Telecomms training course description A comprehensive tour of the telecommunications technologies and terminology currently in use, and under development. What will you learn List and describe components of the PSTN. Explain how calls are made over the PSTN Compare analog and digital transmission methods. Describe the technologies within the transport plane. Recognise the benefits of extra features available in today's telephone networks. Telecomms training course details Who will benefit: Anyone new to the Telecommunications industry. Prerequisites: None. Duration 2 days Telecomms training course contents Telephone network architecture Handsets, local loop, distribution points, Local exchanges, main telephone switches, PBXs. Making a call - some basics Telephone call components, how a telephone call works, accessing the local exchange, loop disconnect, DTMF, standards, E.164, PSTN routing, Intelligent Networks, Special Rate Services. Analogue vs Digital Voice characteristics, PSTN bandwidth, analogue signalling, Digital encoding, PCM and the 64k, ADPCM and other voice compression methods. PBXs PABX, Call processing, networking PBXs, PBX facilities, bandwidth, blocking probability and Erlangs, Erlang models, using Erlang tables. Transmission methods Two wire transmission, 64k circuits, Nx64, E1, 2 wire to 4 wire conversion, echo, echo suppression, echo cancellers, twisted pair, coax, fibre optic, power lines, satellite systems, microwave. Signalling Analogue signalling, loop start, earth calling, E&M, AC15. Digital signalling -CAS, robbed bits and E1 slot 16 signalling. Digital signalling CCS, Q.931, SS7, Q.SIG, DPNSS, DASS2. Transport planes PDH, PDH issues, SDH, SDH architecture, SDH standards, SDH bit rates, SDH mulitplexors, DWDM. Networks Circuit Switched Networks, TDM, Packet Switched Networks, Frame Relay, Message Switching, Circuit Switching, STDM, Cell Switching, ATM, ATM cells, ATM traffic parameters, ATM QoS, MPLS. Other network access Modems, modulation, speeds, ISDN, BRI, PRI, xDSL, SDSL, ADSL. Other Services Centrex, VPNs, FeatureNet, CTI, Call Processing Systems, Voice Mail, Automated Attendant Systems, Interactive Voice Response, Call Management Systems, Call Conferencing, Star Services. Mobile communications 3 types of wireless telephone, mobile generations, base stations, cells, GSM, GPRS, 3G, UMTS, WCDMA, 4G, LTE. VoIP overview What is VoIP, VoIP benefits, What is IP? The IP header, Packetising voice, VoIP addressing, H.323, SIP, RTP. Bandwidth requirements.
Autocad and Sketchup face to face training customised and bespoke.
Are you one of those developers who have heard the buzzword about microservices, but you don't know where to start from? Or are you wondering if a microservices architecture is a right fit for your .NET project? Then this course is for you. Learn all about microservices architecture using .NET Core MVC and protect your project or team from the drawbacks of a monolithic application.
Cyber security training course description This cyber security course focusses on the network side of security. Technologies rather than specific products are studied focussing around the protection of networks using firewalls and VPNs. What will you learn Describe: - Basic security attacks - RADIUS - SSL - VPNs Deploy firewalls and secure networks Explain how the various technologies involved in an IP VPN work. Describe and implement: - L2TP - IPsec - SSL - MPLS, L3, VPNs. Cyber security training course details Who will benefit: Anyone working in the security field. Prerequisites: TCP/IP foundation for engineers Duration 5 days Cyber security training course contents Security review Denial of service, DDOS, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits IP spoofing, SYN attacks, hijacking, reflectors and amplification, keeping up to date with new threats. Hands on port scanning, use a 'hacking' tool. Client and Server security Windows, Linux, Log files, syslogd, accounts, data security. Hands on Server hardening. Firewall introduction What is a firewall? Firewall benefits, concepts. HAnds on launching various attacks on a target. Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls. Firewall products. Hands on Simple personal firewall configuration. Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on SPI firewalls. Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall plusses and minuses. Hands on Proxy firewalls. Firewall architectures Small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Password cracking. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, RADIUS. Hands on Using certificates. VPN overview What is a VPN? What is an IP VPN? VPNs vs. Private Data Networks, Internet VPNs, Intranet VPNs, Remote access VPNs, Site to site VPNs, VPN benefits and disadvantages. VPN Tunnelling VPN components, VPN tunnels, tunnel sources, tunnel end points, tunnelling topologies, tunnelling protocols, which tunnelling protocol? Requirements of tunnels. L2TP Overview, components, how it works, security, packet authentication, L2TP/IPsec, L2TP/PPP, L2 vs L3 tunnelling. Hands on Implementing a L2TP tunnel. IPsec AH, HMAC, ESP, transport and tunnel modes, Security Association, encryption and authentication algorithms, manual vs automated key exchange, NAT and other issues. Hands on Implementing an IPsec VPN. SSL VPNs Layer 4 VPNs, advantages, disadvantages. SSL. TLS. TLS negotiation, TLS authentication. TLS and certificates. Hands on Implementing a SSL VPN. MPLS VPNs Introduction to MPLS, why use MPLS, Headers, architecture, label switching, LDP, MPLS VPNs, L2 versus L3 VPNs. Point to point versus multipoint MPLS VPNs. MBGP and VRFs and their use in MPLS VPNs. Hands on Implementing a MPLS L3 VPN. Penetration testing Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology. Hands on Hacking tools and countermeasures.
