• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

190 Courses in Cardiff delivered Live Online

SOLD OUT! 10th June Hannah Todd #Agent121. Looking for: ADULT FICTION

5.0(3)

By I Am In Print

LOOKING FOR: ADULT FICTION, SCIENCE FICTION / FANTASY After several years spent within publishing houses Bookouture, Canelo, Avon, One More Chapter and Head of Zeus, Hannah Todd became a Literary Agent at the Madeleine Milburn Literary, TV & Film Agency, before joining Janklow & Nesbit in January 2025. Her clients include Kirsty Greenwood, Charlie Gallagher and Leah Mercer. Hannah is keen to see commercial fiction across the board, but with a particular focus on romance, Science Fiction/Fantasy & mystery novels. She is drawn to books with exemplary characterisation, voice and strength of feeling. But don't let your characterisation overshadow the need for impeccable plot and if you can make her laugh or cry then you're onto a winner! Across the full light-dark spectrum Hannah especially loves SFF that features an unlikely band of heroes, like the Six of Crows series by Leigh Bardugo, Scott Lynch's Gentleman Bastard series, Becky Chambers' The Long Way to a Small Angry Planet, T. Kingfisher's Nettle and Bone,and the cosy themes/settings offered by Heather Fawcett and TJ Klune. Hannah's advice is make sure you have a clear USP and hook: If you are sending your reader to a magical academy, or if we're riding dragons or waving wands, that's great! But what makes your book feel different and fresh? An excellent voice is key, but what else makes your take on these tropes stand out? An example of a phenomenal book that has turned the magical academy trope on its head, with layers of excellent world building, a unique magic system and plot twists galore is The Will of the Many by James Islington. If you have something crafted this beautifully then Hannah wants to see it! Romantasy of varying spice levels, accessible to both romance and fantasy readers, is on Hannah's wishlist. And you can whisk her away with contemporary romance novels, romcoms, sweeping love stories that redefine the genre. Romcoms with great disability rep and LGBTQIA+ stories that focus on the joy of falling in love are high on Hannah's agenda. She particularly loves Emily Henry, Laura Wood and Abby Jiminez. Think more Nicholas Sparks than Sally Rooney, and Bonnie Garmus rather than Gabrielle Zevin. In this space, she is a big fan of Emma Donoghue, Bonnie Garmus and Jojo Moyes. Meet with Hannah to discuss your crime and high-concept thrillers with an unsettling ‘it-could-happen-to-me’ feeling, coupled with a twist that's unseen until its delivery. The book she most wants to find in this space is something like Three Hours by Rosamund Lupton in both its themes (real-world emotional suspense) and its execution. A mystery series that feels like a real 'romp' is something she loves to escape with too. With regards to all genres, Hannah is particularly interested in voices from underrepresented backgrounds: such as writers of colour, indigenous communities, the LGBTQIA+ community, and those with disabilities. Hannah does not the right agent to give advice on: Re-imaginings of the classics Books that feature characters putting on Shakespeare plays! Historical fiction Children's, middle-grade and YA Hannah would like you to submit a covering letter, one page synopsis and the first 5,000 words of your completed manuscript in a single word document. (In addition to the paid sessions, Hannah is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Tuesday 3rd June 2025

SOLD OUT! 10th June Hannah Todd #Agent121. Looking for: ADULT FICTION
Delivered Online + more
£72

Thrive Under Pressure: Resilience Skills for Stressful Work Environments

By Eyes Up Training Limited

Transform stress into strength with this 4-week course, enhancing resilience, emotional skills, and effective communication for professionals.

