PMI-ACP® Exam Prep: In-House Training This course builds on the candidates' practical experience of Agile in the workplace to equip them with the broad range of knowledge and skills required for the PMI® Agile Certification exam. It will follow the PMI® requirements and reference the suggested reading list, including the Agile Practice Guide, but will not be limited to those areas. Within the profession and discipline of project management, Agile continues to develop as a significant and important aspect of bringing change to an organization. Where the products of change must be delivered to the business 'on time,' Agile is often the chosen methodology. In addition to equipping candidates for the PMI® Agile Certification examination, this course will also support candidates in taking a more informed and effective role in Agile projects. It will also enable them to take a significant role in encouraging and enabling the organization to become or develop as an Agile environment. What you will Learn You will learn how to: Appreciate the wider aspects of Agile project management tools and techniques Integrate various disciplines within Agile Tailor / customize Agile to suit the needs of different projects Prepare yourself for the PMI® Agile Certification examination Getting Started Introductions Agenda Expectations Foundation Concepts Defining 'Traditional' Project Management Project management parameters The 'traditional' approach to the parameters Strengths and weaknesses of the traditional approach Defining 'Agile' Project Management Project management parameters revisited The 'agile' approach to the parameters Strengths and weaknesses of agile Managing projects with traditional and agile methods Can the two approaches co-exist? Leveraging the benefits of both methods Options for using both methods on a project Avoiding the elephant traps Key aspects of the PMI® Agile Certified Practitioner (PMI-ACP)® Handbook Overview Eligibility requirements Exam information Exam Blueprint Continuing certification requirements Key aspects of the PMI Agile Certification Examination Content Outline Introduction Agile exam content outline Tools and techniques Knowledge and skills Domains and tasks (not examined) An Introduction to Agile and Implementing Agile Definable work vs. high-uncertainty work Project factors that influence tailoring The Agile Manifesto and 12 Principles Agile mindset Agile domains and tasks Agile Tools and Techniques Related to PM 'Hard Skills' Planning, monitoring, and adapting The need for planning, monitoring, and adapting The Agile approach to planning and plans The Agile planning tools and techniques The Agile monitoring tools and techniques The Agile approach to adapting Product quality A definition of 'product quality' Setting the standard for product quality Agile tools and techniques for achieving product quality Risk management A definition of 'risk' What is 'at risk'? The acceptability of risks The Agile tools and techniques for managing risks Agile Tools and Techniques Related to PM 'Soft Skills' The difference between PM 'hard and soft' skills Communications The importance of communications Forms of agile communications Communications within the project Communications from the project Communications to the project Making communications the cultural norm Interpersonal Skills Defining and understanding management Defining and understanding leadership Defining and understanding servant leadership Delegating vs. empowering Playing to people's strengths Overcoming the roadblocks Core Agile Tools and Techniques The philosophy of core Agile tools and techniques Agile estimation Will traditional forms of estimating work for agile? The relationship between estimating and guessing The relationship between estimating and sizing The where, who, and how of agile estimating Agile analysis and design Product analysis and design from a user point of view Product analysis and design from a supplier point of view Product analysis and design from an agile project point of view Value-Based Agile Tools and Techniques The role of value-based tools and techniques in bridging traditional PM with Agile Value-based prioritization Value-based prioritization and agile projects Investment appraisal methods Regulatory driven Customer driven Ranking methods (MMF, MoSCoW) Metrics What should we measure / track? Methods of measuring / tracking Adding value with metrics Process Improvement Value-stream analysis Value-stream mapping Agile Knowledge and Skills Context of Agile Knowledge and Skills vis-Ã -vis Agile Tools and Techniques Agile Knowledge and Skills Process focused People focused Product focused Project focused Exam Preparation and Course Closure The application process - where are you now? The 'Exam-Focused Journal' - what you still have to do Further preparation - self-study schedule Exam topic review Practice exam Practice exam debrief Course closure
