Who is this course for? The Diploma in Visual Effects for Film and Television Animation is tailored for individuals aspiring to work in the Visual Effects, TV, Film, and 3D animation industry. Gain essential skills necessary for a successful career in these fields. Click here for more info: Website Duration: 120 hours of 1-on-1 Training. When can I book: 9 am - 4 pm (Choose your preferred day and time once a week). Monday to Saturday: 9 am - 7 pm (Flexible timing with advance booking). Course Overview for a 120-Hour Diploma Program in Game Design and Development Term 1: Introduction to Game Design and 3D Modeling (40 hours) Module 1: Introduction to Game Design (1 hour) Understanding the game development industry and current trends Exploring game mechanics and fundamental design principles Introduction to the game engines and tools utilized in the program Module 2: 3D Modeling with 3ds Max (25 hours) Familiarization with 3ds Max and its user interface Mastering basic modeling techniques like box modeling and extrusion Advanced modeling skills including subdivision and topology Texturing and shading techniques tailored for game development Module 3: Character Design and Animation (10 hours) Introduction to character design and its developmental process Creating and rigging characters specifically for games Keyframe animation techniques for character movement Term 2: Game Development and Unity 3D (40 hours) Module 4: Unity 3D Basics (20 hours) Navigating Unity 3D and understanding its interface Grasping fundamental game development concepts within Unity Creating game objects, writing scripts, and designing scenes Introduction to scripting using C# Module 5: Advanced Game Development with Unity 3D (10 hours) Constructing game mechanics including UI, scoring, and game states Working with physics and collision systems in Unity Crafting intricate game environments and level designs Module 6: Game Assets with Photoshop (10 hours) Exploring Photoshop tools and features for game asset creation Crafting game elements such as textures, sprites, and icons Optimizing assets for seamless integration into game development Term 3: Advanced Game Design and Portfolio Development (40 hours) Module 7: Advanced Game Design (20 hours) Delving into advanced game design concepts like balancing and difficulty curves Understanding player psychology and methods for engaging audiences Implementing game analytics and user testing for refinement Module 8: Portfolio Development (24 hours) Building a comprehensive portfolio showcasing acquired skills Effective presentation techniques for showcasing work Establishing a professional online presence and networking strategies Final Project: Creating and presenting a collection of best works in collaboration with tutors and fellow students Please note: Any missed sessions or absence without a 48-hour notice will result in session loss and a full class fee charge due to the personalized one-to-one nature of the sessions. Students can request pauses or extended breaks by providing written notice via email. What can you do after this course: Software Proficiency: Master industry-standard design tools for architectural and interior projects. Design Expertise: Develop a deep understanding of design principles and spatial concepts. Visualization Skills: Acquire advanced 2D/3D rendering and virtual reality skills for realistic design representation. Communication and Collaboration: Enhance communication skills and learn to collaborate effectively in design teams. Problem-Solving: Develop creative problem-solving abilities for real-world design challenges. Jobs and Career Opportunities: Architectural Visualizer Interior Designer CAD Technician Virtual Reality Developer 3D Modeler Project Coordinator Freelance Designer Visualization Consultant Students can pursue these roles, applying their expertise in architectural and interior design across various professional opportunities. Course Expectations: Maintain a dedicated notebook to compile your study notes. Schedule makeup sessions for any missed coursework, subject to available time slots. Keep meticulous notes and maintain a design folder to track your progress and nurture creative ideas. Allocate specific time for independent practice and project work. Attain certification from the esteemed professional design team. Post-Course Proficiencies: Upon successful course completion, you will achieve the following: Develop confidence in your software proficiency and a solid grasp of underlying principles. Demonstrate the ability to produce top-tier visuals for architectural and interior design projects. Feel well-prepared to pursue positions, armed with the assurance of your software expertise. Continued Support: We are pleased to offer lifetime, complimentary email and phone support to promptly assist you with any inquiries or challenges that may arise. Software Accessibility: Access to the required software is available through either downloading it from the developer's website or acquiring it at favorable student rates. It is important to note that student software should be exclusively utilized for non-commercial projects. Payment Options: To accommodate your preferences, we provide a range of payment options, including internet bank transfers, credit cards, debit cards, and PayPal. Moreover, we offer installment plans tailored to the needs of our students. Course Type: Certification. Course Level: Basic to Advanced. Time: 09:00 or 4 pm (You can choose your own day and time once a week) (Monday to Friday, 09 am to 7 pm, you can choose anytime by advance booking. Weekends can only be 3 to 4 hrs due to heavy demand on those days). Tutor: Industry Experts. Total Hours: 120 Price for Companies: £3500.00 (With VAT = £4200) For Companies. Price for Students: £3000.00 (With VAT = £3600) For Students.
