• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

171 Architecture courses in Hindley

Total SMTP and email for engineers

5.0(3)

By Systems & Network Training

SMTP training course description A hands on course focusing on the workings of email systems and the standard protocols that they use. The course is not specific to any particular implementation, but some vendor specifics are noted. Linux and Microsoft machines are used in hands on sessions to reinforce the theory of major sessions. The course concentrates on troubleshooting and interworking using network sniffing and protocol inspection rather than "which buttons to push". What will you learn Describe and explain SMTP MIME POP3 IMAP PGP, GPG, S/MIME SPF, DKIM, DMARC Configure mail routing Secure email systems SMTP training course details Who will benefit: Technical staff responsible for email systems. Prerequisites: TCP/IP foundation for engineers. Duration 3 days SMTP training course contents SMTP architecture What is SMTP, email before SMTP, SMTP history, the different protocols, clients, servers. Email composition, transmission, delivering emails, storing and reading emails. MUAs, MTAs, POP3, IMAP, SMTP, DNS, webmail. Hands on Setting up MTAs and MUAs and sending a simple email using telnet. The SMTP protocol SMTP protocol stack, SMTP headers, HELO, SMTP mail, MAIL FROM, RCPT TO, DATA, SMTPUTF8, 8BITMIME, TURN, EHLO, ETRN, 3 digit replies. Hands on Analysing SMTP packets on a network. DNS and SMTP SMTP forwarding, SMTP relays, interoperation, how SMTP uses DNS, MX records. Hands on Setting up mail relays. SMTP headers IMF data, From, to, cc, bcc, sender and recipient headers, message Ids, received trails, in-reply-to, received-SPF, mail list headers. Hands on Using clients to analyse details from mail headers, including true originators and path of emails. MIME Email attachments, MIME versions, content type headers, encoding, base 64, binary data, multi part headers, troubleshooting attachments. Hands on Analysing MIME headers and attachments. POP3 What is POP3, where to use POP3, authorisation, transactions, POP3 commands: USER, PASS, STAT, LIST, RETR, DELE. Hands on Setting up a POP3 server, analysing POP3 packets on a network. IMAP and IMAPS What is IMAP, where to use IMAP, authorisation, mailbox structure, IMAP commands: LOGIN, AUTHENTICATE, LIST, CREATE, Examine (message flags), SELECT, STORE. Hands on Setting up an IMAP server and analysing IMAP packets on a network. Interoperation Mail gateways, addressing, Exchange, sendmail. Email security Basics, Transport level: STARTTLS. Content: PGP/GPG, mail signing and encryption, S/MIME, digital certificates, secure email submission. Hands on Setting up and using a PGP key, configure MTAs to use TLS. Email authentication and spam prevention Mail relays, grey listing, block list & RBL, DNSBL (Real-time Black hole List), White list, SPF, Domain Keys Identified Mail (DKIM), Author Domain Signing Practices (ADSP), Abuse Report Format (ARF), Domain-based Message Authentication, Reporting and Conformance (DMARC). Hands on Relay spamming and the blocking spamming.

Total SMTP and email for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,367

Definitive DNS for engineers

5.0(3)

