• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1735 Courses delivered Live Online

Total RADIUS for Engineers

5.0(3)

By Systems & Network Training

RADIUS training course description A fast paced hands-on introduction to RADIUS. Moves from installation and configuration through to packet analysis and accounting. Practical exercises are spread throughout the course to maintain student interest. What will you learn Configure PPP and PAP/CHAP. Install and configure RADIUS servers. Describe how RADIUS works. Setup RADIUS accounting. Analyse RADIUS packets. Troubleshoot RADIUS installations. RADIUS training course details Who will benefit: Network Administrators. Support personnel. Anyone who will be working with RADIUS. Prerequisites: Knowledge of the TCP/IP protocols would be advantageous. Duration 2 days RADIUS training course contents What is RADIUS? AAA services, Authentication, Authorisation, Accounting, local AAA services, remote AAA services, What is RADIUS? RADIUS as a protocol, RADIUS as an architecture, RADIUS as a standard. Installing RADIUS RADIUS platforms, RADIUS servers, client server communications, services, daemons. Hands on Installing RADIUS and testing with NTRadPing. Server configuration Configuring clients on the server, shared secrets, usernames and passwords. IP address pools. Hands on Configuring a server and testing with NTRadPing. Client configuration Example clients, client configuration steps, enabling RADIUS, pointing clients to the server, shared secrets, example Cisco authentication, example Cisco authorization. Hands on Configuring clients for RADIUS. How RADIUS works RADIUS architecture, RADIUS and authentication, PPP, PAP, CHAP, RADIUS SUCCESS, RADIUS FAILURE, the RADIUS protocol stack, the RADIUS protocol, the RADIUS header, RADIUS codes, RADIUS attributes, ACCESS-REQUEST example, ACCESS-ACCECPT example, CHAP example, proprietary attributes, using unassigned type codes, RADIUS attribute 26, Cisco specific attributes. Hands on Analysing RADIUS packets, configuring PPP CHAP to work with RADIUS. RADIUS accounting Simplified operation, Accounting codes, Accounting attributes, client and server configuration for accounting. Hands on Configuring RADIUS accounting. RADIUS architectures Traditional architecture, multiple RADIUS servers for resilience, Proxy RADIUS servers, Realms, RADIUS in VPNs, RADIUS with 802.1x. Hands on Using multiple RADIUS servers, Proxies. Troubleshooting RADIUS General problem solving, basic tools, RADIUS troubleshooting, Common configuration errors, log files, RADIUS design and performance. Hands on Fixing RADIUS problems.

Total RADIUS for Engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

Battery Energy Storage Systems (BESS) in Electricity Markets and Trading

By EnergyEdge - Training for a Sustainable Energy Future

About this Course Batteries are going to play an increasingly important role in the energy grid. An increasing number of developers are looking to add battery storage systems (BESS) into their existing projects. However future cash flows are highly uncertain and they are often unsure exactly how battery technology can be monetised. A strong revenue model requires stacking of different revenue sources. As the share of variable renewable sources in electricity systems further increase, battery systems are expected to play a growing role by providing frequency control and operational reserves as well as for wholesale arbitrage, while helping reduce grid integration costs. The more volatile electricity prices are, the greater the earning potential of batteries trading electricity on various electricity markets. BESS can generate revenue streams in several different ways; through a frequency response contract with the TSO, by providing grid services in other ways or by arbitrage through buying cheap power and selling power for a higher price in a liquid wholesale market. Because batteries are efficient, the round trip efficiency is also high. They can spread arbitrage trading much better than other storage types and in many cases, other asset classes. For companies that combine a battery with other tasks, for example to store power from their own panels, or to avoid a costly heavy power connection, the investment is less risky than for those that purely focus on arbitrage trading. It is uncertain whether electricity prices will fluctuate more violently in the coming years, or whether the peaks will actually level off. During this highly interactive training, the trainer will provide you with the latest insights and best practices on how to obtain the maximum economic benefits when participating with BESS in the electricity market. Training Objectives By the end of this course, the participants will be able to: Discover the different BESS battery technologies and their impact on the grid Understand the role of storage in providing flexibility to the power system Examine the potential revenue streams from BESS models Learn how profit can generated with BESS trading strategies Determine how to optimize the value from BESS projects Find out how to combine BESS with renewable PPAs Target Audience Professionals and executives from Power Utilities, Energy Companies, Financial & Investment Banks, Renewable Power Project Developers, Transmission System Operators and Energy Industry Regulators will find this training course useful. Electricity Marketing and Traders New Venture or Business Development Executives Corporate Finance and Treasury Executives Audit and Risk Management Executives Power or Utility Market Research Analysts Investment Managers for Renewable Power Projects Origination Professionals Regulation, Compliance and Documentation Officers Lawyers and Accountants Power Transmission and Distributions Engineers Trainer Our key expert is a skilled and accomplished professional with over 25 years' of extensive senior management / board level experience in the energy markets worldwide. Next to advising energy companies, banks, consultants and regulators regarding PPAs, our key expert has also conducted several highly successful training courses about Power Purchase Agreements, Power Project Finance, IPPs, and Project Risk Management to over 1,000 high level participants from Asia, Africa, Europe and Middle East. He was a member of the expert commission of the Dutch Government for 2 offshore wind parks, Hollandse Kust (zuid) Wind Farm Zone Sites 3 and 4 that advised on which of the 5 applicants did provide the best security and solutions associated with the electricity and green certificate prices, the construction and operational risks of the project. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Battery Energy Storage Systems (BESS) in Electricity Markets and Trading
Delivered in Internationally or OnlineFlexible Dates
£2,837 to £3,299

