• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2566 Courses delivered Online

Creative Writing Training

By The Teachers Training

Creative Writing Training Have you always wanted to be a writer? Are you willing to give your best to learn writing? Welcome to our transformative 'Creative Writing Training' course, where imagination knows no bounds and storytelling becomes art. This comprehensive program offers a dynamic exploration into various facets of creative writing, encompassing multiple genres. This Creative Writing Training course will help you to develop a deep understanding of the fundamental elements of storytelling, including character creation, plotting, and dialogue, enabling you to craft engaging and impactful narratives across various genres. As you move through the Creative Writing Training course, you will explore advanced fiction techniques beyond the basics, such as writing mechanics, critical technical issues, and effective editing strategies, ensuring your writing is polished and professional. Besides, in this course, you will gain expertise in specific genres like children's books, short stories, fiction, and novels, allowing you to express your creativity across diverse literary forms and tailor your writing to specific audience preferences. Writing novels and horrors is always challenging. Therefore, this Creative Writing Training course will teach you about the art of world-building in genres like fantasy and horror, where you'll create vivid and immersive settings, populate them with unique characters, races, and societies, and bring your creative visions to life. Furthermore, this course will give you insight into the art of writing thrillers, drama and comedy. Unleash your storytelling potential - enrol now in the Creative Writing Training course and embark on a journey where every word becomes a brushstroke on the canvas of your imagination. Why Choose Teachers Training Some of our website features are: This is a dedicated website for teaching 24/7 tutor support Interactive Content Affordable price Courses accredited by the UK's top awarding bodies 100% online Flexible deadline Entry Requirements No formal entry requirements. You need to have: Passion for learning A good understanding of the English language Be motivated and hard-working Over the age of 16. Certification CPD Certification from The Teachers Training Successfully completing the MCQ exam of this course qualifies you for a CPD-accredited certificate from The Teachers Training. You will be eligible for both PDF copy and hard copy of the certificate to showcase your achievement however you wish. You can get your digital certificate (PDF) for £4.99 only Hard copy certificates are also available, and you can get one for only £10.99 You can get both PDF and Hard copy certificates for just £12.99! The certificate will add significant weight to your CV and will give you a competitive advantage when applying for jobs. 01. Creative Writing Course: Writing Storybooks For Children Introduction Introduction to Children's Writing 00:02:00 Crucial Information 00:02:00 Keys to Success 00:02:00 A.I.M 00:04:00 Coming Up With Ideas Getting Ideas 00:02:00 Character Creation 00:02:00 Characters and Plotting 00:04:00 The Mechanics of Writing Planning Your Story 00:03:00 Storytelling 00:03:00 Important Technical Issues Point of View 00:04:00 Technical Writing Issues 00:04:00 Types of Children's Books Story Structure 00:02:00 Picture Books 1 00:03:00 Picture Books 2 00:03:00 Picture Books 3 00:02:00 Easy Readers 00:03:00 Transition Books 00:01:00 Chapter Books 00:02:00 Junior Novels 00:02:00 Young Adult Fiction 00:05:00 Advanced Fiction Techniques Dialogue 00:05:00 Show don't Tell 00:05:00 Conclusion Conclusion 00:02:00 02. Creative Writing Course - Short Stories Introduction Introduction to Short Story Writing 00:06:00 Foreword Who Am I to Run This Course? 