• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

26225 Courses in Cardiff delivered Online

Essential EVPN

5.0(3)

By Systems & Network Training

Essential EVPN training course description Ethernet VPN (E-VPN) and Provider Backbone Bridging E-VPN (PBB-EVPN) are emerging technologies providing Ethernet services over MPLS. This course studies the technologies in E-VPN/PBB-EVPN providing multi-homing, multi pathing, auto discovery, multicast, forwarding and fast convergence. What will you learn Differentiate between E-VPN and PBB-EVPN. Explain how E-VPN operates. Explain how PBB-EVPN operates. Explain how E-VPN provides: Multi homing Multi pathing Auto discovery. Essential EVPN training course details Who will benefit: Network engineers. Staff working for carriers. Prerequisites: Definitive Ethernet switching for engineers Concise MPLS for engineers Duration 2 days Essential EVPN training course contents Introduction to EVPN Network virtualization What Is network virtualization? types of virtual networks, network tunnelling, the consequences of tunnelling, packet load balancing, network interface card behaviour. maximum transmission unit, lack of visibility, VXLAN, protocols to implement the control plane, support for network virtualization technologies, merchant silicon Software, standards. The building blocks of Ethernet VPN A brief history of EVPN, architecture and protocols for traditional EVPN deployment, EVPN in the data center BGP constructs for Virtual networks, address family indicator/subsequent address family indicator, route distinguisher, route target, RD, RT, and BGP processing, route types, modifications to support EVPN over eBGP, keeping the NEXT HOP unmodified, retaining route targets, FRR support for EVPN, automatic propagation of NEXT HOP, RT/RD derivation, what Is not supported in FRR. Bridging with Ethernet VPN An overview of traditional bridging, overview of bridging with EVPN, what Ifs, why does NVE L3 get an advertisement for MACA? handling BUM packets, handling MAC moves, support for dual-attached hosts, the host-switch Interconnect, VXLAN model for dual-attached hosts, switch peering solutions, handling Link failures, duplicate multi-destination frames, ARP/ND suppression. Routing with Ethernet VPN The case for routing in EVPN, routing use cases in the data center, routing models, where is the routing performed? centralized routing, distributed routing, how routing works in EVPN, asymmetric routing, symmetric routing, VRFs in EVPN routing, summarized route announcements, BGP support for EVPN routing, comparing asymmetric and symmetric models, vendor support for EVPN routing. Configuring and administering Ethernet VPN The sample topology, configuration cases, configuring the MTU, the end first: complete FRR configurations, the Invariants: configuration for the spines, firewall, and servers, centralized routing, asymmetric distributed routing, symmetric routing, dissecting the configuration, configuring the underlay, configuring the overlay: FRR configuring the overlay: interfaces, examining an EVPN network, show running configuration, show BGP summary, show EVPN VNIs and VTEPs, identify which VTEP advertised a MAC address, comparing FRR and Cisco EVPN configurations, considerations for deploying EVPN in large networks.

Essential EVPN
Delivered in Internationally or OnlineFlexible Dates
£2,477

DevOps demystified

5.0(3)

By Systems & Network Training

DevOps demystified training course description This course is an introduction to DevOps. The course emphasizes communication, collaboration , integration, and automation to improve the workflow between developers and IT operations professionals. Improved workflows lead to more opportunities to design software and services in a more agile fashion. This course is a basis for discovering the most important DevOps concepts and to understand the principles and methods behind this. The course will leave you with the inspiration to be the advocate of change. What will you learn Explain DevOps principles. Describe the relationship between Agile , Lean and IT Service Management ( ITSM). Describe methods for automation and technology factors. Describe considerations when changing. Describe challenges, risks and critical success factors. DevOps demystifieds training course details Who will benefit: Non-technical staff involved with DevOps. Prerequisites: None. Duration 1 day DevOps demystified training course contents Why DevOps? From a business perspective From an IT perspective Stereotypes of Dev and Ops: perception and reality What is DevOps? Introduction DevOps Goals DevOps Added value of DevOps Proven Results DevOps for businesses DevOps principles (The Three Ways) DevOps and other frameworks DevOps and Agile DevOps and Lean DevOps and IT Service Management DevOps culture Characteristics of a DevOps culture Organizational Considerations DevOps DevOps stakeholders DevOps roles DevOps teams DevOps organizational structures DevOps methods Continuous Integration Continuous delivery Continuous deployment Value stream mapping Kanban Theory of Constraints Improvement Kata Deming's quality circle ITSM processes DevOps and Automation Methods for DevOps automation Longevity and tools categories DevOps applications Transitioning to a DevOps culture Implementation Challenges, risks and critical success factors Measuring DevOps successes