Junos Intermediate Routing

5.0(3)

By Systems & Network Training

Junos Intermediate Routing training course description This course provides students with intermediate routing knowledge and configuration examples. The course includes an overview of protocol-independent routing features, load balancing and filter-based forwarding, OSPF, BGP, IP tunneling, and high availability (HA) features. Junos Intermediate Routing (JIR) is an intermediate-level course. What will you learn Describe typical uses, configure & monitor static, aggregate, and generated routes. Configure and share routes between routing instances. Explain the operations of OSPF. Describe BGP and its basic operations. Configure and monitor GRE and IP-IP tunnels. Junos Intermediate Routing training course details Who will benefit: Engineers responsible for configuring and monitoring devices running the Junos OS. Prerequisites: Intro to the Junos Operating System Duration 2 days Junos Intermediate Routing training course contents Protocol-Independent Routing Static Routes Aggregated Routes Generated Routes Martian Addresses Routing Instances Lab 1 Protocol-Independent Routing Load Balancing and Filter-Based Forwarding Overview of Load Balancing Configuring and Monitoring Load Balancing Overview of Filter-Based Forwarding Configuring and Monitoring Filter-Based Forwarding Lab 2 Load Balancing and Filter-Based Forwarding Open Shortest Path First Overview of OSPF Adjacency Formation and the Designated Router Election OSPF Scalability Configuring and Monitoring OSPF Basic OSPF Troubleshooting Lab 3 Open Shortest Path First Border Gateway Protocol Overview of BGP BGP Attributes IBGP Versus EBGP Configuring and Monitoring BGP Lab 4 Border Gateway Protocol IP Tunneling Overview of IP Tunneling GRE and IP-IP Tunnels Implementing GRE and IP-IP Tunnels Lab 5 IP Tunneling High Availability Overview of High Availability Networks Graceful Restart Graceful RE Switchover Nonstop Active Routing BFD VRRP Lab 6 High Availability Appendix A: IPv6 Introduction to IPv6 Routing Protocol Configuration Examples Tunneling IPv6 over IPv4 Lab 7 (Optional) IPv6 Appendix B: IS-IS Overview of IS-IS Overview of IS-IS PDUs Adjacency Formation and DIS Election Configuring and Monitoring IS-IS Basic IS-IS Troubleshooting Lab 8 (Optional) IS-IS Appendix C: Routing Information Protocol Introduction to RIP RIP Configuration Examples Monitoring and Troubleshooting RIP

Junos Intermediate Routing
Delivered in Internationally or OnlineFlexible Dates
£2,477

Managing networks with MRTG

5.0(3)

