3G training course description This course is designed to give the delegate an understanding of the technologies used within a 3G UMTS mobile network. During the course we will investigate the UMTS air interface and the use of Wideband-Code Division Multiple Access (WCDMA) to facilitate high speed data access, together with HSPA to offer mobile broadband services. We will describe the use of soft handover rather than hard handover procedures and soft capacity sharing. The course includes a brief exploration of the UMTS protocol stack and the use of PDP Context and QoS support features. What will you learn Explain the 3G UMTS architecture. Describe the role of a Drifting & Serving RNC. Explain the use of ARQ & HARQ for mobile broadband. Describe how IMS integrates into the architecture. Describe the use of Media Gateway Controllers. Identify the temporary identities used within 3G UMTS. 3G training course details Who will benefit: Anyone working within the telecommunications area, especially within the mobile environment. Prerequisites: Mobile communications demystified Telecommunications Introduction Duration 2 days 3G training course contents D3GPP specifications 3GPP standards body, Evolution path, Frequency and bandwidth, Conceptual model, UMTS general architecture, UTRAN architecture & radio access bearer. CDMA principles CDMA principle, Code characteristics, Code requirements. CDMA requirements Synchronization, Power control, Soft handover, Rake receiver, Antenna consideration, Multi-user detection. Radio interface protocol architecture Access stratum & non-access stratum, Overall protocol structure, Logical and transport channels, Physical channels, Protocol termination. Layer 2 Protocols Medium Access Control (MAC) Protocol, Radio Link Control (RLC) Protocol, Packet Data Convergence Protocol (PDCP) protocol, Radio Interface for Broadcast/Multicast Services. Radio Resource Control (RRC) Protocol RRC Architecture, RRC Protocol State, Broadcast of information, RRC connection management, Radio bearer management, RRC connection mobility functions, Power control, Ciphering and Integrity. Mobile procedures Mobility management states and transitions, UMTS identities, Procedures in Idle mode (location updates, cell selection/ re-selection), Circuit-switched call set-up, Packet-switched context activation and context preservation, Data transfer initialization, Soft-handover procedure. Introduction to HSPA The need for high speed data, Fast HARQ, Improved scheduling, Additional channels, Soft combining, HS-DSCH codes, Uplink HSPA vs downlink HSPA, Full HSPA, Use of MIMO, Enhanced CELL_FACH.
About this Training Course One of the main challenges for today's managers is effectively leading and successfully communicating vision that inspires employees to perform. Good leadership engages people and employees who feel both engaged and enabled contribute to higher levels of growth and productivity. They will remain longer with the organisation, perform better and ultimately deliver better service to your customers. This popular 3 full-day course will equip you with key skills that you can utilise to maximise your staff's performance in line with the company's objectives. This interactive course will also empower you with strategic approaches to overcome the people challenges that you may encounter while enabling you to optimise your business strategies successfully. An ILM Recognised programme. Training Objectives What are the benefits that you will gain from attending this course? * Enhance your personal effectiveness and decision-making * Learn how to boost your influencing capability * Inspire enthusiasm, motivation and commitment * Communicate effectively across a multi-cultural team * Nurture your relationships and strengthen your team * Develop an empowering partnership team culture Target Audience Who should attend this course? Anyone involved in leading a business unit or a project team can attend. It covers relationships with host governments, contractors, suppliers and local communities which constitute critical alliances for the development of a project. This course is essential for team leaders, supervisors or managers from the following functions: Project management engineers from various technical disciplines Ad-hoc or special project team leaders in legal, technical & financial disciplines Country managers or business development officers of contractors JV management executives or officers Government officials or industry liaison officers Procurement or contracts executives or officers Trainer Your course leader is the author of Spirit IntelligenceTM and specialises in executive leadership facilitation and management development. He gained a first class honours degree in chemical engineering from Edinburgh University in Scotland and has undertaken postgraduate studies in psychology at Macquarie University in Sydney, Australia. Your course leader's corporate career spanned 14 years in Oil and Gas with BP, Amoco and AGL. Since 1993, he has worked across five continents with more than 170 clients including Rothschild, QBE, AT&T, Intel, Towers Perrin, Thomas