process groups and knowledge areas Project implementation support and Data visualization using MINITAB PRO CLSSGB certification examination anytime within the 90 days course duration Certification Validation Tool for third-party credentials validation PARTICULARS Duration (Hours) 1. Define Phase 22 2. Measure Phase 14 3. Analyse Phase 20 4. Improve Phase 7 5. Control Phase 7 Total Duration 70 (Hours) Introduction Become an expert in six sigma methodology by getting hands-on knowledge on DMAIC, Project Charter, Process Capability, FMEA, Sigma calculation, Test of Hypothesis, Control Charts, VSM, JIT using real case scenarios and real-life examples. Lean and DMAIC methodologies using live projects. The Six Sigma Certification is accredited by The Council for Six Sigma Certification. The certification also acknowledges the BOK outline of The American Society for Quality, USA. The course features world-class content with live projects and MINITAB PRO driven data analysis training with end to end support in project implementation by Master Black Belt Experts and Trainers. What is Six Sigma Certification? A person with Six Sigma certification has problem-solving abilities. Someone may gain Green Belt, Black Belt or Master Black Belt certification. The higher certification one attains, the more is the ability to solve complex organizational problems. Six Sigma certification is a process of individual’s knowledge validation using a classification system, generally referred to as "Belts" (Green Belt, Black Belt, Master Black Belt) This verification test individual commands over six sigma methodology and tools. The belt classification shows the position these certified individuals would occupy in an organizational structure and job roles. Six Sigma Green Belt training is especially for the future project leaders of Lean Six Sigma projects. We deliberately mix non-profit with profit participants. There will then be fun, useful discussions and knowledge exchanges during the training sessions. In addition, there are also many self-employed people who follow the LSS Green Belt training to increase their expertise as in a trimmer. What do you do to get the Six Sigma Green Belt certificate? Our Six Sigma Green Belt training consists of a number of components: Training: in an intensive training program you learn the background of Lean and Six Sigma and we put what we have learned into practice with different simulations. Extra: With our Body of Knowledge and whitepapers you place what you have learned in a theoretical framework. The program also contains various homework assignments, in which we focus, among other things, on the use of MINITAB PRO. Follow-up: During the training, you will receive an access code to an e-learning module. You can pass the substance again in an interactive way. Exam: On the last training day you will make the CLSSGB Green Belt exam. If you succeed, you will immediately receive the official Certified Lean Six Sigma Green Belt certification. Global Recognition of Your Certification: Agenda Overview of Six Sigma and the organizationSix Sigma and organizational goalsValue of six sigmaOrganizational goals and six sigma projectsOrganizational drivers and metricsLean principles in the organizationLean conceptsValue-streaming mappingDesign for six sigma (DFSS) methodologiesRoadmaps for DFSSBasic failure mode and effects analysis (FMEA)Design FMEA and process FMEA Define PhaseProject identificationProject SelectionProcess elementsBenchmarkingProcess inputs and outputsOwners and stakeholders Voice of the customer (VOC) Customer identificationCustomer dataCustomer requirements Project Management Basics Project charterProject scopeProject metricsProject planning toolsProject documentationProject risk analysisProject closureManagement and planning toolsBusiness results for projectsProcess performance CommunicationTeam dynamics and performanceTeam stages and dynamicsTeam roles and responsibilitiesTeam toolsTeam Communication Measure PhaseProcess analysis and documentationProbability and statisticsBasic probability conceptsCentral limit theorem, Statistical distributions, Collecting and summarizing dataTypes of data and measurement scalesSampling and data collection methodsDescriptive statisticsGraphical methodsMeasure Phase (contd E. Measurement system analysis (MSA) F. Process and performance capabilityProcess performance vs. process specificationsProcess capability studiesProcess capability (Cp, Cpk) and process performance (Pp, Ppk) indicesShort-term vs. long-term capability and sigma shift Analyze PhaseExploratory data analysisMulti-vari studiesCorrelation and linear regression B, Hypothesis testingBasics Tests for means, variances, and proportionsIntroduction to MINITAB Data analysis Improve Phase of Six SigmaDesign of experiments (DOE)Basic terms, DOE graphs, and plotsThe root cause analysisLean Tools 1. Waste elimination 2. Cycle-time reduction 3. Kaizen and kaizen blitz V1. Control PhaseStatistical process control (SPC)SPC BasicsRational subgroupingControl chartsControl planLean tools for process controlTotal productive maintenance (TPM)Visual factory Project Implementation & SupportMINITAB Practice and guidance for projectProject implementation supportTemplates and Toolkits application