By Systems & Network Training

MRTG training course description A hands on course focusing on the installation, configuration and use of the MRTG network monitoring and graphing tools. What will you learn Install MRTG. Configure MRTG. Use MRTG to monitor networks. MRTG training course details Who will benefit: Anyone working with MRTG. Prerequisites: Total SNMP for engineers Duration 2 days MRTG training course contents What is MRTG? Network monitoring, review of SNMP. What MRTG does do, what MRTG doesn't do, MRTG architecture, MRTG components. Hands on configuring SNMP support on network devices, configuring extended SNMP support on Windows. Installing MRTG Configuring MRTG tasks, .cfg files, index.html files, running MRTG tasks, instances. Hands on Configuring and running MRTG tasks. MRTG tasks Configuring MRTG tasks, .cfg files, index.html files, running MRTG tasks, instances. Hands on Configuring and running MRTG tasks. MRTG graphs Daily, weekly, monthly, yearly, MRTG database support, RRDTOOL. Hands on MRTG graphs. Using MRTG MRTG examples, custom SNMP OIDs, using the MRTG configuration reference. Hands on MRTG examples. RRDTOOL Installing RRD database support, MRTG instances with the RRD database, RRD database structure, resizing and extending the database. Exporting database records into plain text and XML formats, on demand MRTG graphs using the database. Hands on Using MRTG with RRD database support. Alternatives to MRTG MRTG strengths and weaknesses, scalability, cricket, cacti, other SNMP tools.

Managing networks with MRTG
Delivered in Internationally or OnlineFlexible Dates
£2,477

Network programming with sockets

5.0(3)

By Systems & Network Training

Sockets programming training course description A hands on course for programmers using Sockets. It is important to recognise that the course assumes that delegates are already familiar with TCP/IP and Python. Practical exercises follow all the major theory sessions. What will you learn Read Python programs which use Sockets. Write Python programs which use Sockets. Debug Python programs which use Sockets. Sockets programming training course details Who will benefit: Programmers working with network applications. Prerequisites: TCP/IP foundation for engineers Python for network engineers Duration 2 days Sockets programming training course contents What is a socket? Review of IP, ICMP, UDP vs TCP, IP addresses, protocol numbers, ports. API's, UNIX I/O, sockets. SOCK_STREAM, SOCK_DGRAM. Hands on Compile and run code. The systems calls Clients and servers, structs, socket(), bind(), connect(), listen(), accept(), send(), recv(), sendto (), recvfrom(), close(), shutdown(), getpeername(), gethostname(). Hands on Walk through of example client and server code. First code TCP connections, passive opens, active opens. Hands on Write a simple 'hello world' server and client. Application protocols User character stream, ASCII turn taking, binary protocols. Hands on Raw SMTP, Writing a mail client. Clients Concurrency, polling, threads, event driven programming. Hands on Conferencing application. Servers Concurrency, stateful, stateless. Forks and execs. inetd. Hands on Running servers with and without inetd, chroot jails, conferencing server modifications. Advanced techniques Blocking, select(), partial send(s). Raw sockets, example sockets using Java, Perl and PHP. Hands on A broadcast application.

Network programming with sockets
Delivered in Internationally or OnlineFlexible Dates
£2,477

