NETCONF and YANG training course description An introduction to NETCONF and YANG. The course progresses from what they are, why they are needed, and how to configure them onto a more detailed analysis of how NETCONF works and how to read YANG models. What will you learn Recognise the limits and problems of SNMP and the CLI. Describe the relationship between NETCONF and YANG. Configure NETCONF on network devices. Use NETCONF to configure devices. Read YANG models. NETCONF and YANG training course details Who will benefit: Network engineers. Prerequisites: Network management technologies Duration 1 day NETCONF and YANG training course content What are NETCONF and YANG? Network management and configuration issues. What is NETCONF? What is YANG? Protocols, data models, architecture. Hands on Configuring NETCONF on network devices, using NETCONF. NETCONF NETCONF layers, Secure transport: SSH, Messages: rpc, Operations, Content. Base operations: <get>, <get-config>, <edit-config>, <copy-config>, <delete-config>, <lock>,<unlock>, <close-session>, <kill-session> NETCONF datastores: :candidate, :startup, running. Hands on Retrieving a configuration with NETCONF, Editing a configuration with NETCONF. NETCONF more details NETCONF traffic flows, NETCONF capabilities, hello, capabilities exchange., Filtering data, atomic transactions, validating configurations. Hands on Using NETCONF. YANG YANG models, IETF standard YANG models, tree diagrams, an example: YANG interface management, Module header, Imports and includes, Containers, Lists, leaves, Data types, typedef, Instance data, XML. Hands on Reading YANG data models, creating a configuration instance.
SMPTE 2110 training course description This course studies the new SMPTE ST 2110 suite of standards. The course covers all parts of the standard from SMPTE ST 2110-10 through to SMPTE ST 2110- 50. The course begins with an introduction to all IP studios and separating video and audio streams, then moves on to PTP and synchronisation. Video encapsulation is then followed by audio encapsulation. Handling ancillary data finishes the course. What will you learn Recognise the benefits of SMPTE ST 2110. Describe SMPTE ST 2110. Explain how the SMPTE 2110 standards work. Compare and contrast SMPTE 2110 and SMPTE 2022. SMPTE 2110 training course details Who will benefit: Anyone working in broadcast. Prerequisites: IP broadcast fundamentals Duration 1 day SMPTE 2110 training course contents Introduction The all IP studio. Review of IP and RTP. Role of SMPTE, SMPTE 2022, What is SMPTE 2110, SMPTE 2022 versus 2110, SMPTE 2110 parts, multiplex standards, 2110 separate streams, Video, Audio, ANC. Essences. Separate streams and synchronisation The old way, blackburst, time code, DARS. SMPTE 2110-10, ST2059, PTP, PTP architecture, PTP accuracy, How PTP works, Offset and delay PTP clock types, Hardware time stamping SDP. Hybrids. Uncompressed video SMPTE 2110-20, 2110-21. Image support, raster sizes, bit depth, active video and no blanking, bandwidth and bandwidth savings, pgroups. Timestamps. Packing modes. Packet sizes, pixels per packet. Audio SMPTE 2110-30, 2110-31, PCM, AES3. Allowed versus required. Channels and streams. Ancillary data SMPTE 2110-40, RFC on RTP payloads for ST 291 ancillary data.
Total TRILL training course description A comprehensive look at Transparent Interconnection of Lots of Links (TRILL). This TRILL course starts with the problems in traditional switched networks then moves onto to how TRILL solves these problems. As IS -IS is key to loop free topologies in TRILL networks, this protocol is also studied. What will you learn Explain the benefits of TRILL. Explain how TRILL works. Explain the role of IS-IS in TRILL. Integrate TRILL into existing networks. Total TRILL training course details Who will benefit: Technical staff working with Ethernet. Prerequisites: Definitive Ethernet switching for engineers Duration 1 day Total TRILL training course contents What is TRILL? Layer 2 versus Layer 3, STP problems: One path, convergence, MAC explosion. TRILL switches, RBridges, TRILL campus. TRILL standards TRILL components RBridges, mixing Rbridges with bridges, appointed forwarders. IS-IS Link layer IS-IS, SPF trees, traffic management. IS-IS extensions for TRILL. ISIS TLV. How TRILL works TRILL IS-IS hello discovery, Designated bridge, IS-IS flooding, Appointed forwarder, unicast versus multi-destination frames. TRILL nicknames. TRILL packet headers Local link header, TRILL header. TRILL over Ethernet, TRILL over PPP. VLANs. Fine grained labelling. TRILL BFD. TRILL OAM. Frame overheads. TRILL comparisons MPLS, IP, 802.1aq.