As a qualified homeopath of 5yrs, I've put together a brilliant offer for newly-qualified homeopaths who know all about remedies but almost nothing about running a successful, busy homeopathy practice. Very limited spaces, and the last time it will be this cheap before prices go up. You'll get a mix of group learning and direct access to me (learning from my mistakes so you don't have to waste time and money on making the same!).
The CIPT is the first and only certification of its kind worldwide. It was launched by the IAPP in 2014 and updated in early 2023 to meet the growing need that only tech pros can fill-securing data privacy at all stages of IT product and service lifecycles. Whether you work in the public or private sector, data privacy skills are quickly becoming a must-have-and that's a great opportunity for you. The CIPT certification also holds accreditation under ISO 17024: 2012 About This Course What will you learn? Critical data protection concepts and practices that impact IT Consumer data protection expectations and responsibility How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market How to establish data protection practices for data collection and transfer How to pre-empt data protection issues in the Internet of Things How to factor data protection into data classification and emerging tech such as cloud computing, facial recognition and surveillance How to communicate data protection issues with partners such as management, development, marketing and legal. This course has two programmatic modules, the first four areas focus on the fundamentals of data protection. The second module takes the fundamentals and puts it into practice. MODULE 1: Fundamentals of Information Privacy Unit 1: Common Principles and Approaches to Privacy This unit includes a brief discussion of the modern history of privacy, an introduction to types of information, an overview of information risk management and a summary of modern privacy principles. Unit 2: Jurisdiction and Industries This unit introduces the major privacy models employed around the globe and provides an overview of privacy and data protection regulation by jurisdictions and industry sectors. Unit 3: Information Security: Safeguarding Personal Information This unit presents introductions to information security, including definitions, elements, standards and threats/vulnerabilities, as well as introductions to information security management and governance, including frameworks, controls, cryptography and identity and access management (IAM). Unit 4: Online Privacy: Using Personal Information on Websites and with Other Internet-related Technologies This unit examines the web as a platform, as well as privacy considerations for sensitive online information, including policies and notices, access, security, authentication and data collection. Additional topics include children's online privacy, email, searches, online marketing and advertising, social media, online assurance, cloud computing and mobile devices. MODULE 2: Privacy in Technology Unit 1: Understanding the Need for Privacy in the IT Environment This unit highlights the impact that regulatory activities, security threats, advances in technology and the increasing proliferation of social networks have on IT departments. Unit 2: Core Privacy Concepts This unit reveals how privacy compliance becomes more attainable through developing information lifecycle plans, data identification and classification systems and data flow diagrams. Unit 3: Regulations and Standards Impacting Privacy in IT This unit introduces privacy laws, regulations and standards that can help IT professionals design better privacy programmes and systems to handle personal information throughout the data lifecycle. Unit 4: Privacy in Systems and Applications This unit develops an understanding of the risks inherent in the IT environment and how to address them. Unit 5: Online Privacy Issues This unit presents information about online threats, threat prevention and the role of IT professionals in ensuring proper handling of user data. Unit 6: De-identifying and Anonymizing Personally Identifiable Information This unit reveals the importance of personally identifiable information and methods for ensuring its protection. Unit 7: Cloud Computing This unit evaluates privacy and security concerns associated with cloud services, and standards that exist to advise on their use. Prerequisites There are no prerequisites for this course but attendees would benefit from a review of the materials on the IAPP site. What's Included? 1 years membership of the IAPP Refreshments & Lunch (Classroom courses only) Participant Guide Official Study Guides Official Practice Exam Official Q&A The Exam Fees Who Should Attend? The CIPT credential shows you've got the knowledge to build your organisation's data protection structures from the ground up. With regulators worldwide calling for tech professionals to factor data protection into their products and services, the job market for privacy-trained IT pros has never been stronger. As a result, the CIPT is targeted towards; Data Protection Officers IT Managers and Administrators Records Managers System Developers IT Security specialists Accreditation Our Guarantee We are an approved IAPP Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with a minimum of 25 years commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras. The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training offered for retakes - come back within a year and only pay for the exam.
