• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

175 Architect courses in Cardiff

Introduction to the Junos Operating System

5.0(3)

By Systems & Network Training

Junos Operating System training course description This course provides students with the foundational knowledge required to work with the Junos OS and to configure Junos devices. The course provides a brief overview of the Junos device families and discusses the key architectural components of the software. The course then delves into foundational routing knowledge and configuration examples including general routing concepts, routing policy, and firewall filters. Delegates will gain experience in configuring and monitoring the Junos OS and monitoring basic device operations. This course is based on Junos OS Release 15.1X49. What will you learn Describe the design architecture of the Junos OS. Navigate within the Junos CLI and perform tasks within the CLI operational and configuration modes. Configure and monitor network interfaces. Navigate within the Junos J-Web interface. Identify where you might use firewall filters. Explain basic routing operations and concepts. Identify key factors in Juniper Networks' security. Junos Operating System training course details Who will benefit: This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. Prerequisites: TCP/IP foundation for engineers Duration 3 days Junos Operating System training course contents Junos Operating System Fundamentals The Junos OS Traffic Processing Overview of Junos Devices User Interface Options-The Junos CLI User Interface Options The Junos CLI: CLI Basics The Junos CLI: Operational Mode The Junos CLI: Configuration Mode User Interface Options-The J-Web Interface The J-Web GUI Configuration Lab 1: User Interface Options Initial Configuration Factory-Default Configuration Initial Configuration Interface Configuration Lab 2: Initial System Configuration Secondary System Configuration User Configuration and Authentication System Logging and Tracing Network Time Protocol Archiving Configurations SNMP Lab 3: Secondary System Configuration Operational Monitoring and Maintenance Monitoring Platform and Interface Operation Network Utilities Maintaining the Junos OS Password Recovery System Clean-Up Lab 4: Operational Monitoring and Maintenance Interface Configuration Examples Review of the Interface Configuration Hierarchy Interface Configuration Examples Using Configuration Groups Routing Fundamentals Routing Concepts: Overview of Routing Routing Concepts: The Routing Table Routing Concepts: Routing Instances Static Routing Dynamic Routing Lab 5: Routing Fundamentals Routing Policy Routing Policy Overview Case Study: Routing Policy Lab 6: Routing Policy Firewall Filters Firewall Filters Overview Case Study: Firewall Filters Unicast Reverse-Path-Forwarding Checks Lab 7: Firewall Filters Class of Service CoS Overview Traffic Classification Traffic Queueing Traffic Scheduling Case Study: CoS Lab 8: Class of Service JTAC Procedures Opening a Support Case Customer Support Tools Transferring Files to JTAC Juniper Security Concepts Security Challenges Juniper's Security Focus Appendix A: IPv6 Fundamentals IPv6 Addressing Protocols and Services Configuration

Introduction to the Junos Operating System
Delivered in Internationally or OnlineFlexible Dates
£2,367

Total IP multicast for engineers

5.0(3)

By Systems & Network Training

Total IP multicast training course description This training course provides an advanced three day hands on study of IP multicast technology focusing on architectures, applications and protocols. All aspects of IP multicasting are covered including PC, server and switch implementations. Design, configuration, support and troubleshooting are all covered in the course. Hands on sessions are used to reinforce the theory rather than teach specific implementations. What will you learn Design multicast networks. Explain how multicast networks work. Compare and contrast the different multicast routing protocols, such as DVMRP, PIM, MBGP and SSM. Configure PCs, servers, switches and routers for multicasting. Configure multicast routing protocols including: PIM Dense Mode. PIM Sparse Mode BGP SSM Troubleshoot multicast networks. Total IP multicast training course details Who will benefit: Technical staff working with IP multicasts. Prerequisites: TCP/IP Foundation for engineers Duration 3 days Total IP multicast training course contents Introduction What is multicasting? Why multicast? Why not multicast? Multicasting vs. multiple unicasts, Multicasting vs. broadcasts, multicasting applications, the use of unicast addressing for setting up multicast applications, multicast use within standard protocols such as OSPF. hands on Example multicast applications. Addressing Layer two multicast addresses, Class D addresses, mapping layer 3 addresses onto layer 2 multicast addresses. Multicast addresses on NBMAs, scoping multicast traffic, Multicast address blocks, GLOP, IPv6 and multicasting, anycasting. hands on Multicast addressing. Multicast architectures Where the different protocols are used, PC to router, router to router, how switches can get involved. hands on Analysing multicast packets. PC to router Configuring Class D addresses, IGMP, packet formats, queries, reports, maintaining groups, enhancements to IGMP (v2 and v3), Leaving a group, querier elections, hands on Analysing IGMP packets. Switches and multicasting Controlling multicast traffic with switches, VLANS, static bridge table entries, IGMP snooping, CGMP. hands on Configuring switches for multicast environments. Router to router MOSPF, DVMRP, PIM Sparse Mode, PIM Dense Mode, MBGP. hands on Simple router configuration for multicasting. Theory behind multicast routing protocols Distribution trees, source distribution trees, shared trees, core based trees. Reverse path forwarding, Multicast routing protocol types. PIM DM: Flooding, pruning, PIM designated routers, hands on configuring PIM DM. PIM Sparse mode Rendevous points, discovering RPs, hands on Configuring PIM SM, using different protocols for different groups. PIM SM with one RP, using multiple RPs, Auto RP. MBGP Multiprotocol routing, how does MBGP work? How MBGP carries multiple protocol information, MBGP and multicasts, MBGP and IPv6. hands on Configuring MBGP for multicasts. Internet multicasting The internet, ISPs, the MBone, tunnelling, Inter domain multicasting, the role of MBGP, Inter domain problem, MSDP, MSDP operation SSM, PIM-SM and shared trees, SSM, PIM-SSM operation, SSM benefits. hands on MSDP configuration. SSM configuration.