PMI-ACP® Exam Prep This course builds on the candidates' practical experience of Agile in the workplace to equip them with the broad range of knowledge and skills required for the PMI® Agile Certification exam. It will follow the PMI® requirements and reference the suggested reading list, including the Agile Practice Guide, but will not be limited to those areas. Within the profession and discipline of project management, Agile continues to develop as a significant and important aspect of bringing change to an organization. Where the products of change must be delivered to the business 'on time,' Agile is often the chosen methodology. In addition to equipping candidates for the PMI® Agile Certification examination, this course will also support candidates in taking a more informed and effective role in Agile projects. It will also enable them to take a significant role in encouraging and enabling the organization to become or develop as an Agile environment. What you will Learn You will learn how to: Appreciate the wider aspects of Agile project management tools and techniques Integrate various disciplines within Agile Tailor / customize Agile to suit the needs of different projects Prepare yourself for the PMI® Agile Certification examination Getting Started Introductions Agenda Expectations Foundation Concepts Defining 'Traditional' Project Management Project management parameters The 'traditional' approach to the parameters Strengths and weaknesses of the traditional approach Defining 'Agile' Project Management Project management parameters revisited The 'agile' approach to the parameters Strengths and weaknesses of agile Managing projects with traditional and agile methods Can the two approaches co-exist? Leveraging the benefits of both methods Options for using both methods on a project Avoiding the elephant traps Key aspects of the PMI® Agile Certified Practitioner (PMI-ACP)® Handbook Overview Eligibility requirements Exam information Exam Blueprint Continuing certification requirements Key aspects of the PMI Agile Certification Examination Content Outline Introduction Agile exam content outline Tools and techniques Knowledge and skills Domains and tasks (not examined) An Introduction to Agile and Implementing Agile Definable work vs. high-uncertainty work Project factors that influence tailoring The Agile Manifesto and 12 Principles Agile mindset Agile domains and tasks Agile Tools and Techniques Related to PM 'Hard Skills' Planning, monitoring, and adapting The need for planning, monitoring, and adapting The Agile approach to planning and plans The Agile planning tools and techniques The Agile monitoring tools and techniques The Agile approach to adapting Product quality A definition of 'product quality' Setting the standard for product quality Agile tools and techniques for achieving product quality Risk management A definition of 'risk' What is 'at risk'? The acceptability of risks The Agile tools and techniques for managing risks Agile Tools and Techniques Related to PM 'Soft Skills' The difference between PM 'hard and soft' skills Communications The importance of communications Forms of agile communications Communications within the project Communications from the project Communications to the project Making communications the cultural norm Interpersonal Skills Defining and understanding management Defining and understanding leadership Defining and understanding servant leadership Delegating vs. empowering Playing to people's strengths Overcoming the roadblocks Core Agile Tools and Techniques The philosophy of core Agile tools and techniques Agile estimation Will traditional forms of estimating work for agile? The relationship between estimating and guessing The relationship between estimating and sizing The where, who, and how of agile estimating Agile analysis and design Product analysis and design from a user point of view Product analysis and design from a supplier point of view Product analysis and design from an agile project point of view Value-Based Agile Tools and Techniques The role of value-based tools and techniques in bridging traditional PM with Agile Value-based prioritization Value-based prioritization and agile projects Investment appraisal methods Regulatory driven Customer driven Ranking methods (MMF, MoSCoW) Metrics What should we measure / track? Methods of measuring / tracking Adding value with metrics Process Improvement Value-stream analysis Value-stream mapping Agile Knowledge and Skills Context of Agile Knowledge and Skills vis-Ã -vis Agile Tools and Techniques Agile Knowledge and Skills Process focused People focused Product focused Project focused Exam Preparation and Course Closure The application process - where are you now? The 'Exam-Focused Journal' - what you still have to do Further preparation - self-study schedule Exam topic review Practice exam Practice exam debrief Course closure
About this Virtual Instructor Led Training (VILT) This 3 half-day Virtual Instructor Led Training (VILT) course will help participants grasp the idea of real-world risk management and how this relates to the cyber world. The VILT course will cover topics surrounding identifying cyber risks and vulnerabilities, guidance on applying administrative actions, and comprehensive solutions to ensure your organization is adequately secure and protected. The VILT course will guide participants on how to conduct a security risk assessment for their organization, and equip them with the skills to develop a risk compliance assessment plan as well as methods to develop risk management strategies which can improve their organization's security posture. The VILT course has at least a 30% hands-on approach through the use of Table Top Exercises. The VILT course will cover the following modules: Introduction to Risk Assessments (RA) Threat Actors and Their Motivations Threat and Risk Assessment Critical