• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

128 Courses in Edinburgh delivered Live Online

Safeguarding Train the Trainer

4.9(1007)

By Caring For Care

Definition of Safeguarding Legislation & agreed ways of working Definition of Safeguarding Legislation & agreed ways of working Every child matters guidance Myths and statistics Effects on young people Leadership/worker skills Common indicators of abuse Reporting of abuse and potential abuse Barriers to reporting abuse Understanding the types of abuse Recognising acts, signs and symptoms of abuse Who is vulnerable / at risk The role of dignity in safeguarding Legislation and policies and procedure What to do should you have a concern Overview of prevent How to respond to an individual should they disclose a concern

Safeguarding Train the Trainer
Delivered OnlineFlexible Dates
£450

Securing UNIX systems

5.0(3)

By Systems & Network Training

Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing UNIX systems
Delivered in Internationally or OnlineFlexible Dates
£4,997

Certified Artificial Intelligence Practitioner

By Mpi Learning - Professional Learning And Development Provider

This course shows you how to apply various approaches and algorithms to solve business problems through AI and ML, follow a methodical workflow to develop sound solutions, use open-source, off-the-shelf tools to develop, test, and deploy those solutions, and ensure that they protect the privacy of users. This course includes hands-on activities for each topic area.

Certified Artificial Intelligence Practitioner
Delivered in Loughborough or UK Wide or OnlineFlexible Dates
£595

Securing Linux systems

5.0(3)

By Systems & Network Training

Securing Linux systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure Linux accounts. Secure Linux file systems. Secure Linux access through the network. Securing Linux systems training course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing Linux systems training course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing Linux systems
Delivered in Internationally or OnlineFlexible Dates
£3,697

LTE optimisation and capability

5.0(3)

By Systems & Network Training

LTE optimization training course description This course gives delegates an understanding of the Key Performance Indicators used within the 3G LTE (4G) network environment. We investigate the 3GPP standards for KPIs (including TR 32.814, TS 32.410 & TS 32.455) these cover GERAN, UMTS & LTE environments. The course details the optimisation procedures and the use of Self optimisation, Selforganising & Self-healing equipment now being deployed across all releases of mobile networks. What will you learn Explain the RF optimisation flowchart. Describe the importance of Reference Signal Received Power (RSRP). List many of the 3GPP recommended KPIs. Describe the concept of APN AMBR and UE AMBR within LTE. Describe the use of planning and optimisation computer tools. LTE optimization training course details Who will benefit: Anyone working with LTE. Prerequisites: Essential LTE Duration 2 days LTE optimization training course contents Introduction to the cellular environment The architecture, 2G (GSM), GPRS/EDGE, The NGMN (Next Generation Mobile Network), media gateway controller, 3GPP Rel99 the 3G introduction, HSPA deployments, 3G LTE (4G). Cellular network procedures GSM/GPRS call setup, GPRS data call setup, 3G UMTS data call setup, Data call (Voice over LTE) in LTE (using IMS), Circuit Switched Fall Back (CSFB) in LTE, IP packet session in LTE. Introduction to the standards The 3GPP specifications body, The numbering structure for KPIs, 2G KPIs, 3G/UMTS KPIs, 3G LTE KPIs, IMS KPIs. Introduction to the KPI definitions KPI definitions, accessibility KPIs, retainability KPIs, mobility KPIs, utilisation KPIs. In-depth overview of the air Interfaces GSM/GPRS FDMA & TDMA solution, 3G UMTS WCDMA solution, HSPA+ sharing spare power (Codes), The 3G LTE uplink & downlink interface explained, Initial attach procedures explained. Problem analysis Reference Signal Received Power (RSRP), Signal to Interference Noise Ratio (SINR), handover success rates, power adjustments, classification of coverage problems, weak coverage & coverage holes, lack of dominant cells, cross coverage, improper tilt settings, uplink/downlink imbalance, signal quality, Azimuths & tilts to reduce interference, Handover failure due to interference, Service drop causes. Mobile RF performance in 2G/3G Performance counters, KPIs, testing & measurement, Drive testing and survey, Data collection and post processing of data, LTE service optimization, bandwidth, poor coverage, Quality, optimization process, KPI optimization, Root Cause Analysis (RCA) applied to RF issues, optimization tools and software. Advanced LTE network planning & optimization LTE UE measurements (RSRP/RSRQ), LTE capacity planning, RF configuration parameters, LTE cell selection/reselection planning, LTE radio network KPIs, LTE user-centric KPIs, LTE network performance KPIs, LTE system utilization KPIs, LTE RF channel performance predictions, LTE channel information processing, LTE channel multiplexing, Physical layer and structure, MIMO in LTE, LTE resource plan LTE and Self-Organizing Networks (SON). Radio network optimization work flow Work flow, the existing network, Optimization team establishment and cluster division, Single site verification, Alarm check, Cell state check, Radio parameters check, Site verification, Statistics analysis, Coverage problem analysis. Mobile internet and QoS issues Cellular QoS reference models. How QoS impact on KPIs and measurements, Introduction to mobile internet, The concept of shared access technologies, Support for QoS in the WCDMA environment, The PDP context model, Supporting end-to-end QoS, EPS bearer concepts, Default EPS bearer, Dedicated EPS bearer, APN-AMBR, UE-AMBR.

