• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

35654 Courses in Cardiff delivered Online

Certified TIA-942 Design Consultant (CTDC)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Participants must possess a valid data centre training certificate such as CDCP or any other approved equivalent. Please submit a copy of your certificate for verification upon registration for the CTDC course. Overview After completion of the course the participant will be able to:1. Learn to properly comprehend and apply the ANSI/TIA-942 Standard requirements and guidelines2. Understand the proper intent of the ANSI/TIA-942 Standard to avoid both over- and/or under-investment3. Align the selection of redundancy levels and infrastructure investments to the business requirements.4. Understand the criteria and requirements for a high-availability data centre design and how to effectively establish the data centre from the perspective of the ANSI/TIA-942 Standard5. Understand how the ANSI/TIA-942 Standard relates to various worldwide standards This course, the participant will learn how to design an ANSI/TIA-942 compliant data centre. It will provide a clear understanding of the requirements of the ANSI/TIA-942 Standard and possible implementation variations. Introduction to Data Centre Facilities About the ANSI/TIA-942 Life of the ANSI/TIA-942 Standard Relation to other standards Architectural Electrical Mechanical Telecommunication Areas under scope High level redundancy definitions Redundancy options (N, N+1 etc.) Fault tolerant Concurrent maintainability Compartmentalisation Examples of redundancy levels Data Centre Space PlanningData Centre TopologiesRecommendations for Energy EfficiencyArchitectural Site selection Parking Multi-tenant building Building construction Vapor barrier Roofing Floor loading Raised flooring Suspended/drop ceiling Hanging load Seismic Building Security & Safety Security CCTV Staffing Bullet/ballistic proofing Lighting Safety - Signage Building and Room Access Security checkpoints Entry lobby Doors and windows Exit corridors Shipping and receiving areas Room/Area Design Requirements Administrative offices Security offce Operations centre Restroom and break room UPS/Battery rooms Generator and fuel storage area Computer room Electrical Utility power - Substation - Feed requirements - Self-generation HT/HV switch gear Generator and fuel supply LT/LV switch gear - ATS - Alternatives to ATS UPS and batteries PDU STS Grounding Surge protection EPO Central power monitoring Load banks Testing Equipment maintenance - Preventive maintenance - Facility training programs Mechanical Environmental design - Temperature and humidity requirements - Contamination - Sources - Clean air - Pressurisation - Radio sources - Vibration - Water ingress Water cooled systems - Heat rejection - Chilled water system - Condenser water? - Make up water Air cooled systems HVAC control systems Plumbing - Pipe routing Fire suppression Water leak detection Telecommunications Network topology Redundancy level design Media and connectors Cabling pathways Detailed cabling design considerations Administration and labeling Cable testing Data centre fabrics Exam: Certified TIA-942 Design Consultant Actual course outline may vary depending on offering center. Contact your sales representative for more information.