00:07:00 It's All About Mindset 00:07:00 What Tools Do You Need To Succeed? 00:06:00 Part One: Mindset Mental Preparation 00:06:00 Time Management 00:06:00 Self Belief 00:03:00 Goal Setting 00:02:00 Part Two: The Basics Subject Matter 00:04:00 Genre 00:07:00 Scope 00:03:00 Getting Ideas 00:03:00 Part Three: Construction Time The 7-Step Story Generator 00:02:00 Characters & Character Creation 00:04:00 Creating Protagonists 00:07:00 Character Motivation & Interactions 00:03:00 Story & Setting 00:03:00 The 5-Point Story Structure 00:02:00 Style & Tone 00:02:00 Point of View & Tense 00:03:00 Plotting & The Twist 00:05:00 Building a Short Story Template 00:03:00 Introduction to Scrivener All Hail Scrivener! 00:05:00 Part Four: Writing Your Story The Opening Paragraph 00:03:00 Fast Writing 00:05:00 The Second Draft 00:04:00 Polishing 00:05:00 Part Five: Submitting Your Work 6 Lectures It's All About Presentation 00:04:00 Dealing With Rejection 00:03:00 Rights and Payment 00:02:00 Kindle Publishing 00:04:00 Conclusion Short Stories 00:02:00 03. Creative Writing Course - Fiction Module 1 Part 1 - Getting Ideas and How to Develop Them 00:45:00 Module 1 Part 2 - Inspiration and Finding The Time 00:40:00 Module 2 - What It Means To Be A Writer 00:30:00 Module 3 - Characters 00:40:00 Module 4 - Plotting and Story Construction 01:15:00 Module 5 - Theme, Templates & Outlining 00:40:00 Module 6 - Show Don't Tell 00:45:00 Module 7 - Punctuation, Grammar and some Basic Writing Rules 00:50:00 Module 8 - Scene Structure, Exposition and Story Rules 00:40:00 Module 9 - Chapter Structure, Vision and Focus 00:35:00 Module 10 - Fast Writing Without Fear or Censure 00:40:00 Module 11 - Editing, Re-writing & Polishing 00:40:00 Module 12 - Finishing, Submission & Publication 00:30:00 04. Creative Writing Course - Horror Lesson One: The History of Horror 00:55:00 Lesson Two: Characters and Concepts 01:20:00 Lesson Three: Location and Backdrop 00:50:00 Lesson Four: Story and Plotting 00:55:00 Lesson Five: Writing Issues 01:15:00 Lesson Six: Horror Markets 01:40:00 05. Creative Writing Course - Novel Introduction to Writing Fantasy 00:35:00 Writing Fantasy - Lesson One - Imagining Fantasy 00:35:00 Writing Fantasy - Lesson Two - World Building, Maps and Visualization 00:40:00 Writing Fantasy - Lesson Three - Characters, Races and Societies 00:55:00 Writing Fantasy - Lesson Four - Plotting, Questing and Traveling 01:00:00 Writing Fantasy - Lesson Five - Point of View, Artifacts and Magic 00:55:00 Writing Fantasy - Lesson Six - Resolutions and Sequels 00:40:00 Amusing Article About Fantasy Writing (because it's true!) 00:50:00 Fantasy: Recommended Author & Book List 02:40:00 Fantasy Societies Listing 00:50:00 Mythological Creature Listing 02:00:00 06. Creative Writing Course - Thriller Introduction to Writing the Thriller 00:30:00 The Thriller: Form and Function 00:25:00 Writing the Thriller: Lesson One 00:30:00 Writing the Thriller: Lesson Two 00:30:00 Exercise 1 - Building Your Thriller 00:15:00 Writing the Thriller: Lesson Three 00:20:00 Exercise 2 - Building Your Thriller 00:35:00 Writing the Thriller: Lesson Four 00:25:00 Exercise 3 - Building Your Thriller 00:15:00 Writing the Thriller: Lesson Five 00:20:00 Exercise 4 - Building Your Thriller 00:00:00 Writing the Thriller: Lesson Six 00:30:00 07. Diploma in Drama and Comedy Writing Welcome to the Writer's Greatest Untapped Income Source 00:35:00 Introduction to Writing for TV, Cable and Satellite Networks 01:50:00 Your Ideas and How to Present Them 02:00:00 What's Different About TV Writing? 01:55:00 Scripting, Editing and the Story Bible 01:40:00 A Special Masterclass On Comedy Writing 01:30:00 The Money and How You Get Paid 01:10:00 Resources Resources - Creative Writing Complete Course 00:00:00