DevOps demystified
Delivered in Internationally or OnlineFlexible Dates
£967

VMware vSphere: Install, Configure, Manage v8.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for System administrators System engineers Overview By the end of the course, you should be able to meet the following objectives: Install and configure ESXi hosts Deploy and configure vCenter Use the vSphere Client to create the vCenter inventory and assign roles to vCenter users Create virtual networks using vSphere standard switches and distributed switches Create and configure datastores using storage technologies supported by vSphere Use the vSphere Client to create virtual machines, templates, clones, and snapshots Create content libraries for managing templates and deploying virtual machines Manage virtual machine resource allocation Migrate virtual machines with vSphere vMotion and vSphere Storage vMotion Create and configure a vSphere cluster that is enabled with vSphere High Availability (HA) and vSphere Distributed Resource Scheduler Manage the life cycle of vSphere to keep vCenter, ESXi hosts, and virtual machines up to date This five-day course features intensive hands-on training that focuses on installing, configuring, and managing VMware vSphere 8, which includes VMware ESXi 8 and VMware vCenter 8. This course prepares you to administer a vSphere infrastructure for an organization of any size. This course is the foundation for most VMware technologies in the software-defined data center. Course Introduction Introductions and course logistics Course objectives vSphere and Virtualization Overview Explain basic virtualization concepts Describe how vSphere fits in the software-defined data center and the cloud infrastructure Recognize the user interfaces for accessing vSphere Explain how vSphere interacts with CPUs, memory, networks, storage, and GPUs Installing and Configuring ESXi Install an ESXi host Recognize ESXi user account best practices Configure the ESXi host settings using the DCUI and VMware Host Client Deploying and Configuring vCenter Recognize ESXi hosts communication with vCenter Deploy vCenter Server Appliance Configure vCenter settings Use the vSphere Client to add and manage license keys Create and organize vCenter inventory objects Recognize the rules for applying vCenter permissions View vCenter logs and events Configuring vSphere Networking Configure and view standard switch configurations Configure and view distributed switch configurations Recognize the difference between standard switches and distributed switches Explain how to set networking policies on standard and distributed switches Configuring vSphere Storage Recognize vSphere storage technologies Identify types of vSphere datastores Describe Fibre Channel components and addressing Describe iSCSI components and addressing Configure iSCSI storage on ESXi Create and manage VMFS datastores Configure and manage NFS datastores Deploying Virtual Machines Create and provision VMs Explain the importance of VMware Tools Identify the files that make up a VM Recognize the components of a VM Navigate the vSphere Client and examine VM settings and options Modify VMs by dynamically increasing resources Create VM templates and deploy VMs from them Clone VMs Create customization specifications for guest operating systems Create local, published, and subscribed content libraries Deploy VMs from content libraries Manage multiple versions of VM templates in content libraries Managing Virtual Machines Recognize the types of VM migrations that you can perform within a vCenter instance and across vCenter instances Migrate VMs using vSphere vMotion Describe the role of Enhanced vMotion Compatibility in migrations Migrate VMs using vSphere Storage vMotion Take a snapshot of a VM Manage, consolidate, and delete snapshots Describe CPU and memory concepts in relation to a virtualized environment Describe how VMs compete for resources Define CPU and memory shares, reservations, and limits Deploying and Configuring vSphere Clusters Create a vSphere cluster enabled for vSphere DRS and vSphere HA View information about a vSphere cluster Explain how vSphere DRS determines VM placement on hosts in the cluster Recognize use cases for vSphere DRS settings Monitor a vSphere DRS cluster Describe how vSphere HA responds to various types of failures Identify options for configuring network redundancy in a vSphere HA cluster Recognize vSphere HA design considerations Recognize the use cases for various vSphere HA settings Configure a vSphere HA cluster Recognize when to use vSphere Fault Tolerance Managing the vSphere Lifecycle Enable vSphere Lifecycle Manager in a vSphere cluster Describe features of the vCenter Update Planner Run vCenter upgrade prechecks and interoperability reports Recognize features of vSphere Lifecycle Manager Distinguish between managing hosts using baselines and managing hosts using images Describe how to update hosts using baselines Describe ESXi images Validate ESXi host compliance against a cluster image and update ESXi hosts Update ESXi hosts using vSphere Lifecycle Manager Describe vSphere Lifecycle Manager automatic recommendations Use vSphere Lifecycle Manager to upgrade VMware Tools and VM hardware

