SS7 training course description An Introduction to Signalling System No 7. Covering the terminology, technology and topology of the Core Signalling System. What will you learn Describe the evolution of SS7. Identify the component parts of SS7. Describe the basic method of operation of SS7. Describe a basic call set-up and clear within SS7. SS7 training course details Who will benefit: Network/Systems engineers Operators/Planners. Prerequisites: Telecommunications Introduction Duration 2 days SS7 training course contents Introduction Digital Signalling, CAS, CAS Applications, CCS, Layer 1, Layer 2 (HDLC), Layer 3, Evolution of SS7, Common SS7 functions. Physical Functionality SS7 Topology, Service Switching Point (SSP), Signalling Transfer Point (STP), Service Control Point (SCP), Database Types, CMSDB, NP, LIDB, HLR, VLR, Signalling Modes, Link Types, Further Redundancy, Linksets, Signalling Routes. Addressing Addressing in SS7, E.164, ANSI PCs, ITU-T (CCITT) PCs, Connecting Networks (ISPs/NSPs). Message Transfer Part SS7 Protocol Stack, MTP Level 1, MTP Level 2, Signalling Units, Flow Control, Fill In Signalling Unit (FISU), Link Status Signalling Unit (LSSU), Message Signalling Unit (MSU), MTP Level 3. Application and User Parts Signalling Connection Control Part (SCCP), Transaction Capabilities Application Part (TCAP), Telephone User Part, BTUP, ISDN User Part (ISUP), ISUP - Supplementary Services, ISUP - Call, Call Set-up over SS7. The Intelligent Network Function of IN, Evolution of IN, Conceptual Model, Target Services and Service Features, Independent Building Blocks.
DevOps training course description This course is an introduction to DevOps. The course emphasizes communication, collaboration , integration, and automation to improve the workflow between developers and IT operations professionals. Improved workflows lead to more opportunities to design software and services in a more agile fashion. This course is a basis for discovering the most important DevOps concepts and to understand the principles and methods behind this. The course will leave you with the inspiration to be the advocate of change. What will you learn Explain DevOps principles. Describe the relationship between Agile , Lean and IT Service Management ( ITSM). Describe methods for automation and technology factors. Describe considerations when changing. Describe challenges, risks and critical success factors. DevOps training course details Who will benefit: IT development, IT operations and IT service management. Prerequisites: Introduction to data communications & networking. Duration 2 days DevOps training course contents Why DevOps? Introduction DevOps Goals DevOps Added value of DevOps Proven Results DevOps for businesses DevOps principles (The Three Ways) DevOps and other frameworks DevOps and Agile DevOps and Lean DevOps and IT Service Management DevOps culture Characteristics of a DevOps culture Organizational Considerations DevOps DevOps stakeholders DevOps roles DevOps teams DevOps organizational structures DevOps methods Continuous Integration Continuous delivery Continuous deployment Value stream mapping Kanban Theory of Constraints Improvement Kata Deming's quality circle ITSM processes DevOps and Automation Methods for DevOps automation Longevity and tools categories DevOps applications Transitioning to a DevOps culture. Implementation Challenges, risks and critical success factors Measuring DevOps successes
Securing Kubernetes training course description This course introduces concepts, procedures, and best practices to harden Kubernetes based systems and container-based applications against security threats. It deals with the main areas of cloud-native security: Kubernetes cluster setup, Kubernetes cluster hardening, hardening the underlying operating system and networks, minimizing microservices vulnerabilities, obtaining supply chain security as well as monitoring, logging, and runtime security. What will you learn Harden Kubernetes systems and clusters. Harden containers. Configure and use Kubernetes audit logs. Securing Kubernetes training course details Who will benefit: Technical staff working with Kubernetes Prerequisites: Kubernetes_for_engineers_course.htm Definitive Docker for engineers Duration 2 days Securing Kubernetes training course contents This course does not only deal with the daily security administration of Kubernetes-based systems but also prepares delegates for the official Certified Kubernetes Security Specialist (CKS) exams of the Cloud Native Computing Foundation (CNCF). Structure: 50% theory 50% hands on lab exercise Module 1: User and authorization management Users and service accounts in Kubernetes Authenticating users Managing authorizations with RBAC Module 2: Supply chain security Vulnerabilit checking for images Image validation in Kubernetes Reducing image footprint Secure image registries Module 3: Validating cluster setup and penetration testing Use CIS benchmark to review the security configuration of Kubernetes components. Modify the cluster components' configuration to match the CIS Benchmark. Penetration testing Kubernetes for known vulnerabilities. Module 4: System hardening Use kernel hardening tools Setup appropriate OS level security domains Container runtime sandboxes Limit network access Module 5: Monitoring and logging Configure Kubernetes audit logs Configure Audit Policies Monitor applications behaviour with Falco
ITIL® 4 Specialist: Create, Deliver and Support: In-House Training The ITIL® 4 Specialist: Create, Deliver, and Support module is part of the Managing Professional stream for ITIL® 4. Candidates need to pass the related certification exam for working towards the Managing Professional (MP) designation. This course is based on the ITIL® 4 Specialist: Create, Deliver, and Support exam specifications from AXELOS. With the help of ITIL® 4 concepts and terminology, exercises, and examples included in the course, candidates acquire the relevant knowledge required to pass the certification exam. What You Will Learn The learning objectives of the course are based on the following learning outcomes of the ITIL® 4 Specialist: Create, Deliver, and Support exam specification: Understand how to plan and build a service value stream to create, deliver, and support services Know how relevant ITIL® practices contribute to the creation, delivery, and support across the SVS and value streams Know how to create, deliver, and support services Organization and Culture Organizational Structures Team Culture Continuous Improvement Collaborative Culture Customer-Oriented Mindset Positive Communication Effective Teams Capabilities, Roles, and Competencies Workforce Planning Employee Satisfaction Management Results-Based Measuring and Reporting Information Technology to Create, Deliver, and Support Service Integration and Data Sharing Reporting and Advanced Analytics Collaboration and Workflow Robotic Process Automation Artificial Intelligence and Machine Learning CI / CD Information Model Value Stream Anatomy of a Value Stream Designing a Value Stream Value Stream Mapping Value Stream to Create, Deliver, and Support Services Value Stream for Creation of a New Service Value Stream for User Support Value Stream Model for Restoration of a Live Service Prioritize and Manage Work Managing Queues and Backlogs Shift-Left Approach Prioritizing Work Commercial and Sourcing Considerations Build or Buy Sourcing Models Service Integration and Management
Firewalls training course description A technical hands on training course covering firewall technologies. This focuses on the whys and hows of firewall technology rather than looking at manufacturer specific issues. What will you learn Design secure firewall protected networks. Test firewalls. Evaluate firewalls Configure firewalls Firewalls training course details Who will benefit: Technical staff wanting to learn about Filrewalls including: Technical network staff. Technical security staff. Prerequisites: IP security foundation for engineers Duration 2 days Firewalls training course contents Firewall introduction Security review, what is a firewall? What do firewalls do? Firewall benefits, concepts. Hands on Configuring the network to be used in later labs, launching various attacks on a target. Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls, blade based firewalls, personal firewalls, which firewall should you use? Firewall products. Hands on Configuring a simple firewall. Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on Stateful packet inspection firewalls. Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall advantages and disadvantages. Hands on Proxy firewalls. Personal firewalls The role of personal firewalls, Windows XP, Zonealarm. Hands on Configuring a personal firewall. Firewall architectures Home based, small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. Securing communications VPNs, IPsec. Firewall configuration of VPNs, integration of dedicated VPN devices and firewalls. Hands on IPSec VPN configuration. Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls.