Take on a journey through Architectural History and Interior Design is akin to opening a door to a realm where creativity meets functionality, where spaces tell stories, and where every corner whispers a narrative. In today's modern world, this course holds paramount importance, serving as a gateway to understanding the evolution of structures and the art of crafting environments that resonate with human emotions. Delving into Scandinavian Architectural Style, Eclecticism, Art Deco, and more, you'll master the language of design, learning to orchestrate spaces with finesse. From the play of lighting in Interior Design to the nuances of color psychology, every module enriches your palette of skills. This knowledge isn't just confined to the realm of aesthetics; it permeates into our daily lives, enhancing functionality and fostering well-being. Moreover, in the professional arena, the demand for Interior Designers is burgeoning, with ample opportunities awaiting in the UK job market. With a refined skill set, you could secure positions commanding competitive salaries, with the average ranging from £25,000 to £45,000 per annum, depending on expertise and experience. The advantages of this course are manifold, offering a blend of artistic expression and practical prowess. As the sector continues to expand, with an approximate growth rate of 4-6% annually, honing your skills in Architectural History and Interior Design is not just a choice, but a strategic investment in a flourishing career path. Key Features This Comprehensive Course in Architectural History and Interior Design Includes: This Architectural History and Interior Design Course is CPD Certified Free Certificate from Reed CIQ Approved Architectural History and Interior Design Course Developed by Specialist Lifetime Access Course Curriculum Architectural History and Interior Design Module 01: Scandinavian Architectural Style Module 02: Interior Designing Module 03: Lighting in Interior Design Part One Module 04: Eclecticism Architectural Style Module 05: Introduction to Architectural Studies Module 06: Colour in Interior Designing Module 07: Art Deco Architectural Style Module 08: Architectural Styles Module 09: Gothic Architectural Style Module 10: Architectural Ideas and Movements Module 11: Lighting in Interior Design Part Two Module 12: Ancient Architecture Module 13: Baroque and Rococo Architectural Style Module 14: Victorian Architectural Style Module 15: Classical and Early Christian Architectural Style Module 16: Modern and Post-Modern Architectural Style Learning Outcomes: After completing this Architectural History and Interior Design Course, you will be able to: Analyze architectural styles to inform design decisions effectively. Apply lighting techniques to enhance interior spaces aesthetically. Interpret historical influences on contemporary design practices accurately. Evaluate the impact of color schemes on spatial perception and mood. Synthesize diverse architectural ideas into cohesive design concepts. Communicate architectural concepts visually and verbally with clarity. CPD 10 CPD hours / points Accredited by CPD Quality Standards Comprehensive Course in Architectural History and Interior Design 2:52:32 1: Module 1: Scandinavian Architectural Style Preview 13:07 2: Module 2: Interior Designing 13:52 3: Module 3: Lighting in Interior Design Part One 06:53 4: Module 4: Eclecticism Architectural Style 09:04 5: Module 5: Introduction to Architectural Studies 12:39 6: Module 6: Colour in Interior Designing 13:00 7: Module 7: Art Deco Architectural Style 10:23 8: Module 8: Architectural Styles 07:46 9: Module 9: Gothic Architectural Style 11:39 10: Module 10: Architectural Ideas and Movements 11:53 11: Module 11: Lighting in Interior Design Part Two 08:54 12: Module 12: Ancient Architecture 07:39 13: Module 13: Baroque and Rococo Architectural Style 08:14 14: Module 14: Victorian Architectural Style 09:07 15: Module 15: Classical and Early Christian Architectural Style 12:44 16: Module 16: Modern and Post-Modern Architectural Style 14:38 17: CPD Certificate - Free 01:00 Who is this course for? This Architectural History and Interior Design course is accessible to anyone eager to learn more about this topic. Through this course, you'll gain a solid understanding of Architectural History and Interior Design. Moreover, this course is ideal for: Aspiring architects seeking a comprehensive understanding of architectural history. Interior designers looking to broaden their design repertoire. Students passionate about art, history, and design. Professionals in related fields eager to expand their knowledge. Anyone with a keen interest in the built environment and its evolution. Requirements There are no requirements needed to enrol into this Architectural History and Interior Design course. We welcome individuals from all backgrounds and levels of experience to enrol into this Architectural History and Interior Design course. Career path After finishing this Architectural History and Interior Design course you will have multiple job opportunities waiting for you. Some of the following Job sectors of Architectural History and Interior Design are: Architectural Technician - £20K to 35K/yr Interior Designer - £22K to 45K/yr Architectural Historian - £25K to 40K/yr Lighting Designer - £24K to 50K/yr Design Consultant - £22K to 40K/yr Certificates Digital certificate Digital certificate - Included Reed Courses Certificate of Completion Digital certificate - Included Will be downloadable when all lectures have been completed.