Streaming telemetry training course description An introduction to streaming telemetry. The course progresses from a brief look at the weaknesses of SNMP onto what streaming telemetry is, how it differs from the xflow technologies, the data formats available and how to configure it. What will you learn Describe streaming telemetry. Explain how streaming telemetry works. Describe the data presentation formats available. Configure streaming telemetry. Streaming telemetry training course details Who will benefit: Network engineers. Prerequisites: TCP/IP foundation for engineers. Duration 1 day Streaming telemetry training course content What is streaming telemetry? SNMP weaknesses, Netflow, sflow, polling and the old models, push vs pull, What is streaming telemetry? Telemetry streaming architecture Model driven versus event driven telemetry, subscriptions, publications. Periodic versus on change, model selection and scalability. Telemetry streaming protocols TCP, UDP, SSH, HTTP, HTTP2, NETCONF, RESTCONF, gRPC, gNMI. Models and Encoding The role of YANG. YANG models and tools. XML/ NETCONF, JSON/RESTCONF, JSON over UDP. Protocol buffers/gRPC. Google Protocol Buffers Decoder ring, protocol definition file. GPB-KV, GPB-Compact. Keys. Streaming telemetry configuration Router: Destination, Sensor, subscription. Collector: YANG models, .proto file. Pipeline. ELK: Consume, store, visualise streaming data. Collection tools APIs, YANG development Kit, Downstream consumers, influxdata, Grafana, Kafka, Prometheus, others.
Jenkins training course description An introduction to Continuous Integration and development (CI/CD) in network automation using Jenkins. The course focusses specifically on the network Devops case of using Jenkins. What will you learn Explain how Jenkins can help with network automation. Configure Jenkins for network Devops. Use Jenkins for network automation. Jenkins training course details Who will benefit: Network engineers. Prerequisites: TCP/IP Foundation Duration 1 day Jenkins training course contents What is Jenkins? DevOps, CI/CD, version control systems, git, automating execution of tasks, Jenkins job, Jenkins pipeline, Jenkins plugins, CI server. Hands on Installing Jenkins. Example pipeline for network automation YAML, GitHub, Jenkins, ansible, network devices. Hands on Investigating a workflow: Auto deploying network configurations. Configuring Jenkins Code repository, build triggers, gerrit and reviews, build environment. A Jenkins job, build step, post build actions, running a Jenkins job, build log, home directory. Hands on Configuring Jenkins. CI using Jenkins Branches, pipeline, git, the git plugin. Hands on A Jenkins job to poll, build and unit test network configurations.
DDOS demystified training course description This course covers DDOS attacks and how to defend against them. The course starts by studying DOS attacks and then DDOS attack. Reflectors, booters and stressers are followed by reflection and amplification. Once the various DDOS attacks have been covered we then study the ways to defend against DDOS attacks. What will you learn Describe DDOS. Explain how DDOS attacks work. Recognise DDOS attack types. Describe how to defend DDOS attacks. DDOS demystified training course details Who will benefit: Anyone involved in network security. Prerequisites: Network fundamentals Duration 1 day DDOS demystified training course contents What is DOS? Denial Of Service, outages, Attackers, Command and control, Bots. Why DOS? What is DDOS? Distributed, reflectors, botnets, botnet topologies, amplification, attack bandwidth, attack vectors, booters, stressers, backscatter, DirtJumper, XOR. RUDY. High and Low orbit Ion Cannon. Attack types Application layer attacks, HTTP flood, protocol attacks, SYN floods, teardrop, volumetric attacks, slowloris, DNS cachebusting, fraggle, smurf. IP address spoofing. Reflectors Reflector attacks, amplification attacks, quotients, embedded devices, DNS, NTP, SSDP. DDOS defence Protecting devices from becoming bots. Onsite, outsourced scrubbing, Defending self, defending the Internet, Black hole routing, rate limiting, intelligent application firewalls, anycast, IPS, upstream filtering, BCP38, BCP 140. uRPF.
Our suite of modules are based around helping the customer to buy and enabling salespeople to maximise their conversations with their customers.