Controls Identification Maturity Assessment Treated Cyber Risk Profile Target Cyber Risk Profile and Strategy Target Audience The VILT course is intended for professionals responsible for organizational information and security system and those involved in operating and maintenance of critical information and IT network & sotware systems. Professionals who are designated as the Single Point of Accountability (SPoA) as well as system auditors will find this course useful. Course Level Basic or Foundation Training Methods The VILT course will be delivered online in 3 half-day sessions comprising 4 hours per day, with 2 x 10 minutes break per day, including time for lectures, discussion, quizzes and short classroom exercises. Course Duration: 3 half-day sessions, 4 hours per session (12 hours in total). This VILT course is delivered in partnership with ENGIE Laborelec. Trainer Your expert course leader is a is specialized in cybersecurity risk management. Before joining ENGIE, she worked for The National Cybersecurity Agency of France (ANSSI) based in Paris (France) and for Deloitte Belgium located in Zaventem (Belgium). She has been involved in cybersecurity projects focusing on the principle of protecting critical infrastructures. Her different experiences in Cyber Security, Anti-Money Laundering and Global Trade Compliance (including Export Control and Customs) gave her the opportunity to use methodologies tackling strategic, operational and financial control issues at all levels of an organization: people, business processes, IT applications and infrastructure, legal and regulatory compliance. She was an EBIOS Risk Manager (RM) trainer while she worked for the French government; EBIOS RM is the French method for assessing and treating digital risks. She also had the opportunity to represent France towards European institutions and other relevant stakeholders for topics related to cybersecurity risk management. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations
About this training Decarbonization of the Upstream Oil & Gas sector has previously been based on inter-fuel competition. Market actions were seen as the most effective method for reducing the level of emissions. However, the pace of decarbonization is now being led by government policy acting in concert with a coalition of stakeholders such as investors and consumers. The primary focus of this pathway is on the management of carbon emissions to both mitigate and adapt to climate change. Some energy analysts have forecast that global production of oil and natural gas will have to decline annually by 4 to 6 percent in order to meet the global target of Net Zero Emissions by 2050. Oil and gas producers face a difficult challenge in deciding upon the strategy and measures that will best achieve targets set for them while maintaining supply, attracting investments and accessing markets. This 2-day training course will provide participants with an understanding of the strategies and measures for decarbonizing the Upstream Oil and Gas sector within the framework of measures implemented by individual governments through their respective commitments to reduce emissions to achieve their National Determined Contribution under the Paris Agreement. This course offers a unique opportunity to understand the rapidly increasing issues confronting the industry as well as the options for the management of carbon emissions to comply with corporate as well as national policies and the implementation of measures for controlling, reporting and verification. Training Objectives Upon completion of this course, participants will be better equipped to participate in the implementation of measures for the management of carbon emissions in the following areas: Implementation of measures for reducing carbon emissions Establishing systems for monitoring and reporting carbon emissions Evaluating the commerciality of discoveries Reviewing and strategizing future field development plans Meeting Environmental Obligations Target Audience This course has been specifically designed for professionals involved in the international oil and gas industry, whether employed a field operator, national oil company, or government. It offers a unique opportunity to rapidly increase your understanding of the issues confronting the industry as well as the options for the management of carbon emissions to comply with corporate as well as national policies and the implementation of measures for controlling, reporting and verification. Staff with the following roles will find this course particularly useful: Corporate Planners Project Engineers Financial Analysts Environmental Specialists Legal Advisors Regulatory & Compliance Officers Course Level Basic or Foundation Trainer Your expert course leader is an international legal expert in petroleum law who has been listed in the Guide to the World's Leading Energy and Natural Resources Lawyers. In his thirty years of practice, he has been the lead negotiator and acquisitions advisor for oil and gas companies in the US and the Asia-Pacific. These transactions have included both upstream (licences and leases) and downstream (refineries and pipelines) assets. He has been appointed as Distinguished Visiting Professor in Oil and Gas at the University of Wyoming and Honorary Professor at the Centre for Energy, Petroleum & Mineral Law & Policy (CEPMLP) at Dundee University. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
