• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1387 Courses in Cardiff delivered Live Online

FAMILY CIRCLES

By Inclusive Solutions

Click to read more about this training, in which we demonstrate a live problem solving approach which is based on the active participation of family members. Course Category Inclusion Parents and Carers Behaviour and relationships Problem Solving Description In this training we demonstrate a live problem solving approach which is based on the active participation of family members. ‘Family Circles’ is an evolving new approach to problem solving with families and is based on our years of family work and the development and use of the Circle of Adults process. Inspired by our own Parent Solutions work and the Circle of Adults process as well as Family Group Conferencing and other Restorative Interventions we bring you Family Circles. Essentially the approach involves gathering a family together for a process that is facilitated but majors on the family members offering each other their wisdom and ideas. The approach is capacity focused, person centred approach to working with families rather than the dominant deficit oriented and ‘medical model’ of viewing and planning for or doing things to families. This training can be modelled with a group of professionals or better still with a family. In our work with families we develop the importance of naming stories or theories and seeking linkages and synthesis between what is found out and explored about the family situation and its history. We like participants to sit with the uncertainty, to reflect on the question ‘why’ but without judgement of each other. Deeper reflections may span a whole range of perspectives from ‘within person’ considerations, to situational or systemic possibilities. Health or emotional issues can be reflected on alongside organisational or transactional aspects of what is going on for the family. The better the shared understanding the better the strategy or actions which emerge from these meetings. Quality hypotheses with a close fit to reality lead to more effective implementation in the real world. We encourage ‘loose’ thinking, a search for connections, deeper listening, an ‘open mind’, speculation and exploration without moral judgements. From this stance self-reflection as well as reflection on the situation can produce remarkable insights. The quality of theories or new stories generated is directly influenced by family members’ experiences and the models of learning, behaviour and emotion, systems, educational development, change and so on that they have been exposed to.  Learning Objectives To provide opportunities for: Shared problem solving in a safe exploratory climate in which the family will find its own solutions. Individuals to reflect on their own actions and strategies An exploration of whole-family processes and their impact Emotional support and shared understandings of issues at a child, parent, family, school and community level. Feed back to each other on issues, ideas and strategies that are agreed to be worth sharing with them. Who Is It For? Anyone interested in working with families in a way that builds and makes use of their capacities rather than focus on their challenges and difficulties. Social Care teams School staff Community organisers Educational Psychologists Course Content True family empowerment Deepening shared stories and understandings Facilitating groups Problem solving process Handling family group communication Allowing direct feedback and challenge between participants in a safe way Building relationships Process: Family members are welcomed: Introductions are carried out, ground rules and aims clarified whilst coffee is drunk. A recap from the last session is carried out: To follow up developments and reflections after the last meeting. One issue is selected for the main focus Issue presentation: The family member who raised the concern is asked questions to tell the ‘story’ of the issue or problem. Additional questions/information from the group about the problem are gathered: Ground rules may need to be observed carefully here. Individual participants need to be kept focused and prevented from leaping to premature conclusions or to making ‘helpful’ suggestions about strategy. Relationship aspects to the problem are explored. Metaphors and analogies are invited. How would a fly on the wall see your relationship? If you were alone together on a desert island, what would it be like? Impact of previous relationships/spillage from one relationship to another are explored. Eg what situation they are reminded of? For instance, does this situation remind you of any of those angry but helpless feelings you had with your other son when he was an adolescent? This provides opportunities to reflect on how emotions rub off on other people. The parent feels really frustrated, and on reflection we can see that so does the child System/Organisation factors (Family system/school and community systems and so on): What aspects help or hinder the problem? For instance, does the pastoral system of the local school provide space, or time and skilled personnel able to counsel this young person and work actively with their parents? Synthesis. At this stage the Graphic facilitator summarises what they have heard. They then go on to describe linkages and patterns in what they have heard. This can be very powerful. The person doing the graphic work has been able to listen throughout the presentation process and will have been struck by strong messages, emotions and images as they have arisen. The story and meaning of what is happening in the situation may become a little clearer at this point. Typical links may be ‘mirrored emotions’ strong themes such as loss and separation issues, or repeated processes such as actions triggering rejection. This step provides an excellent grounding for the next process of deepening understanding. What alternative strategies/interventions are open to be used? Brainstormed and recorded. ’Either/ors’ need to be avoided at this time also. This needs to be a shared session in which the family member who is presenting the concern contributes as much as anyone. Care is needed to ensure that this person is not overloaded with other people’s strategies. The final selection of strategy or strategies from the brainstormed list is the problem presenter’s choice. Strategies might include: a special time for the young person, a meeting with the child’s parents to explore how she is being managed at home and to share tactics, a home-school diary, counselling, or an agreed action plan that all are aware of, agreed sanctions and rewards and so forth. Strategies may productively involve processes of restitution and restoration, when ‘sorry’ is not enough. Making it right, rather than punishments or rewards, may then becomes the focus. First Steps. The problem presenter is finally asked to agree one or two first steps which they can carry out over the next 3-7 days. It can help to assign a ‘coach’ who will check in with them to ensure they have carried out the action they have named. This is a time to be very specific. Steps should be small and achievable. The person is just ‘making a start’. A phone call, or making an agreement with a key other person not present at the meeting would be ideal examples. Final reflections. Sometimes referred to as a ‘round of words’ help with closure for all involved. Reflections are on the process not the problem. In large families this is best done standing in a circle. In smaller groups all can remain sitting. Passing around a ‘listening stick’ or something similar such as a stone or light heighten the significance of the process ending and improve listening. Finally the problem presenter is handed the ‘Graphic’ this is their record of the meeting and can be rolled and presented ceremoniously by the facilitators for maximum effect! If you liked this course you may well like: Parent Solutions