Total IP multicast for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,367

Total IPsec for engineers

5.0(3)

By Systems & Network Training

IPsec training course description This hands on course focuses on IPsec VPNs. Rather than focusing on one implementation this course concentrates on the technologies and protocols of IPsec. Starting with an overview of the complete IPsec architecture the course then moves onto ESP packet analysis along with encryption and authentication provided. IKEv1 and IKEv2 are both covered in detail. Having covered IPsec with pre shared keys the course then moves onto IPsec with certificates followed by IPsec issues. The course is vendor neutral with hands on with both Cisco and Microsoft implementations. What will you learn Explain how IPsec works. Explain the role of AH, ESP and IKE. Configure IPsec. Troubleshoot IPsec. IPsec training course details Who will benefit: Technical staff working with IPsec. Prerequisites: Definitive IP VPNs for engineers. Duration 3 days IPsec training course contents What is IPsec? How to spell IPsec, IPsec is IP security, confidentiality, integrity, authenticity, replay protection, what is a VPN? Network layer security, IPsec and IPv4, IPsec and IPv6, the suite of protocols, the standard, IPsec RFCs, IPsec history. Hands on Analysis of 'normal' IP packets. IPsec architecture The IPsec protocols, AH vs ESP, Why two headers? transport mode, tunnel mode, Remote access VPNs, site to site VPNs, security associations, SA database, Security Parameters Index, implementations: Host tack, Bump in the Stack, Bump in the Wire. Hands on Configuring IPsec. AH What AH does, the stack, The AH header, What is authenticated? Device authentication. AH in transport mode, AH in tunnel mode. Hands on AH packet analysis. ESP What ESP does, the ESP header, ESP in transport mode, ESP in tunnel mode, ESP and SA, ESP and SPI. Hands on ESP packet analysis, policy configuration. IPsec encryption IPsec is a framework, standard algorithms, ESP keys, the role of IKE, key lifetimes, how IKE generates the keys, DES, 3DES, AES, cipher block chaining, counter mode, other encryption. Hands on Encryption configuration. IPsec authentication Authentication types, IPsec authentication, Authentication algorithms: MD5, keyed SHA-1, HMAC-MD5, HMAC-SHA-1, HMAC-RIPEMD, other authentication algorithms. Hands on Authentication configuration. IKE Internet Key Exchange, IKE and the SAD, the two phase negotiation, ISAKMP, ISAKMP header, pre shared keys, digital signatures, public key encryption, Diffie Hellman, proposals, counter proposals, nonces, identities, phase 1 negotiation: main mode, aggressive mode, base mode. Phase 2 negotiation: quick mode, new group mode. Hands on IKE packet analysis. More IKE PFS, IKE and dynamic addresses, XAUTH, hybrid authentication, CRACK, ULA, PIC. User level authentication. IKE renegotiation, heartbeats. Hands on Troubleshooting IPsec. IKEv2 The IKEv2 exchange, IKE_SA_INIT, IKE_AUTH, CREATE_CHILD_SA, IKEv2 packets, the informational exchange. Comparing IKev1 vs IKE v2. Hands on IKEv2 configuration and analysis. PKI What is PKI?, Digital certificates, Certificate authorities, CA servers, RA, VA, certificates, CA hierarchy, CRLs, certificate formats. Hands on installing and configuring certificate servers. IPsec issues NAT, IPsec overhead and fragmentation. Summary IPsec strengths and weaknesses. Where to get further information.