Certified TIA-942 Design Consultant (CTDC)
Delivered OnlineFlexible Dates
£2,400

AZ-040T00 Automating Administration with Powershell

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for IT Professionals who are already experienced in general Windows Server, Windows client, Azure, and Microsoft 365 administration, and who want to learn more about using Windows PowerShell for administration. No prior experience with any version of PowerShell or any scripting language is assumed. This course is also suitable for IT Professionals already experienced in server administration, including Microsoft Exchange Server, Microsoft SharePoint Server, and Microsoft SQL Server. This course provides students with the fundamental knowledge and skills to use PowerShell for administering and automating administration of Windows servers. This course provides students the skills to identify and build the command they require to perform a specific task. In addition, students learn how to build scripts to accomplish advanced tasks such as automating repetitive tasks and generating reports. This course provides prerequisite skills supporting a broad range of Microsoft products, including Windows Server, Windows Client, Microsoft Azure, and Microsoft 365. In keeping with that goal, this course will not focus on any one of those products, although Windows Server, which is the common platform for all of those products, will serve as the example for the techniques this course teaches. Prerequisites Before attending this course, students must have: -Experience with Windows networking technologies and implementation. - Experience with Windows Server administration, maintenance, and troubleshooting. 1 - Review Windows PowerShell Learn about Windows PowerShell Get familiar with Windows PowerShell applications Identify factors to install and use Windows PowerShell Configure the Windows PowerShell console Configure the Windows PowerShell Integrated Scripting Environment (ISE) Use Visual Studio Code with PowerShell 2 - Understand the command syntax in Windows PowerShell Discover the structure of PowerShell cmdlets Discover the parameters for using PowerShell cmdlets Review the tab completion feature in PowerShell Display the About files content in PowerShell 3 - Find commands and Get-Help in Windows PowerShell Define modules in PowerShell Find cmdlets in PowerShell Use command aliases in PowerShell Use Show-Command and Get-Help in PowerShell Interpret the help file contents and update the local help content in PowerShell 4 - Manage Active Directory Domain Services using PowerShell cmdlets Manage user accounts in PowerShell Manage groups and group memberships in PowerShell Manage computer accounts in PowerShell Manage organizational units and Active Directory objects in PowerShell 5 - Manage network service settings for Windows devices using PowerShell cmdlets Manage IP addresses in PowerShell Manage IP routing in PowerShell Manage DNS clients in PowerShell Manage Windows Firewall settings in PowerShell 6 - Manage Windows Server settings using PowerShell cmdlets Automate management tasks using the Group Policy management cmdlets Manage server roles and services using PowerShell cmdlets Manage Hyper-V Virtual Machines using PowerShell cmdlets Manage Internet Information Services using PowerShell cmdlets 7 - Manage settings for a local Windows machine using PowerShell cmdlets Manage Windows 10 using PowerShell Manage permissions with PowerShell 8 - Understand the Windows PowerShell pipeline Review Windows PowerShell pipeline and its output Discover object members in PowerShell Control the formatting of pipeline output 9 - Select, sort, and measure objects using the pipeline Sort and group objects by property in the pipeline Measure objects in the pipeline Select a set of objects in the pipeline Select object properties in the pipeline Create and format calculated properties in the pipeline 10 - Filter objects out of the pipeline Learn about the comparison operators in PowerShell Review basic filter syntax in the pipeline Review advanced filter syntax in the pipeline Optimize the filter performance in the pipeline 11 - Enumerate objects in the pipeline Learn about enumerations in the pipeline Review basic syntax to enumerate objects in the pipeline Review advanced syntax to enumerate objects in the pipeline 12 - Send and pass data as output from the pipeline Write pipeline data to a file Convert pipeline objects to other forms of data representation in PowerShell Control additional output options in PowerShell 13 - Pass pipeline objects Pipeline parameter binding Identify ByValue parameters Pass data by using ByValue Pass data by using ByPropertyName Identify ByPropertyName parameters Use manual parameters to override the pipeline Use parenthetical commands Expand property values 14 - Connect with data stores using PowerShell providers Define Windows PowerShell providers Review the built-in providers in PowerShell Access provider help in PowerShell 15 - Use PowerShell drives in PowerShell Explain PowerShell drives in PowerShell Use PowerShell drive cmdlets in PowerShell Manage the file system in PowerShell Manage the registry in PowerShell Work with certificates in PowerShell Work with other PowerShell drives in PowerShell 16 - Review CIM and WMI Review architecture of CIM and WMI Review repositories in CIM and WMI Locate online class documentation by using CIM and WMI cmdlets 17 - Query configuration information by using CIM and WMI List local repository namespaces and classes by using CIM and WMI Query instances by using commands and WMI Query Language Connect to remote computers by using CIM and WMI cmdlets Query repository classes from remote computers by using CIMSession objects 18 - Query and manipulate repository objects by using CIM and WMI methods Discover methods of repository objects by using CIM and WMI Locate class methods and documentation by using CIM and WMI Invoke methods of repository objects by using CIM and WMI 19 - Manage variables in Windows PowerShell scripts Define variables in Windows PowerShell scripts Create variable names in Windows PowerShell scripts Assign values and types to variables in Windows PowerShell scripts Identify the methods and properties of variables in Windows PowerShell scripts Use string variables and methods in Windows PowerShell scripts Use date variables and methods in Windows PowerShell scripts 20 - Work with arrays and hash tables in Windows PowerShell scripts Define an array in Windows PowerShell scripts Work with array lists in Windows PowerShell scripts Define hash tables in Windows PowerShell Scripts Work with hash tables in Windows PowerShell scripts 21 - Create and run scripts by using Windows PowerShell Review Windows PowerShell scripts Modify scripts in the PowerShell Gallery Create scripts using Windows PowerShell Review the PowerShellGet module in Windows PowerShell Run scripts and set the execution policy in Windows PowerShell Review Windows PowerShell and AppLocker Sign the scripts digitally in Windows PowerShell 22 - Work with scripting constructs in Windows PowerShell Review and use the ForEach loop in Windows PowerShell scripts Review and use the If construct in Windows PowerShell scripts Review and use the Switch construct in Windows PowerShell scripts Review the For construct in Windows PowerShell scripts Review other loop constructs in Windows PowerShell scripts Review Break and Continue in Windows PowerShell scripts 23 - Import data in different formats for use in scripts by using Windows PowerShell cmdlets Use the Get-Content command in Windows PowerShell scripts Use the Import-Csv cmdlet in Windows PowerShell scripts Use the Import-Clixml cmdlet in Windows PowerShell scripts Use the ConvertFrom-Json cmdlet in Windows PowerShell scripts 24 - Use methods to accept user inputs in Windows PowerShell scripts Identify values that might change in Windows PowerShell scripts Use the Read-Host cmdlet in Windows PowerShell scripts Use the Get-Credential cmdlet in Windows PowerShell scripts Use the Out-GridView cmdlet in Windows PowerShell scripts Pass parameters to a Windows PowerShell script 25 - Troubleshoot scripts and handle errors in Windows PowerShell Interpret error messages generated for Windows PowerShell commands Add output to Windows PowerShell scripts Use breakpoints in Windows PowerShell scripts Interpret error actions for Windows PowerShell commands 26 - Use functions and modules in Windows PowerShell scripts Review functions in Windows PowerShell scripts Use variable scope in Windows PowerShell scripts Create modules in Windows PowerShell scripts Use the dot sourcing feature in Windows PowerShell 27 - Manage single and multiple computers by using Windows PowerShell remoting Review the remoting feature of Windows PowerShell Compare remoting with remote connectivity Review the remoting security feature of Windows PowerShell Enable remoting by using Windows PowerShell Use one-to-one remoting by using Windows PowerShell Use one-to-many remoting by using Windows PowerShell Compare remoting output with local output 28 - Use advanced Windows PowerShell remoting techniques Review common remoting techniques of Windows PowerShell Send parameters to remote computers in Windows PowerShell Set access protection to variables, aliases, and functions by using the scope modifier Enable multi-hop remoting in Windows PowerShell 29 - Manage persistent connections to remote computers by using Windows PowerShell sessions Review persistent connections in Windows PowerShell Create and manage persistent PSSessions by using Windows PowerShell Disconnect PSSessions by using Windows PowerShell Review the feature of implicit remoting in Windows PowerShell 30 - Review Azure PowerShell module Review Azure PowerShell Review the benefits of the Azure PowerShell module Install the Azure PowerShell module Migrate Azure PowerShell from AzureRM to Azure Review Microsoft Azure Active Directory module for Windows PowerShell and Azure Active Directory PowerShell for Graph modules 31 - Review the features and tools for Azure Cloud Shell Review the characteristics of Azure Cloud Shell Review the features and tools of Azure Cloud Shell Configure and experiment with Azure Cloud Shell 32 - Manage Azure resources with Windows PowerShell Create a new Azure virtual machine by using Windows PowerShell commands Manage Azure virtual machines by using Windows PowerShell commands Manage Azure related storage by using Azure PowerShell Manage Azure subscriptions by using Azure PowerShell 33 - Manage users, groups, and licenses in Microsoft Entra ID by using Windows PowerShell Review benefits to manage Microsoft 365 services by using Windows PowerShell Connect to the Microsoft 365 tenant by using Windows PowerShell Manage users in Microsoft 365 by using Windows PowerShell Manage groups in Microsoft 365 by using Windows PowerShell Manage roles in Microsoft 365 by using Windows PowerShell Manage licenses in Microsoft 365 by using Windows PowerShell 34 - Manage Exchange Online by using Windows PowerShell Connect to Exchange Online by using Windows PowerShell Manage mailboxes in Exchange Online by using Windows PowerShell Manage resources in Exchange Online by using Windows PowerShell Manage admin roles in Exchange Online by using Windows PowerShell 35 - Manage SharePoint Online by using Windows PowerShell Install and connect to SharePoint Online Management Shell by using Windows PowerShell Manage SharePoint Online users and groups by using Windows PowerShell Manage SharePoint sites by using Windows PowerShell Manage SharePoint Online external user sharing by using Windows PowerShell 36 - Manage Microsoft Teams by using Windows PowerShell Review Microsoft Teams PowerShell module Install the Microsoft Teams PowerShell module Manage teams with Microsoft Teams PowerShell module 37 - Create and manage background jobs using Windows PowerShell Define the types of background jobs in Windows PowerShell Start remote jobs and CIM/WMI jobs in Windows PowerShell Monitor jobs in Windows PowerShell Retrieve results for running jobs in Windows PowerShell 38 - Create and manage scheduled jobs using Windows PowerShell Create and run Windows PowerShell scripts as scheduled tasks Define scheduled jobs in Windows PowerShell Create job option and job trigger objects in Windows PowerShell Create and register a scheduled job in Windows PowerShell Retrieve the results from a scheduled job in Windows PowerShell