FAMILY CIRCLES
Delivered in UK Wide Travel Costs or OnlineFlexible Dates
£1,800 to £2,500

AZ-700T00 Designing and Implementing Microsoft Azure Networking Solutions

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is for Network Engineers looking to specialize in Azure networking solutions. An Azure Network engineer designs and implements core Azure networking infrastructure, hybrid networking connections, load balance traffic, network routing, private access to Azure services, network security and monitoring. The azure network engineer will manage networking solutions for optimal performance, resiliency, scale, and security. This course teaches Network Engineers how to design, implement, and maintain Azure networking solutions. This course covers the process of designing, implementing, and managing core Azure networking infrastructure, Hybrid Networking connections, load balancing traffic, network routing, private access to Azure services, network security and monitoring. Learn how to design and implement a secure, reliable, network infrastructure in Azure and how to establish hybrid connectivity, routing, private access to Azure services, and monitoring in Azure. Prerequisites Prerequisite courses (or equivalent knowledge and hands-on experience): AZ-104T00 - Microsoft Azure Administrator 1 - Introduction to Azure Virtual Networks Explore Azure Virtual Networks Configure public IP services Design name resolution for your virtual network Enable cross-virtual network connectivity with peering Implement virtual network traffic routing Configure internet access with Azure Virtual NAT 2 - Design and implement hybrid networking Design and implement Azure VPN Gateway Connect networks with Site-to-site VPN connections Connect devices to networks with Point-to-site VPN connections Connect remote resources by using Azure Virtual WANs Create a network virtual appliance (NVA) in a virtual hub 3 - Design and implement Azure ExpressRoute Explore Azure ExpressRoute Design an ExpressRoute deployment Configure peering for an ExpressRoute deployment Connect an ExpressRoute circuit to a virtual network Connect geographically dispersed networks with ExpressRoute global reach Improve data path performance between networks with ExpressRoute FastPath Troubleshoot ExpressRoute connection issues 4 - Load balance non-HTTP(S) traffic in Azure Explore load balancing Design and implement Azure load balancer using the Azure portal Explore Azure Traffic Manager 5 - Load balance HTTP(S) traffic in Azure Design Azure Application Gateway Configure Azure Application Gateway Design and configure Azure Front Door 6 - Design and implement network security Get network security recommendations with Microsoft Defender for Cloud Deploy Azure DDoS Protection by using the Azure portal Deploy Network Security Groups by using the Azure portal Design and implement Azure Firewall Secure your networks with Azure Firewall Manager Implement a Web Application Firewall on Azure Front Door 7 - Design and implement private access to Azure Services Explain virtual network service endpoints Define Private Link Service and private endpoint Integrate private endpoint with DNS Integrate your App Service with Azure virtual networks 8 - Design and implement network monitoring Monitor your networks using Azure monitor Monitor your networks using Azure network watcher

AZ-700T00 Designing and Implementing Microsoft Azure Networking Solutions
Delivered OnlineFlexible Dates
£1,785

