• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2896 ARC courses delivered Online

Mobile communications demystified

5.0(3)

By Systems & Network Training

Mobile comms training course description A complete overview of mobile communications covering all the major technologies in a 2-day format. What will you learn GSM GPRS UMTS LTE Alternative mobile strategies Mobile comms training course details Who will benefit: Anyone involved in mobile communications. Prerequisites: None. Duration 2 days Mobile comms training course contents Introduction Telephony, RF, mobile and wireless technologies, distances, mobile phone generations, base stations, cells, frequencies, cell types, MSC, handoffs, channels, internetworking, the Internet, wireless Internet access. UK operators, worldwide operators. GSM What is it? Timeline, digitising voice, channels, GSM architecture, Abis, A, Um, MS, BTS, BSC, MSC, HLR, VLR, EIR, AuC. Radio link aspects, GSM signalling overview, signalling protocols, roaming, GSM call flows, authentication. IMEI. SIM cards. GPRS What it is, 2G to 3G, GPRS user features, GPRS network features, GPRS elements, GPRS architecture, overlay, SGSN, GGSN, GPRS ATTACH, GPRS protocol stack, GPRS timeslots, EDGE, GPRS classes, GPRS routing, GPRS packet format. UMTS and 3G What is 3G? IMT-2000, 3G proposals, what is UMTS? Speed comparison, evolution to 3G, CDMA, CDMA 2000, W-CDMA, UMTS components, UMTS infrastructure, RNC, Node B, network architecture, packet switched attach, mobility in 3G, HSDPA. LTE and 4G LTE architecture and principles, Physical layer, Air interface, E-UTRAN, Evolved packet core, service provision. Other wireless solutions Integration of services, Bluetooth, Blackberry, VoIP, Mobile IP, 802.11, WiFi, 802.16, WiMax, What is 5G?

Mobile communications demystified
Delivered in Internationally or OnlineFlexible Dates
£1,497

Essential DWDM

5.0(3)

By Systems & Network Training

DWDM training course description A concise overview of Wave Division Multiplexing (WDM) with both Coarse Wave Division Multiplexing (CWDM) and Dense Wave Division Multiplexing (DWDM) being covered. The course starts with a review of the relevant elements of fibre transmission and multiplexing before then studying WDM components and architectures. Reliability, resilience and management are then followed by WDM services and futures. What will you learn Explain the benefits of WDM. Describe Dispersion and four way mixing. Describe the different WDM equipment components. Describe different WDM architectures. Explain How DWDM works. DWDM training course details Who will benefit: Anyone working with CWDM/DWDM. Prerequisites: Telecommunications Introduction Duration 2 days DWDM training course contents Fibre communications review Optical transmission, Fibre characteristics, Fibre component parts. Multi Mode Fibre (MMF). Single Mode Fibre (SMF). Fibre connections. Lasers. Attenuations, dispersion, optical signal noise ratios (OSNR) and their effects. Channel Spacing and Signal Direction. Limiting factors to single wavelength. WDM overview Multiplexing, TDM, WDM benefits. WDM standards. CWDM vs. DWDM. Four Wave Mixing (FWM). Impact and countermeasures to FWM on WDM. CWDM ITU G.694.2, channels, channel spacing. DWDM ITU G.694.1, channels, channel spacing. WDM Equipment Components Equipment components and building blocks. Optical Terminal Multiplexers (OTM). Optical Add/Drop Multiplexers (OADM). Adding versus dropping. Optical Amplifiers. Erbium Doped Fibre Amplifiers (EDFA). Transponders and Combiners. WDM/DWDM Hubs. Optical and Electrical Cross Connects (OXCs/DXCs). Types of Cross Connects (Transparent/Opaque). Advantages and disadvantages of various Optical cross connects. WDM Architectures WDM network sections. Point-to-Point, Optical switches, mesh, ring and star topology. Example of combined WDM and other technology network. Wavelength converting transponders, 1R, 2R, 3R. Protection for WDM Sub 50ms failover. Equipment protection. Card protection. Y cable, Splitter protection. Far end laser control. Line protection. OMSP 1+1, OMSP 1:1, OMSP 1: N. Self healing optical ring. Sub Network Connection Protection (SNCP). Automatically Switched Optical Networks (ASON). WDM Management Options In band management. Out of band management. The Optical Supervisory Channel (OSC). OSC capabilities. WDM services WDM Access. Bit rates, Transparent Networks. Modulation, DQPSK. SDH over WDM. Migrating from SDH to DWDM. Ethernet over WDM, IP over WDM. Optical Transport Networks G.709, 'digital wrapper', Optical Channel Payload Unit (OPU), Optical Channel Transport Unit ( OTU), Optical Channel Data Unit (ODU). OTU1, OTU2, OTU3, OTU4. WDM Futures All optical amplification, Raman amplification, distributed, lumped. Bit rates. Solitons. Coherent technologies.