This workshop gives an opportunity to focus on the emotional needs of girls and how to meet these. We lift the lid on a less well explored inclusion issue, meeting the emotional needs of girls. Everyone knows a girl or woman. They may be pupil, daughter, sister, parent or partner. Course Category Meeting emotional needs Behaviour and Relationships Inclusion Early Years Description This workshop gives an opportunity to focus on the emotional needs of girls and how to meet these. We lift the lid on a less well explored inclusion issue, meeting the emotional needs of girls. Everyone knows a girl or woman. They may be pupil, daughter, sister, parent or partner. Girls will often withdraw, attack or even hurt themselves when under emotional stress and this is not always obvious in the way it is with boys. 1 in 4 women experience domestic violence and every week 2 women are killed by a current or ex partner. Whilst the world assumes girls have no problems processing their emotions, we lift the lid on this and question what is really happening for girls this century? Testimonials Learning Objectives Increased understanding of girls’ emotional needs Access to a wider range of practical strategies to impact on meeting emotional and behaviour problems Deeper understanding of core values surrounding inclusion Opportunity to reflect on professional attitudes and behaviour towards girls and their emotional challenges New skills and processes to make girls’ inclusion and achievement more successful Who Is It For ? Early years and school based practitioners Key workers Teaching Assistants with support roles Heads and deputies SENCOs Advanced skills teachers Primary and secondary classroom teachers Parents Local Authority support services Course Content The course explores the questions : Is there an invisible problem with girls? What can we do to meet the emotional needs of girls? What helps? What should our priority be with girls? This workshop will explore: Cultural and historical expectations of girls in our society Shared experiences of teaching and parenting girls Circle of Courage as a way of understanding emotional needs Fathers, mothers and daughters Solution Circle Problem Solving around girls’ needs What girls really need If you you want something similar, but not gender specific try: FRESH APPROACHES TO BEHAVIOUR AND RELATIONSHIPS or you may like: RESTORATIVE INTERVENTIONS
Business Intelligence: Virtual In-House Training Business Intelligence (BI) refers to a set of technology-based techniques, applications, and practices used to aggregate, analyze, and present business data. BI practices provide historical and current views of vast amounts of data and generate predictions for business operations. The purpose of Business Intelligence is the support of better business decision making. This course provides an overview of the technology and application of BI and how it can be used to improve corporate performance. What you will Learn You will learn how to: Specify a data warehouse schema Identify the data and visualization to be used for data mining and Business Intelligence Design a Business Intelligence user interface Getting Started Introductions Agenda Expectations Foundation Concepts The challenge of decision making What is Business Intelligence? The Business Intelligence value proposition Business Intelligence taxonomy Business Intelligence management issues Sources of Business Intelligence Data warehousing Data and information Information architecture Defining the data warehouse and its relationships Facts and dimensions Modeling, meta-modeling, and schemas Alternate architectures Building the data warehouse Extracting Transforming Loading Setting up the data and relationships Dimensions and the Fact Table Implementing many-to-many relationships in data warehouse Data marts Online Analytical Processing (OLAP) What is OLAP? OLAP and OLTP OLAP functionality Multi-dimensions Thinking in more than two dimensions What are the possibilities? OLAP architecture Cubism Tools OLAP variations - MOLAP, ROLAP, HOLAP BI using SOA Applications of Business Intelligence Applying BI through OLAP Enterprise Resource Planning and CRM Business Intelligence and financial information Business Intelligence User Interfaces and Presentations Data access Push-pull data access Types of decision support systems Designing the front end Presentation formats Dashboards Types of dashboards Common dashboard features Briefing books and scorecards Querying and Reporting Reporting emphasis Retrofitting Talking back Key Performance Indicators Report Definition and Visualization Typical reporting environment Forms of visualization Unconstrained views Data mining What is in the mine? Applications for data mining Data mining architecture Cross Industry Standard Process for Data Mining (CISP-DM) Data mining techniques Validation The Business Intelligence User Experience The business analyst role Business analysis and data analysis Five-step approach Cultural impact Identifying questions Gathering information Understand the goals The strategic Business Intelligence cycle Focus of Business Intelligence Design for the user Iterate the access Iterative solution development process Review and validation questions Basic approaches Building ad-hoc queries Building on-demand self-service reports Closed loop Business Intelligence Coming attractions - future of Business Intelligence Best practices in Business Intelligence