for Project workSupport on Data Project, Implementation and project completion BenefitsFrom the course Learn the principles and philosophy behind the Six Sigma technique Learn to apply statistical methods to improve business processes Design and implement Six Sigma projects in a practical scenario Learn the DMAIC process and various tools used in Six Sigma methodology Knowledge of Six Sigma Green Belt Professional enables you to understand real-world business problems, increase an organization's revenue by streamlining the process, and become an asset to an organization According to Villanova University, employers such as United Health Group, Honeywell, GE and Volkswagen have been actively seeking professionals with Six Sigma to fill a variety of positions The Training enhances your skills and enables you to perform roles like Quality Manager, Quality Analyst, Finance Manager, Supervisor, Quality Control, etc. According to Indeed.com, the national average salary for a Six Sigma Green Belt is $72,000 per year in the United States. From the workshop Instructor LED training by Six Sigma Black Belt and Master Belt experts to make candidate learn the real scenario of six sigma tools and methodology Learn the principles and philosophy behind the Six Sigma method Dummy project by instructors to make candidate get a hands-on six sigma projects Downloadable Six Sigma PPT & Six Sigma PDF Industry Based case studies High-Quality training from an experienced trainer The Program extensively uses Minitab, specialized statistical software. It provides you with a thorough knowledge of Six Sigma philosophies and principles (including supporting systems and tools). Know about six sigma certification cost and six sigma green belt certification cost. Who should attend? The Six Sigma program is designed for professionals and students who want to develop the ability to lead process improvement initiatives. Six Sigma tools and process is widely used in all business processes. Six Sigma is applicable in all industry and in all functional areas. An indicative list of participants in our Green Belt program could include: Financial/business analyst Commodity manager Project manager Quality manager Production manager Production Engineer Business development manager Manufacturing process engineer Continuous improvement director Business managers or consultants Project manager/Program Manager Director or VP of operations CEO, CFO, CTO Certification On successful completion of the course and course requisites, the candidate will receive Internationally recognized Six Sigma Green Belt Certification. This course offers Six Sigma Certification Validation Tool for Employers Your Six Sigma Certification Validation Tool can be used by employers, clients and other stakeholders to validate the authenticity of your Six Sigma Certifications you have received. Using the programming code located on your certified LSSGB certification, one can see all your training and certification details online.
Duration 1 Days 6 CPD hours This course is intended for System administrators and security operations personnel, including analysts and managers Overview By the end of the course, you should be able to meet the following objectives: Describe the components and capabilities of the Carbon Black EDR server Identify the architecture and data flows for Carbon Black EDR communication Identify the architecture for a cluster configuration and Carbon Black EDR cluster communication Describe the Carbon Black EDR server data types and data locations Use the API to interact with the Carbon Black EDR server without using the UI Create custom threat feeds for use in the Carbon Black EDR server Perform the integration with a syslog server Use different server-side scripts for troubleshooting Troubleshoot sensor-side configurations and communication This course teaches you how to use the advanced features of the VMware Carbon Black© EDR? product. This usage includes gaining access to the Linux server for management and troubleshooting in addition to configuring integrations and using the API. This course provides an in-depth, technical understanding of the Carbon Black EDR product through comprehensive coursework and hands-on scenario-based labs. This class focuses exclusively on advanced technical topics related to the technical back-end configuration and maintenance Course Introduction Introductions and course logistics Course objectives Architecture Data flows and channels Sizing considerations Communication channels and ports Server Datastores SOLR database Storage configurations and data aging Partition states Postgres Modulestore EDR API CBAPI overview Viewing API calls in the browser Utilizing the API to access data Threat Intelligence Feeds Feed structure Report indicator types Custom threat feed creation and addition Syslog Integration SIEM support Configuration Troubleshooting Server-side scripts Server logs Sensor operations Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Carbon Black EDR Advanced Administrator training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Carbon Black EDR Advanced Administrator course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