Essential DWDM
Delivered in Internationally or OnlineFlexible Dates
£1,497

AWS Certified Solutions Architect Associate (SAA-C03)

By Packt

Prepare for the AWS Certified Solutions Architect - Associate (SAA-C03) exam. Learn about the AWS Management Console, S3 buckets, instances, database services, cloud security, costs associated with AWS, Amazon Elastic Compute Cloud (EC2), Amazon Virtual Private Cloud (VPC), Amazon Simple Storage Service (S3), and Amazon Elastic Block Store (EBS).

AWS Certified Solutions Architect Associate (SAA-C03)
Delivered Online On Demand23 hours 24 minutes
£261.99

10th February Helen Lane #Agent121. Looking for: YA, NA, ADULT FICTION

5.0(1)

By I Am In Print

LOOKING FOR: YA, NA, ADULT FICTION Helen Lane is an editor and a Junior Agent at The Booker Albert Literary Agency. She is passionate about books and has spent the last decade supporting authors. She will happily offer her editing advice on manuscripts through I Am In Print but in accordance with her membership of the Association of American Literary Agents (AALA), guidelines state that any work submitted to her for feedback cannot be considered for agent representation. What Helen will do during your session is assess your sample and provide detailed feedback on any identifiable issues, the manuscript's commercial potential and what steps she would advise before you begin querying. She does not require personalisation in the letter, comparison titles or a synopsis, but if you have them already, please include them. As an idea of the genres Helen represents, she would love to see and offer advice on Adult Fantasy, Sci Fi, Horror, Paranormal Romance, LGBTQ+ Romance, Action & Adventure & Thrillers and will also look at YA Fantasy. Books Helen is slightly obsessed with include monster stories (especially if they have giant sharks or squids) and stories set in extreme environments such as the arctic, jungle, caves, ocean, and mountains. She DOES NOT want to read about affairs or abuse in any genre. (Her husband likes her to add here that this is nothing to do with him; she just doesn't like sad stories). Her favourite authors are Mira Grant, Greig Beck, James Rollins, Matthew Reilly, Jennifer L. Armentrout, Darcy Coates, Patricia Briggs & Kelley Armstrong. Helen holds a BSc in Environmental Science from the University of East Anglia and a postgrad qualification in Acoustics. She lives in London with her family and the world’s naughtiest cocker spaniel. Follow Helen on social media: @HFLane_writing Helen would like you to submit a covering letter, 1 page synopsis and first three chapters (Max 5,000 words) of your manuscript in a single word document. (In addition to the paid sessions, Helen is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Friday 31st January 2025

10th February Helen Lane #Agent121. Looking for: YA, NA, ADULT FICTION
Delivered Online + more
£72

Blender to Unreal Engine 5 - 3D Props - Medieval Windmill

By Packt

In this course, we will build a 3D model of a medieval windmill. Our main goal will be to use Blender to create realistic and completely functional windmill subcomponents, which will include a complex set of wooden supports, balconies, steps, a waterwheel, and windmill arms, and then export them to Unreal Engine 5.

Blender to Unreal Engine 5 - 3D Props - Medieval Windmill
Delivered Online On Demand20 hours 57 minutes
£41.99

Essential Lawful Intercept

5.0(3)

By Systems & Network Training

Lawful Intercept training course description Packet based networks require a different approach to Lawful Intercept (LI) than that used in circuit switched networks. This course focuses on what Lawful Interception and Data Retention (DR) means to communications service providers in the IP and NGN areas. The course assumes a basic knowledge of IP networking (i.e. DNS, TCP/UDP, IP, RTP) and the building of services on an IP platform (e.g. SIP, SDP, FTP, HTTP). The course first looks at the regulatory context for LI and DR and how this is translated to a practical architecture. What will you learn Recognise the legal and regulatory obligations to provide LI and DR. Identify the components of the handover architecture for each of LI and DR. Identify the preferred location of points of interception and points of retention in the IP network. Map intercepted material to handover protocols. Understand the data mapping defined in the available standards for both LI and DR. Lawful Intercept training course details Who will benefit: Technical and managerial staff needing to implement public networks. Prerequisites: TCP/IP Foundation Duration 1 day Lawful Intercept training course contents What is meant by LI and DR? Review of regulation: Data protection Directive; Data Retention Directive; RIPA. LI architectures Handover and Interception: ETSI standards ES 201 671 and TS 102 232. LI handover protocol IRI and CC handover; correlation; manual interfaces. DR architectures Handover of query results; points of retention. DR query command set Retrieval of retained records. Security concerns Operation privacy; target privacy; storage and transmission integrity. Implementation Identifying PoI and PoR for provided services. LI and DR wrap up Interaction with other services, storage obligations (volume, time, availability).

Essential Lawful Intercept
Delivered in Internationally or OnlineFlexible Dates
£1,397

Kick Start Your Career with CompTIA's Data Analysis Certification - Live Classes

5.0(1)

By Media Tek Training Solutions Ltd

Get job ready with CompTIA's Data Analysis Certification. Live Classes - Career Guidance - Exam Included.