About this Training Course Exploration and production technology, equipment specification and processes have a unique language that must be conquered by executives such as you. A confident understanding of the technical jargon and a visual appreciation of the various pieces of equipment used provides for an overall 'big picture' of industry value chain. This serves as an excellent foundation for smooth communication and increased efficiency in inter-department project team efforts. Gain a comprehensive overview of the entire value chain and process of oil & gas upstream operations and business in this 3 full-day training course. Training Objectives By attending this industry fundamentals training course, participants will be better able to: Appreciate the dynamics of world energy demand & supply and its impact on pricing Understand the formation of petroleum reservoirs and basic geological considerations Examine the exploration process to gain an overview of the technical processes involved Gain a comprehensive overview of drilling activities - from pre-drilling preparation, through to well drilling, well evaluations and post drilling activities Get familiarised with the common production methods and the different stages of its processes Integrate your understanding of asset maintenance and downstream supply chain activities Better visualise through video presentations the various exploration equipment/ technologies and understand the major cost components Target Audience This course will be useful and applicable, but not limited to: Accounting Administration Business Development Commercial Construction E & P IT / Data Finance Finance & Treasury Health & Safety Human Resource Joint Venture Co-ordinators Legal Logistics Materials Planning Procurement Sales & Marketing Senior Management Sourcing Strategic Planning Supply Chain Tender Contract Course Level Basic or Foundation Training Methods Multi-media presentation methodology to enable better understanding and appreciation technical jargon and equipment applied in the field A pre-course questionnaire to help us focus on your key learning objectives Detailed reference manual for continuous learning and sharing Limited class size to ensure one to one interactivity Trainer Your expert course leader worked for BP for 28 years as a Research Associate and Team Leader, working on Feasibility Studies and acting as a trouble shooter covering all aspects of BPs businesses. These covered field Development Project in the North Sea and several novel resource recovery techniques which were taken from Concept to Field Pilot trials in Canada. His specific work in the offshore area covered Subsea Robotics / Automation, Seabed Production Concepts, Seabed Excavation Methods, Underwater Repair Techniques, Flexible Riser Studies and Maintenance Cost Reductions. After leaving BP in 1992, he continued working in the offshore oil industry through Azur Offshore Ltd, including activities in the assessment of Emerging and Novel Technologies, Technical and Economic Audits, Studies, Production Sharing Agreement Evaluations, Safety and Environmental issues. Clients have included Chevron UK, BP Exploration, British Gas, Technomare, Trident Consultants, Fina UK and Cameron France. He is a regular University lecturer at Crandfield School of Industrial Sciences (UK) and is a course Group Project external examiner for Crandfield. He also lectures on offshore oil industry activities at ENSIETA (France), the Technical University of Delft (Holland) and the Northern Territories University in Darwin (Australia). He is an active member of the UK Society for Underwater Technology (SUT) and serves on their Subsea Engineering and Operations Committee. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
SS7 training course description An Introduction to Signalling System No 7. Covering the terminology, technology and topology of the Core Signalling System. What will you learn Describe the evolution of SS7. Identify the component parts of SS7. Describe the basic method of operation of SS7. Describe a basic call set-up and clear within SS7. SS7 training course details Who will benefit: Network/Systems engineers Operators/Planners. Prerequisites: Telecommunications Introduction Duration 2 days SS7 training course contents Introduction Digital Signalling, CAS, CAS Applications, CCS, Layer 1, Layer 2 (HDLC), Layer 3, Evolution of SS7, Common SS7 functions. Physical Functionality SS7 Topology, Service Switching Point (SSP), Signalling Transfer Point (STP), Service Control Point (SCP), Database Types, CMSDB, NP, LIDB, HLR, VLR, Signalling Modes, Link Types, Further Redundancy, Linksets, Signalling Routes. Addressing Addressing in SS7, E.164, ANSI PCs, ITU-T (CCITT) PCs, Connecting Networks (ISPs/NSPs). Message Transfer Part SS7 Protocol Stack, MTP Level 1, MTP Level 2, Signalling Units, Flow Control, Fill In Signalling Unit (FISU), Link Status Signalling Unit (LSSU), Message Signalling Unit (MSU), MTP Level 3. Application and User Parts Signalling Connection Control Part (SCCP), Transaction Capabilities Application Part (TCAP), Telephone User Part, BTUP, ISDN User Part (ISUP), ISUP - Supplementary Services, ISUP - Call, Call Set-up over SS7. The Intelligent Network Function of IN, Evolution of IN, Conceptual Model, Target Services and Service Features, Independent Building Blocks.