ICA International Diploma in Anti Money Laundering -Flagship qualification This ICA Diploma in Anti Money Laundering training course is an in-depth, graduate level programme which will provide Participants with a professional qualification in anti-money laundering upon completion and helps individuals develop best practice initiatives and prepares them to face present and future challenges, reducing risk. This qualification is increasingly important for professionals as money laundering prevention remains high on the agenda for financial services professionals. This Diploma will help Participants find an integrated approach to fighting the risk is needed and knowledgeable. There are many benefits of studying with ICA: Flexible learning solutions that are suited to you Our learner-centric approach means that you will gain relevant practical and academic skills and knowledge that can be used in your current role Improve your career options by undertaking a globally recognised qualification that hiring managers look for as part of their hiring criteria Many students have stated that they have received a promotion and/or pay rise as a direct result of gaining their qualification The qualifications ensure that you are enabled to develop strategies to help manage and prevent risk within your firm, thus making you an invaluable asset within the current climate Course format 9-month course assessed by 3 written assignments (3,000 - 3,500 words) A mixture of guided online study and participation in live sessions: 2 x virtual classrooms* 1 x immersive learning scenario (putting you at the centre of a story) 3 x tutorials (a chance to discuss elements of the course in more depth) 3 x assessment preparation sessions Videos covering the latest industry developments and case studies Access to the ICA members' portal containing additional reading and resources Proactive support throughout the course to help you stay on track Students of this course will achieve the following outcomes: Increased potential for career progression Extensive knowledge and highly developed AML skills Enhanced workplace performance Professional membership of the ICA Ability to reduce reputational and financial risk for the organisation On successful completion of this ICA Diploma in Anti Money Laundering training course students will be awarded an ICA Diploma in Anti Money Laundering and will be able to use the designation 'Dip.(AML)'. This course is awarded in association with Alliance Manchester Business School, the University of Manchester. The ICA Diploma in Anti Money Laundering training course instructs students in the following areas: Anti money laundering (AML) and countering the financing of terrorism CFT in context Terrorist financing proliferation financing and sanctions Designing a comprehensive AML/CTF risk-based approach for a financial services business Risk-based customer due diligence (CDD), customer risk profiling and monitoring Governance and leadership Suspicious activity reports/ suspicious transaction reports and dealing with the authorities
Advanced Lip Smile Injectables Package includes: Skin Boosters Lips filler , Russian, French techniques Beauty Threads for lips contour Entry requirements Registered Medical professional Level – Beauty Therapist Dental Nurse Physiotherapist Holds at least 6 months experience with needles (micro-needling, microblading, tattooing, vaccinations, phlebotomy and more) NOTE! After booking we will contact you for scheduling the exact course date! Courses dates are subject to change due to mentors availability. We will inform you via email if a date becomes available! Additional information ATTENDANCE ONLINE (Theory), IN CLINIC (Practice) ADVANCED Skin Boosters Lips filler , Russian, French techniques Beauty Threads for lips contour Choose Online or In-Clinic (30% Discount)
Duration 5 Days 30 CPD hours This course is intended for This course is intended for experienced IT security-related practitioners, auditors, consultants, investigators, or instructors, including network or security analysts and engineers, network administrators, information security specialists, and risk management professionals, who are pursuing CISSP training and certification to acquire the credibility and mobility to advance within their current computer security careers or to migrate to a related career. Through the study of all eight CISSP Common Body of Knowledge (CBK) domains, students will validate their knowledge by meeting the necessary preparation requirements to qualify to sit for the CISSP certification exam. Additional CISSP certification requirements include a minimum of five years of direct professional work experience in two or more fields related to the eight CBK security domains, or a college degree and four years of experience. Overview #NAME? In this course, students will expand upon their knowledge by addressing the essential elements of the 8 domains that comprise a Common Body of Knowledge (CBK)© for information systems security professionals. Prerequisites CompTIA Network+ Certification 1 - Security and Risk Management Security Governance Principles Compliance Professional Ethics Security Documentation Risk Management Threat Modeling Business Continuity Plan Fundamentals Acquisition Strategy and Practice Personnel Security Policies Security Awareness and Training 