In this course we explore Mental Health and address how such needs can be met in mainstream classrooms. Course Category Behaviour and Relationships Meeting Emotional Needs Description This is our lead workshop/training day on understanding mental health, behaviour and relationship work in schools other settings and is both a values primer and a practical guide to successful innovative strategies for improving behaviour and strengthening relationships for challenging children and young people of all ages. Not just another day on ‘Behaviour Management’ – Our Mental Health Day goes well beyond a rewards and sanctions approach to ‘behaviour’. We will be focused on those young people for whom rewards and punishments do not always work and who confuse the adults who work with them. We aim to take a relationships-based approach and to give those attending an opportunity to think more deeply about why young people do the things they do and what our part as adults is in creating, sustaining and changing these behaviours. The day gives those present opportunities to reflect on their attitudes and practice in relation to children’s behaviour and relationship building. If your usual approaches to managing tackling mental health needs aren’t working with particular individuals then take a tour through this range of cutting edge strategies for bringing about positive behaviour change, and for meeting challenging emotional needs Learning Objectives reinforce and affirm good practice re-energise, stimulate and challenge thinking about inclusion of challenging pupils and children increased understanding of mental health increased confidence in managing challenging pupils in mainstream schools access to a wider range of practical strategies to impact on behaviour problems opportunity to reflect on professional attitudes and behaviour towards mental health in families and pupils Who Is It For ? Anyone concerned with understanding and meeting emotional and mental health needs Course Content Circle of Courage – belonging-achievement-generosity – independence – model for understanding mental health Compass of Anxiety – understanding and going deeper Active listening – Listening to the person underneath the behaviour Involving other children and young people in solutions and interventions - Circles of friends: peer support, counselling and mediation Team Problem Solving – Solution Circles: a 30 minute group problem solving process to get Teams ‘unstuck’ and to generate positive first action steps Restorative justice and restitution: principles and practice of this approach to repairing harm and restoring relationships without reliance on punishment Understanding the effects of Separation, Loss, Trauma and Neglect on children’s learning and relationships in school and what adults can do to reach and support these children
Duration 1 Days 6 CPD hours This course is intended for This course is designed for students who already have experience creating Modern SharePoint sites and populating them with content, who want to learn advanced features to extend SharePoint's capabilities, make information easier to find and manage, use SharePoint features to improve governance and compliance, and improve the security of information and services within the SharePoint environment. Overview Create a custom site template to reduce the time spent creating similarly configured SharePoint sites. Configure managed metadata, including custom term sets, content types, and metadata-based navigation. Control access through permissions. Improve overall security of sites, lists, libraries, folders, list items, and documents. Microsoft© SharePoint©, in conjunction with the Microsoft 365? productivity and office automation suite, provides tools to create and manage a corporate intranet, facilitate content sharing and collaboration, and enable users to create, access, store, and track documents and data in a central location. Users who already have experience as SharePoint site members and owners may be ready to move on to more advanced site-building tasks such as using custom site templates, custom themes, applying advanced permissions settings, improving security, and preparing sites to support governance and compliance. Advanced site builders may be ready to undertake more advanced site management tasks, working in conjunction with their SharePoint Administrator to create and use custom site templates, term sets and metadata, manage information governance and compliance, and get deeper into SharePoint security configuration. This course focuses on these advanced site-building and administration tasks. Prerequisites To ensure your success in this course, you should have SharePoint site user skills such as the ability to view and enter data in SharePoint lists and libraries, and to navigate a typical SharePoint site. You should also have intermediate site builder skills such as the ability to create a SharePoint site, apply a site template, populate sites with pages, create lists and libraries, and connect a site to a hub site. NOTE: This course was developed using Microsoft 365 Business Standard edition. If you opt to use one of the Enterprise editions, be sure to key the course activities before you deliver the class so you will be able to anticipate any differences that students might see with the edition you use. Lesson 1: Creating Custom Site Templates Topic A: Prepare a Site Script Topic B: Generate and Use a Custom Site Template Lesson 2: Managing Content Services Topic A: Plan and Configure Managed Metadata Topic B: Create and Manage Content Types Topic C: Use Managed Metadata for Navigation and Filtering Lesson 3: Controlling Access Through Permissions Topic A: Assign Permissions Topic B: Manage Permissions Inheritance Lesson 4: Improving Security Topic A: Manage Access at the Site Level Topic B: Manage Access at the Tenant Level
