Advanced UNIX shell scripting training course description A follow on hands on course from the Introduction to shell programming course covering the powerful sed and awk tools along with the extra Korn shell programming features. What will you learn Use regular expressions within grep, ed and many other utilities. Use awk and sed. Integrate sed and awk into shell scripts. Recognise the role of shell scripts within the UNIX system. Write shell scripts using new Korn shell features including: The select construct Arrays Arithmetic evaluation Advanced UNIX shell scripting training course details Who will benefit: Programmers developing applications under UNIX. Administrators who need time saving utilities. Technical personnel who wish to make the most out of the Korn Shell. Prerequisites: UNIX shell scripting Duration 3 days Advanced UNIX shell scripting training course contents Regular Expressions What are REs? How can they be used? How to write REs More REs e REs Tagging, matching words, repetitions. The sed editor Basic usage: Saving output, options. sed script files, sed commands, Specifying lines to edit, Hold space and pattern space, advanced commands Awk Basic usage, nawk script files, Patterns, Records and fields, Actions if, while, do, for... System variables NF, NR, RS... Arrays Functions length, printf, cos, user defined... Using nawk in shell scripts Korn shell scripts Review of Bourne shell scripts functions... Variables typeset, manipulating strings Arrays Arithmetic evaluation the let command, (( )), typeset -i The select construct Syntax, workings, REPLY, PS3 Miscellaneous Enhanced I/O, ${10}
Server Load Balancing course description This two-day Server Load Balancing course introduces the concepts of SLB from the reasons to implement, through the basics and then onto details studies of load distribution, health checks, layer 7 switching and Global SLB. What will you learn Explain packet paths when implementing SLB. Recognise the impact of different topologies. Evaluate SLB load distribution methods. Describe how load balancers can improve security. Explain how GSLB works. Server Load Balancing course details Who will benefit: Anyone working with SLB. Prerequisites: None. Duration 2 days Server Load Balancing course contents Introduction Concept, reasons, benefits, alternatives. Other features: Security, Caching. SLB concepts Architectures, Virtual servers, real servers, Virtual IP address, health checks. DNS load balancing. Packet walk using SLB. Load balancing 6 modes of bonding and load balancing without SLB. ISP load balancing. Health. Distribution policies: Round Robin, least connections, weighted distributions, response time, other variations. Persistent versus concurrent. Layer 4 switching L2 SLB, L3 SLB, single arm SLB, DSR, more packet walking, TCP versus UDP, Port numbers. Layer 7 switching Persistence. Cookie switching, Cookie hashing, Cookie insertion, URL switching, URL Hashing, SSL. Health checks Layer 3: ARP, ping. Layer 4: SYN, UDP. Layer 7: HTTP GET, Status codes, HTTP keepalives, content verification, SSL. Other application keepalives. What to do after failure and recovery. Security DOS attack protection, SYN attack protection, Rate limiting: connections, transactions. SSL offload. Redundancy Hot standby, Active standby, Active active. Stateful, stateless. VRRP, STP. GSLB Anycasting. DNS, TTL, DNS load balancing, problems with DNS load balancing,. HTTP redirect, health, thresholds, round trip times, location.