By Systems & Network Training

DNS training course description This three-day hands on DNS training course studies both the UNIX BIND and the Microsoft (MS DNS) implementations. The course starts with the big picture of how DNS works, then client configuration. Primary and secondary servers are then configured, progressing to DDNS, subdomains and security issues. Hands on sessions follow all sections ensuring that troubleshooting techniques are used throughout the course. Students choose whether to use Windows or UNIX for the hands on sessions. What will you learn Describe the architecture of DNS. Explain how DNS works. Install, configure, maintain and troubleshoot DNS DNS training course details Who will benefit: Technical staff wanting to learn DNS including: Network personnel System administrators. Prerequisites: UNIX Fundamentals (or Windows knowledge). TCP/IP foundation for engineers. Duration 3 days DNS training course contents What is DNS? Hostnames, Name resolution, host files, host file problems, What is DNS? The DNS namespace, TLDs, gTLDs, registering domains, Nameservers, how DNS works. Hands on Testing DNS servers on the Internet. DNS clients Ways to use DNS, dynamic and static configuration, multiple nameservers, domain name, searchlist, resolution issues, testing the configuration. Hands on Client configuration. DNS server software Implementations, Microsoft, BIND, daemons and services, installation, starting and stopping servers. Hands on Setting up a DNS server. DNS zone files What is a zone, Zone file overview, Forward zones, Reverse zones, Resource records, A records, PTR, CNAME, Root hints, local zone file. BIND and Microsoft configuration. Hands on Server configuration files. NS and applications MX records, Mail server load balancing, SPF, SRV records, VoIP and SRV, Microsoft and SRV, NAPTR. Hands on Testing records with dig and nslookup. DNS slaves and other servers DNS server types, Server resilience, Slaves, Zone transfers, SOA records, Serial numbers, recommendations, polling based zone transfers, NOTIFY, AD integration, DNS caching, Negative caching, TTL, Caching only servers. Hands on Masters, slaves and zone transfers. The DNS protocol The DNS stack, DNS port numbers, DNS queries, The DNS header, header section format, question format, other section format. Hands on Troubleshooting DNS with Wireshark. Dynamic DNS DHCP, DDNS, IXFR, WINS integration. Hands on Dynamic DNS. Subdomains Root servers, root server selection, Authority, delegation, NS records, subdomain with and without delegation, reverse delegation. Hands on Delegation, setting up a subdomain server. DNS security Restricting queries, DNS and firewalls, Split DNS, forwarders, internal root servers, the use of proxy servers, DNSSEC, TSIG. Hands on Hardening a DNS server. DNS and IPv6 What is IPv6, IPv6 addressing, IPv6 DNS issues, AAAA, IPv6 reverse delegation. Troubleshooting DNS Problem solving, DNS troubleshooting, Zone file checking, Some common errors, Log files, tools, nslookup, dig, host, DNS design, performance, load balancing. Hands on Putting it all together. Summary Useful books, Internet sites, RFCs. Appendix: ENUM What is ENUM, How ENUM works, NAPTR.

Definitive DNS for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,367

CCNP ENARSI

5.0(3)