Signalling training course description An intensive course that defines and explores the signalling methods that are to be found in today's telecommunications services. What will you learn Describe the Functionality and Features of Signalling. Describe the Functionality of Analogue & Digital Subscriber Signalling. Describe the various types of signalling used on different network types. Describe the Functionality of Private Network Signalling. Describe the Functionality of Public Network Signalling. Signalling training course details Who will benefit: Personnel involved with systems design, implementation and support. Prerequisites: Telecommunications Introduction Duration 2 days Signalling training course contents Introduction What is Signalling?, Standards, ITU-T Recommendations, Signalling Categories - Supervisory Addressing, E.164, Call Information, Network Management, Network Components, Inband/Outband Switch Signalling, Analogue Vs Digital Signalling. Analogue Subscriber Signalling Analogue Local Loops/Switches/Trunks, Digital Switches/Local Loops, Telephone Handset, Accessing the Local Exchange, Pulse/Tone Dialling. Digital Subscriber Signalling Integrated Digital Access, DASS2 & DPNSS, DASS2 - Call, IMUX, Euro ISDN, Q.931 Call Control, Message Identification, Message Types, Call Establishment Messages, Call Clearing. Network Types Service Types, Circuit Switched, Packet Switched, Signalling Terminology, In-Channel Signalling, G.704, Performance and Quality, Digital Signalling, CAS, CAS Applications, Foreign Exchange, CCS, Break-In/Out Private Network Signalling Types Networking PABXs, Inter PABX Analogue Signalling Methods, E & M, Tone-On-Idle, Inter PABX Digital Signalling Methods, DPNSS, DPNSS Deployment, PABX Support for DPNSS, DPNSS Call, Q.Sig, Q.Sig support/functionality/protocol, Message Overview, Call Establishment. Public Network Signalling SS7, SS7 Operations, SS7 Topology, SSP, STP, SCP, Database Types - CMSDB NP LIDB HLR VLR, Signalling Modes, Link Types, Further Redundancy, Linksets, SS7 addressing, Point Codes, Sub-System, Global Title Addressing and Translation, ANSI PCs, ITU-T PCs, SS7 Protocol Stack, MTP Level 1, MTP Level 2, Flow Control, FISU, LSSU, MSU, MSU SIF, MTP Level 3, SCCP, TCAP, TUP, Facility Format, Main Facilities, Flow Control Negotiation, Closed User Groups, Reverse Charging, Fast Select Facility, Throughput Class Negotiation, Call Barring, On-Line Facility Registration. BTUP, ISDN ISUP, Supplementary Services, ISUP Call - IAM, Progress/Answer/Suspend/ Resume/Release Messages, Intelligent Network (IN) Introduction, IN Evolution, IN Conceptual Model, IN Target Services & Service Features, Service Independent Building Blocks
Oracle SQL Advanced training course description The Oracle SQL Advanced course is designed to give delegates practical experience in using some of the more advanced features of Oracle SQL. Additional datatypes and the use of advanced SQL functions and expressions are covered together with enhanced table handling features. What will you learn Retrieve data using correlated subqueries, in-line views and multi-column subqueries. Use the WITH Clause. Inserting and Updating Rows Using Complex Subqueries Create Hierarchical Queries. Use ROLLUP, CUBE and GROUPING SETS group by enhancements. Implement the GROUPING and GROUPING_ID functions. Manage large data sets. Insert data conditionally and unconditionally. Merge Rows in a Table. Create TIMESTAMP and INTERVAL Datatypes. Use TIMESTAMP, TIMEZONE and INTERVAL functions and literals. Use regular expressions and implement related functions. Manage objects with the data dictionary. Manage schema objects. Perform flashback operations. Create and using external tables. Control user access to database objects. Oracle SQL Advanced training course details Who will benefit: Anyone who needs to use the more advanced features of SQL to improve their productivity in querying and updating an Oracle database. Prerequisites: Delegates should have attended the Oracle SQL course or have a similar level of experience. Duration 2 days Oracle SQL Advanced training course contents Retrieve data using subqueries ANY, ALL or SOME operators, Correlated subqueries, In-Line views, The Exists operator, The WITH