• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

19535 Basic courses

Cyber Security for Beginners with 4 Official CompTIA Exams

By Hudson

Beginner to cyber security? No problem. Earn an in-demand set of cyber security certifications with our course aimed at beginners. Start your cyber security training and career for only £889.

Cyber Security for Beginners with 4 Official CompTIA Exams
Delivered Online On Demand
£889

ISO 27001(2022) Foundation

By Training Centre

  During this training course, you will be able to understand the different modules of ISMS, including ISMS policy, procedures, performance measurements, management commitment, internal audit, management review and continual improvement.   About This Course After attending this course, delegates will; Understand the basic concepts of Information Security Management Acknowledge the correlation between ISO/IEC 27001 and other standards and regulatory frameworks Understand the process approaches used to effectively manage Information Security Assessment     Delegates sit a combined exam, consisting of in-course quizzes and exercises, as well as a final 40 question, multiple choice exam on Day 2 of the course. The overall passing score is 70%, to be achieved within the 150 minute time allowance. Exam results are provided within 24 hours, with both a Certificate and a digital badge provided as proof of success.   Our Guarantee   We are an Accredited Training Provider of IECB. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with a minimum of 25 years commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras.  The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training offered for retakes - come back within a year and only pay for the exam. Accreditation Prerequisites   Basic knowledge on Information Security Management is preferred. What's Included?   Delegates will be provided with; Course Slide deck Participant Guide Exam fees Who Should Attend?   Individuals interested in Information Security Management process approaches Individuals seeking to gain knowledge about the main principles and concepts of Information Security Management Individuals interested to pursue a career in Information Security Management Provided by   This course is Accredited by NACS and Administered by theIECB

ISO 27001(2022) Foundation
Delivered OnlineFlexible Dates
£695

Essential Lawful Intercept

5.0(3)

By Systems & Network Training

Lawful Intercept training course description Packet based networks require a different approach to Lawful Intercept (LI) than that used in circuit switched networks. This course focuses on what Lawful Interception and Data Retention (DR) means to communications service providers in the IP and NGN areas. The course assumes a basic knowledge of IP networking (i.e. DNS, TCP/UDP, IP, RTP) and the building of services on an IP platform (e.g. SIP, SDP, FTP, HTTP). The course first looks at the regulatory context for LI and DR and how this is translated to a practical architecture. What will you learn Recognise the legal and regulatory obligations to provide LI and DR. Identify the components of the handover architecture for each of LI and DR. Identify the preferred location of points of interception and points of retention in the IP network. Map intercepted material to handover protocols. Understand the data mapping defined in the available standards for both LI and DR. Lawful Intercept training course details Who will benefit: Technical and managerial staff needing to implement public networks. Prerequisites: TCP/IP Foundation Duration 1 day Lawful Intercept training course contents What is meant by LI and DR? Review of regulation: Data protection Directive; Data Retention Directive; RIPA. LI architectures Handover and Interception: ETSI standards ES 201 671 and TS 102 232. LI handover protocol IRI and CC handover; correlation; manual interfaces. DR architectures Handover of query results; points of retention. DR query command set Retrieval of retained records. Security concerns Operation privacy; target privacy; storage and transmission integrity. Implementation Identifying PoI and PoR for provided services. LI and DR wrap up Interaction with other services, storage obligations (volume, time, availability).

Essential Lawful Intercept
Delivered in Internationally or OnlineFlexible Dates
£1,397