2 - Asset Security Asset Classification Privacy Protection Asset Retention Data Security Controls Secure Data Handling 3 - Security Engineering Security in the Engineering Lifecycle System Component Security Security Models Controls and Countermeasures in Enterprise Security Information System Security Capabilities Design and Architecture Vulnerability Mitigation Vulnerability Mitigation in Embedded, Mobile, and Web-Based Systems Cryptography Concepts Cryptography Techniques Site and Facility Design for Physical Security Physical Security Implementation in Sites and Facilities 4 - Information Security Management Goals Organizational Security The Application of Security Concepts 5 - Information Security Classification and Program Development Information Classification Security Program Development 6 - Risk Management and Ethics Risk Management Ethics 7 - Software Development Security Software Configuration Management Software Controls Database System Security 8 - Cryptography Ciphers and Cryptography Symmetric-Key Cryptography Asymmetric-Key Cryptography Hashing and Message Digests Email, Internet, and Wireless Security Cryptographic Weaknesses 9 - Physical Security Physical Access Control Physical Access Monitoring Physical Security Methods Facilities Security
Debian training course description This three day hands on course provides a comprehensive coverage of core Linux administration tasks on Debian Linux. What will you learn Administer & configure Linux systems. Maintain Linux by handling disk space and taking regular backups. Manage software packages. Perform basic troubleshooting. Maintain a secure Linux system. Describe the organisation and implementation of the filesystem. Debian training course details Who will benefit: System administrators. Network administrators. Prerequisites: Linux fundamentals Duration 3 days Debian training course contents Managing software Package Concepts, RPM, rpm Commands, Yum, Dependencies and Conflicts, Startup Script Problems, Shared Libraries, Library Management, Managing Processes, the Kernel: The First Process, Process Lists, Foreground & Background Processes, Process Priorities, Killing Processes. Configuring hardware Configuring Firmware and Hardware, IRQs, I/O Addresses, DMA Addresses, Boot Disks, Coldplug and Hotplug Devices, Configuring Expansion Cards and PCI Cards, Kernel Modules, USB Devices, Linux USB Drivers, Configuring Hard Disks, Partitioning Systems, LVM, Common Layouts, Creating Partitions and Filesystems, Maintaining Filesystem Health, Tuning, Journals, Checking Filesystems, Monitoring Disk Use, Mounting and Unmounting Filesystems. Managing files File Management Commands, File Naming and Wildcards, File Archiving, Links, Directory Commands, File Ownership and Group, File access control, Permissions, chmod, Defaults, File Attributes, Disk Quotas, Enabling and setting Quotas, Locating Files, The FHS. Booting Linux and editing files Installing Boot Loaders, GRUB Legacy, GRUB 2, Alternative Boot Loaders, the Boot Process, Boot Messages, Runlevels and the Initialization Process, Runlevel Functions, Runlevel Services, Alternative Boot Systems , Upstart, system. Administering the system Managing Users and Groups, Tuning User and System Environments, Using System Log Files, Understanding syslogd , Setting Logging Options, Manually Logging Data, Rotating Log Files, Reviewing Log File Contents, Maintaining the System Time, Linux Time Concepts, Manually Setting the Time, Using NTP, Running Jobs in the Future, Understanding the Role of cron, Creating System cron Jobs, Creating User cron Jobs, Using anacron, Using at. Configuring basic networking TCP/IP, Network Hardware, Network Addresses, Hostnames, Network Ports, Configuring Linux for a Local Network, Configuring with DHCP, Static IP Address, Configuring Routing, Using GUI Configuration Tools, ifup and ifdown, Diagnosing Network Connections, Testing Connectivity, Tracing a Route, Checking Network Status , Examining Network Traffic, Additional Tools. Securing your systems Administering Network Security, Super Server Restrictions, Disabling Unused Servers, Administering Local Security, Securing Passwords, Limiting root Access, Setting Login, Process, SUID/SGID Files, Configuring SSH, Using GPG, Generating, Importing and Revoking Keys, Encrypting and Decrypting Data, Signing Messages and Verifying Signatures.
Ubuntu training course description This three day hands on course provides a comprehensive coverage of core Linux administration tasks on Ubuntu Linux. What will you learn Administer & configure Linux systems. Maintain Linux by handling disk space and taking regular backups. Manage software packages. Perform basic troubleshooting. Maintain a secure Linux system. Describe the organisation and implementation of the filesystem. Ubuntu training course details Who will benefit: System administrators. Network administrators. Prerequisites: Linux fundamentals Duration 3 days Ubuntu training course contents Managing software Package Concepts, RPM, rpm Commands, Yum, Dependencies and Conflicts, Startup Script Problems, Shared Libraries, Library Management, Managing Processes, the Kernel: The First Process, Process Lists, Foreground & Background Processes, Process Priorities, Killing Processes. Configuring