By Systems & Network Training

CCNP (ENARSI) training course description The Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) v1.0 gives you the knowledge you need to install, configure, operate, and troubleshoot an enterprise network. This course covers advanced routing and infrastructure technologies, expanding on the topics covered in the Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.0 course. This course helps prepare for the exam, Implementing Cisco Enterprise Advanced Routing and Services (300- 410 ENARSI), which leads to the new CCNP What will you learn Gain the knowledge you need to install, configure, operate, and troubleshoot an enterprise network. Qualify for professional-level job roles in advance routing and services Prepare for the Implementing Cisco Enterprise Advanced Routing and Services Exam (300-410 ENARSI). CCNP (ENARSI) training course details Who will benefit: Enterprise network engineers, System engineers, System administrators, Network administrators. Prerequisites: CCNP core Duration 5 days CCNP (ENARSI) training course content Course Objectives Configure classic Enhanced Interior Gateway Routing Protocol (EIGRP) and named EIGRP for IPv4 and IPv6 Optimize classic EIGRP and named EIGRP for IPv4 and IPv6 Troubleshoot classic EIGRP and named EIGRP for IPv4 and IPv6 Configure Open Shortest Path First (OSPF)v2 and OSPFv3 in IPv4 and IPv6 environments Optimize OSPFv2 and OSPFv3 behaviour Troubleshoot OSPFv2 for IPv4 and OSPFv3 for IPv4 and IPv6 Implement route redistribution using filtering mechanisms Troubleshoot redistribution Implement path control using Policy-Based Routing (PBR) and IP Service Level Agreement (SLA) Configure Multiprotocol-Border Gateway Protocol (MPBGP) in IPv4 and IPv6 environments Optimize MPBGP in IPv4 and IPv6 environments Troubleshoot MPBGP for IPv4 and IPv6 Describe the features of Multiprotocol Label Switching (MPLS) Describe the major architectural components of an MPLS VPN Identify the routing and packet forwarding functionalities for MPLS VPNs Explain how packets are forwarded in an MPLS VPN environment Implement Cisco Internetwork Operating System (IOS) Dynamic Multipoint VPNs (DMVPNs) Implement Dynamic Host Configuration Protocol (DHCP) Describe the tools available to secure the IPV6 first hop Troubleshoot Cisco router security features Troubleshoot infrastructure security and services Course Outline Implementing EIGRP Optimizing EIGRP Troubleshooting EIGRP Implementing OSPF Optimizing OSPF Troubleshooting OSPF Configuring Redistribution Troubleshooting Redistribution Implementing Path Control Implementing Internal Border Gateway Protocol (IBGP) Optimizing BGP Implementing MP-BGP Troubleshooting BGP Exploring MPLS Introducing MPLS L3 VPN Architecture Introducing MPLS L3 VPN Routing Configuring Virtual Routing and Forwarding (VRF)-Lite Implementing DMVPN Implementing DHCP Introducing IPv6 First Hop Security Securing Cisco Routers Troubleshooting Infrastructure Security and Services Troubleshooting with DNA Center Assurance. Lab outline Configure EIGRP Using Classic Mode and Named Mode for IPv4 and IPv6 Verify the EIGRP Topology Table Configure EIGRP Stub Routing, Summarization, and Default Routing Configure EIGRP Load Balancing and Authentication Troubleshoot EIGRP Issues Configure OSPFv3 for IPv4 and IPv6 Verify the LinkState Database Configure OSPF Stub Areas and Summarization Configure OSPF Authentication Troubleshoot OSPF Issues Implement Routing Protocol Redistribution Manipulate Redistribution Manipulate Redistribution Using Route Maps Troubleshoot Redistribution Issues Implement PBR Configure IBGP and External Border Gateway Protocol (EBGP) Implement BGP Path Selection Configure BGP Advanced Features Configure BGP Route Reflectors Configure MP-BGP for IPv4 and IPv6 Troubleshoot BGP Issues Configure Routing with VRF -Lite Implement Cisco IOS DMVPN Obtain IPv6 Addresses Dynamically Troubleshoot DHCPv4 and DHCPv6 Issues Troubleshoot IPv4 and IPv6 Access Control List (ACL) Issues Configure and Verify Unicast Reverse Path Forwarding (uRPF) Troubleshoot Network Management Protocol Issues: Lab 1 and 2

CCNP ENARSI
Delivered in Internationally or OnlineFlexible Dates
£3,697

Securing Linux systems

5.0(3)

By Systems & Network Training

Securing Linux systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure Linux accounts. Secure Linux file systems. Secure Linux access through the network. Securing Linux systems training course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing Linux systems training course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing Linux systems
Delivered in Internationally or OnlineFlexible Dates
£3,697

Python for network engineers

5.0(3)

