Supporting Windows 10 course description This course is designed to provide students with the knowledge and skills required to support and troubleshoot Windows 10 PCs and devices in a Windows Server domain environment. These skills include understanding of Windows 10 features, how they can be used in an Active Directory environment and how to troubleshoot them. What will you learn Troubleshoot startup issues and operating system services on a Windows 10 PC. Troubleshoot issues related to network connectivity. Troubleshoot client configuration failures and GPO application issues. Troubleshoot issues related to application installation and operation. Recover a PC running Windows 10. Supporting Windows 10 course details Who will benefit: Anyone supporting users running Windows 10 personal computers within a medium to large enterprise. Prerequisites: None. Duration 5 days Supporting Windows 10 course contents Implementing a Troubleshooting Methodology Overview of Windows 10, Introduction to the EDST Job Role, Overview of the Troubleshooting Steps & Tools. Hands on Implementing a Troubleshooting Methodology. Hands on Using Troubleshooting Tools for Windows 10. Troubleshooting Startup Issues Overview of the Windows 10 Startup Recovery Environment, Troubleshooting Startup Settings & Operating System Services Issues, Recovering BitLocker-Protected Drives. Hands on Troubleshooting Startup Issues. Hands on Recovering BitLocker-Encrypted Drives, Creating a New BitLocker Password. Troubleshooting Hardware and Device Drivers Troubleshooting Device Driver Failures & Physical Failures, Overview of Hardware Troubleshooting, Monitoring Reliability, Configuring the Registry. Hands on Troubleshooting Device Driver Issues, Resolving Hardware Issues, Adding a Missing Device Driver to a Driver Store, Reverting a Problematic Device Driver. Hands on Troubleshooting Hardware Issues, Diagnosing Memory, Troubleshooting and Repairing Failed Disk Redundancy Synchronizing Settings, Accessing Data on a Foreign Volume. Troubleshooting Remote Computers Using Remote Desktop and Remote Assistance, Remoting with Windows PowerShell Hands on Troubleshooting Remote Computer by using Remote Desktop and Remote Assistance. Hands on Troubleshooting Remote Computer by using Windows PowerShell. Resolving Network Connectivity Issues Determining Network Settings, Troubleshooting Network Connectivity Issues, Troubleshooting Name Resolution. Hands on Resolving Network Connectivity Issues. Hands onResolving Name Resolution Issues. Troubleshooting Group Policy Overview of Group Policy Application, Resolving Client Configuration Failures and GPO Application Issues. Hands on Troubleshooting Group Policy Application Issues. Hands on Resolving Group Policy Issues. Hands on Installing and Sharing a Printer. Troubleshooting User Settings Troubleshooting Sign In Issues, Troubleshooting the Application of User Settings. Hands on Troubleshooting Sign in Problems. Hands on Troubleshooting the Application of User Settings, Resolving Folder Redirection Problem, Resolving Roaming User Profile Problem. Troubleshooting Remote Connectivity Troubleshooting VPN Connectivity Issues & DirectAccess. Hands on Troubleshooting VPN Connectivity Lab : Configuring and Troubleshooting DirectAccess Configuring and Verifying, DirectAccess Client-Side Settings, Troubleshooting DirectAccess. Troubleshooting Resource Access Within a Domain & File Permissions Issues, Recovering Files Encrypted by EFS, Troubleshooting Printer Access Issues. Lab : Troubleshooting File Access Issues Lab : Troubleshooting Access to Encrypted Files. Hands on Troubleshooting Printer Access Issues Troubleshooting Resource Access for Non Domain Member Clients Configuring and Troubleshooting Device Registration, Configuring and Troubleshooting Work Folders, Configuring and Troubleshooting OneDrive Access. Hands on Troubleshooting Resource Access for Clients that are not Domain Members. Troubleshooting Device Registration, Work Folders and OneDrive for Business. Troubleshooting Applications Troubleshooting Desktop App Installation Issues, Desktop Apps, Managing Windows Store Apps, Troubleshooting Access to Company Web Applications. Hands on Troubleshooting Desktop Apps, AppLocker Policy Application & Application Compatibility issue. Hands on Troubleshooting Access to Company Web Applications, Internet Explorer Issue & Microsoft Edge. Maintaining Windows 10 Managing & Troubleshooting Windows Activation, Troubleshooting Performance, Applying Applications. Hands on Monitoring and Troubleshooting Performance. Recovering Data and Operating System File Recovery in Windows 10, Recovering an OS. Hands on Recovering Data, Recovering Data from Azure Backup, Recovering Deleted File by Using File History. Hands on Provisioning Computer to Comply with Company Standards, Provision Computer to Comply with Company Standards.