Carbon Capture, Utilization & Storage (CCUS) Well Design & Monitoring

By EnergyEdge - Training for a Sustainable Energy Future

About this training course This 3-days training will provide a comprehensive review of integrity of wells exposed to carbon dioxide (CO2) in the context of Carbon Capture Utilization for enhanced oil recovery and Storage (CCUS). CO2 geological storage is a proven technology to reduce greenhouse gas emissions from sources such as coal power plants, cement kilns and steel mills. Wells are widely considered the most critical containment element, especially older wells that are not used to inject CO2 or monitor the plume evolution in the storage reservoir. The main reason for this perceived risk is the high corrosion rate of carbon steel when exposed to wet CO2, and the tendency of Portland cement to react with the gas. The training course advanced contents build on 15 years' experience in carbon storage, both in the development and deployment of technologies. First-hand, in-depth knowledge of the subject will allow us to debunk myths and focus on the real challenges of wells encountering CO2. Training Objectives After the completion of this training course, participants will be able to: Explain the CCUS market drivers Examine the behavior of CO2, on surface and in the reservoir Diagnose cement defects and design repairs Understand the limits of Portland cement Assess the benefits of different technologies and materials Realize why geology is a dominant factor in cement performance Critically choose the most appropriate monitoring techniques Classify aging processes of cement, steel, and rock when exposed to CO2 Assess the risk of existing wells if they encounter the CO2 plume Examine recent advances in real-time approaches to the production monitoring and lift management Target Audience This training course is suitable and will greatly benefit: All surface technical personnel such as process engineers & technologists Facility engineers, production engineers & technologists Drilling engineers and Well engineers Design engineers and Integrity engineers P&A engineers and Cementing engineers Geologists Senior management executives will benefit from this training as covers an overview of the technical and commercial details of CO2 capture technologies and risks involved. Course Level Intermediate Training Methods The training instructor relies on a highly interactive training method to enhance the learning process. This method ensures that all participants gain a complete understanding of all the topics covered. The training environment is highly stimulating, challenging, and effective because the participants will learn by case studies which will allow them to apply the material taught in their own organization. Course Duration: 3 days in total (21 hours). Training Schedule 0830 - Registration 0900 - Start of training 1030 - Morning Break 1045 - Training recommences 1230 - Lunch Break 1330 - Training recommences 1515 - Evening break 1530 - Training recommences 1700 - End of Training The maximum number of participants allowed for this training course is 20. This course is also available through our Virtual Instructor Led Training (VILT) format. Trainer Your expert course leader is an engineer with a passion for well integrity and possesses 28 years of international experience in field operations, technology development and management in the oil & gas and carbon storage sectors. Since 2018 he is program chair of the Well Integrity Technical Section of the Society of Petroleum Engineers (SPE). He is also author or co-author of 31 technical papers, a book chapter on CO2 geological storage and 7 patent applications. He delivers training on well integrity, plug and abandonment, asset integrity, risk management and QHSE across the Eastern Hemisphere, and carries out active research on harnessing geological barriers, modeling leaks through cement, and quantifying methane emissions from oil & gas wells. He has extensive expertise in: Well integrity, cementing, corrosion, upstream oil & gas (drilling, completion), carbon capture and storage, mathematical modeling, risk management, reliability, HSSE (health/safety/security/environment), asset integrity, management systems, sustainable development, project management, portfolio management, training, and technology development and innovation. He has personally worked on CCS projects in Europe (France, Germany, Netherlands, Norway), Algeria, Japan and USA. Partial list of companies that have benefited from the trainer's expertise: Vermilion Energy Geostock Aker BP Shell Statoil ENI TNO Geogreen Wintershall Archer INA and many more Recent CCS consulting track record: Schlumberger Total Oxand TNO THREE60 Energy and others POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable

Carbon Capture, Utilization & Storage (CCUS) Well Design & Monitoring
Delivered in Internationally or OnlineFlexible Dates
£2,790 to £3,245