LINX 3 training course description A detailed study of BGP, from the basics of how it works through to advanced issues such as route reflectors, policy, filtering, route selection and routing registries. The course culminates with a study of an industrial strength BGP template illustrating important issues such as bogon filtering. Practical hands on with routers follow the major sessions to reinforce the theory. A multiple choice exam, leading to the LAIT III certification, is available after the course. The exam consists of 60 questions and lasts 2 hours. What will you learn Connect enterprises to the Internet, and ISPs to each other. Describe how BGP works. List, describe and configure the main BGP attributes. Implement and troubleshoot BGP. Work with route aggregation and calculate CIDR prefixes in seconds. Influence traffic paths with BGP. LINX 3 training course details Who will benefit: Network engineers. Prerequisites: LAIT I and II OR CCNP and take LAIT I and LAIT II exams whilst on this course. Duration 5 days LINX 3 training course contents Basic BGP IGPs, EGPs, What's BGP? BGP RIB, in/out process, tables peers, adding routes. Hands on Simple configuration and troubleshooting. The Internet and peering ASs, AS numbers, Internet structure, ISP types, ISP network design, IXs, peering vs. transit, public/ private peering, bi/multi-lateral peering. Hands on AS information gathering. How BGP works Incremental updates, Path vector protocols, BGP protocol stack, the BGP header, message types, NLRI, withdrawn routes, route refresh, route dampening. Hands on More troubleshooting, packet analysis. MBGP and IPv6 Multiprotocol routing, AFI, SAFI, MBGP and multicasts, IPv6, MPLS VPNs. Hands on IPv6 BGPv4 aggregation CIDR, benefits, techniques, shortcuts, configuring BGP aggregation, leaking routes. Hands on Reducing routing table size. BGP path selection BGP attributes, attribute types, route selection order, Local preference, AS prepend, MEDs. Hands on Influencing traffic with BGP. BGP routing policies What is policy? Examples, route filtering, AS filtering, REs, applying preference selectively, peer groups. Hands on Sophisticated policies. RIPE and routing registries RIRs, Allocations, assignments, PI vs. PA. Objects, RPSL, routing registry, Hands on The RIPE database. Automating BGP configuration Automation tools, whois, IRRToolSet, Bogon lists, tracking bogon lists, HTTP, Peering, routing registries, DNS. Communities What is a community? Community names, communities for: peer types and geography. RFC 1998, default communities. Hands on Setting local preference on other routers. Route servers What are route servers? LINX route servers, route server policy control, What are route collectors, Looking glasses. Hands on Setting up and working with a route server. Peer relationships IBGP, EBGP, next hop self, advertising routes into/out of BGP, synchronisation. Hands on IBGP, troubleshooting a large BGP network. Route reflectors and confederations Full mesh IBGP, Route reflectors, RR configuration and design, confederations, migration issues. Hands on RR configuration. BGP architectures Stub vs. transit AS, when to use BGP, multihoming strategies and issues, default routes. Multihop EBGP, load balancing. Hands on Multihoming. BGP security RFC 7454, security steps, BGP TTL security, filters, RPKI, ROAs, rsync, rrdp, validators. A secure BGP template. Hands on RPKI prefix validation.

LINX 3
Delivered in Internationally or OnlineFlexible Dates
£2,797

6 week introduction to pottery hand building with Anna Hale

By Queen Street Gallery

Learn the basic handbuilding techniques including slab building pinch pot / coil animal sculpture and glazing All of the equipment and resources will be provided.

6 week introduction to pottery hand building with Anna Hale
Delivered In-PersonFlexible Dates
£200

Front End Loading in Oil and Gas Projects

By EnergyEdge - Training for a Sustainable Energy Future

About this Training Front End Loading (FEL) is a methodology that takes a deliberate approach to capital project planning. Where traditional project plans seek to help an operator reach production targets and budgets, FEL methodology aligns an operator's technical and business goals to create a more comprehensive development plan. The FEL approach increases project definition and lowers risk to positively impact total investment costs and return on investment. Training Objectives Upon completion of this course, participants will be able to: Learn the methods applied for Pre-FEL and FEL process Understand the importance of FEL, FEL stages; visualisation, conceptualisation, definition Uncover how to apply project management during FEL Determine risk management in the FEL process Understand benchmarking & value improving practices   Target Audience The course is recommended for anyone who wish to gain in-depth knowledge and understanding of the importance of Front-End Loading and how to apply Front End Loading best practices, including: Team Leaders Senior Managers (Line and Function) Project Managers Development Engineers Graduate Engineers Quality Assurance Engineers Key Contractor's Management FEED engineers Design engineers Mechanical engineers Process engineers   Course Level Basic or Foundation Trainer Your expert course leader is a subsea pipeline consultant with extensive experience in the design, construction, and installation of subsea pipelines for the oil and gas industry. As a consultant, he provides technical expertise and support to clients on all aspects of subsea pipeline projects, from the initial planning and design phase through to construction and commissioning. He is knowledgeable about industry standards, regulations, and best practices for subsea pipelines, and works closely with clients to ensure that projects are delivered safely, on time, and within budget. He has over thirty years' experience in early concept and front-end studies for the initiation of numerous high value upstream oil and gas projects worldwide. He has worked for both Operating Companies and Consultants managing the FEL process for complex, multi-discipline and technically challenging concepts, combining both his technical and project management skills. He has been working with companies like ExxonMobil, Quantum Power, North Caspian Operating Company, OMV Petrom, Port Meridian, BG Group, and etc.   POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Front End Loading in Oil and Gas Projects
Delivered in Internationally or OnlineFlexible Dates
£2,579 to £2,999

Transmission demystified

5.0(3)