Course Introduction Covers B12 deficiency, pernicious anaemia, diagnosis, treatment and management. It also covers signs and symptoms. This course does cover how to set up your own service. Please note: this course is for health care professionals or those working in Primary Care. It is not open to Beauticians unless you are a registered healthcare professional. If in doubt- please email annie at training@anniebarr.com or phone +44 7500048222 About this event Course Introduction This course concentrates on B12 deficiency, symptoms, treatments and management. The course covers B12 deficiency, pernicious anaemia, diagnosis, treatment and management. It also covers signs and symptoms of pernicious anaemia. This course is interactive and we include case studies and discuss issues regarding diagnostic testing. We review inclusion and exclusion criteria and identification of appropriate clients. Delegates will get the opportunity to review practice with hands on practical demonstrations of how to give injections correctly. We will cover administration techniques, where to give the injections and record keeping / documentation. We will discuss role and responsibilities and contraindications and precautions. The delegates will leave this course with an example of an individual protocol of Patient Specific Direction (PSD) and a competence based framework document to be used in practice. This course is very interactive. AIMS AND OBJECTIVES Understand the need for accountability and responsibility in relation to role development Demonstrate an understanding of safe practice Describe the signs and symptoms of pernicious anaemia Describe pernicious anaemia and its impact on patients Fully understand the principles, and practice B12 deficiency and B12 injections Understand the importance of safety issues related to giving injections Understand the law relating to role and function of the HCA and prescribing. Describe why patients require B12 injectionsBe able to correctly identify anatomical sites for injectionsDemonstrate correct administration techniquesDemonstrate how to correctly dispose of wasteDemonstrate correct infection control procedures and use of PPEDescribe when patients require referral and understand the importance of referral using correct clinical pathwaysDemonstrate an understanding of anaphylaxis and emergency proceduresUnderstand the need for correct prescribing proceduresBe able to document consultations following your organisations procedures COURSE CONTENTS Role and responsibilities Accountability guidelines and requirements Pernicious anaemia Blood- function B12 Deficiency Risk factors/groups Causes of B12 deficiency Diagnosis and reference ranges, testing Protocols and guidelines Factors affecting B12 diagnosis and treatment Factors affecting absorption B12 injections and common side effects Could it be B12 Deficiency Supplements Side effects and management including ADR’s Contraindications and Precautions Correct Administration and techniques including practical session Injection sites Legal Issues including consent Prescribing and Patient Specific Directions What to record Storage Disposal of injections/waste Infection control Needle stick injuries Competence and supervised practice Policies and procedures Facts and Figures Setting up and running a clinic Insurance/indemnity Research/evidence base and resources Please note Anaphylaxis is not covered on this course, however we do run a separate Anaphylaxis 1hr training course, which takes place at the end of this B12 webinar. If you wish to do the 1 hr Anaphylaxis also, you should book onto BOTH courses. WHO SHOULD ATTEND? HCAs Nurses Doctors Pharmacists Anyone interested in Vitamin B12 deficiency and pernicious anaemia and those working with clients with B12 deficiency AB Health Group awards CPD points / certificate of attendance for each course. If you would prefer an accredited certificate by our accrediting body Aim Qualifications we can organise this. The charge for the certificate including postage is £30.