Thrive Under Pressure: Resilience Skills for Stressful Work Environments
Delivered Online + more
£350

Total IPsec for engineers

5.0(3)

By Systems & Network Training

IPsec training course description This hands on course focuses on IPsec VPNs. Rather than focusing on one implementation this course concentrates on the technologies and protocols of IPsec. Starting with an overview of the complete IPsec architecture the course then moves onto ESP packet analysis along with encryption and authentication provided. IKEv1 and IKEv2 are both covered in detail. Having covered IPsec with pre shared keys the course then moves onto IPsec with certificates followed by IPsec issues. The course is vendor neutral with hands on with both Cisco and Microsoft implementations. What will you learn Explain how IPsec works. Explain the role of AH, ESP and IKE. Configure IPsec. Troubleshoot IPsec. IPsec training course details Who will benefit: Technical staff working with IPsec. Prerequisites: Definitive IP VPNs for engineers. Duration 3 days IPsec training course contents What is IPsec? How to spell IPsec, IPsec is IP security, confidentiality, integrity, authenticity, replay protection, what is a VPN? Network layer security, IPsec and IPv4, IPsec and IPv6, the suite of protocols, the standard, IPsec RFCs, IPsec history. Hands on Analysis of 'normal' IP packets. IPsec architecture The IPsec protocols, AH vs ESP, Why two headers? transport mode, tunnel mode, Remote access VPNs, site to site VPNs, security associations, SA database, Security Parameters Index, implementations: Host tack, Bump in the Stack, Bump in the Wire. Hands on Configuring IPsec. AH What AH does, the stack, The AH header, What is authenticated? Device authentication. AH in transport mode, AH in tunnel mode. Hands on AH packet analysis. ESP What ESP does, the ESP header, ESP in transport mode, ESP in tunnel mode, ESP and SA, ESP and SPI. Hands on ESP packet analysis, policy configuration. IPsec encryption IPsec is a framework, standard algorithms, ESP keys, the role of IKE, key lifetimes, how IKE generates the keys, DES, 3DES, AES, cipher block chaining, counter mode, other encryption. Hands on Encryption configuration. IPsec authentication Authentication types, IPsec authentication, Authentication algorithms: MD5, keyed SHA-1, HMAC-MD5, HMAC-SHA-1, HMAC-RIPEMD, other authentication algorithms. Hands on Authentication configuration. IKE Internet Key Exchange, IKE and the SAD, the two phase negotiation, ISAKMP, ISAKMP header, pre shared keys, digital signatures, public key encryption, Diffie Hellman, proposals, counter proposals, nonces, identities, phase 1 negotiation: main mode, aggressive mode, base mode. Phase 2 negotiation: quick mode, new group mode. Hands on IKE packet analysis. More IKE PFS, IKE and dynamic addresses, XAUTH, hybrid authentication, CRACK, ULA, PIC. User level authentication. IKE renegotiation, heartbeats. Hands on Troubleshooting IPsec. IKEv2 The IKEv2 exchange, IKE_SA_INIT, IKE_AUTH, CREATE_CHILD_SA, IKEv2 packets, the informational exchange. Comparing IKev1 vs IKE v2. Hands on IKEv2 configuration and analysis. PKI What is PKI?, Digital certificates, Certificate authorities, CA servers, RA, VA, certificates, CA hierarchy, CRLs, certificate formats. Hands on installing and configuring certificate servers. IPsec issues NAT, IPsec overhead and fragmentation. Summary IPsec strengths and weaknesses. Where to get further information.

Total IPsec for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,367

BOOKINGS CLOSED! 11th June Emily MacDonald #Agent121. Looking for: ADULT FICTION, NON-FICTION

5.0(3)