LTE Backhaul training course description This course provides a concise insight into the LTE backhaul. Key parts of the course are detailed looks at the transport of messages and the S1 and X2 protocols. What will you learn Describe the overall architecture of LTE. Explain how data and signalling messages are transported in LTE. Describe the S1 protocol. Describe the X2 protocol. LTE Backhaul training course details Who will benefit: Anyone working with LTE. Prerequisites: Mobile communications demystified Duration 2 days LTE Backhaul training course contents Introduction In the first section of the course, we review LTE and its hardware and software architecture. Requirements and key features of LTE. LTE Architecture and capabilities of the UE. Architecture of the E-UTRAN, functions of the eNB. EPC architecture, and functions of the MME, SGW, PGW and PCRF. System interfaces and protocol stacks. Example information flows. Dedicated and default bearers. EMM, ECM and RRC state diagrams. Architecture of the radio access network In this section, we look in more detail at the architecture of the evolved UMTS terrestrial radio access network (E-UTRAN). Logical and physical architecture of the E-UTRAN. Numbering, addressing and identification. E-UTRAN functions. E-UTRAN protocol stacks. Timing and frequency synchronisation in LTE. Transport of data and signalling in LTE Here, we look in more detail at the techniques and protocols that are used to transport data and signalling messages across the evolved UMTS terrestrial radio access network and the evolved packet core. Quality of service in LTE. The GPRS tunnelling protocol. Differentiated services Multi-protocol label switching (MPLS). The stream control transmission protocol (SCTP). The S1 application protocol This section gives a detailed account of the signalling procedures in the S1 application protocol, which the MME uses to control the operation of the eNB. The material looks at the procedures, messages and information elements, and relates them to the system-level procedures in which they are used. S1 setup procedure. UE context management procedures. Non access stratum information transport. Procedures for managing the evolved radio access bearer (E-RAB). Paging procedures. Mobility management procedures for S1-based handovers. Procedures in support of self-optimising networks. The X2 application protocol This section gives a detailed account of the signalling procedures in the X2 application protocol, which is used for peer-to-peer communication between eNBs. The material looks at the procedures, messages and information elements, and relates them to the system-level procedures in which they are used. X2 setup procedure. Mobility management procedures for X2-based handovers Procedures in support of self-optimising networks. High level system operation In the final section, we bring our discussions of the S1 and X2 application protocols together by reviewing the system-level operation of LTE. Attach procedure. Transitions between the states of RRC Idle and RRC Connected. Tracking area updates in RRC Idle. Handover procedures in RRC Connected.
5-day practical leather bag pattern cutting and design course with leather crafting skillsLearn leather bag design and creation processes with an introduction to leather crafting. Design bags in 3DSee 1-day Pattern Cutting (The Basics) course, here. Join us in our Oxfordshire Workshop (UK) for a week of learning and making. Learn directly from Leathersmith and London College of Fashion Lecturer, Georgie Tym as she guides you through designing your own patterns from scratch to create a whole catalogue of 3D shapes for bags and accessories along with a basic introduction to leather crafting skills. Who is this course for? This 5-day practical bag pattern cutting and introduction to leather craft course is ideal for all experience levels, from beginners to confident makers. A perfect introduction into the pattern cutting skills and leather skills you’ll need to create and design your own bag patterns and leather designs. Are you looking to: Start your own bag brand? Design your own bags? Understand the bag making process? Create bags at home to complete your own handmade wardrobe? Satisfy a general interest into the skills and techniques required to make your own bags? Develop a foundation in leather crafting skillsIf you've answered yes to any of the above, then this is the course for you. What to expect Join Georgie to learn the basics of pattern cutting for bags with an introduction to leather craft. The course includes a foundation knowledge through to more complex cutting techniques. Looking at 3D shapes and examples from which you can create multiple shapes and details. Learn all the essential skills you will need to begin your leather crafting journey. This is the course for you if you’re ready to turn those bags you’ve been dreaming up and designing into 3-Dimensional tangible reality. Within the course, you’ll also be introduced to techniques and materials suitable for accessories, including sewing on an industrial sewing machine and stitching leather by hand. Upon completing the pattern cutting and introduction to leather course you will take away the knowledge to bring your designs to life. Complete with a set of paper/ fabric mock-ups which can be kept as your reference sample set and leather craft samples you will have your very own library of resources to inspire and generate future ideas. The course covers: Pattern types and shapes suitable for each construction type Patterns for details and functionality features Professional methods and best practice Basic pattern cutting techniques Pattern design/ development and sequences Hands on involvement and demonstrations. Hand stitching leather and other materials Machine stitching leather and other materials Leather tools and machinery Seam types used in bag and leather constructions Leather and other materials discussions You will receive a certificate upon completion of the course. What's included in the price? There are no additional costs. Basic materials will be included.The course runs from 10am – 3.30pm Monday - Friday. There will be a tea/ coffee breaks throughout and an hour break at lunch. Please note lunch is not provided.The course will be run from the HOME STUDIO of Hands Of Tym in Banbury, Oxfordshire, OX16 9DHParking available on the drive or on the street with easy access via the M40. Banbury train station is a steep 30 min walk. Trains run from both London Marylebone and Birmingham to Banbury in 50mins. Also well connected to Reading, Oxford, Leamington Spa to name a few.Maximum class size is 5 Cancellation policy Easy - Cancellation and a full refund can be obtained up to 2 weeks before the course starts About Georgie at Hands of Tym During training at Cordwainers, London College of Fashion in 2010 I learnt how to design, make and manufacture bags professionally. Following a varied career in Accessories design and development across many roles and international brands I set up Hands of Tym in 2016. The courses I offer are suitable for all, from experienced to total novice. Come along to learn something new, and design and make your own leather bag in a day.