Sketchup face to face training customised and bespoke.
IPsec training course description This hands on course focuses on IPsec VPNs. Rather than focusing on one implementation this course concentrates on the technologies and protocols of IPsec. Starting with an overview of the complete IPsec architecture the course then moves onto ESP packet analysis along with encryption and authentication provided. IKEv1 and IKEv2 are both covered in detail. Having covered IPsec with pre shared keys the course then moves onto IPsec with certificates followed by IPsec issues. The course is vendor neutral with hands on with both Cisco and Microsoft implementations. What will you learn Explain how IPsec works. Explain the role of AH, ESP and IKE. Configure IPsec. Troubleshoot IPsec. IPsec training course details Who will benefit: Technical staff working with IPsec. Prerequisites: Definitive IP VPNs for engineers. Duration 3 days IPsec training course contents What is IPsec? How to spell IPsec, IPsec is IP security, confidentiality, integrity, authenticity, replay protection, what is a VPN? Network layer security, IPsec and IPv4, IPsec and IPv6, the suite of protocols, the standard, IPsec RFCs, IPsec history. Hands on Analysis of 'normal' IP packets. IPsec architecture The IPsec protocols, AH vs ESP, Why two headers? transport mode, tunnel mode, Remote access VPNs, site to site VPNs, security associations, SA database, Security Parameters Index, implementations: Host tack, Bump in the Stack, Bump in the Wire. Hands on Configuring IPsec. AH What AH does, the stack, The AH header, What is authenticated? Device authentication. AH in transport mode, AH in tunnel mode. Hands on AH packet analysis. ESP What ESP does, the ESP header, ESP in transport mode, ESP in tunnel mode, ESP and SA, ESP and SPI. Hands on ESP packet analysis, policy configuration. IPsec encryption IPsec is a framework, standard algorithms, ESP keys, the role of IKE, key lifetimes, how IKE generates the keys, DES, 3DES, AES, cipher block chaining, counter mode, other encryption. Hands on Encryption configuration. IPsec authentication Authentication types, IPsec authentication, Authentication algorithms: MD5, keyed SHA-1, HMAC-MD5, HMAC-SHA-1, HMAC-RIPEMD, other authentication algorithms. Hands on Authentication configuration. IKE Internet Key Exchange, IKE and the SAD, the two phase negotiation, ISAKMP, ISAKMP header, pre shared keys, digital signatures, public key encryption, Diffie Hellman, proposals, counter proposals, nonces, identities, phase 1 negotiation: main mode, aggressive mode, base mode. Phase 2 negotiation: quick mode, new group mode. Hands on IKE packet analysis. More IKE PFS, IKE and dynamic addresses, XAUTH, hybrid authentication, CRACK, ULA, PIC. User level authentication. IKE renegotiation, heartbeats. Hands on Troubleshooting IPsec. IKEv2 The IKEv2 exchange, IKE_SA_INIT, IKE_AUTH, CREATE_CHILD_SA, IKEv2 packets, the informational exchange. Comparing IKev1 vs IKE v2. Hands on IKEv2 configuration and analysis. PKI What is PKI?, Digital certificates, Certificate authorities, CA servers, RA, VA, certificates, CA hierarchy, CRLs, certificate formats. Hands on installing and configuring certificate servers. IPsec issues NAT, IPsec overhead and fragmentation. Summary IPsec strengths and weaknesses. Where to get further information.