AZ-040T00 Automating Administration with Powershell
Delivered OnlineFlexible Dates
£2,975

Keys To Inclusion

By Inclusive Solutions

How can we interrupt the isolation of disabled, challenging and other ‘different’ children and adults? This is our lead workshop/training day and is both a values primer and a practical guide to successful strategies for developing inclusive practice in educational and non educational settings for children and young people of all ages. This is practical plus being a ‘hearts and minds’ day. What does inclusion mean? Can we imagine what an inclusive school look like? What do we have to do? The day gives those present opportunities to reflect on their attitudes and practice in relation to the inclusion of children and adults who are different or challenging. The Keys can be presented as a powerful interactive Keynote for large conferences. A great way to launch a conference as the first key is ‘welcome’. Learning Objectives Increased confidence regarding developing inclusive practice in mainstream schools and other settings Access to a wider range of practical strategies to impact on behaviour problems Deeper understanding of core values surrounding inclusion of disabled and challenging children and adults Opportunity to reflect on professional attitudes and behaviour towards parents and pupils New skills and processes to make inclusion successful Course Content The course answers the questions : Why inclusion? What is inclusion? How do we go about including high profile children or young people? What does inclusion have to do with me? Best delivered over the course of a full day, ‘Keys to Inclusion’ introduces participants to 6 guiding Ideas that underpin inclusive practice. The importance of WELCOME Inclusion is about Adults’ learning Taking the Long View Giftedness as a new paradigm for understanding disability and difference The Intentional Building of Relationships – ‘Circle of Friends’ work as an example of this Not doing it alone – the importance of Teams in developing inclusive practice.

