CCNA training course description The Implementing and Administering Cisco Solutions (CCNA) course gives you a broad range of fundamental knowledge for all IT careers. Through a combination of lecture, hands-on labs, and self-study, you will learn how to install, operate, configure, and verify basic IPv4 and IPv6 networks. The course covers configuring network components such as switches, routers, and wireless LAN controllers; managing network devices; and identifying basic security threats. It also gives a foundation in network programmability, and software-defined networking What will you learn Install, configure, and operate a small to medium sized network Gain a foundation in the essentials of networking, security, and automation Prepare for the 200-301 CCNA exam, which earns CCNA certification CCNA training course details Who will benefit: Network support help desk technicians involved in the basic installation, operation, and verification of Cisco networks. Anyone seeking CCNA certification. Prerequisites: Introduction to Data communications & networking Duration 5 days CCNA training course content After taking this course, you should be able to: Identify the components of a computer network and describe their basic characteristics. Understand the model of host-to-host communication. Describe the Cisco IOS software. Describe LANs and the role of switches within LANs. Describe Ethernet and describe the operation of switches. Install a switch and perform the initial configuration. Describe the TCP/IP Internet layer, IPv4, its addressing scheme, and subnetting. Describe the TCP/IP Transport and Application layers Explore functions of routing. Implement basic configuration on a Cisco router. Explain host-to-host comms across switches and routers. Identify and resolve common switched network issues and common problems associated with IPv4 addressing. Describe IPv6 main features and addresses, and configure and verify basic IPv6 connectivity. Describe static routing. Describe, implement, and verify VLANs and trunks. Describe inter VLAN routing. Explain the basics of dynamic routing protocols and describe components and terms of OSPF. Explain how STP and RSTP work. Configure link aggregation using EtherChannel. Describe the purpose of Layer 3 redundancy protocols. Describe basic WAN and VPN concepts. Describe the operation of access control lists (ACLs) and their applications in the network. Configure Internet access using DHCP clients and explain and configure NAT on Cisco routers. Describe basic QoS concepts. Describe the concepts of wireless networks, which types of wireless networks can be built, and how to use Wireless LAN Controllers (WLCs). Describe network and device architectures, introduce virtualization, network programmability and SDN and describe smart network management solutions such as Cisco DNA Centerâ¢, SD-Access, and SD-WAN. Configure basic IOS system monitoring tools. Describe the management of Cisco devices. Describe the current security threat landscape. Describe threat defence technologies. Implement a basic security configuration of the device management plane. Implement basic steps to harden network devices. Detailed course outline Exploring the Functions of Networking. The Host-to-Host Communications Model. Operating Cisco IOS Software. Introducing LANs. Exploring the TCP/IP Link Layer. Starting a Switch. The TCP/IP IP layer, IPv4 Addressing, and Subnets. The TCP/IP Transport Layer and Application Layer. Exploring the Functions of Routing. Configuring a Cisco Router. Exploring the Packet Delivery Process. Troubleshooting a Simple Network. Introducing Basic IPv6. Configuring Static Routing. Implementing VLANs and Trunks. Routing Between VLANs. Introducing OSPF. Redundant Switched Topologies with EtherChannel. Explaining Basics of ACL. Enabling Internet Connectivity. Explaining the Evolution of Intelligent Networks. Introducing System Monitoring. Managing Cisco Devices. Securing Administrative Access. Implementing Device Hardening. Self-Study: Building Redundant Switched Topologies. Exploring Layer 3 Redundancy. Introducing WAN Technologies. Introducing QoS. Explaining Wireless Fundamentals. Introducing Architectures and Virtualization. Examining the Security Threat Landscape. Threat Defense Technologies.
CRRUK equips professionals with the concepts, skills and tools to build conscious, intentional relationships, and to coach relationship systems of any size.