Total IPsec for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,367

STP alternatives

5.0(3)

By Systems & Network Training

STP alternatives training course description The Spanning Tree Protocol (STP) dates from 1985. This course explores the technologies that can be used as an alternative to STP, including FabricPath, SPB and TRILL. What will you learn Explain how STP and RSTP work. Explain how TRILL works. Explain how SPB works. Explain how FabricPath works. STP alternatives training course details Who will benefit: Technical network staff. Prerequisites: Definitive Ethernet switching for engineers Duration 1 day STP alternatives training course contents Introduction Layer 2 versus Layer 3, STP problems: One path, convergence, MAC explosion, STP alternatives. STP 802.1D, how STP works, root bridge, convergence times, single path. RSTP 802.1w, Improvements, convergence times. Link aggregation 802.3ad, Multi system Link aggregation. IS-IS Concepts, Discovery, topology exchange, flooding. Changes for TRILL, FabricPath and SPB. FabricPath Overview, architecture, control plane protocols, DRAP, STP interactions, packet forwarding, configuration. TRILL Concepts, RBridge, TRILL frames, control plane, data plane, learning MAC addresses. SPB 802.1aq, Node ID, Backbone Edge Bridges, Backbone MAC address, customer MACs, I-SID, forwarding database.

STP alternatives
Delivered in Internationally or OnlineFlexible Dates
£2,477

Definitive 802.1X for engineers

5.0(3)

By Systems & Network Training

Definitive 802.1X training course description A hands-on training course concentrating solely on 802.1X. Hands on sessions follow major chapters to reinforce the theory. What will you learn Describe 802.1X. Explain how 802.1X works Configure 802.1X Troubleshoot 802.1X. Definitive 802.1X training course details Who will benefit: Technical network staff. Technical security staff. Prerequisites: SIP for engineers Duration 2 days Definitive 802.1X training course contents Introduction What is 802.1X? Authentication access, 802.3, 802.11. IEEE, 802, 802.1X-2001, 802.1X-2010. Architecture Supplicant, Authenticator, Authentication server, EAP, EAPOL, RADIUS, Diameter. Port configuration 802.1X in a switch environment. Hands on Configuring 802.1X. How it works Controlled ports, uncontrolled ports. Authentication flow chart, Initialisation, initiation, negotiation, authentication. Hands on 802.1X packet analysis. 802.1X and 802.11 WiFi, WiFi security. Hands on 802.1X WiFi port access. EAP Extensible Authentication Protocol, RFC 3748, RFC 5247. EAP methods: Weak, MD5, LEAP, Strong: TTLS, TLS, FAST. Encapsulation: 802.1X, PEAP, RADIUS, Diameter, PPP. 802.1X accounting RADIUS, accounting messages, 802.1X accounting AV pairs. 8021.X and VLANS VLANs, Guest VLAN, restricted VLAN, voice VLAN. Hands on VLAN assignments with 802.1X.

Definitive 802.1X for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

Total ISDN for engineers

5.0(3)

By Systems & Network Training

ISDN training course description A comprehensive look at ISDN, as used in voice and data environments. What will you learn Recognise the issues and impacts of using dial up networks. Describe ISDN. Describe ISDN signalling in voice and data environments. Configure a Cisco router to use ISDN. ISDN training course details Who will benefit: Anyone working with ISDN. Prerequisites: Intro to data communications & networking Duration 2 days ISDN training course contents Introduction Dialup connectivity vs. leased lines vs. packet switched networks. ISDN offerings, services, benefits vs. modems. ISDN architectures Use of ISDN by routers, Dial up, top up, backup. Internet access, PCs and ISDN. BRI and PRI ISDN switches, B channels, D channel, ISDN functions and reference points, NT1, NT2, TE1, TE2, Terminal adapters, R,S,T,U interfaces, ISDN standards. PPP Encapsulation, PPP services, PAP and CHAP, Multilink PPP, BACP. ISDN and the seven layer model B channel layers versus D channel layers, the I standards, Q.921, Q.931. Configuration issues for ISDN E.164 addressing and IP addresses, ensuring only the correct traffic brings up the ISDN line. ISDN services Bearer services, teleservices, supplementary services, MSN, sub addressing, CLI…