Kick Start Your Career with CompTIA's Data Analysis Certification - Live Classes
Delivered OnlineFlexible Dates
£1,595

Certified Agile Service Manager (CASM)©

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for The target audience for the CASM course is Anyone interested in learning about Agile and Scrum from a products and process perspective Process owners and process designers Developers who are interested in helping make processes more agile Managers who are looking to bridge multiple practices into a DevOps environment Employees and managers responsible for designing, re-engineering or improving process Consultants guiding their clients through process improvement and DevOps initiatives Internal and external suppliers Process stakeholders Overview The learning objectives for Certified Agile Service Manager (CASM) include an understanding of: What does it mean to 'be agile?' The Agile Manifesto, its core values, and principles Agile concepts and practices including ITSM, Kanban, Lean and DevOps Learn about SCRUM from a product and process perspective Agile thinking and values into service management Scrum roles, artifacts, and events as it applies to both products and processes The two aspects of Agile Service Management: Agile Process Improvement-ensuring processes are lean and deliver 'just enough' control Agile Process Design-applying Agile practices to process design projects This course provides an introduction to Agile Service Management, the application, and integration of agile thinking into service management processes and process design projects. Agile thinking improves IT?s effectiveness and efficiency and enables IT to continue to deliver value in the face of changing requirements. This course prepares you for the Certified Agile Service Manager (CASM) certification. Why Agile Service Management? Challenges Today What is IT Service Management? What is Agile? Agile Manifesto and Principles What Does It Take To Be Agile? Agile Service Management What is Agile Service Management? Agile Service Management Goals, Objectives and Benefits Two Aspects: Agile Process Engineering & Agile Process Improvement Leveraging Related Guidance DevOps ITIL Site Reliability Engineering Lean Scrum Agile Service Management Roles Relationship to Scrum roles Agile Practice Owner Agile Service Management Team Agile Service Manager Agile Process Engineering Agile Processes How Processes Deliver Value Waterfall vs Agile Process Engineering Relationship to Scrum Events & Artifacts Minimum Viable Process Microprocess Architectures Service Management Architecture Agile Service Management Artifacts Practice Backlog Spring Backlog Increment Agile Service Management Events Planning The Sprint Sprint Planning Process Standups Sprint Review Sprint Retrospective Agile Process Improvement Why Process Improvement is Important Process Improvement Goals Process Improvement Reviews Sustaining Improvements Automation

Certified Agile Service Manager (CASM)©
Delivered OnlineFlexible Dates
£1,590

Essential Cloud Technologies

5.0(3)

By Systems & Network Training

Cloud technologies training course description This course provides an introduction to cloud technologies, including, configuration and deployment, security, maintenance, and management. It covers all aspects of cloud computing infrastructure. It will help you to master the fundamental concepts, terminology, and characteristics of cloud computing. . What will you learn Contrast and compare AWS, GCP and Azure. Explain the different cloud services, models and characteristics. Explain cloud virtualization components and options. Explain cloud security options. Describe cloud automation, orchestration, monitoring and performance options. Cloud technologies training course details Who will benefit: Anyone working with or looking to work with cloud technologies. Prerequisites: None. Duration 2 days Cloud technologies training course contents What is the cloud? The Internet Cloud computing Benefits Disadvantages Cloud services IaaS, PaaS, SaaS, others. Cloud service providers AWS, GCP Microsoft Azure, others Cloud architectures Private, public, hybrid others Cloud based delivery The cloud and virtualization Virtual Machines, networks, storage, deployment. Accessing the Virtual Machine Secure cloud environments Security considerations. Data privacy considerations Automation and orchestration Monitoring and performance Performance Cost issues Cost containment

Essential Cloud Technologies
Delivered in Internationally or OnlineFlexible Dates
£1,497

IP security foundation for engineers

5.0(3)

By Systems & Network Training

IP security training course description Connection to the Internet is becoming an essential business tool. This course looks at firewalls, digital certificates, encryption and other essential topics for e-commerce sites. A generic course that looks at firewalls and VPNs. Hands on sessions include using hacking tools and configuring firewalls. What will you learn Describe: Basic security attacks RADIUS SSL IPSec VPNs Implement digital certificates Deploy firewalls to protect Web servers and users. Secure Web servers and clients. IP security training course details Who will benefit: Network administrators. Network operators. Security auditors Prerequisites: TCP/IP foundation for engineers Duration 2 days IP security training course contents TCP/IP review Brief overview of the relevant headers. Hands on Download software for course, use analyser to capture passwords on the wire. Security review Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits The Internet worm, IP spoofing, SYN attack, hijacking, Ping o' Death… keeping up to date with new threats. Hands on Use a port scanning tool, use a 'hacking' tool. Firewalls Products, Packet filtering, DMZ, content filtering, stateful packet inspection, Proxies, firewall architectures, Intrusion Detection Systems, Viruses. Hands on Set up a firewall and prevent attacks. NAT NAT and PAT, Why use NAT, NAT-ALG, RSIP. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Run a password-cracking program. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, PPP authentication, RADIUS. Hands on Using certificates. Web client and server security Cookies, browser certificates, censorship, PICS. Operating system security, Web server user authentication, Restricting access, Logging, Securing CGI scripts. Hands on Browser security. VPNs and IPSec What is a VPN, tunnelling, L2F, PPTP, L2TP, IPSec, AH, ESP, transport mode, tunnel mode.

IP security foundation for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,497