Creative Writing Training
Delivered Online On Demand46 hours
£27.99

Certificate in Company Law (CCL)

By EMG Associates UK Limited

Certificate in Company Law (CCL) Why Attend This course is designed for professionals seeking a comprehensive understanding of legal matters affecting companies in the GCC. The course covers the fundamental principles of company law, including the strategic selection and establishment of different types of companies, as well as the management and dissolution of companies throughout their life cycle. Additionally, participants gain valuable insights into legal issues specific to family businesses in the GCC and learn how to effectively address them in practice. Course Methodology In this interactive training course participants will frequently work in pairs as well as in larger groups to complete exercises as well as regional and international case studies. Course Objectives By the end of the course, participants will be able to: Apply legal rules and principles to specific commercial situations through consideration of relevant company law Increase profitability within their organization by selecting the best company type and by adopting the best legal practices in management Recognize the rules that govern family businesses and how they affect the continuation and success of the business Understand the reasons for company termination and dissolution and the legal issues in this regard Target Audience This course is suitable for lawyers, company managers, management teams, business and law students and those who are interested to know more about company law and its implications. It also benefits directors and executives who have direct responsibility for legal decisions within the organization. In addition, in-house council new to the region, and those working within a legal department, find this course highly beneficial. Target Competencies General principles of company law Company management Corporate governance Problem solving Note The Dubai Government Legal Affairs Department has introduced a Continuing Legal Professional Development (CLPD) programme to legal consultants authorised to practise through a licensed firm in the Emirate of Dubai. We are proud to announce that the Dubai Government Legal Affairs Department has accredited EMG Associates as a CLPD provider. In addition, all our legal programmes have been approved. This PLUS Specialty Training legal course qualifies for 4 elective CLPD points. Types of companies and company formation Types of companies Memorandum of Association (MoA) and the Articles of Association (AoA) related principles Alteration of clauses of the MoA and AoA Partnership and its formation Limited Liability Company (LLC) and its formation Public Shareholding Company and its formation Overview of other types of companies Choosing between various types of companies Company management and shareholders rights and duties Roles and types of directors Powers, duties and liabilities of directors Appointment and retirement Resignation and vacation of office Independent director Meeting of board of directors Auditors: appointment, removal, powers and duties Corporate governance Family businesses in the GCC and shareholders' liability issues UAE law of family companies The provisions related to family businesses in the new Saudi company law Legal organization of family businesses in the GCC Strategies for survival and growth within family businesses Company management and shareholders' liability General principles of corporate liability Liability of directors and Key Managerial Persons (KMP) Liability of shareholders Termination and dissolution of companies Winding up of companies Liquidator Authorities Striking off name Insolvency and bankruptcy Restructuring and re-organization Mergers and amalgamation Acquisition and take-over

Certificate in Company Law (CCL)
Delivered OnlineFlexible Dates
£4,212

Networking Microsoft Systems

5.0(3)

By Systems & Network Training

Networking Microsoft Systems course description A hands-on course covering the network aspects of Microsoft systems. The course progresses from basic TCP/IP tools and configuration settings through to advanced security considerations finishing with an overview of Exchange and IIS. Hands on sessions are based on a choice of Windows Server 2003 or Windows 2000 server and Windows XP or Windows 2000 professional. Customised versions with other Microsoft platforms are also available. What will you learn Design networks with consideration for Microsoft issues such as logons. Design, configure and troubleshoot TCP/IP, DNS, WINS and DHCP. Configure security features such as PKI and IPSec. Describe the Windows TCP/IP implementation details. Networking Microsoft Systems course details Who will benefit: Anyone working with Microsoft systems. Prerequisites: TCP/IP foundation for engineers Supporting Windows ( XP or 2000 or 2003) Duration 5 days Networking Microsoft Systems course contents Configuring network cards PnP, resources, Ethernet cards, wireless cards, dial up networking, other cards, Ethernet settings, layer 2 QoS. Configuring and supporting IP Basic IP settings, advanced IP settings, advanced TCP settings, DrTCP and registry settings, security DHCP DHCP server, authorising the DHCP service, DHCP client, DHCP relays, Address pools, options, lease duration's, Integrating with DNS. Microsoft networking overview Workgroups and domains, Domain controllers, the logon process in a network, the role of Active Directory, synchronisation, protocol stacks and bindings. Accessing file and print resources Shared folders, permissions, network printers, browsing, NetBIOS, SMB. WINS Servers, clients, Client registration, renewing and releasing of names. NetBIOS node types. DNS1 Overview, Primary and secondary servers, DDNS, zones, resource records. The browser service Master, backup and other browser roles, elections, announcements, recovery from failure, Inter subnet browsing. TCP/IP implementation details Dead gateway detection, Multi homing, multicasting, MTU path discovery, registry settings, QOS and RSVP, Windows as a router, performance implications of Microsoft services. Internet Access Options, NAT, Firewall capabilities and Proxy server, Internet Authentication Service. Remote Access Installing, RAS servers. RAS process, protocols Security: PKI PPTP, L2TP, What is IPSec, configuring IPSec. Security: VPNs PPTP, L2TP, What is IPSec, configuring IPSec. Other Microsoft networking services & tools Netmeeting, instant messaging, white boarding, document collaboration, video conferencing Microsoft Exchange, IIS, Directory replication, SNMP, Net Monitor, integration with other platforms.