Keys To Inclusion
Delivered in UK Wide Travel Costs or OnlineFlexible Dates
£1,800 to £2,500

5G demystified

5.0(3)

By Systems & Network Training

5G training course description This course is designed to give the delegate an understanding of the technologies and interworking requirements of the next generation of cellular communications. It is not a definitive set of descriptions but a possibility of the final deployment. During the course we will investigate the 10 pillars for 5G, which will include various Radio Access Technologies that are required to interwork smoothly. Hence we will look at the 4G Pro features and other RATs. What will you learn List the ten pillars of 5G deployment. Explain the 5G Internet and Software Distributed Networks (SDN). Explain carrier aggregation, the mobile cloud and RAT virtualisation. Explain an overall picture of 5G architecture. 5G training course details Who will benefit: Anyone who is looking to work with next generation networks. Prerequisites: Mobile communications demystified Duration 3 days 5G training course contents Drivers for 5G 5G Road Map, 10 Pillars of 5G, evolving RATs, small cell, o SON, MTCm, mm-wave, backhaul, EE, new spectrum, spectrum sharing, RAN virtualisation. 4G LTE advanced features *MIMO, Downlink & uplink MIMO R8, MIMO technology in LTE advanced, Downlink 8-layer SU-MIMO, Downlink MU-MIMO, Uplink MU-MIMO, Uplink transmit diversity, Coordinated multi-point operation (CoMP), Independent eNB & remote base station configurations, Downlink CoMP, * Uplink Multi-Cell Reception. ICIC & eICIC ICIC, Homogeneous to heterogeneous network, eICIC, Macro-pico scenario, Macro-femto scenario, Time orthogonal frequencies. Almost Blank Subframe (ABS). Carrier aggregation Component carriers (CC), * CC aggregation, Intra-band contiguous solutions, Intra-band non-contiguous solutions, Inter-band non-contiguous solutions, CA bandwidth classes, Aggregated transmission bandwidth configurations (ATBC), Possible carrier aggregation configurations (Rel 9, 10 & 12). Enhanced Interference Mitigation & Traffic Adaptation (eIMTA) TDD UL-DL reconfiguration for traffic adaptation, Reconfiguration mechanisms, Interference mitigation schemes, Dynamic & flexible resource allocation. 5G architectures 5G in Europe, horizon 2020 framework, 5G infrastructure PPP, METIS project, innovation centre, 5G in North America, research, company R & D, 5G specifications. The 5G internet Cloud services, IoT & context awareness, network reconfiguration & virtualization support, hypervisors, SDN, the controller, service-oriented API, OpenFlow switches, SDN operation, SDN control for traffic flow redirection, OpenFlow controllers, how SDN works, application, control and infrastructure layers, a programmable network, how SDN & NFV tie together, SDN's downside, SDN orchestration, Mobility, architectures for distributed mobility management, MEDIEVAL & MEDIVO projects, a clean slate approach, mobility first architecture, network virtualization (VNet), INM, NetInf, ForMux, MEEM, GP & AM, QoS support, network resource provisioning, IntServ, RSVP, DiffServ, CoS, aggregated resource provisioning, SICAP, MARA, Emerging approach for resource over-provisioning, example use case architecture for the 5G internet, integrating SDN/NFV for efficient resource control, control information repository, service admission control policies, network resource provisioning, control enforcement functions, network configurations, network operations. Small cells for 5G Average spectral efficiency evolution, What are small cells? WiFi & Femto cells as candidate small-cell technologies, Capacity limits & achievable gains with densifications, gains with multi-antenna techniques, gains with small cells, Mobile data demand, approach & methodology, subscriber density projections, traffic demand projections, global mobile data traffic increase modelling, country level backhaul traffic projections, 2020 average spectrum requirement, Small cell challenges, backhaul, spectrum, automation. Cooperation for next generation wireless networks Cooperative diversity & relaying strategies, Cooperative ARQ & MAC protocols, NCCARQ & PRCSMA packet exchange, Physical layer impact on MAC protocol, NCCARQ overview, PHY layer impact, Performance evaluation, simulation scenario and results. Mobile clouds; technology & services for future communications platforms Mobile cloud, software, hardware and networking resources, Mobile cloud enablers, mobile user domain, wireless technologies, WWAN WLAN and WPAN range, Bluetooth, IEEE.802.15.4, software stacks, infrared, near field communications (NFC), store & forward vs compute & forward, random/linear network coding. Security for 5G communications Potential 5G architectures, Security issues & challenges in 5G, user equipment, mobile malware attacks, 5G mobile botnets, attacks on 4G networks, C-RNTI & packet sequence numbers based UE location tracking, false buffer status reports attacks, message insertion attacks, HeNB attacks, physical attacks, attacks on mobile operator's network, user data & identity attacks, DDoS attacks, amplification, HSS saturation, external IP networks.