55133 PowerShell for System Center Configuration Manager Administrators

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for IT professionals who need to manage the day-to-day environment of an SCCM 2012 SP1 or newer environment. Knowledge of the workings of a standalone primary SCCM site and basic PowerShell experience is recommended. Overview Create additional site system roles on existing or new servers. Modify high level site settings. Create and modify Discovery Methods, Boundaries and Boundary Groups. Create Collections using any of the membership rules available. Delegate authority through Roles and Scopes. Install the Configuration Manager client, modify client settings and restrict access to site systems. Deploy software to clients. Deploy software updates to clients. Configure compliance settings targeted against collections. Modify settings that govern monitoring functions such as Alerts and Status Settings. Work with Task Sequences for Operating System Deployment. Write basic PowerShell scripts using cmdlets learned and scripting constructs to accomplish configuration tasks. This course provides students with the knowledge and skills needed to use PowerShell for System Center Configuration Manager (SCCM) administration. In this course, students learn how to access the PowerShell cmdlets included with SCCM 2012 R2 and use them to perform configuration tasks for a primary site. Individual cmdlets will be used in working with objects such as Boundaries, Boundary Groups, Collections, Software Deployment, Patching, Compliance Settings, OSD Task Sequences, and many others. Basic scripting will also be covered so that students can learn how to put PowerShell to use when working with large sets of objects. Prerequisites Basic Windows and Active Directory knowledge. Conceptual knowledge of Configuration Manager objects and how they interact. Basic experience performing configuration tasks in ECM using the graphical console. Experience working from a command prompt. Basic knowledge of the fundamentals of Windows PowerShell. 1 - REVIEW OF SYSTEM CENTER CONFIGURATION MANAGER CONCEPTS Architecture of an System Center 2012 Configuration Manager Installation Managing Assets Content Delivery and Management Security, Monitoring, and Remote Management 2 - MANAGING RESOURCES Implementing Discovery Organizing Resources with Collections Working with Boundaries 3 - WORKING WITH CLIENTS Installing the Configuration Manager Client Managing Client Settings Managing Client Operations Monitoring Client Status 4 - DISTRIBUTING SOFTWARE Configure the Software Distribution Components Working with Distribution Points Creating Content for Distribution Deploying Software Applications 5 - UPDATING SYSTEMS WITH WSUS AND SCCM Integrating Configuration Manager and WSUS Managing Updates through Software Update Groups Creating and Deploying Update Packages Working with Automatic Deployment Rules 6 - HOW POWERSHELL CAN MANAGE COMPLIANCE SETTINGS Creating Compliance Settings Objects Deploying and Monitor the Baseline 7 - CONFIGURING OPERATING SYSTEM DEPLOYMENT OBJECTS Preparing the OSD Environment Working with Task Sequences 8 - WORKING AT THE SITE LEVEL Modify the Site Adding Site System Roles Adding a Secondary Site 9 - SECURITY AND MONITORING Configuring Role Based Administration Implementing Endpoint Protection Configuring Monitoring Options 10 - USING POWERSHELL SCRIPTING TO AUTOMATE SCCM TASKS Review of Scripting Constructs Introduction to the Configuration Manager WMI Classes