Networking Microsoft Systems
Delivered in Internationally or OnlineFlexible Dates
£3,697

Supporting Microsoft IIS

5.0(3)

By Systems & Network Training

Supporting Microsoft IIS training course description This course provides students with the fundamental knowledge and skills to configure and manage Internet Information Services. This course is intended to help provide pre-requisite skills supporting a broad range of Internet web applications, security, and knowledge to help support other products that use IIS such as Exchange and SharePoint. What will you learn Install IIS. Configure IIS. Secure websites. Maintain IIS. Supporting Microsoft IIS training course details Who will benefit: Technical staff working with Microsoft IIS. Prerequisites: TCP/IP foundation for engineerss Supporting Windows ( XP or 2000 or 2003) Duration 5 days Supporting Microsoft IIS course contents Overview and Installing IIS Web Server infrastructure, installing IIS. Hands on Default install of IIS, verify and test.. Configuring the default website Default website, IIS Manager, default IIS file structure, configuring DNS records for a website, creating virtual directories and Applications. Hands on Configuring the Default website for public access. Creating Virtual Directories and Applications. Application Pools Application Pool Architecture, Application Pool recycling. Hands on Creating and managing Application Pools. Creating additional websites Multiple websites on a single server, website bindings. Hands on Creating new websites. Website and Web application support Configuring Common features, adding support for web applications. Hands on Adding support for web applications. Securing Websites and applications Access control, sites, applications, authentication and permissions. URL authorization rules. Hands on Configuring Authentication and permissions. Securing Data Transmissions with SSL Certificates and SSL, creating certificates for a web server, adding a certificate to a website. Hands on Certificates and HTTPS. Using the Central Certificate Store The Central Certificate Store. Hands on Install and configure the Central Certificate Store. Configuring Remote Administration Installing and Configuring the Management Service. Connecting to remote web servers and websites. Delegating Management Access. Hands on Remote administration. Implementing FTP Implementing FTP, configuring an FTP site. Hands on Install and configure a secured FTP site. Monitoring IIS IMonitoring IIS logs with Log Parser. Hands on Analyze a set of IIS log files for possible issues using Log Parser. Analyze performance data for performance related problems using PerfMon. Backing up and Restoring IIS The IIS environment. Hands on Performing a backup and restore of a website. Building Load-Balanced Web Farms Load-balancing mechanisms, building a Load-Balanced Web Farm using ARR, sharing content to a Web Farm using a network share, Sharing content to a Web Farm using DFS-R, Sharing IIS Configurations in a Web Farm. Hands on Installing and configuring ARR, sharing content to a Web Farm using network share and DFS-R, sharing IIS Configurations in a Web Farm.

Supporting Microsoft IIS
Delivered in Internationally or OnlineFlexible Dates
£3,697

Cyber security for engineers

5.0(3)