5G demystified
Delivered in Internationally or OnlineFlexible Dates
£2,367

Adobe After Effects Beginners to Advanced Course

By ATL Autocad Training London

Adobe After Effects Beginners to Advanced Course Tailored for motion graphics designers basic to expert level. Explore advanced topics including motion tracking, green screen compositing, text animation, and techniques like expressions. Learn animations based on geometric proportions in our Advanced Motion Methods module.  Click here for more info: Website Duration: 40 hours Approach: 1-on1 sessions and Customized content. Schedule: Choose your own day and time. Mon to Sat between 9 am and 5 pm. Module 1: Introduction to After Effects Exploring Adobe After Effects Navigating the Interface Configuring Preferences Utilizing Auto-Save Feature Module 2: Projects and Compositions Creating New Projects/Compositions Importing and Organizing Assets Working with Layers Module 3: Animation Techniques Keyframe Essentials Motion Paths and Modifications Graph Editor Insights Motion Control Tools Module 4: Layer Management Organizing and Navigating Layers Layer Visibility and Locking Switches and Modes in Detail Module 5: Shape Manipulation Shape Layers Fundamentals Creating and Animating Shapes Anchor Point Adjustment Module 6: Effects Mastery Applying and Customizing Effects Exploring Various Effects Examples Module 7: Masks and Track Mattes Mask Creation and Animation Track Matte Techniques Module 8: Text and Typography Animation Working with Text Layers Text Animation Presets Layer Styles for Typography Module 9: Exporting Your Creations Export Options Overview Direct Export from After Effects Utilizing Media Encoder After Effects  https://www.adobe.com  By the end of this 40-hour After Effects training, you will: Master Essentials: Understand fundamental and advanced After Effects features for diverse projects. Create Impactful Visuals: Craft compelling motion graphics, animations, and visual effects. Expert Animation Skills: Perfect keyframing, motion paths, and dynamic animations. Streamlined Workflow: Organize projects efficiently, ensuring smooth project execution. Creative Expression: Manipulate shapes, animate text, apply effects, and create masks creatively. Professional Exporting: Master export techniques for various platforms and media. Confidence and Expertise: Solve challenges confidently, applying skills in real-world projects. Industry-Ready: Gain skills applicable in filmmaking, animation, marketing, and creative sectors. Ongoing Support: Access post-training support for continued assistance. Certification: Receive a recognized certification, enhancing your professional profile. Course Title: Adobe After Effects Comprehensive Training Key Details: Duration: 40 hours Learning Approach: Personalized Training: Tailored content with 1-2-1 sessions. Flexible Schedule: Choose hours between 9 am and 7 pm, Monday to Saturday. Method: Hands-on learning with step-by-step demonstrations. Course Highlights: Master Essential Tools: From basics to advanced features for motion graphics and visual effects. Expert Guidance: Certified trainers provide personalized attention. Creative Animation: Learn advanced animation techniques, motion paths, and effects application. Efficient Workflow: Optimize project organization, layer management, and export techniques. Real-World Projects: Apply skills in filmmaking, animation, marketing, and more. Post-Training Support: Lifetime access to email and phone assistance for continued guidance. Certification: Receive a recognized certificate upon course completion. Benefits: Industry-Relevant Skills: Gain expertise for diverse creative sectors. Unleash Creativity: Craft compelling motion graphics, animations, and visual effects. Confidence in Execution: Solve challenges confidently with real-world application. Professional Recognition: Enhance your profile with a certified After Effects proficiency. Course Materials and Certification: Upon enrollment, you will receive a valuable After Effects training guide in PDF format, serving as a useful resource during and after the course. Additionally, upon successful completion, you'll be awarded an e-certificate, validating your achievement in the Adobe After Effects training program. Post-Course Support: Rest assured, you'll have access to lifetime email support from your dedicated After Effects trainer, providing assistance for any inquiries or challenges arising after the course. Prerequisites and Software Version: No prior After Effects knowledge is required for enrollment. The training is tailored for After Effects 2023, with techniques applicable to recent software releases. Whether you're a Windows or Mac user, the training suits your needs. Our Guarantees: We prioritize your satisfaction with our double guarantee - a price assurance ensuring the best value for your investment and a training guarantee ensuring you master essential concepts and skills.