Course Objectives At the end of this course you will be able to: Identify and work with basic Word 2013 tools and features Edit text in a Word document Modify the appearance of text in a Word document Organise data in tables and lists Insert special characters and graphical objects Control the appearance of pages in a Word document Proof a document Customise the Word environment '1 year email support service Take a look at the consistent excellent feedback from our corporate clients visiting our site ms-officetraining co uk Customer Feedback Good pace, questions encoraged, trainer ensured everyone was kept at same level. Jenny Price - ACER ' With more than 20 years experience, we deliver courses on all levels of the Desktop version of Microsoft Office and Office 365; ranging from Beginner, Intermediate, Advanced to the VBA level. Our trainers are Microsoft certified professionals with a proven track record with several years experience in delivering public, one to one, tailored and bespoke courses. Tailored in company training courses: You can choose to run the course exactly as they are outlined by us or we can customise it so that it meets your specific needs. A tailored or bespoke course will follow the standard outline but may be adapted to your specific organisational needs. Getting Started with Word Identify the Components of the Word Interface Create a Word Document Help Editing a Document Navigate and Select Text Modify Text Find and Replace Text Formatting Text and Paragraphs Apply Character Formatting Align Text Using Tabs Display Text as List Items Control Paragraph Layout Apply Borders and Shading Apply Styles Manage Formatting Adding Tables Insert a Table Modify a Table Format a Table Convert Text to a Table Managing Lists Sort a List Renumber a List Customise a List Inserting Graphic Objects Insert Symbols and Special Characters Add Images to a Document Page Setup Apply a Page Border and Color Add a Watermark Add Headers and Footers Control Page Layout Proofing a Document Check Spelling and Grammar Other Proofing Tools Check Accessibility Customising the Word Environment Customise the Word Interface Additional Save Options Who is this course for? Who is this course for? This course is intended for delegates who want to learn the fundamentals skills of working with Microsoft Word Requirements Requirements General knowledge of the Windows OS Career path Career path Microsoft Office know-how can instantly increase your job prospects as well as your salary. 80 percent of job openings require spreadsheet and word-processing software skills
RESILIA™ Foundation: In-House Training AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect, and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process, and technology. The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions, and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities. What you will Learn At the end of this course, you will be able to: Demonstrate your knowledge of the purpose, benefits, and key terms of cyber resilience Demonstrate your knowledge of the risk management and the key activities needed to address risks and opportunities Demonstrate your knowledge of the purpose of a management system and how best practices and standards can contribute Demonstrate your knowledge of the cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience design, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience transition, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience operation, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of the purpose and benefits of segregation of duties and dual controls Course Introduction Course Learning Objectives Course Agenda Activities Course Book Structure RESILIA Certification Introduction to Cyber Resilience What is Cyber Resilience? Defining Cyber Resilience Balancing in Cyber Resilience Characteristics of Cyber Resilience Risk Management Understanding Risk Management: Discussion Defining Risk Management Addressing Risks and Opportunities Managing Cyber Resilience Why and What of Management Systems? Management Systems Common Management Standards and Frameworks Cyber Resilience Strategy What is Strategy? Cyber Resilience Strategy and Activities Security Controls at Cyber Resilience Strategy Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Design Why Cyber Resilience Design? Cyber Resilience Design Activities Security Controls at Cyber Resilience Design Aligning ITSM Processes with Cyber Resilience Processes Cyber Resilience Transition Why Cyber Resilience Transition? Basics of Cyber Resilience Transition Cyber Resilience Transition: Controls Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Operation The Purpose of Cyber Resilience Operation Security Controls in Cyber Resilience Operation Interaction Between IT Processes and Cyber Resilience Interaction Between ITSM Functions and Cyber Resilience Cyber Resilience Continual Improvement Continual or Continuous Improvement Maturity Models Continual Improvement Controls The Seven-Step Improvement Process The ITIL CSI Approach Cyber Resilience Roles & Responsibilities Segregating Duties Dual Controls