By Systems & Network Training

Transmission demystified training course description Transmission is the process of sending information along a medium of, copper, fibre or wireless. This course looks at transmission techniques for both telecommunications and data communications with a particular focus on Microwave, SDH, DWDM transmission. The course aims to demystify these technologies by explaining all the buzzwords used in transmission. What will you learn Describe various transmission technologies such as multiplexing and demultiplexing. Explain how Microwave works. Explain how SDH works. Explain how DWDM works. Transmission demystified training course details Who will benefit: Anyone working in telecommunications. Prerequisites: None. Duration 2 days Transmission demystified training course contents Transmission basics Systems, media, signals. Signal degradation, noise, distortion, attenuation. Digital, analogue. Modulation, encoding. RF Frequency, wavelength. Distance / range issues, interference, Antenna, power, dB, RF propagation, testing. Microwave transmission What is microwave transmission, point to point communications, line of sight, parabolic antenna, relays, planning considerations, rain and other issues Wired transmissions Copper, Fibre, optical transmission, fibre characteristics, fibre component parts. Multi Mode Fibre (MMF). Single Mode Fibre (SMF). Fibre connections. Lasers. Attenuations, dispersion, optical signal noise ratios (OSNR) and their effects. Channel Spacing and Signal Direction. Limiting factors to single wavelength. Introduction to SDH Timing and synchronisation of digital signals, the plesiochronous digital hierarchy (PDH), the synchronous digital hierarchy (SDH), service protection with SDH. TDM. SDH6 Standards, basic units, frames, STM1 frame, bit rates, STM0, STM1, STM4, STM16, STM64, STM256, SDH architecture, rings, Add drop multiplexors. SDH network topologies, structure of SDH equipment, SDH synchronisation, protection switching in SDH networks, SDH alarm structure, testing of SDH, equipment and systems, Ethernet over SDH. WDM overview Multiplexing, TDM, WDM benefits. WDM standards. CWDM vs. DWDM. Four Wave Mixing (FWM). Impact and countermeasures to FWM on WDM.tructure of SDH equipment, SDH synchronisation, protection switching in SDH networks, SDH alarm structure, testing of SDH, equipment and systems, Ethernet over SDH. DWDM ITU G.694.1, channel and spacing. Optical Terminal Multiplexers (OTM). Optical Add/Drop Multiplexers (OADM). Adding versus dropping. Optical Amplifiers. Erbium Doped Fibre Amplifiers (EDFA). Transponders and Combiners. Optical and Electrical Cross Connects (OXCs/DXCs). Cross Connect types (Transparent/Opaque). Advantages and disadvantages of various Optical cross connects. IP transmission Telecommunications versus data communications, IP transmission, VoIP, MPLS.

Transmission demystified
Delivered in Internationally or OnlineFlexible Dates
£1,727

Complete Python programming

5.0(3)

By Systems & Network Training

Complete Python training course description Python is an agile, robust, expressive, fully objectoriented, extensible, and scalable programming language. It combines the power of compiled languages with the simplicity and rapid development of scripting languages. This course covers Python from the very basics of 'hello world!' through to object oriented programming and advanced topics such as multi threading. Hands on follows all the major sections in order to reinforce the theory. What will you learn Read Python programs. Write Python programs. Debug Python programs. Use Python's objects and memory model as well as its OOP features. Complete Python programming training course details Who will benefit: Anyone wishing to learn Python. Prerequisites: None. Duration 5 days Complete Python programming training course contents Welcome to Python: What is Python? Origins, features. Downloading and installing Python, Python manuals, comparing Python, other implementations. Getting started: Program output, the print statement, "hello world!", Program input, raw_input(), comments, operators, variables and assignment, numbers, strings, lists and tuples, dictionaries, indentation, if statement, while Loop, for loop. range(), list comprehensions. Files, open() and file() built-in functions. Errors and exceptions. Functions, Classes, Modules, useful functions. Python basics: Statements and syntax, variable assignment, identifiers, basic style guidelines, memory management, First Python programs, Related modules/developer tools. Python Objects: Other built-in types, Internal Types, Standard type operators, Standard type built-in functions, Categorizing standard types, Unsupported types. Numbers: Integers, Double precision floating point numbers, Complex numbers, Operators, Built-in and factory functions, Other numeric types. Sequences: strings, lists, and tuples: Sequences, Strings, Strings and operators, String-only operators, Built-in functions, String built-in methods, Special features of strings, Unicode, Summary of string highlights, Lists, Operators, Built-in functions, List type built-in methods, Special features of lists, Tuples, Tuple operators and built-in functions, Tuples special features, Copying Python objects and shallow and deep copies. Mapping and set types: Mapping Type: dictionaries and operators, Mapping type built-in and factory functions, Mapping type built-in methods, Dictionary keys, Set types, Set type operators, Built-in functions, Set type built-in methods. Conditionals and loops: If, else and elif statements, Conditional expressions, while, for, break, continue and pass statements, else statement . . . take two, Iterators and iter(), List comprehensions, Generator expressions. Files and input/output: File objects, File built-in functions [open() and file()], File built-in methods and attributes, Standard files, Command-line arguments, File system, File execution, Persistent storage modules. Errors and exceptions: What are exceptions? Detecting and handling exceptions, Context management, Exceptions as strings, Raising exceptions, Assertions, Standard exceptions, Creating Exceptions, Why exceptions, Exceptions and the sys module. Functions: Calling, creating and passing functions, formal arguments, variable-length arguments, functional programming, Variable scope, recursion, generators. Modules: Modules and files, Namespaces, Importing modules, Module import features, Module built-in functions, Packages, Other features of modules. Object-Oriented Programming (OOP): Classes, Class attributes, Instances, Instance attributes, Binding and method invocation, Static methods and class methods, Composition, Sub-classing and derivation, Inheritance, Built-in functions for classes, and other objects, Customizing classes with special methods, Privacy, Delegation, Advanced features of new-style classes (Python 2.2+), Related modules and documentation. Execution environment: Callable and code Objects, Executable object statements and built-in functions, Executing other programs. 'Restricted' and 'Terminating' execution, operating system interface. Regular expressions: Special symbols and characters, REs and Python, Regular expressions example. Network programming: Sockets: communication endpoints, Network programming in Python, SocketServer module, Twisted framework introduction. Internet client programming: What are internet clients? Transferring files, Network news, E-mail. Multithreaded Programming: Threads and processes Python, threads, and the global interpreter lock, The thread and threading Modules. GUI programming: Tkinter and Python programming, Tkinter Examples, Brief tour of other GUIs. Web programming: Web surfing with Python: creating simple web clients, Advanced Web clients, CGI: helping web servers process client data, Building CGI applications, Using Unicode with CGI, Advanced CGI, Web (HTTP) Servers. Database programming: Python database application programmer's interface (DB-API), ORMs. Miscellaneous Extending Python by writing extensions, Web Services, programming MS Office with Win32 COM, Python and Java programming with Jython.