By Systems & Network Training

Python training course description This Python course focusses on teaching Python for use in network automation and network DevOps. We focus on getting delegates up and running with Python and network automation as quickly as possible rather than making them great programmers. In other words we concentrate on enabling delegates to use network automation libraries such as netmiko, NAPALM and Nornir, and APIs such as NETCONF and RESTCONF rather than enabling delegates to produce object oriented programs. Hands on sessions use Cisco and Juniper devices. What will you learn Run Python programs. Read Python programs. Write Python programs. Debug Python programs. Automate network tasks with Python programs. Configure network devices with Python. Collect data from network devices with Python. Python training course details Who will benefit: Network engineers. Prerequisites: TCP/IP Foundation Duration 5 days Python training course contents What is Python? Programming languages, Why Python? Python in interactive mode, Python scripts, ipython, Python version 2 versus version 3. A simple Python script. Comments. Hands on Installing Python, Hello world. A network example On box vs off box Python. telnet, ssh, NETCONF, HTTP, APIs, manufacturers and API support, analysis of a simple telnetlib program. Hands on Using Python to retrieve the configuration from a network device. Using wireshark to analyse the actions. Python basics I/O, operators, variables and assignment, types, indentation, loops and conditionals. Hands on Modifying the telnet program, changing configurations on a network devices. Functions, classes and methods What are functions, calling functions, builtin functions, useful builtin functions, file handling, classes, objects, creating instances. Hands on Storing configurations in files, configuring devices from files, using an inventory file to work on multiple devices. Libraries and modules Modules, files and packages, import, from-import, Python standard library, other packages, pip install, executing other programs. Managing python libraries. Hands on Using pip, installing and using ipaddress, subprocess to access netsnmp. For the more advanced, using the sockets library. Paramiko and netmiko SSH, enabling SSH on devices, keys. Paramiko versus netmiko, example scripts. pexpect. Hands on Configuring VLANs from Python. pySNMP Gathering facts using previous methods, SNMP review, pySNMP GET, pySNMP and SNMPv3. easySNMP library. Hands on Walking a MIB from Python. NETCONF What is NETCONF? Enabling NETCONF on devices, A first ncclient script, device handlers, get_config, edit_config, copy_config, delete_config, commit, validate, pyEZ, utils_config, utils.sw. Hands on Configuration using ncclient and PyEZ. This session is expanded for those interesting in JunOS automation. Manipulating configuration files Builtin functions, string handling. Unicode. Sequences, strings, lists, tuples. Dictionaries. TextFSM. Regular expressions. JSON, YAML, XML, YANG, Jinja2, templates. Hands on Jinja2 templating with Python to configure network devices. NAPALM Getters, configuration operations, supported devices, NAPALM transport, Config-replace, Config-merge, Compare config, Atomic changes, rollback. Example NAPLAM scripts. Hands on Using NAPALM to gather facts, Using NAPALM for configuration management REST and RESTCONF What is REST, HTTP methods, GET, POST, cURL, Postman, Python requests library. RESTCONF, a RESTCONF example. Hands on Modifying a configuration using RESTCONF. Scapy What is scapy, Scapy in interactive mode, Scapy as a module. Hands on Packet crafting from Python. Warning Errors and exceptions, Exception handling, try, except. Memory management. Garbage collection. Context management, With. Hands on Improving Python code. Nornir What is Nornir? A network automation framework, inventories, connection management and parallelization. Nornir architecture and other libraires. Hands on Setting up nornir, nornir fact gathering, nornir tasks. Optional Writing your own functions, Writing your own classes. pyntc. Hands on Writing reusable code.

Python for network engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697

LTE optimisation and capability

5.0(3)