Certificate in Intellectual Property (CIP) Why Attend As international trade and business continues to evolve, the importance of Intellectual Property Rights (IPRs) becomes increasingly vital. With new technologies and products relying heavily on IPRs, governments around the world are competing to offer higher levels of protection in order to attract investments and promote local innovation and production. Due to the complex nature of the scientific, economic, social, and theoretical aspects of IPRs, it is crucial for entities to have a comprehensive understanding of these issues. During this course, through practical workshops, case studies and expert knowledge, participants will gain an understanding of the concepts, theories, legislative and practical elements necessary to develop a successful IP strategy for their organization. Course Methodology In this interactive training course participants will frequently work in pairs as well as in larger groups to complete exercises, and regional and international case studies Course Objectives By the end of the course, participants will be able to: Understand the theoretical background of Intellectual Property (IP) and the various types of IP existence Understand the international and local set of conventions and laws governing IPRs Demonstrate deep knowledge of the conditions that should exist in each type of IPR, their registration, licensing and enforcement Apply knowledge of IPRs in all legal fields including contracts and litigation Participate effectively in building a comprehensive IP strategy for their organization Target Audience This course is suitable for professionals working in the legal and IP filed, including but not limited to; lawyers, in-house counsels, governmental officials, police, customs, health authorities, researchers, university lecturers, publishers, IP agents as well as researchers who are interested in having deeper knowledge about IP in the GCC. It will also highly benefit in-house councils who recently joined their companies in the GCC as it will give them all the knowledge needed to handle all IP issues within the region. Target Competencies General principles of IPRs Trademarks, Patents, Copyright Principles of IP Enforcement Building IP Strategy Note The Dubai Government Legal Affairs Department has introduced a Continuing Legal Professional Development (CLPD) programme to legal consultants authorised to practise through a licensed firm in the Emirate of Dubai. We are proud to announce that the Dubai Government Legal Affairs Department has accredited EMG Associates as a CLPD provider. In addition, all our legal programmes have been approved. This PLUS Specialty Training Legal course qualifies for 4 elective CLPD points. Introduction and basic concepts Types of IPRs Main theories justifying IP protection The role of IP in economic development The Role of IP in innovation and creativity The globalization of IPRs protection International conventions Trade-Related Aspects of Intellectual Property Rights (TRIPS) and the World Trade Organization The GCC Cooperation in the field of IP protection Trademarks and copyright Definition and types of marks Scope of trade marks protection Registration procedures and rights conferred to trade mark owner Legal protection of trade marks Subject matter and conditions of copyright Types of protected works Financial and moral rights Fair use, duration of protection and legal protection for copyright Patents and trade secrets Patentable inventions and types of patents Registration process Ownership and rights conferred to patent owner Employer-employee inventions and legal protection for patents Definition of trade secrets and confidential information Elements of trade secrets Utilization of trade secrets commercially Legal protection of trade secrets Building a strong IP strategy and strategic management of IPRs Overview and basic concepts Understand your business and your IP needs IP audit and building the portfolio Onward licensing (licensing process and contracts) IP commercialization mechanisms and maximizing the benefits Practical steps to building a successful IP strategy IP valuation - your gateway to know how much your IP worth Assessment of the IP strategy for further success