Cook, Fujitsu, Nortel, Frank Russell, Electrolux, Arab Bank, Cable and Wireless, GSK, Merck, Sharpe and Dome, World Vision, Ericsson, IBM, Placer Dome Gold, Jim Beam, Ernst & Young and Commonwealth Bank of Australia. He focuses on what he calls tapping The Hidden Advantage to unleash the power of the whole person - the power of the body and mind, the passion of the emotions and the enthusiasm, motivation, commitment, initiative, creativity, resilience and persistence of the spirit in business. He is very experienced internationally in both skills enhancement and the strategic facilitation of tough and intractable client challenges. His approach is pragmatic. He provides his clients with a powerful range of practical tools and approaches to enable management to tap The Hidden Advantage latent in their staff and achieve optimum performance and results. A powerful and compelling speaker, he combines humour, energy and passion. He draws on a wealth of personal experience and thorough research. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
https://www.valuex2.com/icagile-business-agility-foundations-certification-training/ https://www.linkedin.com/company/80563537/
About this Training Course This 3 full-day training course will introduce participants to the Microsoft Power BI® software solution for extracting, manipulating, visualising and analysing data. This is a very practical, hands-on course that takes participants through a series of exercises which help users understand the Power BI® environment, how to use the key areas of functionality, and how to apply the tools it contains to design and produce analyses of their own data. The first two days focus on learning the key concepts and practising these using clean, simple datasets. The third day provides participants with the opportunity to apply what they've learned to their own data. This makes the course far more relevant and meaningful for them, it allows our facilitator to help them structure their data models, queries and DAX formulas correctly, and it allows our facilitator to help them solve any additional problems that may arise but which were not covered as part of the standard the course. In addition, at the end of the day, each participant walks away with something of real, practical use for their job role. Many previous participants have remarked that they obtained the most value from the course during the third day because otherwise, they wouldn't be able to do what they need to do. This is an introductory course and although it does not assume any prior experience with Power BI®, participants will gain much more from the course if they have at least used Power BI® a little prior to attending. Participants who have taught themselves Power BI® will also benefit from attending as the course will fill-in a number of gaps in their knowledge and will also extend what they know. A general understanding of databases, Excel formulas, and Excel Pivot Tables is useful though not essential. Comprehensive course notes, exercises and completed solutions are included. Microsoft® PowerBI® is a trademark of Microsoft Corporation in the United States and/or other countries. Training Objectives Upon completion of this training course, participants will be able to: Confidently use the Power BI® solution, including Power BI® Desktop, PowerBI®.com and the Power BI® Gateway Extract data from a variety of data sources and manipulate the data extracted so it is ready for analysis Combine data sources together and gain an introductory understanding of the M language Write formulas using the DAX language for generating custom columns, measures and tables Design reports and dashboards using a wide range of both built-in and custom visuals Publish reports and dashboards to PowerBI®.com Share reports and dashboards with others using PowerBI®.com Customize reports and dashboards so that different user groups automatically see their own personalized views Target Audience This training course is intended for: Financial Analysts Accountants Budgeting and planning specialists Treasury Risk Managers Strategic Planners This is an introductory course and although it does not assume any prior experience with Power BI®, participants will gain much more from the course if they have at least used Power BI® a little prior to attending. Participants who have taught themselves Power BI® will also benefit from attending as the course will fill-in a number of gaps in their knowledge and will also extend what they know. A general understanding of databases, Excel formulas, and Excel Pivot Tables is useful though not essential. Comprehensive course notes, exercises and completed solutions are included. Course Level Basic or Foundation Trainer Your expert course leader has a Masters (Applied Finance & Investment), B.Comm (Accounting & Information Systems), CISA, FAIM, F Fin and is a Microsoft Certified Excel Expert. He has over 20 years' experience in financial modelling, forecasting, valuation, model auditing, and management reporting for clients throughout the world. He is skilled in the development and maintenance of analytical tools and