By I Am In Print

LOOKING FOR: ADULT FICTION, NON-FICTION Emily MacDonald joined 42 management and production company in 2019, working with Eugenie Furniss across her clients. She is now an agent in the Books Department, and is building her own list. Send Emily a story with characters that just won't leave her and a narrative that pulls her in, keeping her immersed in the world well after she has finished reading. She reads across a wide-range and has a particular interest in: book club, high-concept crime/thriller, upmarket and literary fiction. In fiction, Emily would love to find a crime/thriller set within a subcult: a modern retelling of British folklore (think Kamila Shamsie’s Home Fire); an unconventional love story; and a character led journey of self-discovery (especially one set within a diasporic community). Emily is also looking for narrative non-fiction which immerses the reader into an untold true story (personal or historical), exploring a new point of view, and providing a compelling social commentary, with an investigative twist. Think the obsessive vein of Kirk W. Johnson or personal/political dispatches of Aidan Hartley. Emily wants her horizons to expand while she reads. In both fiction and non-fiction, Emily loves stories woven into their surroundings, where the setting is as central a character as those who drive the narrative. In both spheres, she is keen to hear from Scottish and regional voices with stories to tell. Please note, Emily is not currently accepting submissions for Children's lit/YA and SFF. Emily would like you to submit a covering letter, 1 - 2 page synopsis and the first 5,000 words of your manuscript in a single word document. (In addition to the paid sessions, Emily is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Wednesday 4th June 2025

BOOKINGS CLOSED! 11th June Emily MacDonald #Agent121. Looking for: ADULT FICTION, NON-FICTION
Delivered Online + more
£72

ESOL - English for Specific Purposes (ESP) (modular) - Online Tuition

5.0(8)

By GLA Tutors Home or Online

This English for Specific Purposes (ESP) tutoring course is designed to cater to the specific language needs of adult learners in their professional or academic fields. Participants will focus on developing their communication skills in English within their specific area of expertise. Through targeted lessons, practical exercises, and industry-specific materials, learners will enhance their ability to effectively communicate in English within their professional or academic contexts.  Course Duration: 10 weeks (40 sessions) Course Objectives: By the end of this course, participants will: 1. Communicate confidently and effectively in English within their specific field. 2. Expand industry-specific vocabulary and terminology. 3. Develop listening skills to understand specialised language and accents. 4. Enhance reading comprehension skills for professional or academic texts. 5. Write accurately and coherently for specific purposes within their field. Course Outline: Week 1: Introduction and Needs Analysis - Introduction to course objectives, expectations, and ESP methodology - Conducting a needs analysis to identify participants' specific language requirements - Establishing individual learning goals and expectations within their field of expertise Week 2: Speaking Skills for Specific Purposes - Developing effective oral communication skills for professional or academic contexts - Practicing role-plays, presentations, and discussions within participants' fields - Enhancing fluency and confidence in expressing ideas and opinions Week 3: Listening Skills for Specific Purposes - Developing listening skills to understand specialised language, accents, and speech patterns - Authentic listening materials related to participants' field of expertise - Strategies for effective note-taking and comprehension of specialised content Week 4: Vocabulary Expansion within Participants' Field - Expanding industry-specific vocabulary and terminology - Exercises and activities to reinforce and practice specialized vocabulary - Incorporating technical terms and jargon into spoken and written communication Week 5: Reading Comprehension for Professional/Academic Texts - Developing reading skills for professional or academic texts within participants' fields - Strategies for skimming, scanning, and understanding complex texts - Identifying main ideas, supporting details, and summarizing key information Week 6: Writing Skills for Specific Purposes - Improving writing skills for specific purposes within participants' field - Practice exercises for writing reports, proposals, academic papers, etc. - Enhancing clarity, coherence, and professional tone in written communication Week 7: Presentation and Public Speaking Skills - Developing effective presentation skills within participants' field - Techniques for organizing content, engaging the audience, and delivering impactful presentations - Practice sessions with feedback and guidance Week 8: Negotiation and Business Communication Skills - Enhancing negotiation and business communication skills for professional contexts - Role-plays and practical exercises for effective communication in meetings, negotiations, etc. - Polishing language and strategies for successful business interactions Week 9: Cross-Cultural Communication - Understanding cultural nuances and adapting communication styles within participants' field - Developing intercultural communication skills for international professional contexts - Practicing effective communication in multicultural environments Week 10: Review and Final Evaluation - Reviewing course content and addressing individual needs - Comprehensive review exercises for all language skills within participants' field - Final evaluation and feedback session Note: This syllabus serves as a guideline and can be customised based on the specific needs, interests, and proficiency levels of the participants. The course may also include guest speakers or industry-specific field trips to provide further immersion and practical application of language skills.