Total ISDN for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

Zeroconf and Bonjour for engineers

5.0(3)

By Systems & Network Training

Zeroconf and Bonjour training course description A hands on training course focusing on Microsoft and Apple implementations of Zeroconf. The course covers all three main areas: Interface configuration, name resolution and service discovery. Hands on with Apple Bonjour and Microsoft UPnP compliment all the major theory sessions. What will you learn Explain how mDNS and LLMNR work. Explain how DNS-SD and SSDP work. Recognise the role of service discovery gateways. Zeroconf and Bonjour training course details Who will benefit: Technical staff working with Zeroconf. Developers using Zeroconf. Prerequisites: TCP/IP Foundation for engineers Duration 2 day Zeroconf and Bonjour training course contents What is Zeroconf? Zeroconf, architecture, Microsoft UPnP, Apple, Bonjour, devices, components. Home networks, enterprise networks, BYOD. Plug and play without Zeroconf DHCP, DNS, A, PTR, SRV records, DDNS. Hands on DHCP configuration. Address selection IPv4 link local addresses, IPv6 link local addresses. Hands: Addresses without DHCP. Name resolution mDNS, finding names, announcing names, .local DNS namespace, LLMNR. Hands on Names without DNS. Role of multicasting Multicast addresses, multicasts and switches, multicasts and routers. Hands on Multicasts, TTL. Service discovery DNS-SD, SRV and TXT lookups, SSDP, HTTP. Hands on Browsing for services Zeroconf in a routed environment Service Discovery gateways, configuration, service filters, DNS-LLQ, NAT-PMP. Miscellaneous Security, automatic multicast addresses, wireless auto configuration.

Zeroconf and Bonjour for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

Managing networks with MRTG

5.0(3)

By Systems & Network Training

MRTG training course description A hands on course focusing on the installation, configuration and use of the MRTG network monitoring and graphing tools. What will you learn Install MRTG. Configure MRTG. Use MRTG to monitor networks. MRTG training course details Who will benefit: Anyone working with MRTG. Prerequisites: Total SNMP for engineers Duration 2 days MRTG training course contents What is MRTG? Network monitoring, review of SNMP. What MRTG does do, what MRTG doesn't do, MRTG architecture, MRTG components. Hands on configuring SNMP support on network devices, configuring extended SNMP support on Windows. Installing MRTG Configuring MRTG tasks, .cfg files, index.html files, running MRTG tasks, instances. Hands on Configuring and running MRTG tasks. MRTG tasks Configuring MRTG tasks, .cfg files, index.html files, running MRTG tasks, instances. Hands on Configuring and running MRTG tasks. MRTG graphs Daily, weekly, monthly, yearly, MRTG database support, RRDTOOL. Hands on MRTG graphs. Using MRTG MRTG examples, custom SNMP OIDs, using the MRTG configuration reference. Hands on MRTG examples. RRDTOOL Installing RRD database support, MRTG instances with the RRD database, RRD database structure, resizing and extending the database. Exporting database records into plain text and XML formats, on demand MRTG graphs using the database. Hands on Using MRTG with RRD database support. Alternatives to MRTG MRTG strengths and weaknesses, scalability, cricket, cacti, other SNMP tools.

Managing networks with MRTG
Delivered in Internationally or OnlineFlexible Dates
£2,477