VMware vSphere: Install, Configure, Manage v8.0
Delivered OnlineFlexible Dates
£4,250

Essential Frame Relay

5.0(3)

By Systems & Network Training

Frame Relay training course description A comprehensive look at Frame Relay, particularly with reference to a IP routed environment. Note this course is run as a workshop and therefore the contents are flexible. What will you learn Recognise the issues of using Frame Relay Describe Frame Relay. Configure a Cisco router to use Frame relay. Frame Relay training course details Who will benefit: Anyone working with Frame Relay. Prerequisites: Intro to data communications & networking Duration 1 day Frame Relay training course contents Introduction Packet switched networks, PVCs, SVCs. Topologies, Full mesh, partial mesh, Hub and spoke. Basics DLCI, CIR, LMI, the local loop. Configuring routers for Frame Relay Inverse ARP, static mappings, subinterfaces More Frame Relay Burst rates, FECN, BECN, the DE bit, Traffic shaping. Voice Over Frame Relay

Essential Frame Relay
Delivered in Internationally or OnlineFlexible Dates
£1,397

RESILIA Foundation: Virtual In-House Training

By IIL Europe Ltd

RESILIA™ Foundation: Virtual In-House Training AXELOS RESILIA™: Cyber Resilience Best Practice is designed to help commercial and government organizations around the world prevent, detect, and correct any impact cyber attacks will have on the information required to do business. Adding RESILIA to the existing AXELOS global best practice portfolio, including ITIL® and PRINCE2®, brings a common cyber resilience best practice for security, IT service management, and business. Active cyber resilience is achieved through people, process, and technology. The RESILIA™ Foundation course starts with the purpose, key terms, the distinction between resilience and security, and the benefits of implementing cyber resilience. It introduces risk management and the key activities needed to address risks and opportunities. Further, it explains the relevance of common management standards and best practice frameworks to achieve cyber resilience. Subsequently, it identifies the cyber resilience processes, the associated control objectives, interactions, and activities that should be aligned with corresponding ITSM activities. In the final part of the course, it describes the segregation of duties and dual controls related to cyber resilience roles and responsibilities. What you will Learn At the end of this course, you will be able to: Demonstrate your knowledge of the purpose, benefits, and key terms of cyber resilience Demonstrate your knowledge of the risk management and the key activities needed to address risks and opportunities Demonstrate your knowledge of the purpose of a management system and how best practices and standards can contribute Demonstrate your knowledge of the cyber resilience strategy, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience design, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience transition, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience operation, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of cyber resilience continual improvement, the associated control objectives, and their interactions with ITSM activities Demonstrate your knowledge of the purpose and benefits of segregation of duties and dual controls Course Introduction Course Learning Objectives Course Agenda Activities Course Book Structure RESILIA Certification Introduction to Cyber Resilience What is Cyber Resilience? Defining Cyber Resilience Balancing in Cyber Resilience Characteristics of Cyber Resilience Risk Management Understanding Risk Management: Discussion Defining Risk Management Addressing Risks and Opportunities Managing Cyber Resilience Why and What of Management Systems? Management Systems Common Management Standards and Frameworks Cyber Resilience Strategy What is Strategy? Cyber Resilience Strategy and Activities Security Controls at Cyber Resilience Strategy Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Design Why Cyber Resilience Design? Cyber Resilience Design Activities Security Controls at Cyber Resilience Design Aligning ITSM Processes with Cyber Resilience Processes Cyber Resilience Transition Why Cyber Resilience Transition? Basics of Cyber Resilience Transition Cyber Resilience Transition: Controls Interaction Between ITSM Processes and Cyber Resilience Cyber Resilience Operation The Purpose of Cyber Resilience Operation Security Controls in Cyber Resilience Operation Interaction Between IT Processes and Cyber Resilience Interaction Between ITSM Functions and Cyber Resilience Cyber Resilience Continual Improvement Continual or Continuous Improvement Maturity Models Continual Improvement Controls The Seven-Step Improvement Process The ITIL CSI Approach Cyber Resilience Roles & Responsibilities Segregating Duties Dual Controls