About this Training Course This course aims to help geologists, geophysicists, stratigraphers and reservoir engineers gain a thorough understanding of the concepts and practical applications of sequence stratigraphy through integration of seismic sequence stratigraphy with well log sequence stratigraphy and the application of biostratigraphy to sequence stratigraphy. The course examines the geological principles, processes and terminology related to the interpretation and use of seismic sequence stratigraphy and its integration with well log sequence stratigraphy and biostratigraphy. Concepts are illustrated with field examples of seismic, well-log, core, and outcrop data and reinforced with practical exercises using real data. Course Content in Summary: Introduction to concepts, eustatic controls, seismic stratigraphy and definition of key terms. Controls - eustatic and basinal controls, accommodation and equilibrium types, systems tracts and systems tract boundaries. Sequences and systems tracts - highstand, falling stage, lowstand, transgressive and shelf margin systems tracts. Key surfaces and their identification from well logs, core, outcrop and seismic reflections. Sequence expression in well logs - log characters of parasequences, maximum flooding surfaces and criteria for picking sequence boundaries. Interpretation of systems tracts from well logs - integration of well log sequence stratigraphy with seismic sequence stratigraphy. Seismic expression of sequences - Interpretation of seismic reflections in depositional sequences - seismic sequence; seismic facies. Clastic and carbonate depositional environments - depositional responses to changes in relative sea level. Mixed systems and evaporites. Variations on the model. A review of application and exploration significance. Training Objectives By the end of this course, participants will be able to: Gain an understanding of sequence stratigraphic controls and concepts. Recognise sequence stratigraphic surfaces, systems tracts and stratigraphic sequences on well-log cross-sections, seismic lines, and outcrop profiles and depositional facies. Construct a sequence stratigraphic model by integrating lithological, biostratigraphical, seismic and well data. Apply sequence stratigraphy effectively for facies predictions in exploration and production. Target Audience This course will benefit explorationists, geologists, stratigraphers and geophysicists who wish to extend their knowledge through integration of seismic sequence stratigraphy with well log sequence stratigraphy. Trainer Your expert course leader is the Geosciences Technical Director for PetroEdge. She was previously, the manager of Robertson Petroleum Training Centre and a Senior Project Scientist at Robertson CGG. She has over 20 years of experience in teaching geology and leading field trips. Prior to her 8 years at Robertson, she was in academia as a lecturer for 6 years and a Research Fellow for 3 years. She has conducted fieldwork and led field trips in the US and many areas in the UK. In addition, she has led university regional geology day schools and has comprehensive experience in course and study programme writing. She has extensive experience in delivering courses and in Clastic and Carbonate Reservoir Geology, Deepwater Turbidites, Sandstone Reservoirs, Wireline Log Interpretation, Integrated Sequence Stratigraphy, Basin Analysis and Exploration & Appraisal workshops globally. In delivering the Exploration Team Management Workshop, she has project managed and taught key principles and modules on project planning, data collection/collation, geophysical assessment, stratigraphy and facies mapping, source rock facies and hydrocarbon generation, play fairway mapping, risking and prospect evaluation. Her knowledge and enthusiasm for instructing is reflected in consistently being rated as excellent by trainees, and clients specifically requesting her participation in courses. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
What You'll Learn An introduction to reactive expressions - how they differ from base R functionality and why they are needed within Shiny. Simple reactive expressions - creating dynamic data expressions Reacting to user-initiated actions - how to get your dashboard to adapt dynamically to user inputs Nested reactions - more complex relationships where multiple actions need to bee accounted for About The Trainer Jeremy has been using R since the very first day of his career in 2005, when it was better known as a mere letter of the alphabet! As an early adopter of the language, he’s seen it evolve – from its ugly initial versions to more elegant analytics solutions underpinned by the tidyverse, on which this course is focused. He is a regular speaker on UK R circuit and co-organises a number of R-community groups, including LondonR, ManchesterR & BrightonR, and the infamous EARL conference! About Us Datacove are a data and analytics consultancy specialising in customer analytics, marketing analytics and process automation. With over 20 years of combined experience in the industry we answer the questions that sit at the heart of every business, from who your customers are, to where and how you find more of them and how much you need to spend to do so. We also automate your most painful business processes, removing the 20+ hours you spend on them per week, forever! Extra Information Our courses are delivered during core office hours, ensuring they fit seamlessly into your work schedule. Once your booking is confirmed, we will send you a Microsoft Teams link, allowing you to join the session with ease.