Total STP training course description The Spanning Tree Protocol (STP) dates from 1985. This course explores in depth how the protocol works and the implications this has on network performance. We also study STP variants including 802.1w (RSTP) and 802.1s (MSTP). What will you learn Explain how STP works. Explain how RSTP works. Explain how MSTP works. Troubleshoot STP and variants. Total STP training course details Who will benefit: Technical network staff. Prerequisites: Definitive Ethernet switching for engineers Duration 1 day Total STP training course contents STP What is 802.1D, what is STP, resilience, broadcast storms, forwarding and blocking, single path. Hands on Impact of broadcast storms, enabling disabling STP. Operation STP frames, BPDUs, root bridge election, blocked ports, root ports, designated ports. STP path costs. Hands on Analysing STP, troubleshooting implications. Topology changes Hello timer, Forward delay timer, max age timer, Topology Change Notification (TCN) BPDU. Hands on STP convergence. STP enhancements and tuning Bridge ID, Bridge priority, port priority, 30 second delay, Edge ports, PortFast, root guard, loop guard, BPDU guard. Hands on Root bridge positioning, improving STP convergence. RSTP 802.1w, Improvements, convergence times. RSTP bridge port roles, RSTP switch port states. Edge ports, link ports. Hands on RSTP configuration and convergence. VLANs and STP Access/untagged ports, trunk/tagged ports, PVST, PVST+, RPVST, MISTP, MSTP and 802.1s. MSTP BPDUs. Instances, Load balancing, impact on CPU. Hands on MSTP load balancing. Interoperability Regions, Virtual bridges, domains. Hands on STP, RSTP and MSTP interoperation.
Docker for engineers training course description Docker is the container platform of choice. This course covers how to use Docker to package your applications with all of their dependencies and then test, deploy, scale and support your containers. Hands on sessions follow all the major sessions. What will you learn Work with Docker images, containers and command line tools. Deploy and test Docker containers. Debug Docker containers. Describe Docker networking, deployment tools, orchestration and security. Docker for engineers training course details Who will benefit: Anyone working with Docker. Prerequisites: Introduction to virtualization. Duration 2 days Docker for engineers training course contents Introduction The birth of Docker, the promise of Docker, what Docker isn't. Docker at a glance Process simplification, broad support and adoption, architecture, getting the most from Docker, the Docker workflow. Installing Docker Important terminology, Docker client, Docker server, test the setup. Working with Docker images Anatomy of a Dockerfile, building an image, running your image, custom base images, storing images. Working with Docker containers What are containers? creating a container, starting a container, auto-restarting a container, stopping a container, killing a container, pausing and unpausing a container, cleaning up containers and images, next steps. Exploring Docker Printing the Docker version, server information, downloading image updates, inspecting a container, getting inside a running container, exploring the shell, returning a result, docker logs, monitoring Docker, exploration. The path to production containers Deploying, testing containers. Debugging containers Process output, process inspection, controlling processes, network inspection, image history, inspecting a container, filesystem inspection, moving along. Docker at scale Docker swarm, centurion, amazon EC2 container service. Advanced topics Pluggable backends, containers in detail, security, networking. Designing your production container platform The twelve-factor app, the reactive manifesto. Conclusion The challenges, the Docker workflow, minimizing deployment artifacts, optimizing storage and retrieval, the payoff, the final word.