About this Training Course Gas wells are the most uncertain hence critical component of any gas production system. A successful gas project relies on a reliable forecast of gas well production and on timely implementation of measures that restore, sustain and improve gas well capacity, and maximize reserves. This 5-day course provides the skills to understand and analyze (changes in) gas well performance, and to select and design those remedial measures. It addresses all four gas well components i.e. reservoir performance, inflow performance, outflow performance and surface performance, individually and combined. In depletion-drive reservoirs, the gas well outflow performance becomes inevitably compromised as the reservoir pressure depletes and the gas rate becomes insufficient to lift liquid water and condensate to surface. This condition is referred to as liquid loading and causes significant loss of well capacity and reserves. This 5-day course provides the means to recognize and predict liquid loading, introduces the deliquification techniques that mitigate liquid loading, and then teaches how to select, design, install and operate the optimum suite of deliquification measures. Training Objectives On completion of this course, participants will be able to: Recognize and model gas well reservoir, inflow, outflow and surface performance Understand and model gas well production forecast and reserves Identify and model gas well performance threats and opportunities, specifically liquid loading and deliquification Select and justify remedial measures that mitigate those threats or realize those opportunities, specifically deliquification measures Understand design, installation and operation of those deliquification measures Target Audience This course is intended for production engineer, surveillance engineer, completion engineer, production/process chemist, reservoir engineer, production programmer, production operator, as well as other professionals responsible for selecting, installing, operating, monitoring and optimizing deliquification. Course Level Basic or Foundation Training Methods This course consists of a series of lectures and exercises. The lectures are interactive with field examples to illustrate models and concepts, where participants are encouraged to contribute their own relevant field examples. The exercises make use of a series of Excel worksheets for model calculations. Participants are invited to implement their own field specific well data. When arranged beforehand, PROSPER gas well performance software can be used as well. This course addresses ways and means to monitor and manage gas well performance and deliquification. It covers the purpose, outcome and benefit of gas well surveillance and capacity measures to assist future surveillance and capacity planning. Specifically, it addresses the selection and implementation of deliquification measures. This course introduces the skills and tools required for periodic review of gas well performance in support of critical business processes Trainer Your expert course leader brings with him 38 years of oil and gas field experience largely within Shell of which 25 years as gas well production engineer. He has covered the full spectrum of activities moving from R&D to green field development to brown field surveillance and optimisation, to become a leading gas well performance and deliquification specialist. He likes to capture the complex reality of gas well inflow, outflow and reservoir performance by means of practical data-driven rules and tools that cover a wide range of conditions i.e. shallow-to-deep, prolific-to-tight, dry-to-wet, green-to-brown, 1-1/2'-to-9-5/8' tubing, and depletion-to-aquifer drive. Before his retirement end 2020, He worked for Shell affiliated oil and gas companies including Shell Malaysia, Petroleum Development Oman, NAM Netherlands and Shell R&D in Netherlands and USA. Since then, he has been active as an independent trainer and consultant, amongst others for Cairn India. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