clause, Multi-Column subqueries, Insert and update using a query, Correlated update and delete. Hierarchical queries Hierarchical data, The START WITH and CONNECT BY clauses, The LEVEL pseudo-column, Sequencing the output, Eliminating nodes and branches. Enhanced grouping features Review of basic grouping concepts, The ROLLUP and CUBE extensions, The GROUPING SETS extension, Using the GROUPING and GROUPING_ID functions. Manage large data sets Multi-table Inserts, Conditional and unconditional Inserts, Merging data into a table, Table and view based merge, A sub query based merge. Flashback technology Flashback query, The AS clause, Flashback table, Flashback drop. Date, time and time zone support Date, Timestamp and Interval datatypes, Handling dates and times, Handling intervals, Date, timestamp and interval functions and literals, Related NLS parameters. Regular expression support Regular expression notation, Character matching, Repetition operators, Sub expression grouping, Regular expression functions. Manage objects with the Data Dictionary The Data Dictionary, Useful Data Dictionary tables, Using the Data Dictionary. Manage schema objects Column operations, Constraint operations, Creating and dropping Indexes, B-Tree indexes, Function based indexes, Descending indexes, Creating and using external tables. Access control System privileges and roles, Create users, Alter user details, Grant and revoke object privileges.
ITIL® 4 Specialist: Drive Stakeholder Value: In-House Training The ITIL® 4 Specialist: Drive Stakeholder Value module is part of the Managing Professional stream for ITIL 4. Candidates need to pass the related certification exam for working towards the Managing Professional (MP) designation. This course is based on the ITIL® 4 Specialist: Drive Stakeholder Value exam specifications from AXELOS. With the help of ITIL® 4 concepts and terminology, exercises, and examples included in the course, candidates acquire the relevant knowledge required to pass the certification exam. What You Will Learn The learning objectives of the course are based on the following learning outcomes of the ITIL® 4 Specialist: Drive Stakeholder Value exam specification: Understand how customer journeys are designed Know how to target markets and stakeholders Know how to foster stakeholder relationships Know how to shape demand and define service offerings Know how to align expectations and agree on details of services Know how to onboard and offboard customers and users Know how to act together to ensure continual value co-creation (service consumption / provisioning) Know how to realize and validate service value Customer Journey Purpose of the Module Purpose of Mastering the Customer Journey Touchpoints and Service Interactions Module Topics Mapping the Customer Journey Designing the Customer Journey Measuring and Improving the Customer Journey Customer Journey Step 1: Explore Purpose of the Module Purpose of the Explore Step Module Topics Understanding Service Consumers Understanding Service Providers Understanding and Targeting Markets Customer Journey Step 2: Engage Purpose of the Module Purpose of the Engage Step Aspects of Service Value Module Topics Service Relationship Types Building Service Relationships Building and Sustaining Trust and Relationships Analyzing Customer Needs Managing Suppliers and Partners Customer Journey Step 3: Offer Purpose of the Module Purpose of Shaping Demand and Service Offerings Module Topics Managing Demand and Opportunities Specifying and Managing Customer Requirements Designing Service Offerings and User Experience Selling and Obtaining Service Offerings Customer Journey Step 4: Agree Purpose of the Module Purpose of Aligning Expectations and Agreeing on Services Module Topics Agreeing on and Planning Value Co-Creation Negotiating and Agreeing on a Service Customer Journey Step 5: Onboard Purpose of the Module Purpose of Onboarding and Offboarding ITIL® Management Practices Module Topics Planning Onboarding Fostering Relationships with Users Providing User Engagement and Delivery Channels Enabling Users for Service Elevating Mutual Capabilities Offboarding Customer Journey Step 6: Co-create Purpose of the Module Purpose of Service Provision and Consumption Module Topics Service Mindset Ongoing Service Interactions Nurturing User Communities Customer Journey Step 7: Realize Purpose of the Module Measuring Service Value Purpose of Value Capturing and Customer Journey Improvement Realizing Service Value in Different Settings Module Topics Tracking Value Realization Assessing and Reporting Value Realization Evaluating Value Realization and Improving Customer Journeys Realizing Value for the Service Provider