This workshop gives an opportunity to focus on the emotional needs of children and young people and how to meet these. We lift the lid on an emerging urgent inclusion issue, meeting the emotional well being of all children. In one year 1300 young men committed suicide in the UK. In the UK the commonest cause of death among those aged 16-35 is suicide. Online Course now available via Teachable Platform – Understanding children’s Emotional Needs Learn at your own pace… lots of text and video support Course Category Behaviour and Relationships Meeting emotional needs Early Years Inclusion Description This workshop gives an opportunity to focus on the emotional needs of children and young people and how to meet these. We lift the lid on an emerging urgent inclusion issue, meeting the emotional well being of all children. In one year 1300 young men committed suicide in the UK. In the UK the commonest cause of death among those aged 16-35 is suicide. 1 in 4 women experience domestic violence and 2 women a week are killed by a current or ex partner. We need to find ways to allow children to unclench their hearts and learn to experience, process, communicate and manage their own emotional lives for their own and for the good of the wider community. Testimonials Be the first…. Learning Objectives Increased understanding of emotional needs Access to a wider range of practical strategies to impact on meeting emotional and behaviour problems Deeper understanding of core values surrounding inclusion Opportunity to reflect on professional attitudes and behaviour towards children and their emotional challenges New skills and processes to make emotionally challenged children’s inclusion and achievement more successful Who Is It For ? Early years and school based practitioners Key workers Teaching Assistants with support roles Heads and deputies SENCOs Advanced skills teachers Primary and secondary classroom teachers Parents Local authority support services Course Content Shared experiences of teaching and parenting around emotional well being Circle of Courage as away of understanding emotional needs Fathers, mothers and sons and daughters Drinking and drugs, filling the emotional void Depression and suicide Anger and violence Solution Circle Problem Solving What children really need
European Data Protection Principles of Data Protection in Europe covers the essential pan-European and national data protection laws, as well as industry-standard best practices for corporate compliance with these laws. Those taking this course will gain an understanding of the European model for privacy enforcement, key privacy terminology and practical concepts concerning the protection of personal data and trans-border data flows. The training is based on the body of knowledge for the IAPP's ANSI-accredited Certified Information Privacy Professional/Europe (CIPP/E) certification program. Privacy Programme Management Principles of Privacy Management is the how-to training on implementing a privacy program framework, managing the privacy program operational lifecycle and structuring a knowledgeable, high-performing privacy team. Those taking this course will learn the skills to manage privacy in an organisation through process and technology-regardless of jurisdiction or industry. The Principles of Privacy Program Management training is based on the body of knowledge for the IAPP's ANSI-accredited Certified Information Privacy Manager (CIPM) certification programme. Make a difference in your organization and in your career. The CIPM designation says that you're a leader in privacy program administration and that you've got the goods to establish, maintain and manage a privacy program across all stages of its lifecycle. About This Course Delivered in a modular format, this four day course covers Days 1 & 2 Module 1: Data Protection Laws Introduces key European data protection laws and regulatory bodies, describing the evolution toward a Harmonised European Legislative Framework. Module 2: Personal Data Defines and differentiates between types of data-including personal, anonymous, pseudo-anonymous and special categories. Module 3: Controllers and Processors Describes the roles and relationships of controllers and processors. Module 4: Processing Personal Data Defines data processing and GDPR processing principles, Explains the application of the GDPR and outlines the legitimate bases for processing personal data. Module 5: Information provision Explains controller obligations for providing information about data processing activities to data subjects and Supervisory Authorities. Module 6: Data Subjects 'Rights Describes data subjects' rights, applications of rights and obligations controller and processor. Module 7: Security or Processing Discusses considerations and duties of controllers and processors for Ensuring security of personal data and providing notification of data breaches. Module 8: Accountability Investigates accountability requirements, data protection management systems, data protection impact assessments, privacy policies and the role of the data protection officer. Module 9: International Data Transfers Outlines options and obligations for transferring data outside the European Economic Area, Decisions adequacy and appropriateness safeguards and derogations. Module 10: Supervision and Enforcement Describes the role, powers and procedures or Supervisory Authorities; the composition and tasks of the European Data Protection Board; the role of the European Data Protection Supervisor; and