RESILIA Foundation: Virtual In-House Training
Delivered OnlineFlexible Dates
£1,850

GPON and FTTx networks

5.0(3)

By Systems & Network Training

GPON and FTTx networks training course description Designed to benefit those requiring an in depth knowledge of the principles and applications of Ten Gigabit and Gigabit Passive Optical Networking and Fibre to the X in NG Networks applications and their associated equipment, its flexibility and function within a modern transmission network. Using an effective mix of 'hands on' equipment instruction and correlation to theory based learning the delegate will gain a complete understanding of the equipment and the tasks to be undertaken in a real life situation. What will you learn Compare PON/FTTx systems. Explain network elements and designs. Support applications and network interfaces. List circuit provisioning and bandwidth requirements. Understand upstream & downstream issues. Describe headend & network elements/OLT-ONT. Perform network testing with OTDR test sets. GPON and FTTx networks training course details Who will benefit: Anyone working with GPON and FTTx. Prerequisites: Introduction to data communications and networking. Duration 5 days GPON and FTTx training course contents FTTN, FTTC, FTTH SMF, MMF, Fibre safety and properties (dispersion/attenuation), Fibre reel cables and types, Fibre installation and air blown fibre, Transmitters and receivers - power budget/laser classes. Fibre to the home (FTTH), FTTC (Fibre to the Cabinet), FTTN (Fibre to the node) , FTTD (Fibre to the desk), FFTH topologies and wavelengths, Active or passive optical network. WDM equipment and GPON OSP design Wavelength considerations, WDM/DWDM/CWDM, EDFA optical amplification, AWG (Arrayed Waveguide Grating) splitters , Couplers (splitters) and losses, Optical splitters 1x2, 1x4, 1x8, 1x16, 1x32, 1x64, 2x64. PON variants Gigabit passive optical network (GPON), Gigabit Ethernet passive optical network (GEPON), Time division PON (TDM-PON), Wave Division Multiplexing PON (WDM-PON), 1Gbps, 10Gbps, 40Ggps, 100Gbps FSAN (Full Service Access Network) NGA (Next Generation Access), Strategies for TDM-PON to WDM-PON migration, Architecture of NG-PON (hybrid WDM/TDM PON), Additional services than triple play. GEPON design GPON OSP centralized and distributed design, GPON PON splitters x4 x8 x32, Fibre splice trays /cassette trays & enclosures, GPON field testing and installation verification, GPON physical layer testing, Optical time domain reflectometer (OTDR), Optical power source & meter, Optical return loss (ORL), APON/BPON/GPON/EPON comparisons. GPON ITU-T G.984.1 Reference model, terminology & architecture, Access network system management functions. ONT & OLT functional block examples. FTTx scenarios, 4 switching arrangements for external access network backup. GPON ITU-T G.984.2 Physical layer, Enhancement band, Bit rate and wavelengths, FEC and RAMAN. GPON ITU-T G.984.3 Frame structure, GPON encapsulation method (GEM), GTC adaptation and framing sublayer protocol stack, Status reporting & traffic monitoring DBA (SR-DBA & TM-DBA), Transmission container (T-CONT) types, Downstream & upstream multiplexing, GEM port identifier, Media access control and ONU registration, Extended bandwidth assignment model scheduling architecture, PLOAM & alarm messages, Downstream & Upstream FEC, Process order in a GTC transmit flow. GPON ITU-T G.984.4 and G.988 ONT management and control interface (OMCI) Management interface, Reference model, Typical ONT with SCTE 55-1 or SCTE 55-2 compliancy. GPON ITU-T G.984.5 enhancement band Band options, GPON NGA, Wavelength allocation. GPON ITU-T G.984.6 optical reach extension (G.984.re) Reach extension (RE), OA-based and OEO-based reach extenders, Protection, Reach extender with OTDR blocking filters (BF) and bypass (BYP) filters. GPON ITU-T G.984.7 long reach Quiet Window. 10-GPON ITU-T G.987.1 (XG-PON) Scenarios, reference access network architecture, XG-PON with G-PON through WDM1r, G-PON and XG-PON wavelength allocation, G-PON and XG-PON co-existence with video overlay option, RE migration scenarios. G.989 40Gbps XG-PON2 Functional reference architecture, NG-PON2 system coexistence with legacy systems, Definitions of legacy compatibility terminology. GPON issues and standards GPON components GPON OLT / GPON ONT, GPON management, Operational support systems (OSS), Network management systems (NMS), OMCI (ONT Management control interface), RG (Residential gateway), Data and prioritised voice channel product, GPON broadband-forum standards, Broadband-forum , TR-069 and TR-156, HPNA (home phone network alliance), Powerline carrier (PLC), GPON DLNI G.hn or G.9960, MOCA, FTTH council certification standard for network certification. Fibre-connected home badge, Ethernet in the first mile (EFM), GPON frame synchronization to network timing, Direct clock synchronization interface (BITS), Multiservice access platform (MSAP), Software planning tool, Superconnected cities / voucher scheme. Hands on practical assignments Single and multimode fibre recognition, Fibre Cleaning methods, Checking cleaning with an optical microscope, Optical light source and optical power meter referencing, PON splitter and fibre drum testing with an optical power meter, 6km classroom passive optical network testing with an OTDR at 1310/1550nm, Using decibels (dB's) and decibel milliwats (dBm's), Designing networks up to 20km long using vendor specifications (power budget), Fault finding with a visible fault locator.