Assuring Quality Through Acceptance Testing: In-House Training It is also the business analyst's responsibility to confirm that the resulting solution developed by IT does, in fact, solve the defined problem. This is done first through testing, especially acceptance testing, and then through monitoring of the installed solution in the user community. It is the business analyst's job to define the business problem to be solved by IT. It is also the business analyst's responsibility to confirm that the resulting solution developed by IT does, in fact, solve the defined problem. This is done first through testing, especially acceptance testing, and then through monitoring of the installed solution in the user community. The business analyst is not only concerned with the testing itself, but also with the management and monitoring of the users doing the acceptance testing, and recording, analyzing, and evaluating the results. What you will Learn Upon completion, participants will be able to: Create a set of acceptance test cases Manage and monitor an acceptance test stage where users perform the testing Work with the development team in the systems testing stage Assess the solution once it is in the business environment Foundation Concepts The role of the business analyst An introduction to the BABOK® Guide BA roles and relationships through the project life cycle Introduction to assuring software quality through acceptance testing The Scope of IT Testing Overview of testing stages The testing process Testing documentation Pre-Acceptance Testing The BA's role in testing Early development testing stages (unit and integration) Late development testing stage (system) The Acceptance Test Stage - Part I (Planning, Design, and Development) Overview of user acceptance testing Acceptance test planning Designing user acceptance tests Developing individual user acceptance test cases Building effective user acceptance test scenarios The Acceptance Test Stage - Part II (Execution and Reporting) Operating guidelines Execution Reporting Post-Acceptance Testing Overview Project implementation Project transition (project closure) Production through retirement Testing Commercial Off-the-Shelf (COTS) Software Overview Selecting the software Implementing the software Summary What did we learn and how can we implement this in our work environments?
WiMax training course description Broadband wireless access is an emerging technology area. This course looks at WiMAX, where it can be used, how it works and the alternative technologies. What will you learn Describe WiMAX. Explain how WiMAX works. Compare and contrast WiMAX with alternative broadband wireless access technologies. WiMax training course details Who will benefit: Anyone wishing to know more about WiMAX. Prerequisites: None. Duration 2 days WiMax training course contents Introduction What is WiMAX? WiMAX applications, The Internet, Internet access choices, wireless broadband access, WiMAX benefits. WiMAX overview Spectrums, LOS vs. non-LOS, bit rates, modulation, mobility, channel bandwidth, cell radius. WiMAX standards The WiMAX forum, IEEE, ETSI, HIPERACCESS, HIPERMAN, 802.16, 802.16-2004, 802.16a, 802.16e, 802.16f. WiMAX architecture Subscriber Stations (SS), Indoors, outdoors, antennas, Radio Base Stations (BS), LOS, Non LOS BackHaul, Point to multipoint, mesh support. Physical layer 10 - 66GHz, TDMA, TDD, FDD, 2 -11 GHz, SC2, OFDM, OFDMA, QPSK, QAM, Radio Link Control (RLC), uplink, downlink. MAC layer Traffic types (continuous, bursty), QoS, service types. MAC operations, connection oriented, frame structure, addressing. Convergence sublayers, service specific, common part, profiles (IP, ATM). Bandwidth request-grant, ARQ, Management messages. Security MAC privacy sublayer, network access authentication, AAA, 802.1x, key exchange and privacy. WiMAX alternatives WiMAX vs. 3G, WiMAX vs. 802.20.
IS-IS training course description A hands on course on IS-IS link state routing protocol. The main focus of the course is the use of IS-IS in an IP only environment but can be tailored to concentrate on the use of IS-IS in CLNP networks. Hands on sessions use Cisco routers. What will you learn Configure and troubleshoot IS-IS. Explain how IS-IS works. Describe the use of Level 1 and Level 2. Design IS-IS networks. IS-IS training course details Who will benefit: Network administrators. Network operators. Prerequisites: TCP/IP Foundation for engineers Duration 2 days IS-IS training course contents Introduction The history of IS-IS, OSI background, terminology, addressing, how OSI networking works, ES-IS, ISIS, IS types, basic OSI configuration, other configuration parameters. Running IS-IS in an IP environment Integrated routing, Dual IS-IS, OSI only IS-IS, IP only IS-IS, packet formats and the use of CLNP, Basic configuration. How IS-IS works in detail Link state theory, tuneable parameters, IS-IS metrics, hellos, CSNP intervals, retransmissions, TLVs, Sub TLVs, Designated routers and pseudo nodes, authentication. Level 1 and level 2 in detail Router types, circuit types, Hot potato routing, route leaking, Area partitioning. Multiple addresses Redistribution and summarisation Tagging and filtering