financial models for middle-market companies to large corporates, at all levels of complexity, in both domestic and international settings. He has trained delegates from a wide variety of Oil & Gas companies including Chevron, Woodside, BHP Billiton, Petronas, Carigali, Shell, Nippon, Eni, Pertamina, Inpex, and many more. He provides training in financial modelling for companies throughout the Asia, Oceania, Middle East and African regions. Before his current role, he spent 6 years working in the Corporate and IT Consulting divisions of a large, multinational Chartered Accounting firm. He is the author of a number of white papers on financial modelling on subjects such as Financial Modelling Best Practices and Financial Model Auditing. Highlights from his oil and gas experience include: Development of economic models to assist Decision Analysts modelling for a wide range of scenarios for multinational oil & gas assets. Auditing and further development of life of project models for Chevron's Strategic Planning Division analysing their North West Shelf assets. Development of business plan and budgeting models for multinational oil & gas assets. Development of cash flow and taxation models for a variety of oil gas companies. Consulting on Sarbanes Oxley spreadsheet remediation and risk assessment. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
About this training Carbon Capture and Storage (CCS) is an upcoming new technology that has a vital place within global efforts to decarbonise. It has a unique set of challenges, opportunities and risks to be understood and accommodated within appropriate legal, regulatory, and social and public license frameworks. The course has a strong international and global south emphasis with case studies on CCS projects and will touch on the role of CCS in developing country energy transition. The course satisfies a part of the market that is not currently catered for - the wider science, risks, financing, regulation, planning and social license aspects of CCS. These are issues that are as important as the technical issues in the sense that any of them can be a show-stopper for CCS. Training Objectives Upon completion of this course, participants will be able to: Place CCS within the context of the global geological carbon cycle and the contribution to could make to carbon abatement Explore the basic engineering and other challenges and solutions of CO2 transport and capture Recognize the geological challenges and solutions of CO2 storage Learn the methods of geological and environmental monitoring of CCS sites and why monitoring is important Understand the policy and finance challenges and solutions of CCS projects Know the importance of social license to operate and how to gain a social license to operate Target Audience This course will cater for in-company legal specialists, finance, project managers, marketing and communications specialists; as well as geologists, planners and environmental scientists in regulatory or government roles in regions considering the development of CCS. The course will provide up to date and relevant information to help in understanding opportunities and in managing risk. Geoscientists Government energy regulators and policy makers Financiers and investors Government natural resource and planning department Environmental scientists Finance professionals Marketing and communication professionals Legal specialists Project managers Course Level Basic or Foundation Trainer Your expert course leader is one of the most influential figures in British geoscience. He has 25 years' experience in geological, energy, and palaeontological science and research, including 8 years national level science leadership as the UK's chief geologist (Executive Chief Scientist and Director of Science and Technology of the British Geological Survey). He has been providing geoscience advice to Government for almost 15 years and has an excellent overview of Government policy, industrial activity and funding landscape in applied and energy geoscience, including CCUS and shale gas. He is a well-known communicator of science and has published three single-author popular science books (one award-winning), including the best introductory book on CCS 'Returning Carbon to Nature' Elsevier 2013. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
Certified Associate in Project Management (CAPM)® Exam Prep: Virtual In-House Training This course gives you the knowledge you need to pass the exam and covers CAPM®-critical information on project management theory, principles, techniques, and methods Are you planning on taking the CAPM® examination? This course gives you the knowledge you need to pass the exam and covers CAPM®-critical information on project management theory, principles, techniques, and methods. You'll also have an opportunity for practical applications and time to review the kinds of questions you'll find in the CAPM® Exam. What you Will Learn Apply for the CAPM® Examination Develop a personal exam preparation plan Describe the structure, intent, and framework principles of the current edition of the PMBOK® Guide Explain