GPON and FTTx networks
Delivered in Internationally or OnlineFlexible Dates
£3,697

An Introduction to British and American Literature

By The Teachers Training

An Introduction to British and American Literature is yet another 'Teacher's Choice' course from Teachers Training for a complete understanding of the fundamental topics. You are also entitled to exclusive tutor support and a professional CPD-accredited certificate in addition to the special discounted price for a limited time. Just like all our courses, this An Introduction to British and American Literature and its curriculum have also been designed by expert teachers so that teachers of tomorrow can learn from the best and equip themselves with all the necessary skills. Consisting of several modules, the course teaches you everything you need to succeed in this profession. The course can be studied part-time. You can become accredited within 11 hours studying at your own pace. Your qualification will be recognised and can be checked for validity on our dedicated website. Why Choose Teachers Training Some of our website features are: This is a dedicated website for teaching 24/7 tutor support Interactive Content Affordable price Courses accredited by the UK's top awarding bodies 100% online Flexible deadline Entry Requirements No formal entry requirements. You need to have: Passion for learning A good understanding of the English language Be motivated and hard-working Over the age of 16. Certification CPD Certification from The Teachers Training Successfully completing the MCQ exam of this course qualifies you for a CPD-accredited certificate from The Teachers Training. You will be eligible for both PDF copy and hard copy of the certificate to showcase your achievement however you wish. You can get your digital certificate (PDF) for £4.99 only Hard copy certificates are also available, and you can get one for only £10.99 You can get both PDF and Hard copy certificates for just £12.99! The certificate will add significant weight to your CV and will give you a competitive advantage when applying for jobs. Elizabethan Drama and Shakespeare's Hamlet The History of Drama 00:10:00 Elizabethan Drama 00:12:00 William Shakespeare 00:06:00 Hamlet: A Synopsis of the Play 00:04:00 Hamlet: An Anlaysis of the Play 00:19:00 Hamlet's Soliloquies 00:05:00 Jacobean Literature and the Metaphysical Poets Jacobean Literature Poetry and Prose 00:12:00 Puritanism & The English Civil War 00:11:00 Metaphysical Poetry 00:08:00 George Herbert 00:05:00 Andrew Marvell 00:07:00 John Milton 00:08:00 The Rise of the Novel and Satire The Restoration & Glorious Revolution 00:06:00 The Novel 00:08:00 Early Novelists: Defoe, Richardson, and Fielding 00:11:00 English Satire: John Dryden & Alexander Pope 00:06:00 Jonathan Swift & Gulliver's Travels 00:10:00 Swift's A Modest Proposal 00:08:00 