LTE optimisation and capability
Delivered in Internationally or OnlineFlexible Dates
£2,477

Awareness of Safeguarding

By Madeleys First Aid Plus

RQF level 1 Awareness of Safeguarding The RQF Level 1 Awareness of Safeguarding course is designed to provide individuals with a basic understanding of safeguarding principles and practices. It aims to raise awareness about the importance of safeguarding and promote the well-being and protection of vulnerable individuals, such as children, young people, and adults at risk. The course covers the following topics: Introduction to Safeguarding: Definition and importance of safeguarding. Key legislation, policies, and guidance related to safeguarding. Roles and responsibilities of individuals and organizations in safeguarding. Types of Abuse and Neglect: Overview of different types of abuse, including physical, emotional, sexual, and financial abuse. Recognizing signs and indicators of abuse and neglect. Understanding the impact of abuse on individuals' well-being. Vulnerable Groups: Identifying vulnerable groups, such as children, young people, older adults, and individuals with disabilities or mental health issues. Understanding the specific safeguarding concerns and considerations for each group. Reporting and Responding to Safeguarding Concerns: Procedures for reporting safeguarding concerns or disclosures. Understanding the importance of maintaining confidentiality and handling sensitive information appropriately. Responding to safeguarding concerns in a timely and appropriate manner. Promoting Safeguarding and Preventing Abuse: Strategies for promoting a safe and inclusive environment. Recognizing potential risk factors and implementing preventative measures. Understanding the importance of creating a culture of safeguarding within organizations. Multi-Agency Collaboration: Collaboration between different agencies and organizations involved in safeguarding, such as social services, law enforcement, and healthcare. Sharing information and working together to ensure effective safeguarding practices. Case Studies and Scenarios: Reviewing case studies and scenarios to apply safeguarding principles and practices. Analysing potential safeguarding dilemmas and decision-making processes. Personal Responsibilities: Recognizing personal boundaries and limitations when working with vulnerable individuals. Understanding the importance of self-care and managing emotional well-being when dealing with safeguarding issues. It is important to ensure that the course meets local safeguarding guidelines and requirements. Suitability - Who should attend? The RQF Level 1 Awareness of Safeguarding course is suitable for a wide range of individuals who may come into contact with vulnerable individuals or have a general interest in understanding safeguarding principles. Here are some key groups of people who should attend the course: Employees and Staff: The course is relevant for employees and staff members across various sectors and industries, including but not limited to education, healthcare, social services, hospitality, sports and recreation, and community organizations. It helps them develop a basic understanding of safeguarding principles and their responsibilities in ensuring the well-being and protection of vulnerable individuals they may encounter in their work. Volunteers: Individuals who volunteer their time and services in organizations that work with vulnerable individuals should attend the course. It equips them with essential knowledge and awareness of safeguarding issues, helping them provide appropriate support and maintain the safety and dignity of those they interact with. Parents and Caregivers: The course can benefit parents, guardians, and caregivers by providing them with a foundation in safeguarding principles. It helps them recognize potential risks and signs of abuse or neglect, enabling them to create safer environments for the children or vulnerable