CCNA training course description The Implementing and Administering Cisco Solutions (CCNA) course gives you a broad range of fundamental knowledge for all IT careers. Through a combination of lecture, hands-on labs, and self-study, you will learn how to install, operate, configure, and verify basic IPv4 and IPv6 networks. The course covers configuring network components such as switches, routers, and wireless LAN controllers; managing network devices; and identifying basic security threats. It also gives a foundation in network programmability, and software-defined networking What will you learn Install, configure, and operate a small to medium sized network Gain a foundation in the essentials of networking, security, and automation Prepare for the 200-301 CCNA exam, which earns CCNA certification CCNA training course details Who will benefit: Network support help desk technicians involved in the basic installation, operation, and verification of Cisco networks. Anyone seeking CCNA certification. Prerequisites: Introduction to Data communications & networking Duration 5 days CCNA training course content After taking this course, you should be able to: Identify the components of a computer network and describe their basic characteristics. Understand the model of host-to-host communication. Describe the Cisco IOS software. Describe LANs and the role of switches within LANs. Describe Ethernet and describe the operation of switches. Install a switch and perform the initial configuration. Describe the TCP/IP Internet layer, IPv4, its addressing scheme, and subnetting. Describe the TCP/IP Transport and Application layers Explore functions of routing. Implement basic configuration on a Cisco router. Explain host-to-host comms across switches and routers. Identify and resolve common switched network issues and common problems associated with IPv4 addressing. Describe IPv6 main features and addresses, and configure and verify basic IPv6 connectivity. Describe static routing. Describe, implement, and verify VLANs and trunks. Describe inter VLAN routing. Explain the basics of dynamic routing protocols and describe components and terms of OSPF. Explain how STP and RSTP work. Configure link aggregation using EtherChannel. Describe the purpose of Layer 3 redundancy protocols. Describe basic WAN and VPN concepts. Describe the operation of access control lists (ACLs) and their applications in the network. Configure Internet access using DHCP clients and explain and configure NAT on Cisco routers. Describe basic QoS concepts. Describe the concepts of wireless networks, which types of wireless networks can be built, and how to use Wireless LAN Controllers (WLCs). Describe network and device architectures, introduce virtualization, network programmability and SDN and describe smart network management solutions such as Cisco DNA Centerâ¢, SD-Access, and SD-WAN. Configure basic IOS system monitoring tools. Describe the management of Cisco devices. Describe the current security threat landscape. Describe threat defence technologies. Implement a basic security configuration of the device management plane. Implement basic steps to harden network devices. Detailed course outline Exploring the Functions of Networking. The Host-to-Host Communications Model. Operating Cisco IOS Software. Introducing LANs. Exploring the TCP/IP Link Layer. Starting a Switch. The TCP/IP IP layer, IPv4 Addressing, and Subnets. The TCP/IP Transport Layer and Application Layer. Exploring the Functions of Routing. Configuring a Cisco Router. Exploring the Packet Delivery Process. Troubleshooting a Simple Network. Introducing Basic IPv6. Configuring Static Routing. Implementing VLANs and Trunks. Routing Between VLANs. Introducing OSPF. Redundant Switched Topologies with EtherChannel. Explaining Basics of ACL. Enabling Internet Connectivity. Explaining the Evolution of Intelligent Networks. Introducing System Monitoring. Managing Cisco Devices. Securing Administrative Access. Implementing Device Hardening. Self-Study: Building Redundant Switched Topologies. Exploring Layer 3 Redundancy. Introducing WAN Technologies. Introducing QoS. Explaining Wireless Fundamentals. Introducing Architectures and Virtualization. Examining the Security Threat Landscape. Threat Defense Technologies.