First Aid Course Overview Being familiar with the fundamentals of first aid is a must, whether you're at home or at work. It's never too late to start training since you never know when you might need to save a life. The goal of this first aid course is to familiarise you with both the basic and advanced concepts of first aid, including how to handle potentially fatal situations and how to examine an injured person from head to toe. Everyone can benefit from our First Aid course, which features professional audiovisual presentations, simple-to-follow modules, and useful guidance for low-risk work environments including restaurants, stores, and offices. First aid kits, the recovery posture, performing CPR, and managing follow-up ailments including allergies and asthma are important subjects. You will study the items of the first aid bag in detail and gain knowledge of the duties and responsibilities of a first aider through case studies and hands-on exercises. You will be guided through the steps and best practices for handling a variety of minor and significant injuries by our knowledgeable educator. In addition to learning first aid skills for adults, this course will teach you how to modify and use basic first aid techniques for a child or baby. Upon completion of this course, you will possess exceptional theoretical and practical expertise, enabling you to assume command in the event of a first aid emergency. As evidence of your new abilities and assurance that you are implementing the appropriate safety precautions for your company or workplace, you will also obtain a CPD-approved certificate. Why You Should Choose First Aid Course Lifetime access to the course No hidden fees or exam charges CPD Accredited certification on successful completion Full Tutor support on weekdays (Monday - Friday) Efficient exam system, assessment and instant results Download Printable PDF certificate immediately after completion Obtain the original print copy of your certificate, dispatch the next working day for as little as £9. Improve your chance of gaining professional skills and better earning potential. Who is this Course for? First Aid Course is CPD certified and IAO accredited. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic backgrounds. Requirements Our First Aid Course is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path You will be ready to enter the relevant job market after completing this course. You will be able to gain necessary knowledge and skills required to succeed in this sector. All our Diplomas' are CPD and IAO accredited so you will be able to stand out in the crowd by adding our qualifications to your CV and Resume. First Aid Module 01: Basic First-Aid Techniques Basic First-Aid Techniques 00:20:00 Module 02: Incident Management at Work Incident Management at Work 00:25:00 Module 03: Primary Survey Primary Survey 00:15:00 Module 04: Secondary Survey Secondary Survey 00:15:00 Module 05: Paediatric First Aid for Common Illnesses, Injuries and Incidents Paediatric First Aid for Common Illnesses, Injuries and Incidents 00:38:00 Module 06: First Aid for Acute Medical Conditions First Aid for Acute Medical Conditions 00:22:00 Module 07: Loss of Responsiveness and CPR Loss of Responsiveness and CPR 00:20:00 Module 08: Medical Emergency Medical Emergencies 00:16:00 Module 09: Things to Keep in Mind Things to Keep in Mind 00:15:00
The objective of the fast track Level 4 Diploma in Education and Training Management qualification (accredited by Othm, UK) is to develop learners' understanding of theory and practice relating to their role in education. The qualification will provide learners with an opportunity to engage with the challenges facing professionals and policy makers in their own country. It will provide knowledge that underpins the ability to work as an effective practitioner in the education sector. The units in fast track Level 4 Diploma in Education and Training Management combine both theoretical and practical knowledge in the education profession and will develop and enhance knowledge and skills in the areas of effective performance, planning and accountability, development and team working. Learners will be able to work in a variety of roles within education administration and/or management. Key Highlights of fast track Level 4 Diploma in Education and Training Management qualification are: Program Duration: 6 Months (Regular duration mode also available) Program Credits: 120 Designed for working Professionals Format: Online No Written Exam. The Assessment is done via Submission of Assignment Tutor Assist available Dedicated Student Success Manager Timely Doubt Resolution Regular Networking Events with Industry Professionals Direct entry into Year 1 of a three-year UK Bachelor's degree LSBR Alumni Status No Cost EMI Option Requirements For entry onto the fast track OTHM Level 4 Diploma in Education