55133 PowerShell for System Center Configuration Manager Administrators
Delivered OnlineFlexible Dates
£1,785

AI-102T00 Designing and Implementing an Azure AI Solution

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Software engineers concerned with building, managing and deploying AI solutions that leverage Azure AI Services, Azure AI Search, and Azure OpenAI. They are familiar with C# or Python and have knowledge on using REST-based APIs to build computer vision, language analysis, knowledge mining, intelligent search, and generative AI solutions on Azure. AI-102 Designing and Implementing an Azure AI Solution is intended for software developers wanting to build AI infused applications that leverage?Azure AI Services,?Azure AI Search, and?Azure OpenAI. The course will use C# or Python as the programming language. Prerequisites Before attending this course, students must have: Knowledge of Microsoft Azure and ability to navigate the Azure portal Knowledge of either C# or Python Familiarity with JSON and REST programming semantics Recommended course prerequisites AI-900T00: Microsoft Azure AI Fundamentals course 1 - Prepare to develop AI solutions on Azure Define artificial intelligence Understand AI-related terms Understand considerations for AI Engineers Understand considerations for responsible AI Understand capabilities of Azure Machine Learning Understand capabilities of Azure AI Services Understand capabilities of the Azure Bot Service Understand capabilities of Azure Cognitive Search 2 - Create and consume Azure AI services Provision an Azure AI services resource Identify endpoints and keys Use a REST API Use an SDK 3 - Secure Azure AI services Consider authentication Implement network security 4 - Monitor Azure AI services Monitor cost Create alerts View metrics Manage diagnostic logging 5 - Deploy Azure AI services in containers Understand containers Use Azure AI services containers 6 - Analyze images Provision an Azure AI Vision resource Analyze an image Generate a smart-cropped thumbnail 7 - Classify images Provision Azure resources for Azure AI Custom Vision Understand image classification Train an image classifier 8 - Detect, analyze, and recognize faces Identify options for face detection analysis and identification Understand considerations for face analysis Detect faces with the Azure AI Vision service Understand capabilities of the face service Compare and match detected faces Implement facial recognition 9 - Read Text in images and documents with the Azure AI Vision Service Explore Azure AI Vision options for reading text Use the Read API 10 - Analyze video Understand Azure Video Indexer capabilities Extract custom insights Use Video Analyzer widgets and APIs 11 - Analyze text with Azure AI Language Provision an Azure AI Language resource Detect language Extract key phrases Analyze sentiment Extract entities Extract linked entities 12 - Build a question answering solution Understand question answering Compare question answering to Azure AI Language understanding Create a knowledge base Implement multi-turn conversation Test and publish a knowledge base Use a knowledge base Improve question answering performance 13 - Build a conversational language understanding model Understand prebuilt capabilities of the Azure AI Language service Understand resources for building a conversational language understanding model Define intents, utterances, and entities Use patterns to differentiate similar utterances Use pre-built entity components Train, test, publish, and review a conversational language understanding model 14 - Create a custom text classification solution Understand types of classification projects Understand how to build text classification projects 15 - Create a custom named entity extraction solution Understand custom named entity recognition Label your data Train and evaluate your model 16 - Translate text with Azure AI Translator service Provision an Azure AI Translator resource Specify translation options Define custom translations 17 - Create speech-enabled apps with Azure AI services Provision an Azure resource for speech Use the Azure AI Speech to Text API Use the text to speech API Configure audio format and voices Use Speech Synthesis Markup Language 18 - Translate speech with the Azure AI Speech service Provision an Azure resource for speech translation Translate speech to text Synthesize translations 19 - Create an Azure AI Search solution Manage capacity Understand search components Understand the indexing process Search an index Apply filtering and sorting Enhance the index 20 - Create a custom skill for Azure AI Search Create a custom skill Add a custom skill to a skillset 21 - Create a knowledge store with Azure AI Search Define projections Define a knowledge store 22 - Plan an Azure AI Document Intelligence solution Understand AI Document Intelligence Plan Azure AI Document Intelligence resources Choose a model type 23 - Use prebuilt Azure AI Document Intelligence models Understand prebuilt models Use the General Document, Read, and Layout models Use financial, ID, and tax models 24 - Extract data from forms with Azure Document Intelligence What is Azure Document Intelligence? Get started with Azure Document Intelligence Train custom models Use Azure Document Intelligence models Use the Azure Document Intelligence Studio 25 - Get started with Azure OpenAI Service Access Azure OpenAI Service Use Azure OpenAI Studio Explore types of generative AI models Deploy generative AI models Use prompts to get completions from models Test models in Azure OpenAI Studio's playgrounds 26 - Build natural language solutions with Azure OpenAI Service Integrate Azure OpenAI into your app Use Azure OpenAI REST API Use Azure OpenAI SDK 27 - Apply prompt engineering with Azure OpenAI Service Understand prompt engineering Write more effective prompts Provide context to improve accuracy 28 - Generate code with Azure OpenAI Service Construct code from natural language Complete code and assist the development process Fix bugs and improve your code 29 - Generate images with Azure OpenAI Service What is DALL-E? Explore DALL-E in Azure OpenAI Studio Use the Azure OpenAI REST API to consume DALL-E models 30 - Use your own data with Azure OpenAI Service Understand how to use your own data Add your own data source Chat with your model using your own data 31 - Fundamentals of Responsible Generative AI Plan a responsible generative AI solution Identify potential harms Measure potential harms Mitigate potential harms Operate a responsible generative AI solution

AI-102T00 Designing and Implementing an Azure AI Solution
Delivered OnlineFlexible Dates
£1,785

Kick Start Your Career with CompTIA's Data Analysis Certification - Live Classes

5.0(1)

By Media Tek Training Solutions Ltd

Get job ready with CompTIA's Data Analysis Certification. Live Classes - Career Guidance - Exam Included.