hardware Configuring Firmware and Hardware, IRQs, I/O Addresses, DMA Addresses, Boot Disks, Coldplug and Hotplug Devices, Configuring Expansion Cards and PCI Cards, Kernel Modules, USB Devices, Linux USB Drivers, Configuring Hard Disks, Partitioning Systems, LVM, Common Layouts, Creating Partitions and Filesystems, Maintaining Filesystem Health, Tuning, Journals, Checking Filesystems, Monitoring Disk Use, Mounting and Unmounting Filesystems. Managing files File Management Commands, File Naming and Wildcards, File Archiving, Links, Directory Commands, File Ownership and Group, File access control, Permissions, chmod, Defaults, File Attributes, Disk Quotas, Enabling and setting Quotas, Locating Files, The FHS. Booting Linux and editing files Installing Boot Loaders, GRUB Legacy, GRUB 2, Alternative Boot Loaders, the Boot Process, Boot Messages, Runlevels and the Initialization Process, Runlevel Functions, Runlevel Services, Alternative Boot Systems , Upstart, system. Administering the system Managing Users and Groups, Tuning User and System Environments, Using System Log Files, Understanding syslogd , Setting Logging Options, Manually Logging Data, Rotating Log Files, Reviewing Log File Contents, Maintaining the System Time, Linux Time Concepts, Manually Setting the Time, Using NTP, Running Jobs in the Future, Understanding the Role of cron, Creating System cron Jobs, Creating User cron Jobs, Using anacron, Using at. Configuring basic networking TCP/IP, Network Hardware, Network Addresses, Hostnames, Network Ports, Configuring Linux for a Local Network, Configuring with DHCP, Static IP Address, Configuring Routing, Using GUI Configuration Tools, ifup and ifdown, Diagnosing Network Connections, Testing Connectivity, Tracing a Route, Checking Network Status , Examining Network Traffic, Additional Tools. Securing your systems Administering Network Security, Super Server Restrictions, Disabling Unused Servers, Administering Local Security, Securing Passwords, Limiting root Access, Setting Login, Process, SUID/SGID Files, Configuring SSH, Using GPG, Generating, Importing and Revoking Keys, Encrypting and Decrypting Data, Signing Messages and Verifying Signatures.
Suse training course description This three day hands on course provides a comprehensive coverage of core Linux administration tasks on Suse Linux. What will you learn Administer & configure Linux systems. Maintain Linux by handling disk space and taking regular backups. Manage software packages. Perform basic troubleshooting. Maintain a secure Linux system. Describe the organisation and implementation of the filesystem. Suse training course details Who will benefit: System administrators. Network administrators. Prerequisites: Linux fundamentals Duration 3 days Suse training course contents Managing software Package Concepts, RPM, rpm Commands, Yum, Dependencies and Conflicts, Startup Script Problems, Shared Libraries, Library Management, Managing Processes, the Kernel: The First Process, Process Lists, Foreground & Background Processes, Process Priorities, Killing Processes. Configuring hardware Configuring Firmware and Hardware, IRQs, I/O Addresses, DMA Addresses, Boot Disks, Coldplug and Hotplug Devices, Configuring Expansion Cards and PCI Cards, Kernel Modules, USB Devices, Linux USB Drivers, Configuring Hard Disks, Partitioning Systems, LVM, Common Layouts, Creating Partitions and Filesystems, Maintaining Filesystem Health, Tuning, Journals, Checking Filesystems, Monitoring Disk Use, Mounting and Unmounting Filesystems. Managing files File Management Commands, File Naming and Wildcards, File Archiving, Links, Directory Commands, File Ownership and Group, File access control, Permissions, chmod, Defaults, File Attributes, Disk Quotas, Enabling and setting Quotas, Locating Files, The FHS. Booting Linux and editing files Installing Boot Loaders, GRUB Legacy, GRUB 2, Alternative Boot Loaders, the Boot Process, Boot Messages, Runlevels and the Initialization Process, Runlevel Functions, Runlevel Services, Alternative Boot Systems , Upstart, system. Administering the system Managing Users and Groups, Tuning User and System Environments, Using System Log Files, Understanding syslogd , Setting Logging Options, Manually Logging Data, Rotating Log Files, Reviewing Log File Contents, Maintaining the System Time, Linux Time Concepts, Manually Setting the Time, Using NTP, Running Jobs in the Future, Understanding the Role of cron, Creating System cron Jobs, Creating User cron Jobs, Using anacron, Using at. Configuring basic networking TCP/IP, Network Hardware, Network Addresses, Hostnames, Network Ports, Configuring Linux for a Local Network, Configuring with DHCP, Static IP Address, Configuring Routing, Using GUI Configuration Tools, ifup and ifdown, Diagnosing Network Connections, Testing Connectivity, Tracing a Route, Checking Network Status , Examining Network Traffic, Additional Tools. Securing your systems Administering Network Security, Super Server Restrictions, Disabling Unused Servers, Administering Local Security, Securing Passwords, Limiting root Access, Setting Login, Process, SUID/SGID Files, Configuring SSH, Using GPG, Generating, Importing and Revoking Keys, Encrypting and Decrypting Data, Signing Messages and Verifying Signatures.