Network virtualization training course description This course covers network virtualization. It has been designed to enable network engineers to recognise and handle the requirements of networking Virtual Machines. Both internal and external network virtualization is covered along with the technologies used to map overlay networks on to the physical infrastructure. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer implementations. What will you learn Evaluate network virtualization implementations and technologies. Connect Virtual Machines with virtual switches. Explain how overlay networks operate. Describe the technologies in overlay networks. Network virtualization training course details Who will benefit: Engineers networking virtual machines. Prerequisites: Introduction to virtualization. Duration 2 days Network virtualization training course contents Virtualization review Hypervisors, VMs, containers, migration issues, Data Centre network design. TOR and spine switches. VM IP addressing and MAC addresses. Hands on VM network configuration Network virtualization What is network virtualization, internal virtual networks, external virtual networks. Wireless network virtualization: spectrum, infrastructure, air interface. Implementations: Open vSwitch, NSX, Cisco, others. Hands on VM communication over the network. Single host network virtualization NICs, vNICs, resource allocation, vSwitches, tables, packet walks. vRouters. Hands on vSwitch configuration, MAC and ARP tables. Container networks Single host, network modes: Bridge, host, container, none. Hands on Docker networking. Multi host network virtualization Access control, path isolation, controllers, overlay networks. L2 extensions. NSX manager. OpenStack neutron. Packet walks. Distributed logical firewalls. Load balancing. Hands on Creating, configuring and using a distributed vSwitch. Mapping virtual to physical networks VXLAN, VTEP, VXLAN encapsulation, controllers, multicasts and VXLAN. VRF lite, GRE, MPLS VPN, 802.1x. Hands on VXLAN configuration. Orchestration vCenter, vagrant, OpenStack, Kubernetes, scheduling, service discovery, load balancing, plugins, CNI, Kubernetes architecture. Hands on Kubernetes networking. Summary Performance, NFV, automation. Monitoring in virtual networks.
SIP security training course description A hands-on course covering SIP security. It is assumed that delegates already know SIP as this course focuses purely on the security issues in SIP IP telephony networks. Hands-on practicals follow each major theory session and include use of various SIP security tools such as vomit, sipp, sipsak and sivus amongst others. What will you learn Secure SIP networks Use various SIP security tools SIP security training course details Who will benefit: Technical staff working with SIP. Technical security staff. Prerequisites: SIP for engineers Duration 2 days SIP security training course contents SIP review SIP infrastructure and entities, example SIP session. Hands on Simple SIP network with and without authentication. SIP security attacks DOS attacks, infrastructure attacks, eavesdropping, spoofing, replay, message integrity. Hands on Basic SIP packet capture, infrastructure attacks. SIP tools SIP packet creation: Sivus, SIPsak, PROTOS, SFTF, SIP bomber, SIPp, Seagull, Nastysip. SIP packet generators: SIPNess, NetDude. Monitoring: Wireshark, Cain & Abel, Vomit, Oreka, VoiPong. Scripts and tools: SIP-Fun, Skora.net, kphone-ddos, sip-scan, sip-kill, sip-redirectrtp. Health of different tools. Hands on Generating SIP packets, rebuilding conversations from captured packets, password cracking. VPNs and SIP IPSec, AH, ESP, transport mode, tunnel mode, Pre Shared Keys, Public keys. Hands on SIP calls over IPSec. Secure SIP signaling SIP relationship with HTTP, Deprecated HTTP 1.0 basic authentication, HTTP 1.1 Digest authentication, S/MIME, SIPS, SIPS URI, TLS, DTLS, PKI infrastructures. Hands on SIP with TLS. Secure media streams SRTP, features, packet format, default encryption, default authentication, key distribution. S/MIME, MIKEY, SDP security descriptions. SIP security agreements. Hands on Analysing SRTP packets. Firewalls NAT traversal. Impact of firewall on infrastructure attacks. TLS and firewalls. SIP specific firewalls. Hands on SIP calls through a firewall.