The Emergence of American Literature Colonialism & John Smith 00:07:00 Pilgrim Writers 00:10:00 The Revolutionary Period Writers 00:07:00 The Knickerbocker Era: Washington Irving 00:14:00 Frontier Fiction: James Fenimore Cooper 00:10:00 The New England Renaissance The Westward Expansion 00:04:00 Transcendentalism: Ralph Waldo Emerson 00:10:00 Transcendentalism: Henry David Thoreau 00:08:00 Anti-Transcendentalism: Nathaniel Hawthorne 00:05:00 Nathaniel Hawthorne and The Scarlet Letter 00:08:00 Herman Melville 00:05:00 Edgar Allan Poe 00:06:00 Poe's 'The Cask of Amontillado' 00:05:00 Poe's 'The Raven' 00:07:00 The American Civil War Era and the Gilded Age The American Civil War Era & Harriet Beecher Stowe 00:07:00 Walt Whitman 00:09:00 Whitman's 'Drum Taps' 00:06:00 Emily Dickinson 00:09:00 The Gilded Age 00:07:00 Local Color Writing: Mark Twain 00:08:00 Tom Sawyer & Huck Finn 00:11:00 A Connecticut Yankee in King Arthur's Court 00:07:00 Women Writers of the 19th Century Female Writers & The French Revolution 00:12:00 Mary Wollstonecraft 00:09:00 Helen Maria Williams 00:08:00 Unitarianism 00:04:00 Harriet Martineau 00:12:00 Anna Laetitia Barbauld 00:06:00 Lucy Aikin 00:05:00 British Romantic Poets and the Poetic Imagination The Napoleonic Wars 00:08:00 The Romantic Period 00:05:00 William Blake 00:08:00 William Wordsworth 00:08:00 Samuel Taylor Coleridge 00:08:00 Percy Bysshe Shelley 00:08:00 John Keats 00:09:00 Lord George Gordon Byron 00:07:00 Victorian Novels Gothic Novels 00:10:00 Jane Austin's Pride and Prejudice 00:14:00 Victorian Novels 00:09:00 Emily Brontë and Wuthering Heights 00:11:00 Charles Dickens and Great Expectations 00:15:00 The Imagist Movements after World War I Anti-Victorianism & Edwardian England 00:05:00 Imagism & Gertruid Stein 00:05:00 Post War Literature & Ezra Pound 00:10:00 T.S. Eliot 00:13:00 William Carlos Williams 00:05:00 Archibald MacLeish 00:05:00 Modernist Fiction Modernist Fiction 00:07:00 Henry James 00:07:00 James Joyce 00:07:00 Joyce's 'Araby' 00:19:00 Joyce's Ulysses 00:07:00 Virginia Woolf 00:06:00 To the Lighthouse 00:12:00 The Lost Generation Ernest Hemingway and the Lost Generation 00:05:00 Hemingway's The Sun Also Rises 00:10:00 F. Scott Fitzgerald 00:04:00 Fitzgerald's The Great Gatsby 00:08:00 ee cummings 00:06:00 Robert Lowell 00:05:00 The Beat Generation & Allen Ginsberg 00:11:00

An Introduction to British and American Literature
Delivered Online On Demand10 hours 59 minutes
£27.99

Introduction to Bloodstain Pattern Analysis (BPA)

By Spatter/ed

Learn about Bloodstain Pattern Analysis (BPA) and develop the skills to identify bloodstains and interpret bloodstain patterns, over the course of 3 MODULES, from renowned experts in the field. Brought to you by SPATTER/ED Ltd.

Introduction to Bloodstain Pattern Analysis (BPA)
Delivered Online On Demand1 hour
£250