Transmission Lines: Design, Analysis and Applications

By EnergyEdge - Training for a Sustainable Energy Future

About this training course Transmission lines and sub-stations are essential components in the electrical power systems. Proper design and maintenance are crucial for transmission lines to maintain a continuous operation. The objective of this 5-day training course is to deal appropriately with control systems, design characteristics and electric & magnetic fields. Participants will gain a better understanding on the corona and gap discharge phenomena, constructional features, and optimization of the transmission lines. Training Objectives By participating in this course, you will be able to: Understand transmission line design and its application Examine different types of conductors and electrical characteristics Explore basic and general transmission line parameters Prevent overvoltage through insulation design Determine surge impedance and corona effects Calculate and measure electric and magnetic fields Comprehend the impact of audible noise and electromagnetic interference Identify interference within the transmission line systems Target Audience The course will greatly benefit the following groups but not limited to: Electrical Engineers Civil Engineers Transmission & Distribution Engineers Substation Operators Safety Engineers Reliability Engineers Facility & Plant Engineers Technical Engineers Design Engineers Plant Supervisors Electrical Contractors Course Level Basic or Foundation Intermediate Training Methods The training instructor relies on a highly interactive training method to enhance the learning process. This method ensures that all participants gain a complete understanding of all the topics covered. The training environment is highly stimulating, challenging, and effective because the participants will learn by case studies which will allow them to apply the material taught in their own organization. Course Duration: 5 days in total (35 hours). Training Schedule 0830 - Registration 0900 - Start of training 1030 - Morning Break 1045 - Training recommences 1230 - Lunch Break 1330 - Training recommences 1515 - Evening break 1530 - Training recommences 1700 - End of Training The maximum number of participants allowed for this training course is 25. This course is also available through our Virtual Instructor Led Training (VILT) format. Trainer Your expert course leader is a professional engineer with extensive experience in power system studies, substation design field-testing, and EHS programs settings for Mining and Electrical Utilities sectors. He was formally the Engineering Manager at GE Canada in Ontario. He received his M.Sc. in electrical engineering from the University of New Brunswick and his MBA from Laurier School of Business in Waterloo. He has managed and executed more than 150 engineering projects on substation design EMF audits and power system studies and analyses, EMF audits and grounding audits, for major electrical utilities, mines, oil and gas, data centers, industrial and commercial facilities in Canada and the U.S. He is a certified professional engineer in the provinces of Ontario and Alberta. He has various IEEE publications, has served as a technical reviewer for many IEEE journals in power systems and control systems, and is the chair of the Industry Application Chapter (IAS) for IEEE Toronto Section. He remains a very active member for the IEEE substation committee of IEEE Std. 81 ground testing (WGE6) and IEEE Std. 80 ground design (WGD7). A certified electrical safety trainer by GE Corporate and a Canadian Standard Association (CSA) committee member at the mining advisory panel for electrical safety, he also taught many technical courses all over Canada to industrial customers, electrical consultants as well as to electrical utilities customers. Highlighted Projects: Various Power System Studies for 345/230 kV Stations - Nova Scotia Power (EMERA) RF audits for Telecom tower and antennas - Cogeco/Rogers Mobile Power System analysis - Powell Canada Structural/Geotechnical Design and upgrades - Oakville Hydro Underground Cables testing and sizing - Plan Group Relay programming and design optimization - Cenovus Canada Different Arc Flash Analysis and BESS Design - SNC Lavalin Environmental site assessment (ESA) Phase I/II for multiple stations - Ontario Electromagnetic compatibility (EMC) assessment for Toronto LRT expansion - MOSAIC Battery energy storage system (BESS) installation at City of London - Siemens Canada EMF audits for 500 kV Transmission Lines - Hydro One EMF audits for 500 kV Transmission Lines - Hydro Quebec AC interference for 138 kV line modeling and mitigations - HBMS Mine POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Transmission Lines: Design, Analysis and Applications
Delivered in Internationally or OnlineFlexible Dates
£3,320