and Training Management qualification, learners must possess: Relevant NQF/QCF/RQF Level 3 Award/Diploma or at the level of GCE/GCSE or equivalent qualification Learner must be 18 years or older at the beginning of the course Mature learners (over 21) with management experience (learners must check with Admission Counsellors at LSBR regarding this experience prior to registering for the programme) Career path Progress to: Year 2 of a Three-year UK Bachelor's degree Completion of your qualification in fast track mode will meet the University standard academic entry requirements. However, each applicant will be subject to individual assessment and other entry requirements which may affect university entry. Certificates Certificate of Achievement Hard copy certificate - Included Once you complete the course, you would be receiving a Physical hard copy of your Diploma along with its Transcript which we would Courier to your address via DHL or Royal Mail without any additional charge
DDOS demystified training course description This course covers DDOS attacks and how to defend against them. The course starts by studying DOS attacks and then DDOS attack. Reflectors, booters and stressers are followed by reflection and amplification. Once the various DDOS attacks have been covered we then study the ways to defend against DDOS attacks. What will you learn Describe DDOS. Explain how DDOS attacks work. Recognise DDOS attack types. Describe how to defend DDOS attacks. DDOS demystified training course details Who will benefit: Anyone involved in network security. Prerequisites: Network fundamentals Duration 1 day DDOS demystified training course contents What is DOS? Denial Of Service, outages, Attackers, Command and control, Bots. Why DOS? What is DDOS? Distributed, reflectors, botnets, botnet topologies, amplification, attack bandwidth, attack vectors, booters, stressers, backscatter, DirtJumper, XOR. RUDY. High and Low orbit Ion Cannon. Attack types Application layer attacks, HTTP flood, protocol attacks, SYN floods, teardrop, volumetric attacks, slowloris, DNS cachebusting, fraggle, smurf. IP address spoofing. Reflectors Reflector attacks, amplification attacks, quotients, embedded devices, DNS, NTP, SSDP. DDOS defence Protecting devices from becoming bots. Onsite, outsourced scrubbing, Defending self, defending the Internet, Black hole routing, rate limiting, intelligent application firewalls, anycast, IPS, upstream filtering, BCP38, BCP 140. uRPF.
Overview The International English Language Testing System (IELTS) measures the language proficiency of people who want to study or work where English is used as a language of communication. We offer both group and private IELTS preparation courses. Online Trainer led IELTS Coaching. Our method Throughout the course students work on all four modules; listening, reading, writing, and speaking. We also help our students with the grammar and vocabulary knowledge they need to achieve their band score. We believe that the best way to learn exam English is to relate it to real life. Our trainer will show you how your IELTS skills can be used in every day situations and will help to achieve higher bands and fulfil the requirement of the universities and colleges.
Network design training course description This course provides you with the knowledge needed to perform the design of a network infrastructure that supports desired network solutions to achieve effective performance, scalability, and availability. We recognise that the role of design does not normally require hands on skills but hands on sessions are used to reinforce the theory not to teach configuration or troubleshooting. What will you learn Create HA enterprise network designs. Develop optimum Layer 3 designs. Design effective modern WAN and data center networks. Develop effective migration approaches to IPv6. Create effective network security designs. Network design training course details Who will benefit: Anyone involved with network design. Prerequisites: TCP/IP Foundation for engineers Duration 5 days Network design training course contents Part I Reliable, resilient enterprise L2/3 network designOptimal Enterprise Campus Design:Enterprise campus design principles, hierarchy, modularity, flexibility, resiliency.EIGRP design:EIGRP Design, Should you use EIGRP?OSPF design: OSPF scalability designs, OSPF area design, OSPF Full-Mesh Design, OSPF Hub-and-Spoke Design, OSPF convergence design and optimization techniques. IS-IS