By Systems & Network Training

LTE optimization training course description This course gives delegates an understanding of the Key Performance Indicators used within the 3G LTE (4G) network environment. We investigate the 3GPP standards for KPIs (including TR 32.814, TS 32.410 & TS 32.455) these cover GERAN, UMTS & LTE environments. The course details the optimisation procedures and the use of Self optimisation, Selforganising & Self-healing equipment now being deployed across all releases of mobile networks. What will you learn Explain the RF optimisation flowchart. Describe the importance of Reference Signal Received Power (RSRP). List many of the 3GPP recommended KPIs. Describe the concept of APN AMBR and UE AMBR within LTE. Describe the use of planning and optimisation computer tools. LTE optimization training course details Who will benefit: Anyone working with LTE. Prerequisites: Essential LTE Duration 2 days LTE optimization training course contents Introduction to the cellular environment The architecture, 2G (GSM), GPRS/EDGE, The NGMN (Next Generation Mobile Network), media gateway controller, 3GPP Rel99 the 3G introduction, HSPA deployments, 3G LTE (4G). Cellular network procedures GSM/GPRS call setup, GPRS data call setup, 3G UMTS data call setup, Data call (Voice over LTE) in LTE (using IMS), Circuit Switched Fall Back (CSFB) in LTE, IP packet session in LTE. Introduction to the standards The 3GPP specifications body, The numbering structure for KPIs, 2G KPIs, 3G/UMTS KPIs, 3G LTE KPIs, IMS KPIs. Introduction to the KPI definitions KPI definitions, accessibility KPIs, retainability KPIs, mobility KPIs, utilisation KPIs. In-depth overview of the air Interfaces GSM/GPRS FDMA & TDMA solution, 3G UMTS WCDMA solution, HSPA+ sharing spare power (Codes), The 3G LTE uplink & downlink interface explained, Initial attach procedures explained. Problem analysis Reference Signal Received Power (RSRP), Signal to Interference Noise Ratio (SINR), handover success rates, power adjustments, classification of coverage problems, weak coverage & coverage holes, lack of dominant cells, cross coverage, improper tilt settings, uplink/downlink imbalance, signal quality, Azimuths & tilts to reduce interference, Handover failure due to interference, Service drop causes. Mobile RF performance in 2G/3G Performance counters, KPIs, testing & measurement, Drive testing and survey, Data collection and post processing of data, LTE service optimization, bandwidth, poor coverage, Quality, optimization process, KPI optimization, Root Cause Analysis (RCA) applied to RF issues, optimization tools and software. Advanced LTE network planning & optimization LTE UE measurements (RSRP/RSRQ), LTE capacity planning, RF configuration parameters, LTE cell selection/reselection planning, LTE radio network KPIs, LTE user-centric KPIs, LTE network performance KPIs, LTE system utilization KPIs, LTE RF channel performance predictions, LTE channel information processing, LTE channel multiplexing, Physical layer and structure, MIMO in LTE, LTE resource plan LTE and Self-Organizing Networks (SON). Radio network optimization work flow Work flow, the existing network, Optimization team establishment and cluster division, Single site verification, Alarm check, Cell state check, Radio parameters check, Site verification, Statistics analysis, Coverage problem analysis. Mobile internet and QoS issues Cellular QoS reference models. How QoS impact on KPIs and measurements, Introduction to mobile internet, The concept of shared access technologies, Support for QoS in the WCDMA environment, The PDP context model, Supporting end-to-end QoS, EPS bearer concepts, Default EPS bearer, Dedicated EPS bearer, APN-AMBR, UE-AMBR.

LTE optimisation and capability
Delivered in Internationally or OnlineFlexible Dates
£2,477

UNIX system administration

5.0(3)