Adobe After Effects Beginners to Advanced Course
Delivered OnlineFlexible Dates
£1,800

Mobile communications demystified

5.0(3)

By Systems & Network Training

Mobile comms training course description A complete overview of mobile communications covering all the major technologies in a 2-day format. What will you learn GSM GPRS UMTS LTE Alternative mobile strategies Mobile comms training course details Who will benefit: Anyone involved in mobile communications. Prerequisites: None. Duration 2 days Mobile comms training course contents Introduction Telephony, RF, mobile and wireless technologies, distances, mobile phone generations, base stations, cells, frequencies, cell types, MSC, handoffs, channels, internetworking, the Internet, wireless Internet access. UK operators, worldwide operators. GSM What is it? Timeline, digitising voice, channels, GSM architecture, Abis, A, Um, MS, BTS, BSC, MSC, HLR, VLR, EIR, AuC. Radio link aspects, GSM signalling overview, signalling protocols, roaming, GSM call flows, authentication. IMEI. SIM cards. GPRS What it is, 2G to 3G, GPRS user features, GPRS network features, GPRS elements, GPRS architecture, overlay, SGSN, GGSN, GPRS ATTACH, GPRS protocol stack, GPRS timeslots, EDGE, GPRS classes, GPRS routing, GPRS packet format. UMTS and 3G What is 3G? IMT-2000, 3G proposals, what is UMTS? Speed comparison, evolution to 3G, CDMA, CDMA 2000, W-CDMA, UMTS components, UMTS infrastructure, RNC, Node B, network architecture, packet switched attach, mobility in 3G, HSDPA. LTE and 4G LTE architecture and principles, Physical layer, Air interface, E-UTRAN, Evolved packet core, service provision. Other wireless solutions Integration of services, Bluetooth, Blackberry, VoIP, Mobile IP, 802.11, WiFi, 802.16, WiMax, What is 5G?

Mobile communications demystified
Delivered in Internationally or OnlineFlexible Dates
£1,497

Complete JavaScript

5.0(3)

By Systems & Network Training

Complete JavaScript training course description A hands on course covering JavaScript programming. Core JavaScript is covered first, including the basics, arrays, functions, classes, modules and Regular expressions. Client side JavaScript is then covered including JavaScript in browsers, Scripting CSS, the jQuery library and HTML APIs. What will you learn Read JavaScript. Write JavaScript. Debug JavaScript. Complete JavaScript training course details Who will benefit: Anyone wishing to learn JavaScript. Prerequisites: None. Duration 3 days Complete JavaScript training course contents CORE JAVASCRIPT Lexical structure: Character set, comments, literals, identifiers, and reserved words, optional semicolons.. Types, values and variables: Numbers, text, boolean values, null and undefines, the global object, wrapper objects, immutable primitive values and mutable object references, type conversions, variable declaration, variable scope. Expressions and operators: Primary expressions, object and array initializers, function definition expressions, property access expressions, invocation expressions, object creation expressions, operator overview, arithmetic expressions, relational expressions, logical expressions, assignment expressions, evaluation expressions, miscellaneous operators. Statements: Expression statements, compound and empty statements, declaration statements, conditionals, loops, jumps, miscellaneous statements, summary of JavaScript statements. Objects: Creating objects, querying and setting properties, deleting properties, testing properties, enumerating properties, property getters and setters, property attributes, object attributes, serializing objects, object methods. Arrays: Creating arrays, reading and writing array elements, sparse arrays, array length, adding and deleting array elements, iterating arrays, multi-dimensional arrays, array methods, FCMAScript 5 array methods, array type, array-like objects, strings as arrays. Functions: Defining functions, invoking functions, function arguments and parameters, functions as values, functions as namespaces, closures, function properties, methods and constructor, functional programming. Classes and modules: Classes and prototypes, classes and constructors, Java-style classes in JavaScript, augmenting classes, classes and types, object oriented techniques in JavaScript, subclasses, classes in ECMAScript 5, modules. Pattern matching and regular expressions: Defining regular expressions, string methods for pattern matching, the RegExp object. JavaScript subsets and extensions: JavaScript subsets, constants and scoped variables, destructuring assignment, iteration, shorthand functions, multiple catch clauses, E4X: ECMAScript for XML. Server-side JavaScript: Scripting Java with Rhino, asynchronous I/O with node. CLIENT SIDE JAVASCRIPT JavaScript in web browsers: Client side JavaScript, embedding JavaScript in HTML, execution of JavaScript programs, compatibility and interoperability, accessibility, security, client side frameworks. The Window object: Timers, browser location and navigation, browsing history, browser screen information, dialog boxes, error handling, document elements as window properties, multiple windows and frames. Scripting Documents: Overview of the DOM, selecting document elements, document structure and traversal, attributes, element content, creating, inserting and deleting nodes. Example: generating a table of contents, document and element geometry and scrolling, HTML forms, other document features. Scripting CSS: Overview of CSS, important CSS properties, scripting inline styles, querying computed styles, scripting CSS classes, scripting stylesheets. Handling events: Types of events, registering event handlers, event handler invocation, document load events, mouse events, mousewheel events, drag and drop events, text events, keyboard events. Scripted HTTP: Using XMLHttpRequest, HTTP by <script>: JSOMP, Comet with server-sent events. The jQuery library: jQuery basics, jQuery getters and setters, altering document structure, handling events with jQuery, Animated effects, Ajax with jQuery, Utility functions, jQuery selectors and selection methods, Extending jQuery with plug-ins. The jQuery UI library. Client side storage: localStorage and sessionStorage, Cookies, IE usingData persistence, Applicatioin storage and offline webapps. Scripted media and graphics: Scripting images, Scripting audio and video, SCG:scalable vector graphics, Graphics in a <canvas>. Scripted HTTP: Using XMLHttpRequest, HTTP by <script>: JSOMP, Comet with server-sent events. The jQuery library: jQuery basics, jQuery getters and setters, altering document structure, handling events with jQuery, Animated effects, Ajax with jQuery, Utility functions, jQuery selectors and selection methods, Extending jQuery with plug-ins. The jQuery UI library. Client side storage: localStorage and sessionStorage, Cookies, IE usingData persistence, Applicatioin storage and offline webapps. Scripted media and graphics: Scripting images, Scripting audio and video, SCG:scalable vector graphics, Graphics in a <canvas>. HTMLS APIs: Geolocation, history management, cross-origin messaging, web workers, type arrays and ArrayBuffers, blobs, the filesystem API, client side databases, web sockets.