Management of Portfolios (MoP®) Practitioner: In-House Training In this MoP® Practitioner course, participants will have sufficient knowledge and understanding of how to apply and tailor the MoP guidance and to analyze portfolio data, documentation, and roles in relation to a given situation. MoP helps organizations ensure if the investments are done in the right, change initiatives, and implementing them correctly. This is achieved by: Prioritizing the programs and projects in terms of their contribution to the organization's strategic objectives and overall level of risk Managing the programs and projects consistently to ensure efficient and effective delivery Maximizing the benefit by providing the greatest return from the investment made What you will Learn Define the business case to get senior management approval for portfolio management Plan the implementation of portfolio management Select and adapt MoP principles, practices, and techniques to suit different organizational environments Evaluate examples of MoP information including documents and role descriptions Analyze the solutions adopted in relation to a given scenario Introduction Overview MoP Portfolio Definition Portfolio Management Roles Portfolio Management Documents MoP Practitioner Assignments Portfolio Management Documents Portfolio Delivery How to Implement Practice Exam MoP Practitioner Exam (taken online, after the class has ended)
Four half-day Leadership modules with mini work placed projects to bring the learning into action in the workplace.
Total IP multicast training course description This training course provides an advanced three day hands on study of IP multicast technology focusing on architectures, applications and protocols. All aspects of IP multicasting are covered including PC, server and switch implementations. Design, configuration, support and troubleshooting are all covered in the course. Hands on sessions are used to reinforce the theory rather than teach specific implementations. What will you learn Design multicast networks. Explain how multicast networks work. Compare and contrast the different multicast routing protocols, such as DVMRP, PIM, MBGP and SSM. Configure PCs, servers, switches and routers for multicasting. Configure multicast routing protocols including: PIM Dense Mode. PIM Sparse Mode BGP SSM Troubleshoot multicast networks. Total IP multicast training course details Who will benefit: Technical staff working with IP multicasts. Prerequisites: TCP/IP Foundation for engineers Duration 3 days Total IP multicast training course contents Introduction What is multicasting? Why multicast? Why not multicast? Multicasting vs. multiple unicasts, Multicasting vs. broadcasts, multicasting applications, the use of unicast addressing for setting up multicast applications, multicast use within standard protocols such as OSPF. hands on Example multicast applications. Addressing Layer two multicast addresses, Class D addresses, mapping layer 3 addresses onto layer 2 multicast addresses. Multicast addresses on NBMAs, scoping multicast traffic, Multicast address blocks, GLOP, IPv6 and multicasting, anycasting. hands on Multicast addressing. Multicast architectures Where the different protocols are used, PC to router, router to router, how switches can get involved. hands on Analysing multicast packets. PC to router Configuring Class D addresses, IGMP, packet formats, queries, reports, maintaining groups, enhancements to IGMP (v2 and v3), Leaving a group, querier elections, hands on Analysing IGMP packets. Switches and multicasting Controlling multicast traffic with switches, VLANS, static bridge table entries, IGMP snooping, CGMP. hands on Configuring switches for multicast environments. Router to router MOSPF, DVMRP, PIM Sparse Mode, PIM Dense Mode, MBGP. hands on Simple router configuration for multicasting. Theory behind multicast routing protocols Distribution trees, source distribution trees, shared trees, core based trees. Reverse path forwarding, Multicast routing protocol types. PIM DM: Flooding, pruning, PIM designated routers, hands on configuring PIM DM. PIM Sparse mode Rendevous points, discovering RPs, hands on Configuring PIM SM, using different protocols for different groups. PIM SM with one RP, using multiple RPs, Auto RP. MBGP Multiprotocol routing, how does MBGP work? How MBGP carries multiple protocol information, MBGP and multicasts, MBGP and IPv6. hands on Configuring MBGP for multicasts. Internet multicasting The internet, ISPs, the MBone, tunnelling, Inter domain multicasting, the role of MBGP, Inter domain problem, MSDP, MSDP operation SSM, PIM-SM and shared trees, SSM, PIM-SSM operation, SSM benefits. hands on MSDP configuration. SSM configuration.