individuals under their care. Community and Youth Workers: Individuals involved in community work, youth organizations, or youth clubs should attend the course to enhance their understanding of safeguarding. It enables them to promote the well-being and safety of young people and recognize signs of potential abuse or exploitation. Volunteers or Trustees of Charitable Organizations: Individuals serving as volunteers or trustees in charitable organizations that work with vulnerable populations can benefit from the course. It helps them fulfill their responsibilities in safeguarding the individuals the organization serves and ensures they are aware of their legal and ethical obligations. General Public: The course is open to the general public as it provides valuable knowledge and awareness of safeguarding principles. It can benefit individuals who have an interest in understanding the rights and protection of vulnerable individuals in society. It's important to note that the RQF Level 1 Awareness of Safeguarding course provides foundational knowledge and awareness. For individuals who require more in-depth training or who have specific safeguarding roles or responsibilities, higher-level courses may be more suitable. Outcome / Qualification etc. Certification The qualification does not have an expiry date but refresher training and keeping up to date with changes to policies, procedures and new legislation through ongoing CPD is vital. Training Course Content Module 1 Introductions Module 2 Safeguarding legislation and guidance Module 3 Roles and responsibilities Module 4 Abuse and neglect Module 5 Identifying concerns and disclosure Module 6 Making judgements Module 7 Reporting concerns Module 8 Course closure and assessment MODULE 1 INTRODUCTIONS Session content Trainer/Assessor introduction Learner introductions Course syllabus Learning outcomes and assessment criteria Session duration 20 minutes MODULE 2 SAFEGUARDING LEGISLATION AND GUIDANCE Session content Introduction to safeguarding Definitions Assessment framework Safeguarding statistics Safeguarding legislation and guidance Rights of a child/adult at risk Session duration 40 minutes MODULE 3 ROLES AND RESPONSIBILITIES Session content Safeguarding partnerships Local authority safeguarding officer Social care services Multi-agency safeguarding hubs Organisational safeguarding policies Safeguarding lead Session duration 30 minutes MODULE 4 ABUSE AND NEGLECT Session content Definitions Types of abuse and neglect Physical abuse Emotional abuse Sexual abuse Neglect Signs and indicators Parent/carer abuse Radicalisation FGM Forced marriage Modern slavery County line gangs Electronic media abuse - Internet and social networking dangers Session duration 50 minutes MODULE 5 IDENTIFYING CONCERNS AND DISCLOSURE Session content Identifying concerns Being a point of disclosure Recording disclosure information Session duration 20 minutes MODULE 6 MAKING JUDGEMENTS Session content Child development needs Identifying a safeguarding concern Group activity making judgements Session duration 30 minutes MODULE 7 REPORTING CONCERNS Session content Silencing factors Barriers to raising concerns Reporting concerns Importance of sharing concerns Session duration 20 minutes MODULE 8 COURSE CLOSURE AND ASSESSMENT Session content Course summary Assessment paper Course evaluation Course closure Session duration 30 minutes Course delivery details Qualification delivery The qualification has 4 assigned guided learning hours (GLH) and 5 hours total qualification time (TQT). GLH indicates the number of classroom contact hours that the learner will undertake. TQT includes GLH but also takes into account any unsupervised learning and is an estimate of how long the average learner will take to complete the qualification. The minimum classroom contact time of 4 hours should be delivered over a minimum of half a day. The course can be spread over a maximum of 2 weeks, ensuring that