MB-500T00 Dynamics 365 - Finance and Operations Apps Developer

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Microsoft Dynamics 365 Finance and Operations Apps Developers Overview By the end of this course, you will learn to develop fully realized solutions by using standardized application coding patterns. In this course, you will learn the tasks needed to fulfill the role of developer in Dynamics 365 Finance and Operations Apps. The Dynamics 365 for Finance and Operations (FO) developer is a key technical resource that implements and extends the application to meet the requirements of the business. Module 1: Overview & Architecturen Explore the ecosystem and main components Explore the technical architecture Explore design and deployment considerations Module 2: Developer Tools Manage implementations by using Lifecycle Services Manage source code by using version control Customize by using Visual Studio Module 3: Solution Design Implement application lifecycle management Module 4: AOT Elements Build extended data types and enumerations Build tables Build forms and optimize form performance Create classes Create other user interface elements Module 5: Code Development & Testing Explore the test framework and use tools Get started with development using X++ Develop object-oriented code Use RSAT tool Module 6: Data Migration Prepare data for migration Module 7: Frameworks Introduction Explore extensions and the extension framework Extend elements SysOperationSandbox framework Summary Module 8: Integration Identify data integration patterns and scenarios Implement data integration concepts and solutions Implement the data management package API Data integrations Integrate with Microsoft Azure Connecting to Power Platform services Consume business events Integrate Finance and Operations apps with Microsoft Dataverse Module 9: Reporting Explore the reporting tools Build reports Build workspaces Manage data sources with external data stores Module 10: Security & Performance Work with performance and monitoring tools Implement role-based security Apply basic performance optimization techniques Additional course details: Nexus Humans MB-500T00 Dynamics 365 - Finance and Operations Apps Developer training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the MB-500T00 Dynamics 365 - Finance and Operations Apps Developer course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

MB-500T00 Dynamics 365 - Finance and Operations Apps Developer
Delivered OnlineFlexible Dates
£2,975

LTE Architecture and Protocols

5.0(3)

By Systems & Network Training

LTE Architecture and Protocols course description This course provides a comprehensive tour of the LTE architecture along with services provided and the protocols used. What will you learn Describe the overall architecture of LTE. Explain the information flows through LTE. Describe the LTE security. Describe LTE mobility management. Recognise the next steps for LTE. LTE Architecture and Protocols course details Who will benefit: Anyone working with LTE. Prerequisites: Mobile communications demystified Duration 3 days LTE Architecture and Protocols course contents Introduction History, LTE key features. The 4G ITU process. The LTE 3GPP specifications. Specifications. System Architecture LTE hardware architecture. UE architecture and capabilities. E-UTRAN and eNB. EPC, MME functions, SGW, PGW and PCRF. System interfaces and protocol stacks. Example information flows. Dedicated and default bearers. EMM, ECM, RRC state diagrams. Radio transmission and reception OFDMA, SC-FDMA, MIMO antennas. Air interface protocol stack. Logical, transport and physical channels. Frame and slot structure, the resource grid. Resource element mapping of the physical channels and signals. Cell acquisition, data transmission and random access. MAC, RLC, PDCP protocols. LTE spectrum allocation. Power-on procedures Network and cell selection. RRC connection establishment. Attach procedure, including IP address allocation and default bearer activation. LTE detach procedure. Security in LTE networks LTE security features, identity confidentiality, ciphering and integrity protection. Architecture of network access security in LTE. Secure key hierarchy. Authentication and key agreement procedure. Security mode command procedure. Network domain security architecture. Security associations using IKE and IPSec. Mobility management RRC_IDLE, RRC_CONNECTED. Cell reselection, tracking area updates. Measurement reporting. X2 and S1 based handovers. Interoperation with UMTS, GSM and non-3GPP technologies such as cdma2000. QoS, policy control and charging QoS in LTE, EPS bearers, service data flows and packet flows. The architecture and signalling procedures for policy and charging control. Data transport using GPRS, differentiated services and MPLS. Offline and online charging in LTE. Delivery of voice and text messages over LTE Difficulties and solutions for Voice over LTE. Architecture and call setup procedures for circuit switched fallback. Architecture, protocols and call setup procedures in IP multimedia subsystem. Enhancements in release 9 LTE location services. Multimedia broadcast / multicast service and MBSFN. Cell selection, commercial mobile alert service. LTE Advanced and release 10 Impact of carrier aggregation on LTE air interface. Enhanced MIMO processing on uplink and downlink. Relaying. Release 11 and beyond. OAM and self organising networks Operation, administration, maintenance and provisioning for LTE. Self-configuration of base station parameters. Fractional frequency re-use, inter-cell interference co-ordination. Self-optimisation of base station procedures. Self-healing to detect and recover from faults.

LTE Architecture and Protocols
Delivered in Internationally or OnlineFlexible Dates
£2,367