Best Practices Procurement for Carbon Offsets in the Energy Industry

By EnergyEdge - Training for a Sustainable Energy Future

About this Training Course More energy companies today are setting ambitious net-zero targets and are expected to pour billions into the voluntary carbon offset market by the end of this decade. To get to net zero emissions, companies will need to balance emissions with nature and technology-based offsets. Markets are the best tool for connecting carbon sources and sinks. Many countries will not have enough supply inside their borders and will need to co-operate with those who have extra greenhouse gas removal potential. The energy industry is in search of effective climate tools as pressure mounts from investors and consumers for more progress on fighting rising emissions. Corporations fighting to cut their carbon footprint have for years focused on internal reduction measures. Many are now adding to that effort by turning to carbon credits, a process made easier as verification and registration tools mature. One particular category of carbon offsets leads the way: high-quality, nature-based carbon credits. These represent the largest category of carbon credit projects in the voluntary carbon market, comprising nearly half of credits issued. Public concern about this practice focused on the additionality, leakage, and integrity of carbon offsets that are created through reforestation, land preservation, carbon capture and other projects. Lack of standardization and government regulation has also increased uncertainty for all participants in carbon markets, creating risks for developers of credit-generating projects and offset purchasers. Demand for higher-quality offsets will value projects that were subjected to due diligence and rely upon reputable third-party verification. Companies purchasing offsets generated by permanent and quantifiable projects will therefore be in the best position moving forward. In this highly interactive training course, your course instructor will guide you through the latest developments and best procurement practices to successfully operate in the voluntary carbon market. Training Objectives At the end of this course, the participants will be able to: Discover the current state of the carbon economy Gain insights into the voluntary carbon market Learn about the different type carbon credits available Examine how companies can reach net zero target by using carbon offsets Uncover best practices in carbon credit procurement strategy Learn the pricing dynamics carbon credits Examine how to identify and ensure high quality credits Obtain key learning from flawed carbon offset projects Target Audience This course is intended for: Energy transition team leaders Carbon credit procurement professionals ESG strategy team leaders Finance and accounting professionals Low carbon business analysts or economists Corporate business sustainability professionals Legal, compliance and regulatory professionals Carbon trading professionals Course Level Intermediate Trainer Your expert course leader is a skilled and accomplished professional with over 25 years of extensive C-level experience in the energy markets worldwide. He has a strong expertise in all the aspects of (energy) commodity markets, international sales, marketing of services, derivatives trading, staff training and risk management within dynamic and high-pressure environments. He received a Master's degree in Law from the University of Utrecht in 1987. He started his career at the NLKKAS, the Clearing House of the Commodity Futures Exchange in Amsterdam. After working for the NLKKAS for five years, he was appointed as Member of the Management Board of the Agricultural Futures Exchange (ATA) in Amsterdam at the age of 31. While working for the Clearing House and exchange, he became an expert in all the aspects of trading and risk management of commodities. In 1997, he founded his own specialist-consulting firm that provides strategic advice about (energy) commodity markets, trading and risk management. He has advised government agencies such as the European Commission, investment banks, major utilities and commodity trading companies and various energy exchanges and market places in Europe, CEE countries, North America and Asia. Some of the issues he has advised on are the development and implementation of a Risk Management Framework, investment strategies, trading and hedging strategies, initiation of Power Exchanges (APX) and other trading platforms, the set-up of (OTC) Clearing facilities, and feasibility and market studies like for the Oil, LNG and the Carbon Market. The latest additions are (Corporate) PPAs and Artificial Intelligence for energy firms. He has given numerous seminars, workshops and (in-house) training sessions about both the physical and financial trading and risk management of commodity and carbon products. The courses have been given to companies all over the world, in countries like Japan, Singapore, Thailand, United Kingdom, Germany, Poland, Slovenia, Czech Republic, Malaysia, China, India, Belgium and the Netherlands. He has published several articles in specialist magazines such as Commodities Now and Energy Risk and he is the co-author of a book called A Guide to Emissions Trading: Risk Management and Business Implications published by Risk Books in 2004. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Best Practices Procurement for Carbon Offsets in the Energy Industry
Delivered in Internationally or OnlineFlexible Dates
£2,751 to £3,199