Design:The protocol, IS-IS hierarchical architecture, IS-IS vs OSPF, IS-IS Deep Dive, IS-IS Design Considerations. BGP design:BGP overview, Designing Scalable iBGP Networks, BGP Route Reflector Design, Enhancing the Design of BGP Policies with BGP Communities, Case Study: Designing Enterprise wide BGP Policies Using BGP Communities, BGP Load-Sharing Design.Part II Enterprise IPv6 Design ConsiderationsIPv6 Design Considerations in the Enterprise: IPv6 Deployment and Design Considerations, Considerations for Migration to IPv6 Design, IPv6 Transition Mechanisms, Final Thoughts on IPv6 Transition Mechanisms. Challenges of the Transition to IPv6: IPv6 Services, Link Layer Security Considerations. Part III Modern Enterprise Wide-Area Networks DesignService Provider-Managed VPNs:Choosing Your WAN Connection, Layer 3 MPLS VPNs, Case Study: MPLS VPN Routing Propagation, Layer 2 MPLS VPN Services. Enterprise-Managed WANs: Enterprise-Managed VPNs, GRE, Multipoint GRE, Point-to-Point and Multipoint GRE, IPsec, IPsec and dynamic VTI, DMVPN, Case Study: EIGRP DMVPN, DMVPN and Redundancy, Case Study: MPLS/VPN over GRE/DMVPN, SSL VPN. Enterprise WAN Resiliency Design: WAN Remote-Site Overview, MPLS L3 WAN Design Models, Common L2 WAN Design Models, Common VPN WAN Design Models, 3G/4G VPN Design Models, Remote Site Using Local Internet, Remote-Site LAN, Case Study: Redundancy and Connectivity, NGWAN, SDWAN, and IWAN Solution Overview, IWAN Design Overview, Enterprise WAN and Access Management. Part IV Enterprise Data Center DesignsMultitier Data Center Designs: Case Study: Small Data Centers (Connecting Servers to an Enterprise LAN), Case Study: Two-Tier Data Center Network Architecture, Case Study: Three-Tier Data Center Network Architecture.Trends and Techniques to Design Modern Data Centers: The Need for a New Network Architecture, Limitations of Current Networking Technology, Modern Data Center Design Techniques and Architectures, Multitenant Data Center. SDN:SDN characteristics, How SDN addresses current Networking Limitations, SDN Architecture Components, SDN Network Virtualization overlays. Data Center Connections:Data Center Traffic Flows, The Need for DCI, IP Address Mobility, Case Study: Dark Fiber DCI, Pseudowire DCI. Part V Design QoS for Optimized User ExperienceQoS Overview:QoS Overview, IntServ versus DiffServ, Classification and Marking, Policers and Shapers, Policing Tools: Single-Rate Three-Color Marker, Policing Tools: TwoRate Three-Color Marker, Queuing Tools, Dropping Tools. QoS design principles and best practices: QoS overview, classification and marking design principles, policing and remarking design principles, queuing design principles, dropping design principles, Per-Hop behavior queue design principles, RFC 4594 QoS Recommendation, QoS Strategy Models. Campus QoS, WAN QoS, Data Center QoS.MPLS VPN QoS Design: The Need for QoS in MPLS VPN, Layer 2 Private WAN QoS Administration, Fully Meshed MPLS VPN QoS Administration, MPLS DiffServ Tunneling Modes, Sample MPLS VPN QoS Roles. IPsec VPN QoS Design: The Need for QoS in IPsec VPN, VPN Use Cases and Their QoS Models, IPsec Refresher, Encryption and Classification: Order of Operations, MTU Considerations, DMVPN QoS Considerations. Part VI IP Multicast DesignEnterprise IP Multicast Design: How Does IP Multicast Work? Multicast Protocols, Multicast Forwarding and RPF Check, Multicast Protocol Basics, PIM-SM Overview, Multicast Routing Table, Basic SSM Concepts, Bidirectional PIM. RP discovery, Anycast RP Features, MSDP. Part VII Designing Optimum Enterprise Network SecurityDesigning Security Services and Infrastructure Protection Network Security Zoning, Designing Infrastructure Protection.Designing firewall & IPS solutions: Firewall architectures, virtualized firewalls. Case Study: Application Tier separation, Case Study: Firewalls in a Data Center, Case Study: Firewall High Availability, IPS Architectures, Case Study: Secure Campus Edge Design (Internet and Extranet Connectivity). IP Multicast Security: Multicast Security Challenges, Multicast Network Security Considerations. Designing Network Access Control Solutions:IEEE 802.1X, EAP, 802.1X supplicants, 802.1X phased deployment, Case Study: Authorization Options. Part VIII Design scenariosDesign Case Studies: 1: Enterprise Connectivity, 2: Enterprise BGP with Internet Connectivity, 3: IPv6, 4: Data Center Connectivity, 5: Resilient Enterprise WAN, 6: Secure Enterprise Network, 7: QoS in the Enterprise Network.