the PMBOK® Guide Knowledge Areas, as well as their inter-relationships with the each other and the Process Groups Getting Started Program orientation The CAPM® certification process Certified Associate in Project Management (CAPM®) Examination Content Outline CAPM® eligibility requirements Code of Ethics and Professional Conduct Application options Foundation Concepts Skills and qualities of a project manager Project management terminology and definitions Relationship of project, program, portfolio, and operations management Project lifecycle approaches Project Integration Management Review Project Integration Management Knowledge Area Develop Project Charter Develop Project Management Plan Direct and Manage Project Work Manage Project Knowledge Monitoring and Controlling Perform Integrated Change Control Close Project or Phase Project Stakeholder Management Review Project Stakeholder Management Knowledge Area Identify Stakeholders Plan Stakeholder Engagement Manage Stakeholder Engagement Monitor Stakeholder Engagement Project Scope Management Review Project Scope Management Knowledge Area Plan Scope Management Collect Requirements Define Scope Create WBS Validate Scope Control Scope Project Schedule Management Review Project Schedule Management Knowledge Area Plan Schedule Management Define Activities Sequence Activities Estimate Activity Durations Develop Schedule Control Schedule Project Cost Management Review Project Cost Management Knowledge Area Plan Cost Management Estimate Costs Determine Budget Control Schedule Project Resource Management Review Project Resource Management Knowledge Area Plan Resource Management Estimate Activity Resources Acquire Resources Develop Team Manage Team Control Resources Project Quality Management Review Project Quality Management Knowledge Area Plan Quality Management Manage Quality Control Quality Project Risk Management Review Project Risk Management Knowledge Area Plan Risk Management Identify Risks Perform Qualitative Risk Analysis Perform Quantitative Risk Analysis Plan Risk Responses Implement Risk Responses Monitor Risks Project Communications Management Review Project Communications Management Knowledge Area Plan Communications Management Manage Communications Monitor Communications Project Procurement Management Review Project Procurement Management Knowledge Area Plan Procurement Management Conduct Procurements Control Procurements Summary and Next Steps Program Review Mock CAPM® Exam Getting Prepared for the CAPM® Exam After the CAPM® Exam
ZigBee training course description A hands on course covering the entire ZigBee protocol stack. ZigBee operation, primitives and frame formats are covered in detail using software tools to test and analyse ZigBee commands and demonstrate how these affect the 802.15.4 MAC. Analysers are used to decode packet formats. What will you learn Describe the ZigBee architecture and applications. Explain the workings of ZigBee protocol stack including the 802.15.4, NWK, APS and ZDO sub layers. Describe in detail the ZigBee primitives and how they are used to pass data; make networks; join networks and repair networks. Secure ZigBee networks. ZigBee training course details Who will benefit: Technical staff requiring grounding in ZigBee including application engineers. Prerequisites: RF fundamentals. Duration 2 days ZigBee training course contents Wireless data overview What is 802.15.4 and ZigBee? WLAN, WPAN, Bluetooth vs. ZigBee. Markets. Applications and architecture. ZigBee demonstration. ZigBee Standards and technology The 7-layer model, IEEE WPAN standards overview, 802.15.4 & ZigBee, ZigBee alliance. ZigBee Protocol stack The ZigBee 5 layer model, The network (NWK) sub layer, Application support sub layer (APS), the ZigBee Device Object (ZDO). 802.15.4 Radio Frequencies, modulation, power, DSSS, BPSK/ O-QPSK, channels, symbols, chips and bit rate. 802.15.4 PHY PHY data transfer primitives. The PHY packet. PHY PIB management. 802.15.4 MAC layer The MAC layer overview, CSMA/CA, addresses, frame types, super frames, MAC layer: Data, Data control, Scan and join, PAN maintenance, MAC PIB. Hands on 802.15.4 frame analysis. ZigBee Topologies Point to point topology, star topology, cluster tree, wired integration. Hands on Building a ZigBee network. ZigBee frame formats General frame format, data frames, command frames. Hands on Analysing ZigBee frames. ZigBee NWK NWK data primitives: Request. Confirm. Indication. NWK management primitives: Network discovery, network formation. Permit joining. Start router. Join. Direct join. Leave. Reset. Sync. NWK database management. Hands on NWK analysis ZigBee APS Address mapping, matching devices, binding devices, binding tables. Hands on APS analysis. ZigBee ZDO Device roles, binding requests, initiating and responding, device discovery, service discovery, network management. ZDO Endpoint 0. ZigBee Security Security issues, security modes, MAC security, NWK security, APS security. Applications Writing ZigBee applications, application profiles, End points, Endpoint addressing, clusters of attributes, broadcasts. Hands on Sample ZigBee application.