Complete Python programming
Delivered in Internationally or OnlineFlexible Dates
£3,697

Project Contract Management Skills: In-House Training

By IIL Europe Ltd

Project Contract Management Skills: In-House Training Contracts are a critical part of most large or strategic projects/programs. As such, it is imperative that Project and Program Managers be well versed on basic implications of a contract as well as best practices in contract management. While not as critical a need, anyone involved in projects that involve external relationships should have a healthy appreciation for the power of good contract management. The overall goal of the course is to provide knowledge to manage complex contracts in a global environment. What You Will Learn After this program, you will be able to: Explain overall project procurement process from a buyer and seller perspective Recognize the importance of key contractual terms and how they affect projects Evaluate and contribute to the pre-contract documents and processes Identify and mitigate common pitfalls throughout the procurement process Utilize techniques to administer contracts Getting Started Introductions Course structure Course goals and objectives Foundation Concepts The Importance of Contract Management Terms and Definitions Contract Management Process Legal Systems Codes of Conduct Planning Business Analysis Procurement Management Plan Procurement Statement of Work (SOW) Common Pitfalls Solicit Contract Market Analysis Bid documents Sellers' Proposals Pitfalls Execute Contract Evaluate and Award Contract Negotiate Contract Execute Contract Common Pitfalls Deliver the Contract Preparing to Deliver Project Plan Risk Management Common Pitfalls Administer Contract Enabling Contract Management Contract Performance Monitoring and Control Change Management Financial Management / Payment Dispute Management & Resolution Contract Completion and Closure

Project Contract Management Skills: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,695

Project Contract Management Skills

By IIL Europe Ltd

Project Contract Management Skills Contracts are a critical part of most large or strategic projects/programs. As such, it is imperative that Project and Program Managers be well versed on basic implications of a contract as well as best practices in contract management. While not as critical a need, anyone involved in projects that involve external relationships should have a healthy appreciation for the power of good contract management. The overall goal of the course is to provide knowledge to manage complex contracts in a global environment. What You Will Learn After this program, you will be able to: Explain overall project procurement process from a buyer and seller perspective Recognize the importance of key contractual terms and how they affect projects Evaluate and contribute to the pre-contract documents and processes Identify and mitigate common pitfalls throughout the procurement process Utilize techniques to administer contracts Getting Started Introductions Course structure Course goals and objectives Foundation Concepts The Importance of Contract Management Terms and Definitions Contract Management Process Legal Systems Codes of Conduct Planning Business Analysis Procurement Management Plan Procurement Statement of Work (SOW) Common Pitfalls Solicit Contract Market Analysis Bid documents Sellers' Proposals Pitfalls Execute Contract Evaluate and Award Contract Negotiate Contract Execute Contract Common Pitfalls Deliver the Contract Preparing to Deliver Project Plan Risk Management Common Pitfalls Administer Contract Enabling Contract Management Contract Performance Monitoring and Control Change Management Financial Management / Payment Dispute Management & Resolution Contract Completion and Closure

Project Contract Management Skills
Delivered In-Person in LondonFlexible Dates
£1,695