Overview This comprehensive course on 'Architectural Studies' will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This 'Architectural Studies' comes with accredited certification which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is this course for? There is no experience or previous qualifications required for enrolment on this 'Architectural Studies'. It is available to all students, of all academic backgrounds. Requirements Our 'Architectural Studies' is fully compatible with PC's, Mac's, Laptop,Tablet and Smartphone devices. This course has been designed to be fully compatible on tablets and smartphones so you can access your course on wifi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 16 sections • 16 lectures • 05:23:00 total length •Introduction to Architectural Studies: 00:27:00 •Ancient Architecture: 00:13:00 •Architectural Ideas and Movements: 00:23:00 •Architectural Styles: 00:15:00 •Art Deco Architectural Style: 00:18:00 •Scandinavian Architectural Style: 00:22:00 •Victorian Architectural Style: 00:18:00 •Classical and Early Christian Architectural Style: 00:28:00 •Gothic Architectural Style: 00:22:00 •Baroque and Rococo Architectural Style: 00:17:00 •Eclecticism Architectural Style: 00:15:00 •Modern and Post-Modern Architectural Style: 00:28:00 •Interior Designing: 00:24:00 •Colour in Interior Designing: 00:24:00 •Lighting in Interior Design Part One: 00:12:00 •Lighting in Interior Design Part Two: 00:17:00
Definitive Salt training course description Salt is a remote execution framework and configuration management system. This course covers Salt from the basics. After a quick first taste the course moves onto execution modules, salt states, minion and master data, jinja, Salt extensions and then topology and configuration options. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. What will you learn Install and use Salt. Describe the architecture of Salt. Manage configurations with Salt. Extend Salt. Definitive Salt training course details Who will benefit: Anyone working with Salt. Prerequisites: Linux fundamentals. Duration 2 days Definitive Salt training course contents Introduction What is Salt? High- level architecture, Some quick examples, system management, configuration management, A brief history, Topology options, Extending Salt. Quick start: First taste of Salt Single-master setup, from packages, bootstrap scripts, Starting up, Basic commands, salt: the main workhorse, salt-key: key management, salt-call: execution on the minion, salt-run: co-ordination of jobs on the master, summary of commands, Key management, viewing keys, accepting keys, rejecting keys, key files, Minion targeting, minion ID, list (-L), glob, regular expressions (-E), grains (-G), compound (-C), targeting summary, Additional remote execution details, Conclusion. Execution modules: The functional foundation sys: information and documentation about modules, sys.doc basic documentation, sys.list_modules, sys.list_functions: simple listings, cmd: execute via shell, cmd.run: run any command, pkg: manage packages, virtual modules, pkg.lists_pkgs: list all installed packages, pkg.available version: see what version will be installed, pkg.install: install packages, user: manage users, user.add: add users, user.list_users, user info: get user info, saltutil: access various Salt utilities, Summary. Configuration management: Salt states Salt files overview, SLS example: adding a user, working with the multi-layered state system, Highstate and the top file, the top file, State ordering, require: depend on another state, watch: run based on other changes, odds and ends, Summary. Minion data / master data Grains are minion data, performing basic grain operations, setting grains, targeting with grains in the top file, Pillars are data from the master, querying pillar data, querying other sources with external pillars, Renderers give data options. Extending Salt: part I Introduction to Jinja, Jinja basics, Templating with Jinja, filtering by grains, Custom execution module, Custom state modules, Custom grains, External pillars, Summary. More on the matter Runners, manage minions, manage jobs, The orchestrate runner, The event system, The reactor system, Summary. Extending Salt: part II Python client API, reading configuration data on a master and minion, using the master client (localclient) API, Using the caller client API, Custom runners, writing a custom runner, using the runnerclient API, Summary. Topology and configuration options Master configuration, directories and files, logging, access control, files server options, Topology variations, masterless minions, peer systems, syndication masters, multiple masters. Brief introduction to salt-cloud Overview, Setup AWS and salt-cloud, installing salt-cloud, cloud providers, cloud profiles, cloud maps, Introspection via salt cloud, Creating infrastructure, More information. Using vagrant to run Salt examples YAML.
You will learn how to develop reliable and scalable serverless applications, following the microservices architecture. We will develop event-driven microservices with AWS serverless services that come with the power of the cloud, high availability and high scalability by nature following serverless design patterns and best practices.