About this Training Front End Loading (FEL) is a methodology that takes a deliberate approach to capital project planning. Where traditional project plans seek to help an operator reach production targets and budgets, FEL methodology aligns an operator's technical and business goals to create a more comprehensive development plan. The FEL approach increases project definition and lowers risk to positively impact total investment costs and return on investment. Training Objectives Upon completion of this course, participants will be able to: Learn the methods applied for Pre-FEL and FEL process Understand the importance of FEL, FEL stages; visualisation, conceptualisation, definition Uncover how to apply project management during FEL Determine risk management in the FEL process Understand benchmarking & value improving practices Target Audience The course is recommended for anyone who wish to gain in-depth knowledge and understanding of the importance of Front-End Loading and how to apply Front End Loading best practices, including: Team Leaders Senior Managers (Line and Function) Project Managers Development Engineers Graduate Engineers Quality Assurance Engineers Key Contractor's Management FEED engineers Design engineers Mechanical engineers Process engineers Course Level Basic or Foundation Trainer Your expert course leader is a subsea pipeline consultant with extensive experience in the design, construction, and installation of subsea pipelines for the oil and gas industry. As a consultant, he provides technical expertise and support to clients on all aspects of subsea pipeline projects, from the initial planning and design phase through to construction and commissioning. He is knowledgeable about industry standards, regulations, and best practices for subsea pipelines, and works closely with clients to ensure that projects are delivered safely, on time, and within budget. He has over thirty years' experience in early concept and front-end studies for the initiation of numerous high value upstream oil and gas projects worldwide. He has worked for both Operating Companies and Consultants managing the FEL process for complex, multi-discipline and technically challenging concepts, combining both his technical and project management skills. He has been working with companies like ExxonMobil, Quantum Power, North Caspian Operating Company, OMV Petrom, Port Meridian, BG Group, and etc. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
Duration 2 Days 12 CPD hours This course is intended for This course is designed for people who need output from a database. In some cases, database programs have limited reporting tools, or tools that are not accessible. Learners may or may not have programming or SQL experience. Overview In this course, you will connect to a database to extract data and present it as a report. You will: Identify the elements of the Crystal Reports interface. Create and modify a basic report. Use formulas to calculate and filter data. Build a parameterized report. Group report data. Enhance a report. Create a report using data from an Excel workbook. Distribute data. In this course, students will create a basic report by connecting to a database and modifying the report's presentation. 1 - EXPLORING THE CRYSTAL REPORTS INTERFACE Topic A: Explore Crystal Reports Topic B: Use Crystal Reports Help Topic C: Customize Report Settings 2 - WORKING WITH REPORTS Topic A: Create a Report Topic B: Modify a Report Topic C: Display Specific Report Data Topic D: Work with Report Sections 3 - USING FORMULAS IN REPORTS Topic A: Create a Formula Topic B: Edit a Formula Topic C: Filter Data by Using a Formula Topic D: Work with Advanced Formulas and Functions Topic E: Handle Null Values 4 - BUILDING PARAMETERIZED REPORTS Topic A: Create a Parameter Field Topic B: Use a Range Parameter in a Report Topic C: Create a Prompt 5 - GROUPING REPORT DATA Topic A: Group Report Data Topic B: Modify a Group Report Topic C: Group by Using Parameters Topic D: Create a Parameterized Top N Report 6 - ENHANCING A REPORT Topic A: Format a Report Topic B: Insert Objects in a Report Topic C: Suppress Report Sections Topic D: Use Report Templates 7 - CREATING A REPORT FROM EXCEL DATA Topic A: Create a Report Based on Excel Data Topic B: Modify a Report Generated from Excel Data Topic C: Update Data in a Report Based on Excel Data 8 - DISTRIBUTING DATA Topic A: Export Data Topic B: Create Mailing Labels 9 - APPENDIX Appendix A: Setting Up and Configuring Data Sources Appendix B: Using Report Processing Techniques Appendix C: Using Functions in Formulas