Peer mediation is an approach to impacting on conflict resolution and bullying in primary and secondary schools by training pupils to be mediators or ‘counsellors’. This well proven, highly effective method of impacting on school based bullying is still viewed by some as radical. In this workshop participants are introduced to the key components of successful schemes. Our trainers have first hand experience of setting up school based schemes and sustaining these over time. Peer Mediation Training Guide Online Course now available via Teachable Platform – Peer Mediation Learn at your own pace… lots of text and video support Course Category Peer Support Description Peer mediation or peer counselling is an approach to impacting on bullying in primary and secondary schools by training pupils to be ‘Peer Mediators’ or ‘counsellors’. This well proven, highly effective method of impacting on school based bullying is still viewed by some as radical. We can provide training for staff or direct training with students across the age range – typically delivered over 6 short high impact, interactive learning workshops. For staff training, participants are introduced to the key components of successful schemes. Our trainers have first hand experience of setting up school based schemes and sustaining these over time. Enjoy participating in a multi media workshop that will challenge, entertain and reach for your emotions. Watch young people doing their stuff! Testimonials Thank you for the course – I really enjoyed it Learning Objectives To be able to understand the values and wider context of peer support To be able to set up and run a peer counselling scheme to reduce bullying To understand and be able to maximise the power of the peer group in supporting relationships, achievement and behaviour change Who Is It For ? Year 5 or Year 10 pupils Primary and secondary teachers Heads and Deputies SENCOs Learning Support and Guidance staff Advanced Skills Teachers Parents Local Authority Support Services Community Development workers Early Years and School based Practitioners Course Content The course answers the questions : What do you do with major bullying problems in school? Practically how do we go about recruiting and training pupils as counsellors? Will pupils be hurt if we involve them with bullies? Key Themes covered within the direct student training as well as in the staff development sessions- include: Issues of Confidentiality Welcoming your ‘client’ Using active listening skills Using Open and Closed Questions to enable your client to tell you his or her story How to reflect back feelings and how to check you have understood what the client has told you Exploring options for resolving the bullying issue with your client This video gives a brief taster of the work in a Nottingham Primary school. If you liked this course you may well like: PEER SUPPORT AS AN ANTI-BULLYING STRATEGY AT LOCAL AUTHORITY LEVEL
Linux training course description A Linux foundation appropriate for all flavours of Linux, focussed on getting network engineers up and running with Linux. The command line is used throughout. The course progresses from the basics of Linux commands onto useful tools such as grep, then shell features such as piping and then onto shell scripting. Administration aspects covered are the tasks network engineers are most likely to encounter such as software installation. Hands on exercises concentrate on network related tasks such as installing net-snmp and using shell scripts to provide network automation. What will you learn Use Linux commands to perform a variety of tasks from manipulating files to handling processes. Create and edit files with vi. Work with permissions. Write simple shell scripts. Install software packages. Configure base networking. Linux training course details Who will benefit: Network engineers. Prerequisites: TCP/IP Foundation Duration 5 days Linux training course contents What is Linux? Linux distributions, open source software. Getting started Logging in, changing passwords, logging out. Hands on Basics and root access. Linux basics Command structure. The Linux manuals, basic commands (who, date, tty, uname, echo, banner...). Hands on Using the CLI. Connecting to a network IP configuration, DHCP, static addressing, routing, ifconfig, ping, netstat, traceroute, dig. Hands on Network configuration and testing. Managing Software Package Concepts, Comparison of package formats, RPM, rpm Commands, Yum, Debian Packages, dpkg, apt-cache, apt-get, dselect, aptitude, Converting Between Package Formats, Dependencies and Conflicts, Startup Script Problems, Shared Libraries, Library Management Hands on Installing network packages such as nmap and net-snmp. Processes and log files ps, kill, background processes, at, exec, priorities. Managing Linux log files. Syslogd. Setting the time. Cron and cronjobs. Managing Processes, the Kernel: The First Process. Hands on Controlling daemons and services. Setting up a TFTP server. Filesystem commands Home directories, manipulating files and directories, Filesystem layout, Pathnames, hard and symbolic links. Viewing files. Hands on Exploring the filesystem, working with network device configuration files. The Linux editors ed, vi, shell escapes, .exrc. Hands on Editing network device configuration files. Extracting data from files grep, find, cut, sort and paste⦠Hands on Working with syslog files. Permissions Theory, chmod, chown, newgrp. Hands on Handling permission problems. The shell Metacharacters, piping and redirection. Hands on Running SNMP commands and working with their output. Basic shell scripting What are shell scripts? Simple scripts, control structures. Variable. Setting variables, using variables, set, scope, export, sourcing, environmental variables, read. Positional parameters: $0 to $9, $#, $* and others. shift parameter substitution. Control statements: The test command, if , while loops, for loops, the case statement. Hands on Automating network tasks. Customising your environment Environmental variables, stty, .profile and other startup files. Hands on Customising Linux. Introduction to administration The root user, su. Managing users and groups. Hands on The power of root. Archiving files Backups, tar, cpio, dd, gzip. Hands on Working with tar files. Booting Linux and Editing Files Installing Boot Loaders, GRUB Legacy, GRUB 2, Alternative Boot Loaders, the Boot Process, Boot Messages, Runlevels and the Initialization Process, Runlevel Functions, Runlevel Services, Alternative Boot Systems , Upstart, system. Hands on Installing network services on Linux.