AZ-800T00 Administering Windows Server Hybrid Core Infrastructure

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This four-day course is intended for Windows Server Hybrid Administrators who have experience working with Windows Server and want to extend the capabilities of their on-premises environments by combining on-premises and hybrid technologies. Windows Server Hybrid Administrators implement and manage on-premises and hybrid solutions such as identity, management, compute, networking, and storage in a Windows Server hybrid environment. This course teaches IT Professionals how to manage core Windows Server workloads and services using on-premises, hybrid, and cloud technologies. The course teaches IT Professionals how to implement and manage on-premises and hybrid solutions such as identity, management, compute, networking, and storage in a Windows Server hybrid environment. Prerequisites Experience with managing Windows Server operating system and Windows Server workloads in on-premises scenarios, including AD DS, DNS, DFS, Hyper-V, and File and Storage Services Experience with common Windows Server management tools (implied in the first prerequisite). Basic knowledge of core Microsoft compute, storage, networking, and virtualization technologies (implied in the first prerequisite). Experience and an understanding of core networking technologies such as IP addressing, name resolution, and Dynamic Host Configuration Protocol (DHCP) Experience working with and an understanding of Microsoft Hyper-V and basic server virtualization concepts Basic experience with implementing and managing IaaS services in Microsoft Azure Basic knowledge of Azure Active Directory Experience working hands-on with Windows client operating systems such as Windows 10 or Windows 11 Basic experience with Windows PowerShell 1 - Introduction to AD DS Define AD DS Define users, groups, and computers Define AD DS forests and domains Define OUs Manage objects and their properties in AD DS 2 - Manage AD DS domain controllers and FSMO roles Deploy AD DS domain controllers Maintain AD DS domain controllers Manage the AD DS Global Catalog role Manage AD DS operations masters Manage AD DS schema 3 - Implement Group Policy Objects Define GPOs Implement GPO scope and inheritance Define domain-based GPOs Create and configure a domain-based GPO Define GPO storage Define administrative templates 4 - Manage advanced features of AD DS Create trust relationships Implement ESAE forests Monitor and troubleshoot AD DS Create custom AD DS partitions 5 - Implement hybrid identity with Windows Server Select a Microsoft Entra integration model Plan for Microsoft Entra integration Prepare on-premises Active Directory for directory synchronization Install and configure directory synchronization with Microsoft Entra Connect Implement Seamless Single Sign-On Enable Microsoft Entra login in for Windows VM in Azure Describe Microsoft Entra Domain Services Implement and configure Microsoft Entra Domain Services Manage Windows Server 2019 in a Microsoft Entra Domain Services environment Create and configure a Microsoft Entra Domain Services instance Join a Windows Server VM to a managed domain 6 - Deploy and manage Azure IaaS Active Directory domain controllers in Azure Select an option to implement directory and identity services using Active Directory Domain Services in Azure Deploy and configure Active Directory Domain Services domain controllers in Azure VMs Install a replica Active Directory domain controller in an Azure VM Install a new Active Directory forest on an Azure VNet 7 - Perform Windows Server secure administration Define least privilege administration Implement delegated privileges Use privileged access workstations Use jump servers 8 - Describe Windows Server administration tools Explore Windows Admin Center Use Server Manager List Remote Server Administration Tools Use Windows PowerShell Use Windows PowerShell to remotely administer a server 9 - Perform post-installation configuration of Windows Server List the available post-installation configuration tools Configure Server Core using Sconfig Use DSC to configure Windows Server Perform post-installation configuration with Windows Admin Center Configure a server with answer files 10 - Just Enough Administration in Windows Server Explain the concept of Just Enough Administration (JEA) Define role capabilities for a JEA endpoint Create a session configuration file to register a JEA endpoint Describe how JEA endpoints work to limit access to a PowerShell session Create and connect to a JEA endpoint Demonstration: Connect to a JEA endpoint 11 - Administer and manage Windows Server IaaS Virtual Machine remotely Select the appropriate remote administration tool Manage Windows Virtual Machines with Azure Bastion Create an Azure Bastion host Configure just-in-time administration 12 - Manage hybrid workloads with Azure Arc Describe Azure Arc Onboard Windows Server instances Connect hybrid machines to Azure from the Azure portal Use Azure Arc to manage Windows Server instances Restrict access with RBAC 13 - Configure and manage Hyper-V Define Hyper-V Define Hyper-V Manager Configure Hyper-V hosts using best practices Configure Hyper-V networking Assess advanced Hyper-V networking features Define nested virtualization 14 - Configure and manage Hyper-V virtual machines List the virtual machine configuration versions List the virtual machine generation versions List available VHD formats and types Create and configure VMs Determine storage options for VMs Define shared VHDs and VHD Sets Implement guest clusters using shared VHDX 15 - Secure Hyper-V workloads Define guarded fabric Define the Host Guardian Service Explore TPM-trusted attestation Define KPS Determine key features of shielded VMs Compare encryption-supported and shielded VMs in a guarded fabric Implement a shielded VM 16 - Run containers on Windows Server Define containers List the differences between containers and VMs Define Windows Server and Hyper-V containers and isolation modes Explore Docker Prepare a Windows Server 2019 host for container deployment Security, Storage, and Networking with Windows containers 17 - Orchestrate containers on Windows Server using Kubernetes Define orchestration Define Kubernetes Deploy Kubernetes resources Create a Kubernetes cluster on Windows Define Azure Arc Connect an Azure Arc-enabled Kubernetes cluster to Azure Arc 18 - Plan and deploy Windows Server IaaS Virtual Machines Describe Azure compute Describe Virtual Machine storage Deploy Azure Virtual Machines Create a windows Virtual Machine using the portal Create a windows Virtual Machine using Azure CLI Deploy Azure Virtual Machines using templates Describe additional management optimization options 19 - Customize Windows Server IaaS Virtual Machine images Create a generalized image Create a new Virtual Machine from a managed image Create a managed image of a generalized virtual machine in Azure Create a Virtual Machine from a managed image Implement Azure Image Builder Create a windows Virtual Machine using Azure Image Builder template Create a Windows Virtual Machine with Azure Image Builder using PowerShell 20 - Automate the configuration of Windows Server IaaS Virtual Machines Describe Azure Automation Implement Azure Automation with DSC Remediate noncompliant servers Describe Custom Script Extensions Configure a Virtual Machine by using DSC 21 - Deploy and manage DHCP Use DHCP to simplify IP configuration Install and configure the DHCP role Configure DHCP options Configure DHCP scopes Select DHCP high availability options Implement DHCP Failover 22 - Implement Windows Server DNS Explore the DNS architecture Work with DNS zones and records Install and configure the DNS role Implement DNS forwarding 23 - Implement IP Address Management Define IP Address Management Deploy IP Address Management Administer IP Address Management Configure IP Address Management options Manage DNS zones with IP Address Management Manage DHCP servers with IP Address Management Use IP Address Management to manage IP addressing 24 - Implement remote access Examine the remote access options in Windows Server Select and set up VPNs Use NPS to create and enforce network access policies Plan and implement NPS Deploy a PKI for remote access Use WAP as a reverse web proxy 25 - Implement hybrid network infrastructure Describe Azure network topologies Implement Azure VPN options Create a route-based VPN gateway using the Azure portal Implement Azure ExpressRoute Configure Azure Virtual WAN Implement DNS in hybrid environments 26 - Implement DNS for Windows Server IaaS VMs Understand Azure DNS Implement Azure DNS Create an Azure DNS zone and record using the Azure portal Implement DNS with Azure IaaS virtual machines Implement split-horizon DNS in Azure Troubleshoot DNS 27 - Implement Windows Server IaaS VM IP addressing and routing Implement a virtual network Implement IaaS VM IP addressing Assign and manage IP addresses Configure a private IP address for a virtual machine using the Azure portal Create a virtual machine with a static public IP address using the Azure portal Implement IaaS virtual machine IP routing Implement IPv6 for Windows Server IaaS virtual machines 28 - Manage Windows Server file servers Define the Windows Server file system List the benefits and uses of File Server Resource Manager Define SMB and its security considerations Configure SMB protocol Define Volume Shadow Copy Service 29 - Implement Storage Spaces and Storage Spaces Direct Define the Storage Spaces architecture and its components List the functionalities, benefits, and use cases of Storage Spaces Implement Storage Spaces List the functionalities, components, benefits, and use cases of Storage Spaces Direct Implement Storage Spaces Direct 30 - Implement Windows Server Data Deduplication Define the architecture, components, and functionality of Data Deduplication Define the use cases and interoperability of Data Deduplication Implement Data Deduplication Manage and maintain Data Deduplication 31 - Implement Windows Server iSCSI List the functionalities, components, and use cases of iSCSI List the considerations for implementing iSCSI Implement iSCSI Configure high availability for iSCSI 32 - Implement Windows Server Storage Replica List the functionalities and components of Storage Replica Examine the prerequisites for implementing Storage Replica Implement Storage Replica by using Windows Admin Center Implement Storage Replica by using Windows PowerShell 33 - Implement a hybrid file server infrastructure Describe Azure File services Configure Azure Files Configure connectivity to Azure Files Describe Azure File Sync Implement Azure File Sync Deploy Azure File Sync Deploy Azure File Sync 2 Manage cloud tiering Migrate from DFSR to Azure File Sync