By Systems & Network Training

UNIX system administration training course description This five day hands on course provides a comprehensive coverage of core UNIX administration tasks. The course covers generic UNIX and is available for any UNIX distribution required. What will you learn Administer & configure UNIX systems. Maintain UNIX by handling disk space and taking regular backups. Manage software packages. Perform basic troubleshooting. Maintain a secure UNIX system. Describe the organisation and implementation of the filesystem. UNIX system administration training course details Who will benefit: System administrators Network administrators. Prerequisites: UNIX fundamentals. Duration 5 days UNIX system administration training course contents Part 1 Exploring UNIX command-line tools Using a shell, shell configuration, environment variables, getting help, streams, redirection and pipes, processing text using filters, manipulating files, regular expressions, grep, sed. Managing software Package concepts, comparison of package formats, RPM, rpm commands, yum, dpkg, apt-cache, apt-get, dselect, aptitude, converting between package formats, dependencies and conflicts, startup script problems, shared libraries, library management, managing processes, the kernel: the first process, process lists, foreground & background processes, process priorities, killing processes. Configuring hardware Configuring firmware and hardware, RQs, I/O addresses, DMA addresses, Boot disks, coldplug and hotplug devices, configuring expansion cards and PCI cards, kernel modules, USB devices, UNIX USB crivers, configuring hard disks, partitioning systems, LVM, common layouts, creating partitions and filesystems, maintaining filesystem health, tuning, journals, checking filesystems, monitoring disk use, mounting and unmounting filesystems. Managing files File management commands, file naming and wildcards, file archiving, links, directory commands, file ownership and group, file access control, permissions, chmod, defaults, file attributes, disk quotas, enabling and setting quotas, locating files, the FHS. Booting UNIX and editing files Installing boot loaders, GRUB legacy, GRUB 2, alternative boot loaders, the boot process, boot messages, runlevels and the initialization process, runlevel functions, runlevel services, alternative boot systems, upstart, system. Part 2 Configuring the X window system Localization, configuring basic X features, X server options, methods of configuring X, X display information, X fonts, the X GUI login system, XDMCP server, using X for remote access, screen display settings, setting your time zone, your locale, configuring printing, conceptualizing the UNIX printing architecture, understanding PostScript and ghostscript, running a printing system, configuring CUPS, monitoring and controlling the print queue. Administering the system Managing users and groups, tuning user and system environments, using system log files, understanding syslogd, setting logging options, manually logging data, rotating l;og files, reviewing log file contents, maintaining the system time, UNIX time concepts, manually setting the time, using NTP, running jobs in the future, understanding the role of cron, creating system cron jobs, creating user cron jobs, using anacron, using at. Configuring basic networking TCP/IP, network hardware, network addresses, hostnames, network ports, configuring UNIX for a local network, configuring with DHCP, static IP address, configuring routing, using GUI configuration tools, ifup and ifdown, diagnosing network connections, testing connectivity, tracing a route, checking network status , examining network traffic, additional tools. Writing scripts, configuring email, and using databases The shell environment, aliases, shell configuration files, writing scripts, commands, variables, conditional expressions, loops, functions, managing email, choosing email software, securing your email server, managing data with SQL, picking a SQL package, understanding SQL basics, using MySQL. Securing your system Administering network security, super server restrictions, disabling unused servers, administering local security, securing passwords, limiting root access, setting login, process, SUID/SGID files, configuring SSH, using GPG, generating, importing and revoking keys, encrypting and decrypting data, signing messages and verifying signatures.

UNIX system administration
Delivered in Internationally or OnlineFlexible Dates
£2,797

Linux system administration (LPIC-1)

5.0(3)