Smart Metering & Power Quality Analytics

By EnergyEdge - Training for a Sustainable Energy Future

About this training course The smart meter or smart grid represents the next-generation electrical power system. This system uses information, data & communication technology within generation, delivery and consumption of electric energy. This 4-day course will equip you with the innovations that are shaping the power generation and distribution systems and will cover topics ranging from Smart Metering Architecture, Cybersecurity, Smart Grid Systems and Power Line Communications. Training Objectives By participating in this course, you will be able to: Comprehend the Smart Grid and Smart Meters architecture Review latest trends and challenges within the Smart Grid Technology Perform analysis on smart electronic meters Comply with regulatory and metering standards Recognize the importance of cybersecurity in smart grids Maximize efficiency, reliability, and longevity of your smart meters and equipment Gain valuable insights into power quality and harmonics Target Audience This course will greatly benefit the following groups but not limited to: Smart Grid managers and engineers Smart Meters managers and engineers Power plant managers Outage managers Maintenance and operations engineers Power regulatory personnel Transmission managers and engineers Distribution managers and engineers IT managers Renewable energy managers and engineers Course Level Basic or Foundation Intermediate Training Methods The training instructor relies on a highly interactive training method to enhance the learning process. This method ensures that all participants gain a complete understanding of all the topics covered. The training environment is highly stimulating, challenging, and effective because the participants will learn by case studies which will allow them to apply the material taught in their own organization. Course Duration: 4 days in total (28 hours). Training Schedule 0830 - Registration 0900 - Start of training 1030 - Morning Break 1045 - Training recommences 1230 - Lunch Break 1330 - Training recommences 1515 - Evening break 1530 - Training recommences 1700 - End of Training The maximum number of participants allowed for this training course is 25. This course is also available through our Virtual Instructor Led Training (VILT) format. Trainer Your expert course leader is a professional engineer with extensive experience in power system studies, substation design field-testing, and EHS programs settings for Mining and Electrical Utilities sectors. He was formally the Engineering Manager at GE Canada in Ontario. He received his M.Sc. in electrical engineering from the University of New Brunswick and his MBA from Laurier School of Business in Waterloo. He has managed and executed more than 150 engineering projects on substation design EMF audits and power system studies and analyses, EMF audits and grounding audits, for major electrical utilities, mines, oil and gas, data centers, industrial and commercial facilities in Canada and the U.S. He is a certified professional engineer in the provinces of Ontario and Alberta. He has various IEEE publications, has served as a technical reviewer for many IEEE journals in power systems and control systems, and is the chair of the Industry Application Chapter (IAS) for IEEE Toronto Section. He remains a very active member for the IEEE substation committee of IEEE Std. 81 ground testing (WGE6) and IEEE Std. 80 ground design (WGD7). A certified electrical safety trainer by GE Corporate and a Canadian Standard Association (CSA) committee member at the mining advisory panel for electrical safety, he also taught many technical courses all over Canada to industrial customers, electrical consultants as well as to electrical utilities customers. Highlighted Projects: Various Power System Studies for 345/230 kV Stations - Nova Scotia Power (EMERA) RF audits for Telecom tower and antennas - Cogeco/Rogers Mobile Power System analysis - Powell Canada Structural/Geotechnical Design and upgrades - Oakville Hydro Underground Cables testing and sizing - Plan Group Relay programming and design optimization - Cenovus Canada Different Arc Flash Analysis and BESS Design - SNC Lavalin Environmental site assessment (ESA) Phase I/II for multiple stations - Ontario Electromagnetic compatibility (EMC) assessment for Toronto LRT expansion - MOSAIC Battery energy storage system (BESS) installation at City of London - Siemens Canada EMF audits for 500 kV Transmission Lines - Hydro One EMF audits for 500 kV Transmission Lines - Hydro Quebec AC interference for 138 kV line modeling and mitigations - HBMS Mine POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Smart Metering & Power Quality Analytics
Delivered in Internationally or OnlineFlexible Dates
£2,683 to £3,120

Essential Bluetooth

5.0(3)

By Systems & Network Training

Bluetooth training course description Bluetooth is used by many kids these days but is probably under-utilised in business environments. This hands on training course provides an overview of what Bluetooth is, how it works, what it can be used for and how to configure it on different devices. What will you learn Explain what Bluetooth is. Describe the Bluetooth protocol stack. Recognise the applications of Bluetooth. Configure Bluetooth. Bluetooth training course details Who will benefit: Anyone who needs to know more about Bluetooth. Prerequisites: None. Duration 2 days Bluetooth training course contents Classic Bluetooth Bluetooth overview Basics, standards, competing technologies. Bluetooth radio RF bands, power losses, frequency hopping. Bluetooth modulation PSK, DPSK, DPQSK. Bluetooth data transfer FH, TDD, FDMA, ACL, SCO, Bluetooth packets. Making connections Piconets, Scatternets, Pairing The protocol stack Baseband, Link Manager, L2CAP, SDP, GAP, RFCOMM. Profiles FTP, DUN, LAN, Synch, HDP, GOEP/OBEX etc. Security Authentication, authorisation, encryption, risks. Bluetooth Low Energy Introduction Bluetooth Smart and Bluetooth Smart Ready. BLE device types Design goals, terminology and core concepts. BLE usage models Presence detection, data broadcasting connectionless models, gateways. BLE architecture Controller, host, applications and stack splits. BLE protocol stack Link layer, HCI, L2CAP. BLE profiles GAP roles, models, procedures, security modes, data advertising. BLE security Pairing, bonding, data signing BLE applications Devices, services, profiles, peripherals

Essential Bluetooth
Delivered in Internationally or OnlineFlexible Dates
£2,477