AZ-800T00 Administering Windows Server Hybrid Core Infrastructure
Delivered OnlineFlexible Dates
£2,380

IP in mobile networks

5.0(3)

By Systems & Network Training

Mobile IP training course description A detailed examination of the protocols and architecture of Mobile IP. What will you learn Recognise the benefits of ADSL. Configure and troubleshoot IS-IS. Explain how IS-IS works. Describe the use of Level 1 and Level 2. Design IS-IS networks. Mobile IP course details Who will benefit: Technical staff wanting to learn DNS.Network Administrators. Support personnel. Prerequisites: TCP/IP Foundation Duration 2 days Mobile IP course contents Introduction Quick review of IP, What is Mobile IP? What Mobile IP provides, Mobility requirements, Where Mobile IP is required, where mobile IP is not required, DHCP as an alternative, Proxy ARP as an alternative. Architecture Mobile node, home network, home agent, Foreign agent, Fixed home address, Care of address, Correspondent node, Tunnelling. How Mobile IP works Using two addresses, issues with TCP, discovering the care of address, registering care of address, tunnelling the care of address. The protocols involved. Issues with Mobile IP Routing inefficiencies, Security and firewalls, ingress filtering, QoS. MIP and IPv6 Stateless address configuration, Neighbour discovery, miscellaneous.

IP in mobile networks
Delivered in Internationally or OnlineFlexible Dates
£2,477