By Systems & Network Training

LPIC-1 training course description This five day hands on course provides a comprehensive coverage of core Linux administration tasks. The course covers generic Linux and is available for any Linux distribution required. It closely follows the LPIC curriculum allowing delegates to achieve the relevant certification if required. What will you learn Administer & configure Linux systems. Maintain Linux by handling disk space and taking regular backups. Manage software packages. Perform basic troubleshooting. Maintain a secure Linux system. Describe the organisation and implementation of the filesystem. LPIC-1 training course details Who will benefit: System administrators. Network administrators. Prerequisites: Linux fundamentals (LPI 010) Duration 5 days LPIC-1 training course contents Part I Exam 101 Exploring Linux Command-Line Tools Using a Shell, Shell Configuration, Environment Variables, Getting Help, Streams, Redirection and Pipes, Processing Text Using Filters, Manipulating files, Regular Expressions, grep,sed. Managing Software Package Concepts, Comparison of package formats, RPM, rpm Commands, Yum, Debian Packages, dpkg, apt-cache, apt-get, dselect, aptitude, Converting Between Package Formats, Dependencies and Conflicts, Startup Script Problems, Shared Libraries, Library Management, Managing Processes, the Kernel: The First Process, Process Lists, Foreground & Background Processes, Process Priorities, Killing Processes. Configuring Hardware Configuring Firmware and Hardware, IRQs, I/O Addresses, DMA Addresses, Boot Disks, Coldplug and Hotplug Devices, Configuring Expansion Cards and PCI Cards, Kernel Modules, USB Devices, Linux USB Drivers, Configuring Hard Disks, Partitioning Systems, LVM, Common Layouts, Creating Partitions and Filesystems, Maintaining Filesystem Health, Tuning, Journals, Checking Filesystems, Monitoring Disk Use, Mounting and Unmounting Filesystems. Managing Files File Management Commands, File Naming and Wildcards, File Archiving, Links, Directory Commands, File Ownership and Group, File access control, Permissions, chmod, Defaults, File Attributes, Disk Quotas, Enabling and setting Quotas, Locating Files, The FHS. Booting Linux and Editing Files Installing Boot Loaders, GRUB Legacy, GRUB 2, Alternative Boot Loaders, the Boot Process, Boot Messages, Runlevels and the Initialization Process, Runlevel Functions, Runlevel Services, Alternative Boot Systems , Upstart, system. Part II Exam 102 265 Securing the X Window System Localization, Configuring Basic X Features, X Server Options, Methods of Configuring X, X Display Information, X Fonts, The X GUI Login System, XDMCP Server, Using X for Remote Access, Screen Display Settings, Setting Your Time Zone, Your Locale, Configuring Printing, Conceptualizing the Linux Printing Architecture, Understanding PostScript and Ghostscript, Running a Printing System, Configuring CUPS, Monitoring and Controlling the Print Queue. Administering the System Managing Users and Groups, Tuning User and System Environments, Using System Log Files, Understanding syslogd , Setting Logging Options, Manually Logging Data, Rotating Log Files, Reviewing Log File Contents, Maintaining the System Time, Linux Time Concepts, Manually Setting the Time, Using NTP, Running Jobs in the Future, Understanding the Role of cron, Creating System cron Jobs, Creating User cron Jobs, Using anacron, Using at. Configuring Basic Networking TCP/IP, Network Hardware, Network Addresses, Hostnames, Network Ports, Configuring Linux for a Local Network, Configuring with DHCP, Static IP Address, Configuring Routing, Using GUI Configuration Tools, ifup and ifdown, Diagnosing Network Connections, Testing Connectivity, Tracing a Route, Checking Network Status , Examining Network Traffic, Additional Tools. Writing Scripts, Configuring Email, and Using Databases The Shell Environment, Aliases, Shell Configuration Files, Writing Scripts, Commands, Variables, Conditional Expressions, Loops, Functions, Managing Email, Choosing Email Software, Securing Your Email Server, Managing Data with SQL, Picking a SQL Package, Understanding SQL Basics, Using MySQL Securing Your System Administering Network Security, Super Server Restrictions, Disabling Unused Servers, Administering Local Security, Securing Passwords, Limiting root Access, Setting Login, Process, SUID/SGID Files, Configuring SSH, Using GPG, Generating, Importing and Revoking Keys, Encrypting and Decrypting Data, Signing Messages and Verifying Signatures.

Linux system administration (LPIC-1)
Delivered in Internationally or OnlineFlexible Dates
£2,797

MySQL foundation

5.0(3)