Complete JavaScript
Delivered in Internationally or OnlineFlexible Dates
£2,367

CompTIA A+ Part 2

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for individuals who have basic computer user skills and who are interested in obtaining a job as an entry-level IT technician. This course is also designed for students who are seeking the CompTIA A+ certification and who want to prepare for the CompTIA A+ Core 2 220-1102 Certification Exam. Overview Identify, install and configure Windows Operating System features Perform OS installations and upgrades Identify features and tools of macOS Identify features and tools of Linux OS Summarize security measures and protocols Configure SOHO network security Manage security settings Troubleshoot Windows OS problems Explain change-management best practices Implement workstation backup and recover methods Identify the basics of scripting CompTIA A+ certified professionals are proven problem solvers. They support today?s core technologies from security to cloud to data management and more. CompTIA A+ is the industry standard for launching IT careers into today?s digital world. It is the only industry recognized credential with performance-based items to prove pros can think on their feet to perform critical IT support tasks in the moment. It is trusted by employers around the world to identify the go-to person in end point management and technical support roles. CompTIA A+ is regularly re-invented by IT experts to ensure that it validates core skills and abilities demanded in the workplace. This course follows after the A+ Part 1 course and prepares you for the A+ Core 2 exam 220-1101. Prerequisites While there are no prerequisites for this course, please ensure you have the right level of experience to be successful in this training. Lesson 1: Configuring Windows Topic 1A: Configure Windows User Settings Topic 1B: Configure Windows System Settings Lesson 2: Managing Windows Topic 2A: Use Management Consoles Topic 2B: Use Performance and Troubleshooting Tools Topic 2C: Use Command-line Tools Lesson 3: Identifying OS Types and Features Topic 3A: Explain OS Types Topic 3B: Compare Windows Editions Lesson 4: Supporting Windows Topic 4A: Perform OS Installations and Upgrades Topic 4B: Install and Configure Application Topic 4C: Troubleshoot Windows OS Problems Lesson 5: Managing Windows Networking Topic 5A: Manage Windows Networking Topic 5B: Troubleshoot Windows Networking Topic 5C: Configure Windows Security Settings Topic 5D: Manage Windows Shares Lesson 6: Managing Linux and macOS Topic 6A: Identify Features of Linux Topic 6B: Identify Features of macOS Lesson 7: Configuring SOHO Network Security Topic 7A: Explain Attacks, Threats, and Vulnerabilities Topic 7B: Compare Wireless Security Protocols Topic 7C: Configure SOHO Router Security Topic 7D: Summarize Security Measures Lesson 8: Managing Security Settings Topic 8A: Configure Workstation Security Topic 8B: Configure Browser Security Topic 8C: Troubleshoot Workstation Security Issues Lesson 9: Supporting Mobile Software Topic 9A: Configure Mobile OS Security Topic 9B: Troubleshoot Mobile OS and App Software Topic 9C: Troubleshoot Mobile OS and App Security Lesson 10: Using Support and Scripting Tools Topic 10A: Use Remote Access Technologies Topic 10B: Implement Backup and Recovery Topic 10C: Explain Data Handling Best Practices Topic 10D: Identify Basics of Scripting Lesson 11: Implementing Operational Procedures Topic 11A: Implement Best Practice Documentation Topic 11B: Use Proper Communication Techniques Topic 11C: Use Common Safety and Environmental Procedures

CompTIA A+ Part 2
Delivered OnlineFlexible Dates
£2,475

Signalling systems for engineers

5.0(3)