each session is a minimum of two hours. The class ratio for this qualification is a maximum of 16 learners to 1 Trainer/Assessor Why choose Madeleys First Aid Plus Founded in 2021 after Louise left 30 years in the NHS as an Advanced practitioner in A&E/ITU, had spent 1.5 years in Covid ITU Won FSB Best start-up business in the West Midlands in May 2023 Now trained 100's of delegates in Physical and Mental Health First Aid Expenses Travel costs and lunch required, there are many cafes and sandwich bars here in Much Wenlock to buy your lunch, you may eat it in the training room. All training material, books, qualification certificates are included in the price Continuing Studies The RQF Level 1 Awareness of Safeguarding course serves as an introductory course that provides individuals with a basic understanding of safeguarding principles. While it is a standalone qualification, individuals who complete the course may choose to progress further in their safeguarding training and education. Here are some potential progression options: RQF Level 2 Award in Safeguarding: This qualification builds upon the knowledge gained in the Level 1 course and provides a more comprehensive understanding of safeguarding principles, policies, and procedures. It covers topics such as risk assessment, responding to safeguarding concerns, and effective communication in safeguarding contexts. Specialized Safeguarding Courses: Individuals who wish to focus on specific areas of safeguarding can pursue specialized courses related to their field of interest. These courses may include Child Protection, Adult Safeguarding, Domestic Abuse Awareness, Online Safety, or Safeguarding in Healthcare. Specialized courses delve deeper into the specific risks, regulations, and best practices associated with safeguarding vulnerable individuals in those particular contexts. Safeguarding Training for Specific Professions: Many professions have specific safeguarding training requirements tailored to their sector. For example, teachers may need to complete safeguarding training specific to the education setting, healthcare professionals may have training focused on safeguarding vulnerable patients, and social workers may have specialized safeguarding training in line with their role. Progression may involve undertaking profession-specific safeguarding courses or qualifications. Safeguarding Leadership and Management Training: Individuals in supervisory or managerial positions may consider pursuing training that focuses on the leadership and management aspects of safeguarding. This can include courses on developing and implementing safeguarding policies and procedures, managing safeguarding incidents, conducting internal investigations, and providing guidance and support to staff. Continued Professional Development (CPD): Engaging in ongoing CPD activities is essential for staying updated with the latest developments in safeguarding practices and policies. Individuals can attend conferences, workshops, or seminars related to safeguarding, child protection, or specific areas of interest within the field. This allows for continued learning and networking with other professionals. Higher Education: Individuals who wish to pursue a more in-depth study of safeguarding can consider higher education programs in social work, psychology, criminology, or related fields. These programs provide comprehensive knowledge and training in safeguarding practices, policies, and research. They may lead to professional certifications or degrees that enhance career opportunities in safeguarding roles. It's important for individuals to research and explore progression options that align with their specific career goals, interests, and local requirements. Different countries or regions may have varying certification or training requirements for safeguarding roles, so it's advisable to check with relevant regulatory bodies or professional associations for specific guidance.