ESOL - English for Specific Purposes (ESP) (modular) - Online Tuition
Delivered OnlineFlexible Dates
£40

SIP security for engineers

5.0(3)

By Systems & Network Training

SIP security training course description A hands-on course covering SIP security. It is assumed that delegates already know SIP as this course focuses purely on the security issues in SIP IP telephony networks. Hands-on practicals follow each major theory session and include use of various SIP security tools such as vomit, sipp, sipsak and sivus amongst others. What will you learn Secure SIP networks Use various SIP security tools SIP security training course details Who will benefit: Technical staff working with SIP. Technical security staff. Prerequisites: SIP for engineers Duration 2 days SIP security training course contents SIP review SIP infrastructure and entities, example SIP session. Hands on Simple SIP network with and without authentication. SIP security attacks DOS attacks, infrastructure attacks, eavesdropping, spoofing, replay, message integrity. Hands on Basic SIP packet capture, infrastructure attacks. SIP tools SIP packet creation: Sivus, SIPsak, PROTOS, SFTF, SIP bomber, SIPp, Seagull, Nastysip. SIP packet generators: SIPNess, NetDude. Monitoring: Wireshark, Cain & Abel, Vomit, Oreka, VoiPong. Scripts and tools: SIP-Fun, Skora.net, kphone-ddos, sip-scan, sip-kill, sip-redirectrtp. Health of different tools. Hands on Generating SIP packets, rebuilding conversations from captured packets, password cracking. VPNs and SIP IPSec, AH, ESP, transport mode, tunnel mode, Pre Shared Keys, Public keys. Hands on SIP calls over IPSec. Secure SIP signaling SIP relationship with HTTP, Deprecated HTTP 1.0 basic authentication, HTTP 1.1 Digest authentication, S/MIME, SIPS, SIPS URI, TLS, DTLS, PKI infrastructures. Hands on SIP with TLS. Secure media streams SRTP, features, packet format, default encryption, default authentication, key distribution. S/MIME, MIKEY, SDP security descriptions. SIP security agreements. Hands on Analysing SRTP packets. Firewalls NAT traversal. Impact of firewall on infrastructure attacks. TLS and firewalls. SIP specific firewalls. Hands on SIP calls through a firewall.

SIP security for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,727

Total IPv6 for engineers

5.0(3)

By Systems & Network Training

IPv6 training course description IPv6 is the next generation Internet Protocol. This hands-on course looks at the benefits and features of the new protocol along with an assessment of the likely impact of the protocol and migration strategies. Practical exercises using PCs and routers follow the major sessions in order to reinforce the theory. What will you learn Configure PCs and routers for IPv6. Troubleshoot IPv6 networks. Analyse IPv6 packets. Plan migration strategies for IPv6. Integrate IPv6 and IPv4 networks. IPv6 training course details Who will benefit: Anyone working in the field of networking. Prerequisites: TCP/IP Foundation for engineers Duration 3 days IPv6 training course contents Introduction Reasons for IPv6, IPv4 weaknesses, what is IPv6? IPv4 solutions for solving address wastage, the origins of IPv6. hands on IPv6 on a PC, IPv6 on a router. IPv6 addressing IPv6 address allocation, address format, Prefixes but no masks, address categories, scope zones, aggregatable global unicast, link local, Unicast, Multicast, Anycast. Prefix delegation. hands on Link local addresses, manual address configuration, name resolution. Plug and play Plug and play addressing, ICMP neighbour discovery, router solicitation, DHCPv6, stateful autoconfiguration and stateless autoconfiguration. hands on Plug and play addresses and default gateways. The IPv6 header The IPv4 header, IPv6 header format, QoS, flow control, priority field, extension headers, hop by hop, destinations header, fragmentation header, security, IPsec, AH, ESP, TCP and UDP, ICMPv6. hands on IPv6 packet analysis. Migrating to IPv6 Overview, migration, dual stack, IPv4 compatible addresses, DNS, IPv6 DNS issues, AAAA records, IPv6 reverse delegation, DNS transport, protocol translators, NAT-PT, NAPT-PT, NAT64, DNS64, tunnelling, tunnel establishment, tunnel brokers, Tunnel types. hands on Dual stack operation, tunnelling, IPv6 name resolution. IPv6 routing IPv6 routing, RIPng packet format, RIPng for IPv6, OSPF for IPv6, MBGP, multiprotocol routing, MBGP and multicasts, MBGP and IPv6. hands on Base router setup for IPv6, IPv6 static routes, RIPng, OSPFv3. MBGP