Data comms training course description A hands on training course introducing the concepts of data communications, moving on to covering both LAN and WAN technology. Quizzes are used extensively to ensure material has sunk in and to maximise learning time. Hands on sessions ensure that by the end of the course delegates have made cables, built LANS and WANS, configured TCP/IP, switches and routers. What will you learn Use the seven layer model to classify networking buzzwords. Build and troubleshoot Ethernet, LAN/WAN and WiFi networks Explain the difference between switches and routers. Connect networks with routers. Data comms training course details Who will benefit: Anyone who requires a technical introduction to networks. Prerequisites: None. Duration 3 days Data comms training course contents What are networks? What is data communications? What are networks? Types of network, LANs, LAN choices, WANs, WAN choices, PANs, SANs, MANs, connecting networks. Internetworks, the internet, clouds. Networks and standards Standards bodies, ISO, ITU, IEEE, IETF, OSI 7 layer reference model, TCP/IP and OSI, ping and the 7 layer model, encapsulation, fragmentation. The physical layer Transmission media: Copper, Fibre, RF, UTP, Cat 5/5e/6/7..., RJ45, straight and cross over cables. Coax, Fibre cable & connectors, SFP, MMF, SMF, radio spectrum, frequencies, ranges, noise and electrical distortion, repeaters. Hands on Cabling, ping. Bandwidth Definition, Bits, bytes, speeds, simplex, half/full duplex, a/symmetrical, aggregation, latency. Calculating bandwidth requirements. The Data Link layer Frames, classifications, standards, LAN/WAN layer 2 technologies (Point to point, virtual circuits). Ethernet What is Ethernet? 802.3, evolution from CSMA/CD, choosing cables, topologies, NICs, MAC addresses. Ethernet frame format. Hands on Analysing Ethernet frames. Ethernet switches Connecting multiple devices, switches work at layer 2, Switches vs. hubs, simultaneous conversations, full duplex, MAC address database, how switches work, switch benefits, loops, STP. Console ports. Hands on Switches and WireShark, configuring switches, broadcast storms, STP. VLANS What are VLANs, why have VLANs. Hands on The effect of VLANs on network traffic. Wireless LANs Type of wireless network. WiFi, 802.11b/g/n/ac, WiFi6, antennae, interference, 802.11 frame format, CSMA/CA, half duplex, Wireless Access Points, security. Hands on Building a WiFi network. WANS WAN architecture, WAN types, service providers, access equipment, DTE, DCE, core equipment, WANs and the 7 layer model, choosing a WAN. WAN access Point to point, multi access, Internet, phone lines, leased lines, xDSL, broadband architecture. DOCSIS, FTTH, PON, SD-WAN. Older technologies (if required): Modems, ISDN, 64k, E1, TDM. Packet switched networks Packet switching, virtual circuits, Hub & spoke, partial & full mesh, MPLS, MPLS and routers, Why MPLS? MPLS -TE, MPLS VPN, Internet VPN. Older technologies (if required). Service provider technologies Transport plane, SDH, SONET, WDM, CWDM, DWDM, DWDM architectures, OTN. TCP/IP Definition, protocols, services, internetworking, the Internet, intranets, IAB, RFCs, IP header, IP addressing, subnet masks, IPv6, TCP, UDP. Hands on IP address and subnet mask configuration. Routers What are routers? Routers vs switches, when to route and when to switch, default gateways, routing tables, static routes, routing protocols. Firewalls, how firewalls work. Hands on Router configuration, tracert. Applications Clients, servers, web, HTTP, Email, resource sharing, IM, VoIP, Video over IP, terminal emulation, ftp, ssh. Hands on telnet
Enhance your skills in promoting positive behavior and creating supportive environments for children with our PBS course. Evidence-based practices and collaboration emphasised.