By Systems & Network Training

Signalling training course description An intensive course that defines and explores the signalling methods that are to be found in today's telecommunications services. What will you learn Describe the Functionality and Features of Signalling. Describe the Functionality of Analogue & Digital Subscriber Signalling. Describe the various types of signalling used on different network types. Describe the Functionality of Private Network Signalling. Describe the Functionality of Public Network Signalling. Signalling training course details Who will benefit: Personnel involved with systems design, implementation and support. Prerequisites: Telecommunications Introduction Duration 2 days Signalling training course contents Introduction What is Signalling?, Standards, ITU-T Recommendations, Signalling Categories - Supervisory Addressing, E.164, Call Information, Network Management, Network Components, Inband/Outband Switch Signalling, Analogue Vs Digital Signalling. Analogue Subscriber Signalling Analogue Local Loops/Switches/Trunks, Digital Switches/Local Loops, Telephone Handset, Accessing the Local Exchange, Pulse/Tone Dialling. Digital Subscriber Signalling Integrated Digital Access, DASS2 & DPNSS, DASS2 - Call, IMUX, Euro ISDN, Q.931 Call Control, Message Identification, Message Types, Call Establishment Messages, Call Clearing. Network Types Service Types, Circuit Switched, Packet Switched, Signalling Terminology, In-Channel Signalling, G.704, Performance and Quality, Digital Signalling, CAS, CAS Applications, Foreign Exchange, CCS, Break-In/Out Private Network Signalling Types Networking PABXs, Inter PABX Analogue Signalling Methods, E & M, Tone-On-Idle, Inter PABX Digital Signalling Methods, DPNSS, DPNSS Deployment, PABX Support for DPNSS, DPNSS Call, Q.Sig, Q.Sig support/functionality/protocol, Message Overview, Call Establishment. Public Network Signalling SS7, SS7 Operations, SS7 Topology, SSP, STP, SCP, Database Types - CMSDB NP LIDB HLR VLR, Signalling Modes, Link Types, Further Redundancy, Linksets, SS7 addressing, Point Codes, Sub-System, Global Title Addressing and Translation, ANSI PCs, ITU-T PCs, SS7 Protocol Stack, MTP Level 1, MTP Level 2, Flow Control, FISU, LSSU, MSU, MSU SIF, MTP Level 3, SCCP, TCAP, TUP, Facility Format, Main Facilities, Flow Control Negotiation, Closed User Groups, Reverse Charging, Fast Select Facility, Throughput Class Negotiation, Call Barring, On-Line Facility Registration. BTUP, ISDN ISUP, Supplementary Services, ISUP Call - IAM, Progress/Answer/Suspend/ Resume/Release Messages, Intelligent Network (IN) Introduction, IN Evolution, IN Conceptual Model, IN Target Services & Service Features, Service Independent Building Blocks

Signalling systems for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,727

CompTIA Security+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for people who are seeking to launch a career in cybersecurity. Overview Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; Monitor and secure hybrid environments, including cloud, mobile, and IoT; Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; Identify, analyze, and respond to security events and incidents. CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and is the first security certification a candidate should earn. CompTIA Security+ establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Lesson 1: Summarize Fundamental Security Concepts Security Concepts Security Controls Lesson 2: Compare Threat Types Threat Actors Attack Surfaces Social Engineering Lesson 3: Explain Cryptographic Solutions Cryptographic Algorithms Public Key Infrastructure Cryptographic Solutions Lesson 4: Implement Identity and Access Management Authentication Authorization Identity Management Lesson 5: Secure Enterprise Network Architecture Enterprise Network Architecture Network Security Appliances Secure Communications Lesson 6: Secure Cloud Network Architecture Cloud Infrastructure Embedded Systems and Zero Trust Architecture Lesson 7: Explain Resiliency and Site Security Concepts Asset Management Redundancy Strategies Physical Security Lesson 8: Explain Vulnerability Management Device and OS Vulnerabilities Application and Cloud Vulnerabilities Vulnerability Identification Methods Vulnerability Analysis and Remediation Lesson 9: Evaluate Network Security Capabilities Network Security Baselines Network Security Capability Enhancement Lesson 10: Assess Endpoint Security Capabilities Implement Endpoint Security Mobile Device Hardening Lesson 11: Enhance Application Security Capabilities Application Protocol Security Baselines Cloud and Web Application Security Concepts Lesson 12: Explain Incident Response and Monitoring Concepts Incident Response Digital Forensics Data Sources Alerting and Monitoring Tools Lesson 13: Analyze Indicators of Malicious Activity Malware Attack Indicators Physical and Network Attack Indicators Application Attack Indicators Lesson 14: Summarize Security Governance Concepts Policies, Standards, and Procedures Change Management Automation and Orchestration Lesson 15: Explain Risk Management Processes Risk Management Processes and Concepts Vendor Management Concepts Audits and Assessments Lesson 16: Summarize Data Protection and Compliance Concepts Data Classification and Compliance Personnel Policies Additional course details: Nexus Humans CompTIA Security Plus Certification (Exam SY0-601) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Security Plus Certification (Exam SY0-601) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Security+
Delivered OnlineFlexible Dates
£2,475