PMI-RMP® Exam Prep: Virtual In-House Training This course is aimed at preparing the participant to pass the PMI-RMP® (Risk Management Professional) exam. The course will also provide practical tips and tools that can be used in any organization's project management risk practices. In this expanded session, you will also have time to practice your exam taking skills with coaching from a credentialed instructor. The course includes the tool RMP-IQ, with sample exam questions to practice for the exam and allow participants to see their knowledge level in the various domains. What You Will Learn At the end of this course, participants will be able to: Explain the value and benefits of the PMI-RMP® credential Perform a self-assessment of your knowledge and skills Prepare a study plan that will allow you to pass the exam Foundation Concepts The Risk Management Professional (PMI-RMP®) Exam PMI's Standard for Risk Management Portfolios, Programs and Projects Key risk definitions Risk management life cycle Levels of Risk Management Enterprise Risk Management Portfolio Risk Management Program Risk Management Project Risk Management Risk Strategy and Planning: Part 1 Task 1: Perform a preliminary document analysis Task 2: Assess project environment for threats and opportunities Task 3: Confirm risk thresholds based on risk appetites Risk Strategy and Planning: Part 2 Task 4: Establish risk management strategy Task 5: Document the risk management plan Task 6: Plan and lead risk management activities with stakeholders Agile, programs, and portfolio aspects of risk strategy and planning Risk Identification: Part 1 Objectivity and bias Task 1: Conduct risk identification exercises Risk Identification: Part 2 Task 2: Examine assumption and constraint analysis Task 3: Document risk triggers and thresholds based on context / environment Task 4: Develop risk register Agile, programs, and portfolio aspects of risk identification Risk Analysis: Part 1 Task 1: Perform qualitative analysis Risk analysis in an agile environment Risk Analysis: Part 2 Task 2: Perform quantitative analysis Task 3: Identify threats and opportunities Program and portfolio aspects of risk analysis Risk Response Task 1: Plan risk responses Agile, programs, and portfolio aspects of risk response planning Task 2: Implement risk responses Monitor and Close Risks: Part 1 Task 1: Gather and analyze performance data Monitor and Close Risks: Part 2 Task 2: Monitor residual and secondary risks Task 4: Monitor project risk levels Task 3: Provide information required to update relevant project documents Agile, programs, and portfolio aspects of monitoring and closing risks
Management of Value (MoV®) Practitioner: Virtual In-House Training This interactive MoV® Practitioner course provides a modular and case-study-driven approach to learning Management of Value (MoV). The core knowledge is structured and comprehensive; and well-rounded modules cover the methodology and various techniques. A case study is used to help appreciate the relevance of MoV in its practical application. What you will Learn The MoV Practitioner Course prepares you for the MoV Practitioner exam. Individuals certified at the MoV Practitioner level will be able to: Apply Management of Value (MoV) principles, processes and techniques, and advocate the benefits of this application appropriately to the senior Management. Develop a plan of MoV activities for the whole lifecycle of small and large projects and programs. Plan an MoV study, tailoring it to particular projects or programs and developing practical study or workshop handbooks as required. Understand and articulate value in relation to organizational objectives. Prioritize value drivers using function analysis and use these to demonstrate how value might be improved. Quantify monetary and non-monetary value using the Value Index, Value Metrics and the Value for Money ratio. Describe and comment on the application of various techniques relevant to MoV. Monitor improvements in value realized throughout a project lifecycle and capture learning which can be transferred to future projects. Offer suggestions and guidance about embedding MoV into an organization, including policy issues, undertake a health check, assess maturity and competence, and provide guidance on typical roles and responsibilities. Understand and articulate the use of MoV within other Best Management Practice methods and its contributions to them Benefits of Taking This Course Upon successful completion of this course, you will be able to: Organise and contribute constructively to a Management of Value (MoV) Study Demonstrate a knowledge of MoV principles, processes, approach, and environment Analyse a company, programme or project to establish its organisational value includes identification and weighting of Value Drivers Pass the AXELOS Practitioner Examination Function Analysis Customer FAST Diagram Value Tree Development Weighting Attributes Paired Comparisons Developing a Value Profile Developing a Value Index Value for Money Ratio Stimulating Innovation Value Engineering Option Evaluation and Selection Evaluation Matrix Value and Value for Money Timing and Planning Teams and Stakeholders MoV in the Organization Integrating with Best Management Practice Relationship between Process and Approach