Kick Start Your Career with CompTIA's Data Analysis Certification - Live Classes
Delivered OnlineFlexible Dates
£1,595

Advanced Architecting on AWS

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for Solution Architects Overview At the end of this course, you will be able to: Apply the AWS Well-Architected Framework Manage multiple AWS accounts for your organization Connect an on-premises datacenter to AWS cloud Move large data from an on-premises datacenter to AWS Design large datastores for AWS cloud Understand different architectural designs for scalability Protect your infrastructure from DDoS attack Secure your data on AWS with encryption Enhance the performance of your solutions Select the most appropriate AWS deployment mechanism Building on concepts introduced in Architecting on AWS, Advanced Architecting on AWS is intended for individuals who are experienced with designing scalable and elastic applications on the AWS platform. Building on concepts introduced in Architecting on AWS, this course covers how to build complex solutions which incorporate data services, governance, and security on AWS. This course introduces specialized AWS services, including AWS Direct Connect and AWS Storage Gateway to support Hybrid architecture. It also covers designing best practices for building scalable, elastic, secure, and highly available applications on AWS. Module 1: AWS Account Management Multiple accounts Multi-account patterns License management Manage security and costs with multiple accounts AWS Organizations AWS Directory Service Hands-on lab: Multi-VPC connectivity using a VPN Module 2: Advanced Network Architectures Improve VPC network connections Enhance performance for HPC workloads VPN connections over AWS AWS Direct Connect AWS Transit Gateway Amazon Route 53 Exercise: Design a hybrid architecture Module 3: Deployment Management on AWS Application lifecycle management Application deployment using containers AWS Elastic Beanstalk AWS OpsWorks AWS CloudFormation Module 4: Data Optimize Amazon S3 storage Amazon ElastiCache AWS Snowball AWS Storage Gateway AWS DataSync Backup and archival considerations Database migration Designing for big data with Amazon DynamoDB Hands-on lab: Build a failover solution with Amazon Route 53 and Amazon RDS Module 5: Designing for large scale applications AWS Auto Scaling Migrating over-provisioned resources Blue-green deployments on AWS Hands-on lab: Blue-green deployment with AWS Module 6: Building resilient architectures DDoS attack overview AWS Shield AWS WAF Amazon GuardDuty High availability using Microsoft SQL Server and Microsoft SharePoint on AWS High availability using MongoDB on Amazon EC2 AWS Global Accelerator Hands-on lab: CloudFront content delivery and automating AWS WAF rules Module 7: Encryption and data security Encryption primer DIY key management in AWS AWS Marketplace for encryption products AWS Key Management Service (AWS KMS) Cloud Hardware Security Module (HSM) Comparison of key management options Hands-on lab: AWS KMS with envelope encryption

Advanced Architecting on AWS
Delivered OnlineFlexible Dates
£1,717

Total STP for engineers

5.0(3)

By Systems & Network Training

Total STP training course description The Spanning Tree Protocol (STP) dates from 1985. This course explores in depth how the protocol works and the implications this has on network performance. We also study STP variants including 802.1w (RSTP) and 802.1s (MSTP). What will you learn Explain how STP works. Explain how RSTP works. Explain how MSTP works. Troubleshoot STP and variants. Total STP training course details Who will benefit: Technical network staff. Prerequisites: Definitive Ethernet switching for engineers Duration 1 day Total STP training course contents STP What is 802.1D, what is STP, resilience, broadcast storms, forwarding and blocking, single path. Hands on Impact of broadcast storms, enabling disabling STP. Operation STP frames, BPDUs, root bridge election, blocked ports, root ports, designated ports. STP path costs. Hands on Analysing STP, troubleshooting implications. Topology changes Hello timer, Forward delay timer, max age timer, Topology Change Notification (TCN) BPDU. Hands on STP convergence. STP enhancements and tuning Bridge ID, Bridge priority, port priority, 30 second delay, Edge ports, PortFast, root guard, loop guard, BPDU guard. Hands on Root bridge positioning, improving STP convergence. RSTP 802.1w, Improvements, convergence times. RSTP bridge port roles, RSTP switch port states. Edge ports, link ports. Hands on RSTP configuration and convergence. VLANs and STP Access/untagged ports, trunk/tagged ports, PVST, PVST+, RPVST, MISTP, MSTP and 802.1s. MSTP BPDUs. Instances, Load balancing, impact on CPU. Hands on MSTP load balancing. Interoperability Regions, Virtual bridges, domains. Hands on STP, RSTP and MSTP interoperation.