Awareness of Safeguarding
Delivered in Much Wenlock or Online + more
£60

Peering at LINX

5.0(3)

By Systems & Network Training

Peering at LINX training course description A one or two day induction course covering the technical procedures of LINX along with correct interaction with LINX and LINX members. This course focuses on the implementation of the technologies within the LINX network. For those already competent in BGP the one day version of this course is sufficient. What will you learn Explain the role of LINX in the Internet. Correctly connect to LINX. Recognise the correct procedures for peering at LINX. Use the current Best Current Practices. Peering at LINX training course details Who will benefit: Technical staff of new LINX members. Technical staff of companies preparing to join LINX. Non technical staff may also benefit from this course. Prerequisites: None. (For technical staff with BGP knowledge 1 day) Duration 1 to 2 days Peering at LINX training course contents Introduction and review Networks, The Internet, IP, routers, Autonomous systems, the structure of the Internet, the role of Internet Exchanges. BGP and peering. LINX, EuroIX, RIPE. What you get when you join LINX. LINX products: Connexions, Virtual PoPs, Colocation resales, LINX from anywhere. LINX infrastructure The original architecture, The growth of LINX, the current topology. LINX London locations. Dual LAN topology. LON1, LON2. Use of MPLS to connect London sites. Regional peering: LINX NoVa, LINX Manchester, LINX Wales, LINX Scotland, ManxIX, JEDIX. Connecting with LINX nnecting with LINX Locations. 1/10/100/400G. Interface specifications. Link aggregation. The racks and space provided, access to the racks, connecting WAN circuits into LINX. The connection form, How to link your ISP with LINX, switch assignments, limits on traffic, average measured traffic, getting statistics from LINX, Using looking glass. Allowed traffic. Port security Configuration hints LINX IP details, IPv4, IPv6, PTR records, Cisco base configuration, Juniper base configuration. Peering with other LINX members Preparing for peering, the peering template, setting up the peering, RFC 2142, the RIPE database, contacts, peeringdb.net, solving downed BGP sessions, escalation procedures. Peering configuration hints Cisco BGP configuration, Juniper BGP configuration. LINX additional services Private interconnect, LINX time service. NTP, Strata. The LINX route server Bi lateral peering, Multi lateral peering. How the LINX route server is configured. Use of communities on the route server, template for peering with the route server. Summary Getting further information, the LINX website, the LINX mailing lists.

Peering at LINX
Delivered in Internationally or OnlineFlexible Dates
£867

MS POWER BI COURSE

4.6(12)

By PCWorkshops

Data Visualization Courses London. In this Power BI Course, you will learn how to translate data trends, summaries, statistics and insights from your data into powerful and inspirational visualizations This course is ideal for managers and data analysts who need to make business decisions based on data.

MS POWER BI COURSE
Delivered OnlineFlexible Dates
£185

Functional Skills Qualification in Mathematics at Level 2

By Cavity Dental Training

This qualification consists of 2 mandatory components. Learners must complete both the Non-Calculator and Calculator written examinations. The assessments will assess a learner’s representing, analysing, and interpreting skills using numbers, geometry, and statistics in realistic contexts. To achieve an equivalent to GCSE grade C or 4. The qualification is awarded by Highfield OFQUAL-regulated and nationally recognised. Learn about the Functional Skills Qualification in Mathematics at Level 2 Our rolling 12-week course, via live webinar with a dedicated tutor, is designed to discover your weakness and build on those, to enable you to achieve success in Maths to allow you to progress your career in the direction you want. Every Wednesday 4pm – 6pm with full resources and practice papers – you will succeed. As part of one of our apprenticeship courses – This course could be government funded – so ask for more information. Course Dates Every Wednesday 4pm – 6pm 12 week rolling course Costs £350.00 per person (inc. VAT) Any additional resits of exams are charged at £30 each.

Functional Skills Qualification in Mathematics at Level 2
Delivered OnlineFlexible Dates
£350

Certified Wireless Analysis Professional

5.0(3)