Definitive Segment Routing course description This Segment Routing (SR) training course is a comprehensive program designed to equip network professionals with the knowledge and skills needed to implement and manage SR in modern networking environments. Segment Routing is a cutting-edge network architecture that enhances network flexibility, scalability, and efficiency. This course offers in-depth coverage of SR principles, protocols, and practical implementation techniques. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. What will you learn Explain packet paths when implementing SLB. Explain how Segment Routing works. Explain the relationship between SR and MPLS. Use SR for Traffic Engineering. Troubleshoot Segment Routing. Implement TI-LFA using Segment Routing Definitive Segment Routing course details Who will benefit: This course is ideal for network engineers, architects, and administrators who want to stay up-to-date with the latest networking technologies and enhance their expertise in Segment Routing. Prerequisites: Concise MPLS for engineers Duration 3 days Definitive Segment Routing course contents Introduction to Segment Routing (SR) What is SR? Source based routing, SPRING, history, segments, why SR? SR benefits.SR usage: Traffic Engineering, Shortest path, local protection. Relationship between SR and MPLS, SRv6. Hands on Investigating the base network. Segment Routing architecture SR domains, SR paths, SR segments. Segment types. Segment IDs, combining segments, IGP extensions, control plane components. Hands on Configuring SR, exploring how SR works, Segment Routing protocols SR-MPLS. MPLS label stack operations. Segment Routing Global Block (SRGB). SRLB. IS-IS and OSPF extensions for SR. Prefix segments, adjacency segments. SRGB/IGP interactions. Multidomain SR policies. SPF, Strict SPF. Hands on Analysing IGP SR extension operation. Investigating the SRGB. Segment Routing Traffic Engineering RSVP-TE versus SR-TE. SR policies. Anycast and binding SIDs. SR flexible algorithm flex-algo, Performance measurement delay. Hands on Optimising network paths for various applications. SR integration with 'older' technologies MPLS and LDP integration with SR. Hands on Integration. Topology Independent Loop Free Alternative Classic LFA and IP/MPLS protection mechanisms. TI-LFA protection options. Hands on TI-LFA operation with SR and LDP traffic. Scenarios SDN. Managing SR with SR controllers. Analyse, optimise, automate. Network slicing. BGP peering segments Path Computation Elements, BGP Link State. BGP prefix segments, BGP peer segments. Egress peer engineering. SR enabled VPNs. Hands onBGP segment routing. Troubleshooting Segment Routing IP toolkit: ping and traceroute. MPLS toolkit: MPLS ping, MPLS echo request/reply, MPLS ping, MPLS traceroute and path discovery. Router show commands. Hands on Used throughout the course during exercises. SRv6 Note this is an optional extra day. See our one day SRv6 course for details. IPv6 headers review, routing headers, IPv6 segment, SRv6 segment Identifiers. IPv6 Segment Routing Header. SRH procedures. Hands on Configuring SRv6, Analysing SRv6 operation.
QA Level 2 Award In Food Safety In Catering (RQF) Face to Face: Full day course Virtual Classroom: Spread over 3 sessions of 2½ hr duration Food business operators are required by law, to ensure that food handlers receive appropriate supervision and instruction/training in food hygiene in line with their work activity and should enable them to handle food safely Recommended by HSE and Environmental Health Officers (EHO's) Course Contents: The Importance of Food Safety Food Safety Laws Legal Responsibilities of Food Handlers Types of Contamination and the Associated Risks Bacteriology Food Poisoning Foodborne Illnesses An Introduction to Hazard Analysis and Critical Control Points (HACCP) Personal Hygiene Work Flow, Work Surfaces and Equipment Cleaning and Disinfection Waste Disposal Pest Control Safe Food Handling Practices including Time and Temperature Controls Preparation Cooking and Reheating Chilling Cooling Thawing Hot holding Displaying food Core temperatures Food Preservation Storage Stock Control Procedures Benefits of this course: Businesses have a duty to their customers to produce food that is safe for consumption. There are one million cases of food poisoning in the UK each year. More than 6,000 are admitted to hospital. In 2014/2015, businesses in Chesterfield were issued 344 written enforcement notices. Derby received 1,116. Doing our Ofqual regulated, nationally accredited course ensures that nothing of importance is left out. EU and UK regulations state that all food handlers must receive appropriate training in food safety practices relevant to their duties. The Food Standards Agency says that 'Food business operators are required by law, to ensure that food handlers receive appropriate supervision and instruction/training in food hygiene in line with their work activity and should enable them to handle food safely’. Our QA Level 2 Award in Food Safety in Catering (RQF) is a nationally accredited qualification especially suitable for people working in, or planning to work in, the food retail industry, and complies with the training regulations. Accredited, Ofqual regulated qualification Our Food Safety in Catering training course is a nationally recognised, Ofqual regulated qualification accredited by Qualsafe Awards. This means that you can be rest assured that your Food safety in Catering certificate fulfils the legal requirements and is a very good way to make sure your employees are trained in Food Safety. The Ofqual Register number for this course is 603/2594/X