remedies, liabilities and penalties for non-compliance. Module 11: Compliance Discusses the applications of European data protection law, legal bases and compliance requirements for processing personal data in practice, employers-including processing employee data, surveillance, direct marketing, Internet technology and communications and outsourcing. Days 3 & 4 Module 1: Introduction to privacy program management Identifies privacy program management responsibilities, and describes the role of accountability in privacy program management. Module 2: Privacy governance Examines considerations for developing and implementing a privacy program, including the position of the privacy function within the organization, role of the DPO, program scope and charter, privacy strategy, support and ongoing involvement of key functions and privacy frameworks. Module 3: Applicable laws and regulations Discusses the regulatory environment, common elements across jurisdictions and strategies for aligning compliance with organizational strategy. Module 4: Data assessments Relates practical processes for creating and using data inventories/maps, gap analyses, privacy assessments, privacy impact assessments/data protection impact assessments and vendor assessments. Module 5: Policies Describes common types of privacy-related policies, outlines components and offers strategies for implementation. Module 6: Data subject rights Discusses operational considerations for communicating and ensuring data subject rights, including privacy notice, choice and consent, access and rectification, data portability, and erasure and the right to be forgotten. Module 7: Training and awareness Outlines strategies for developing and implementing privacy training and awareness programs. Module 8: Protecting personal information Examines a holistic approach to protecting personal information through privacy by design. Module 9: Data breach incident plans Provides guidance on planning for and responding to a data security incident or breach. Module 10: Measuring, monitoring and auditing program performance Relates common practices for monitoring, measuring, analyzing and auditing privacy program performance Prerequisites There are no prerequisites for this course but attendees would benefit from a review of the materials on the IAPP SITE What's Included? 1 years membership of the IAPP Breakfast, Lunch, mid-morning and afternoon snacks, teas, coffees Official Study Guides* Official Participant Guides* Official Exam Q&A's* Both exam fees * In electronic format for Live Online and hard copy for Classroom delegates Who Should Attend? This course is suitable for aspiring Data Protection Officers, as well as Information Security Managers, Lawyers, Data Managers, Analysts and Risk Teams. Provided by Our Guarantee We are an approved IAPP Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with a minimum of 25 years commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras. The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training offered for retakes - come back within a year and only pay for the exam.
Telecomms training course description A comprehensive tour of the telecommunications technologies and terminology currently in use, and under development. What will you learn List and describe components of the PSTN. Explain how calls are made over the PSTN Compare analog and digital transmission methods. Describe the technologies within the transport plane. Recognise the benefits of extra features available in today's telephone networks. Telecomms training course details Who will benefit: Anyone new to the Telecommunications industry. Prerequisites: None. Duration 2 days Telecomms training course contents Telephone network architecture Handsets, local loop, distribution points, Local exchanges, main telephone switches, PBXs. Making a call - some basics Telephone call components, how a telephone call works, accessing the local exchange, loop disconnect, DTMF, standards, E.164, PSTN routing, Intelligent Networks, Special Rate Services. Analogue vs Digital Voice characteristics, PSTN bandwidth, analogue signalling, Digital encoding, PCM and the 64k, ADPCM and other voice compression methods. PBXs PABX, Call processing, networking PBXs, PBX facilities, bandwidth, blocking probability and Erlangs, Erlang models, using Erlang tables. Transmission methods Two wire transmission, 64k circuits, Nx64, E1, 2 wire to 4 wire conversion, echo, echo suppression, echo cancellers, twisted pair, coax, fibre optic, power lines, satellite systems, microwave. Signalling Analogue signalling, loop start, earth calling, E&M, AC15. Digital signalling -CAS, robbed bits and E1 slot 16 signalling. Digital signalling CCS, Q.931, SS7, Q.SIG, DPNSS, DASS2. Transport planes PDH, PDH issues, SDH, SDH architecture, SDH standards, SDH bit rates, SDH mulitplexors, DWDM. Networks Circuit Switched Networks, TDM, Packet Switched Networks, Frame Relay, Message Switching, Circuit Switching, STDM, Cell Switching, ATM, ATM cells, ATM traffic parameters, ATM QoS, MPLS. Other network access Modems, modulation, speeds, ISDN, BRI, PRI, xDSL, SDSL, ADSL. Other Services Centrex, VPNs, FeatureNet, CTI, Call Processing Systems, Voice Mail, Automated Attendant Systems, Interactive Voice Response, Call Management Systems, Call Conferencing, Star Services. Mobile communications 3 types of wireless telephone, mobile generations, base stations, cells, GSM, GPRS, 3G, UMTS, WCDMA, 4G, LTE. VoIP overview What is VoIP, VoIP benefits, What is IP? The IP header, Packetising voice, VoIP addressing, H.323, SIP, RTP. Bandwidth requirements.