By Systems & Network Training

CWAP training course description This WiFi analysis course consists of hands-on learning using the latest enterprise wireless LAN analysis and troubleshooting tools. The course takes an in-depth look at the functionality of WLANs, intended operation of the 802.11 protocol and Wi-Fi Alliance specifications, WLAN frame formatting and structure, troubleshooting methodology, and protocol analysis. It also includes extensive training in modern spectrum analysis with a focus on advanced RF behaviour analysis, data collection methods, interpreting spectrum plots and charts, and understanding advanced features of WLAN spectrum analysers. What will you learn Analyse WiFi frames using Wireshark. Explain 802.11 protocol operation. Troubleshoot WiFi networks using Wireshark. Troubleshoot WiFi networks using spectrum analysers. CWAP training course details Who will benefit: Technical Network Staff Anyone looking to become a CWAP Prerequisites: Certified Wireless Network Administrator Duration 4 days CWAP training course contents Principles of WLAN Communication 802.11 Working Group, OSI reference model and the 802.11 PHY and MAC, Communication sublayers and data units, WLAN architecture components, Organization of station forwarding Addressing and internetworking operation, Modern WLAN product architectures. Physical (PHY) and MAC Layer Formats and Technologies Physical layer functions, Preamble function and format, Header purpose and structure, Analysis of PHY problems, Physical PPDU formats, 802.11b, 802.11a, 802.11g, 802.11n, MAC frame components, MAC encapsulation, Fields and subfields of the MAC header, Frame Control, Frame types and subtypes and their uses, Addressing, Frame body, Data frame format, Control frame format, Management frame format, Information elements and fields. Beaconing and synchronization Scanning, Client state machine, 802.11 contention, QoS, Admission control, Band steering and airtime fairness mechanisms Fragmentation, Acknowledgments and Block acknowledgments, Protection mechanisms and backward compatibility, Power management, Dynamic Frequency Selection (DFS) and Transmit Power Control (TPC), Security components, methods, and exchanges, Roaming procedures exchanges, Future protocol enhancements. 802.11n Transmit beamforming, Spatial multiplexing, Maximal Ratio Combining (MRC), Space-Time Block Coding, 40 MHz channels, Frame aggregation, HT-OFDM format, Modulation and Coding Schemes (MCS), HT frame formatting and more. Protocol Analysis Tools and Methodology Troubleshooting methodology, Protocol analyser types, Analysis NIC/adapter selection and constraints, Interpreting results based on location, Analyzer settings and features, Filtering and channel scanning, Interpreting decodes, Using advanced analysis features, Assessing WLAN health and behaviour factors, Evaluating network statistics, Troubleshooting common problems, Wired analysis to support wireless network issues. Spectrum Analysis Tools and Methodology Radio frequency behaviour review, Visualizing RF domains using spectrum measurement tools, Spectrum analyser types and operation, Analyser specifications and characteristics, Understanding spectrum data presentation, Interpreting plots and charts, Common WLAN spectrum analyser features, Identifying transmit patterns, Device classification and network impact, Recognizing transmit signatures. Hands on lab exercises Wireshark Setup, Use, and In-Depth Analysis Wireshark is fundamental to troubleshooting. Labs include: - Capabilities, configuration, and data display - Opening, collecting, saving, and modifying capture files. - Filtering traffic, and using colouring rules as analysis aides. - Live captures based on a set of desired collection criteria. - Identify and isolate network problems. - Conversation analysis. - Remote packet capture with an AP. Understanding Frame Components Familiarity with the frame structure and contents is essential in real -world troubleshooting efforts. Labs include: - Understanding the MAC header - Comparing the three major frame types and their subtypes - Analysing frame formats of individual frame types - Analysing 802.11n frame components - Additional information is reported by protocol analysers - Information not visible in protocol analysers Frame Exchanges Understanding frame exchange rules and behaviors is critical to identifying expected and unexpected. It is also necessary to understand what is normal so that aberrations can be properly troubleshot. Labs include: - Connectivity exchanges and sequences - Legacy and modern security exchanges - ERP and HT protection mechanisms - Power save behaviour - Acknowledgments, block acknowledgments, and supporting action frames - Dynamic rate switching - Band steering Troubleshooting Common Problems This lab exposes students to hands-on troubleshooting skills by setting up common problems in WLANs and allowing students to attempt to solve them. - Trouleshooting connectivity exchanges - Troubleshooting 802.1X and EAP exchanges - Troubleshooting roaming Spectrum Analyzer Setup, Use, and In-Depth Analysis Specifically, it will explore the plots and charts used to display spectrum data and how to interpret this data to define a transmitter's impact on the network. The following are covered: - Installing the analyser and using display and navigation - The 'RF perspective' provided by each plot and chart - Using built-in features and automated device identification - Characterizing the behaviours of an interference source - Assessing the impact of an interference source - Determining the impact of transmitter proximity on interference. - Identifying signatures of common transmitters - Remote spectrum analysis with an AP

Certified Wireless Analysis Professional
Delivered in Internationally or OnlineFlexible Dates
£3,297