Total IPv6 for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,367

IP security foundation for engineers

5.0(3)

By Systems & Network Training

IP security training course description Connection to the Internet is becoming an essential business tool. This course looks at firewalls, digital certificates, encryption and other essential topics for e-commerce sites. A generic course that looks at firewalls and VPNs. Hands on sessions include using hacking tools and configuring firewalls. What will you learn Describe: Basic security attacks RADIUS SSL IPSec VPNs Implement digital certificates Deploy firewalls to protect Web servers and users. Secure Web servers and clients. IP security training course details Who will benefit: Network administrators. Network operators. Security auditors Prerequisites: TCP/IP foundation for engineers Duration 2 days IP security training course contents TCP/IP review Brief overview of the relevant headers. Hands on Download software for course, use analyser to capture passwords on the wire. Security review Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits The Internet worm, IP spoofing, SYN attack, hijacking, Ping o' Death… keeping up to date with new threats. Hands on Use a port scanning tool, use a 'hacking' tool. Firewalls Products, Packet filtering, DMZ, content filtering, stateful packet inspection, Proxies, firewall architectures, Intrusion Detection Systems, Viruses. Hands on Set up a firewall and prevent attacks. NAT NAT and PAT, Why use NAT, NAT-ALG, RSIP. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Run a password-cracking program. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, PPP authentication, RADIUS. Hands on Using certificates. Web client and server security Cookies, browser certificates, censorship, PICS. Operating system security, Web server user authentication, Restricting access, Logging, Securing CGI scripts. Hands on Browser security. VPNs and IPSec What is a VPN, tunnelling, L2F, PPTP, L2TP, IPSec, AH, ESP, transport mode, tunnel mode.

IP security foundation for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,497

Definitive VPNs for engineers

5.0(3)