Total STP for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,727

Jamf 300 Course

By Influential Training

Jamf Training, Jamf 300 course,

Jamf 300 Course
Delivered OnlineFlexible Dates
£1,900

Server Load Balancing for engineers

5.0(3)

By Systems & Network Training

Server Load Balancing course description This two-day Server Load Balancing course introduces the concepts of SLB from the reasons to implement, through the basics and then onto details studies of load distribution, health checks, layer 7 switching and Global SLB. What will you learn Explain packet paths when implementing SLB. Recognise the impact of different topologies. Evaluate SLB load distribution methods. Describe how load balancers can improve security. Explain how GSLB works. Server Load Balancing course details Who will benefit: Anyone working with SLB. Prerequisites: None. Duration 2 days Server Load Balancing course contents Introduction Concept, reasons, benefits, alternatives. Other features: Security, Caching. SLB concepts Architectures, Virtual servers, real servers, Virtual IP address, health checks. DNS load balancing. Packet walk using SLB. Load balancing 6 modes of bonding and load balancing without SLB. ISP load balancing. Health. Distribution policies: Round Robin, least connections, weighted distributions, response time, other variations. Persistent versus concurrent. Layer 4 switching L2 SLB, L3 SLB, single arm SLB, DSR, more packet walking, TCP versus UDP, Port numbers. Layer 7 switching Persistence. Cookie switching, Cookie hashing, Cookie insertion, URL switching, URL Hashing, SSL. Health checks Layer 3: ARP, ping. Layer 4: SYN, UDP. Layer 7: HTTP GET, Status codes, HTTP keepalives, content verification, SSL. Other application keepalives. What to do after failure and recovery. Security DOS attack protection, SYN attack protection, Rate limiting: connections, transactions. SSL offload. Redundancy Hot standby, Active standby, Active active. Stateful, stateless. VRRP, STP. GSLB Anycasting. DNS, TTL, DNS load balancing, problems with DNS load balancing,. HTTP redirect, health, thresholds, round trip times, location.

Server Load Balancing for  engineers
Delivered in Internationally or OnlineFlexible Dates
£1,727

Essential LTE

5.0(3)

By Systems & Network Training

LTE training course description This course is designed to give the delegate an understanding of the technologies used within a 3G UMTS mobile network. During the course we will investigate the UMTS air interface and the use of Wideband-Code Division Multiple Access (WCDMA) to facilitate high speed data access, together with HSPA to offer mobile broadband services. We will describe the use of soft handover rather than hard handover procedures and soft capacity sharing. The course includes a brief exploration of the UMTS protocol stack and the use of PDP Context and QoS support features. What will you learn Explain the 3G UMTS architecture. Describe the role of a Drifting & Serving RNC. Explain the use of ARQ & HARQ for mobile broadband. Describe how IMS integrates into the architecture. Describe the use of Media Gateway Controllers. Identify the temporary identities used within 3G UMTS. LTE training course details Who will benefit: Anyone working within the telecommunications area, especially within the mobile environment. Prerequisites: Mobile communications demystified Telecommunications Introduction Duration 2 days LTE training course contents LTE Introduction The path to LTE, 3GPP. LTE to LTE advanced. LTE Architecture The core, Access, roaming. Protocols: User plane, Control plane. Example information flows. Bearer management. Spectrum allocation. LTE technologies Transmission, reception, OFDMA, multiple antenna, MIMO. LTE Air interface Air interface protocol stack. Channels, Resource Grid, cell acquisition. Up and downlink controls. Layer 2 protocols. Cell acquisition Power on, selecting networks and cells. RRC connection. Attach procedure. Mobility management Roaming, RRC_IDLE, RRC_CONNECTED, cell reselection, handover, interoperation with UMTS and GSM networks. Voice and text IMS, QoS, policy and charging.

Essential LTE
Delivered in Internationally or OnlineFlexible Dates
£1,727