By Systems & Network Training

MySQL foundation training course description The MySQL foundation course covers the basics of the SQL language as implemented by MySQL. The course is designed to give delegates practical experience in writing SQL statements using the MySQL client program and MySQL Workbench. The basic SQL statements, including the use of SQL functions and the basic table and view handling statements are introduced. What will you learn Create, alter and drop a MySQL database. Write SQL statements. Use SQL expressions and functions. Create and alter tables, indexes and views. Use transactions. Grant and revoke access privileges. Export and import data. MySQL foundation training course details Who will benefit: Anyone who needs to access and work with a MySQL Database. Prerequisites: An understanding of databases and exposure to information technology in general would be useful. Duration 3 days MySQL foundation training course contents Database concepts What is a database? database management systems, tables, rows and columns, indexes, primary keys, unique constraints and foreign keys, client-server architecture, supported data types, storage engines and table types, Information_Schema and MySQL Databases. Hands on using a database. Using the MySQL client What is the MySQL client? getting started and logging in, selecting a database, client commands, entering and executing SQL statements, retrieving previous commands, creating, editing and executing SQL files, redirecting output into a file, command line execution of MySQL scripts. Hands on Using the MySQL client. Basic SELECT The SQL SELECT statement, case sensitivity, quotes, statement terminator, syntax conventions, SELECT clause, FROM clause, conditions and the WHERE clause, logical operators, ORDER BY clause, column aliases, arithmetic expressions, precedence of operators. Hands on querying the sample database. LIMIT, UNION and AGGREGATE functions The LIMIT clause, UNION, UNION ALL, aggregate functions, GROUP BY clause, using Rollup with GROUP BY, HAVING clause. Hands on using limit, union and aggregate functions. Subqueries and joins Subqueries, cartesian products, table aliases, natural joins, join using, join on, multi-table joins. Hands on using subqueries and joins. Numeric and character functions Function types, testing functions, numeric functions character functions. Hands on using numeric and character functions. Data, time and other functions Date and time column types, date and time formats, Date format function, functions to return date time, functions to extract components from date time, date time arithmetic, miscellaneous functions. Hands on using date, time and other functions. Databases and tables Creating a database, selecting a database, creating tables, Auto_increment, show create table, column operations, constraint operations, copying tables, renaming tables, changing engine for tables, dropping tables, temporary tables. Hands on maintaining databases and tables. Indexes and views What is an index? creating an index, reviewing indexes, dropping indexes, what is a view? creating views, view restrictions, dropping views. Hands on maintaining indexes and views. Managing data Inserting rows, replacing rows, updating rows, deleting rows, Truncate statement, The COMMIT and ROLLBACK commands, savepoints, implicit commits. Hands on managing data. Access control Creating users, renaming users, dropping users, granting privileges, revoking privileges. Hands on creating users, granting and revoking. Import and export Exporting using SQL, importing using SQL, exporting from the command line, importing from the command line. Hands on export and import data.

MySQL foundation
Delivered in Internationally or OnlineFlexible Dates
£2,367

Introduction to Design Thinking: In-House Training

By IIL Europe Ltd

Introduction to Design Thinking: In-House Training Innovation is the cornerstone of highly successful companies, especially those that continue to be successful over the years and decades. Design thinking practices fuel this continual innovation, as they are the critical links from inspiration to delivery, concept to showroom floor, and start-up to global business. Design thinking is a structured approach to promoting innovation and creative problem-solving. It is not a new approach. It has been around for centuries, as the art, architecture, and inventions of mankind illustrate. By examining the steps to achieving great design and maximum utility of product, design thinking approaches provide a framework in which to develop new solutions to problems and new products to sell. This highly interactive course is designed to help participants think like designers to generate innovation, and to help teams to produce more innovation and creativity. Since design thinking is based on doing rather than thinking, we participants are challenged to apply the techniques, in the classroom, to create new ideas and solutions to a case study project. What you will Learn At the end of this program, you will be able to: Explain the underlying principles and value of using Design Thinking for innovation Describe the basic concepts of the Stanford Model for Design Thinking Evaluate a set of basic Design Thinking techniques for application to your projects Apply tools, techniques, and skills aligned with the 5 stages of the Stanford Model Drive innovation through Design Thinking at some level in your work environment Foundation Concepts Problems and solutions The Design Thinking difference Design Thinking skills and abilities Design Thinking mindset Design Thinking frameworks Stages of Design Thinking Problems and solutions The Design Thinking difference Design Thinking skills and abilities Design Thinking mindset Design Thinking frameworks General Practices Team formation Visualization Improvisation Personalization Empathize Practices Overview of Empathize techniques Observation Engagement Interviews Define Practices Overview of Define practices Unpacking techniques Defining the customer techniques Integrating the Define experience Ideate Practices Overview of Ideate practices Reusable techniques for the Ideate stage New Ideate techniques to explore Prototype & Test Practices Overview of Prototype practices Examples of prototypes Overview of Testing practices Forms of testing techniques Adopt and Adapt Design Thinking Overview of Design Thinking implementation Design Thinking implementation challenges Success in implementing Design Thinking Summary and Next Steps Workshop summary Next steps: Personal Action Plans

Introduction to Design Thinking: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,295