By Systems & Network Training

Definitive VPNs training course description A hands on course covering VPNs from the basics of benefits and Internet vs. Intranet VPNs through to detailed analysis of the technologies involved in VPNs. All the major VPN protocols are covered including PPPoE, L2TP, SSL, IPsec and dynamic VPNs. MPLS L3 VPNs are also covered. What will you learn Describe what a VPN is and explain the difference between different VPN types. Recognise the design and implementation issues involved in implementing a VPN. Explain how the various technologies involved in a VPN work. Describe and implement: L2TP, IPsec, SSL, MPLS L3 VPNs. Evaluate VPN technologies. Definitive VPNs training course details Who will benefit: Network personnel. Prerequisites: IP Security foundation for engineers. Duration 3 days Definitive VPNs training course contents VPN overview What is a VPN? What is an IP VPN? VPNs vs. Private Data Networks, Internet VPNs, Intranet VPNs, Remote access VPNs, Site to site VPNs, VPN benefits and disadvantages. VPN Tunnelling VPN components, VPN tunnels, tunnel sources, tunnel end points, hardware based VPNs, Firewall based VPNs, software based VPNs, tunnelling topologies, tunnelling protocols, which tunnelling protocol should you use? requirements of tunnels. VPN security components Critical VPN security requirements, Encryption and authentication, Diffie Hellman, DES, 3DES, RSA, PKI, Ca server types, pre shared keys versus certificates, Enrolling with a CA, RADIUS in VPNs. PPP Encapsulation, operation, authentication. Hands on Setting up PPPoE and analysing PPP packets. PPTP Overview, Components, How it works, control and data connections, GRE. Hands on Building a PPTP VPN. L2TP Overview, components, how it works, security, packet authentication, L2TP/IPSec, L2TP/PPP, Layer 2 versus layer 3 tunnelling. Hands on Implementing a L2TP tunnel. IPSec AH, HMAC, ESP, transport and tunnel modes, Security Association, use of encryption and authentication algorithms, manual vs automated key exchange, NAT and other issues. Hands on Implementing an IPSec VPN. Intranet VPNs Headers, architecture, label switching, LDP, MPLS VPNs. VPN products and services PE and CPE, management, various VPN products. VPN issues and architectures VPN architectures: terminate VPN before/on/ after/in parallel with firewall, resilience issues, VRRP, performance issues, QoS and VPNs. documentation.

Definitive VPNs for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,367

Cyber security for engineers

5.0(3)

By Systems & Network Training

Cyber security training course description This cyber security course focusses on the network side of security. Technologies rather than specific products are studied focussing around the protection of networks using firewalls and VPNs. What will you learn Describe: - Basic security attacks - RADIUS - SSL - VPNs Deploy firewalls and secure networks Explain how the various technologies involved in an IP VPN work. Describe and implement: - L2TP - IPsec - SSL - MPLS, L3, VPNs. Cyber security training course details Who will benefit: Anyone working in the security field. Prerequisites: TCP/IP foundation for engineers Duration 5 days Cyber security training course contents Security review Denial of service, DDOS, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits IP spoofing, SYN attacks, hijacking, reflectors and amplification, keeping up to date with new threats. Hands on port scanning, use a 'hacking' tool. Client and Server security Windows, Linux, Log files, syslogd, accounts, data security. Hands on Server hardening. Firewall introduction What is a firewall? Firewall benefits, concepts. HAnds on launching various attacks on a target. Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls. Firewall products. Hands on Simple personal firewall configuration. Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on SPI firewalls. Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall plusses and minuses. Hands on Proxy firewalls. Firewall architectures Small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Password cracking. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, RADIUS. Hands on Using certificates. VPN overview What is a VPN? What is an IP VPN? VPNs vs. Private Data Networks, Internet VPNs, Intranet VPNs, Remote access VPNs, Site to site VPNs, VPN benefits and disadvantages. VPN Tunnelling VPN components, VPN tunnels, tunnel sources, tunnel end points, tunnelling topologies, tunnelling protocols, which tunnelling protocol? Requirements of tunnels. L2TP Overview, components, how it works, security, packet authentication, L2TP/IPsec, L2TP/PPP, L2 vs L3 tunnelling. Hands on Implementing a L2TP tunnel. IPsec AH, HMAC, ESP, transport and tunnel modes, Security Association, encryption and authentication algorithms, manual vs automated key exchange, NAT and other issues. Hands on Implementing an IPsec VPN. SSL VPNs Layer 4 VPNs, advantages, disadvantages. SSL. TLS. TLS negotiation, TLS authentication. TLS and certificates. Hands on Implementing a SSL VPN. MPLS VPNs Introduction to MPLS, why use MPLS, Headers, architecture, label switching, LDP, MPLS VPNs, L2 versus L3 VPNs. Point to point versus multipoint MPLS VPNs. MBGP and VRFs and their use in MPLS VPNs. Hands on Implementing a MPLS L3 VPN. Penetration testing Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology. Hands on Hacking tools and countermeasures.

Cyber security for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697

Educators matching "ESP"

Show all 11