LINX 3 training course description A detailed study of BGP, from the basics of how it works through to advanced issues such as route reflectors, policy, filtering, route selection and routing registries. The course culminates with a study of an industrial strength BGP template illustrating important issues such as bogon filtering. Practical hands on with routers follow the major sessions to reinforce the theory. A multiple choice exam, leading to the LAIT III certification, is available after the course. The exam consists of 60 questions and lasts 2 hours. What will you learn Connect enterprises to the Internet, and ISPs to each other. Describe how BGP works. List, describe and configure the main BGP attributes. Implement and troubleshoot BGP. Work with route aggregation and calculate CIDR prefixes in seconds. Influence traffic paths with BGP. LINX 3 training course details Who will benefit: Network engineers. Prerequisites: LAIT I and II OR CCNP and take LAIT I and LAIT II exams whilst on this course. Duration 5 days LINX 3 training course contents Basic BGP IGPs, EGPs, What's BGP? BGP RIB, in/out process, tables peers, adding routes. Hands on Simple configuration and troubleshooting. The Internet and peering ASs, AS numbers, Internet structure, ISP types, ISP network design, IXs, peering vs. transit, public/ private peering, bi/multi-lateral peering. Hands on AS information gathering. How BGP works Incremental updates, Path vector protocols, BGP protocol stack, the BGP header, message types, NLRI, withdrawn routes, route refresh, route dampening. Hands on More troubleshooting, packet analysis. MBGP and IPv6 Multiprotocol routing, AFI, SAFI, MBGP and multicasts, IPv6, MPLS VPNs. Hands on IPv6 BGPv4 aggregation CIDR, benefits, techniques, shortcuts, configuring BGP aggregation, leaking routes. Hands on Reducing routing table size. BGP path selection BGP attributes, attribute types, route selection order, Local preference, AS prepend, MEDs. Hands on Influencing traffic with BGP. BGP routing policies What is policy? Examples, route filtering, AS filtering, REs, applying preference selectively, peer groups. Hands on Sophisticated policies. RIPE and routing registries RIRs, Allocations, assignments, PI vs. PA. Objects, RPSL, routing registry, Hands on The RIPE database. Automating BGP configuration Automation tools, whois, IRRToolSet, Bogon lists, tracking bogon lists, HTTP, Peering, routing registries, DNS. Communities What is a community? Community names, communities for: peer types and geography. RFC 1998, default communities. Hands on Setting local preference on other routers. Route servers What are route servers? LINX route servers, route server policy control, What are route collectors, Looking glasses. Hands on Setting up and working with a route server. Peer relationships IBGP, EBGP, next hop self, advertising routes into/out of BGP, synchronisation. Hands on IBGP, troubleshooting a large BGP network. Route reflectors and confederations Full mesh IBGP, Route reflectors, RR configuration and design, confederations, migration issues. Hands on RR configuration. BGP architectures Stub vs. transit AS, when to use BGP, multihoming strategies and issues, default routes. Multihop EBGP, load balancing. Hands on Multihoming. BGP security RFC 7454, security steps, BGP TTL security, filters, RPKI, ROAs, rsync, rrdp, validators. A secure BGP template. Hands on RPKI prefix validation.