By Systems & Network Training

Cyber security training course description This cyber security course focusses on the network side of security. Technologies rather than specific products are studied focussing around the protection of networks using firewalls and VPNs. What will you learn Describe: - Basic security attacks - RADIUS - SSL - VPNs Deploy firewalls and secure networks Explain how the various technologies involved in an IP VPN work. Describe and implement: - L2TP - IPsec - SSL - MPLS, L3, VPNs. Cyber security training course details Who will benefit: Anyone working in the security field. Prerequisites: TCP/IP foundation for engineers Duration 5 days Cyber security training course contents Security review Denial of service, DDOS, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits IP spoofing, SYN attacks, hijacking, reflectors and amplification, keeping up to date with new threats. Hands on port scanning, use a 'hacking' tool. Client and Server security Windows, Linux, Log files, syslogd, accounts, data security. Hands on Server hardening. Firewall introduction What is a firewall? Firewall benefits, concepts. HAnds on launching various attacks on a target. Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls. Firewall products. Hands on Simple personal firewall configuration. Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on SPI firewalls. Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall plusses and minuses. Hands on Proxy firewalls. Firewall architectures Small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Password cracking. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, RADIUS. Hands on Using certificates. VPN overview What is a VPN? What is an IP VPN? VPNs vs. Private Data Networks, Internet VPNs, Intranet VPNs, Remote access VPNs, Site to site VPNs, VPN benefits and disadvantages. VPN Tunnelling VPN components, VPN tunnels, tunnel sources, tunnel end points, tunnelling topologies, tunnelling protocols, which tunnelling protocol? Requirements of tunnels. L2TP Overview, components, how it works, security, packet authentication, L2TP/IPsec, L2TP/PPP, L2 vs L3 tunnelling. Hands on Implementing a L2TP tunnel. IPsec AH, HMAC, ESP, transport and tunnel modes, Security Association, encryption and authentication algorithms, manual vs automated key exchange, NAT and other issues. Hands on Implementing an IPsec VPN. SSL VPNs Layer 4 VPNs, advantages, disadvantages. SSL. TLS. TLS negotiation, TLS authentication. TLS and certificates. Hands on Implementing a SSL VPN. MPLS VPNs Introduction to MPLS, why use MPLS, Headers, architecture, label switching, LDP, MPLS VPNs, L2 versus L3 VPNs. Point to point versus multipoint MPLS VPNs. MBGP and VRFs and their use in MPLS VPNs. Hands on Implementing a MPLS L3 VPN. Penetration testing Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology. Hands on Hacking tools and countermeasures.

Cyber security for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697

Integrating UNIX and Microsoft

5.0(3)

By Systems & Network Training

Integrating UNIX and Microsoft course description This course is designed for the enterprise-level UNIX professional and represents the highest level of professional, distribution-neutral UNIX certification within the industry. It covers administering UNIX enterprise-wide with an emphasis on mixed environments. What will you learn Configure and troubleshoot OpenLDAP. Use OpenLDAP as an authentication backend. Manage software packages. Use Samba - Share configuration - User and group management - Domain integration - Name services - with Linux and Windows clients Integrating UNIX and Microsoft course details Who will benefit: Enterprise-level UNIX professionals. Prerequisites: UNIX network administration. Duration 5 days Integrating UNIX and Microsoft course contents OPENLDAP CONFIGURATION OpenLDAP replication Replication concepts, OpenLDAP replication, replication log files, replica hubs, LDAP referrals, LDAP sync replication. Securing the Directory Securing the directory with SSL and TLS, Firewall considerations, Unauthenticated access methods, User/password authentication methods, Maintanence of SASL user DB, certificates. OpenLDAP Server Performance Tuning Measure OpenLDAP performance, Tune software configuration to increase performance, indexes. OPENLDAP AS AN AUTHENTICATION BACKEND LDAP Integration with PAM and NSS Configure PAM to use LDAP for authentication, NSS to retrieve information from LDAP and PAM modules in UNIX. Integrating LDAP with Active Directory and Kerberos Kerberos integration with LDAP, Cross platform authentication, Single sign-on concepts, Integration and compatibility limitations between OpenLDAP and Active Directory. SAMBA BASICS Samba Concepts and Architecture Samba daemons and components, key issues regarding heterogeneous network, Identify key TCP/UDP ports used with SMB/CIFS, Knowledge of Samba3 and Samba4 differences. Configure Samba Samba server configuration file structure, variables and configuration parameters, Troubleshoot and debug configuration problems. Regular Samba Maintenance Monitor and interact with running Samba daemons, Perform regular backups of Samba configuration and state data. Troubleshooting Samba Samba logging, Backup TDB files, Restore TDB files, Identify TDB file corruption, Edit / list TDB file content. Internationalization Internationalization character codes and code pages, differences in the name space between Windows and Linux/Unix with respect to share, names, user/group/computer naming in a non-English environment. SAMBA SHARE CONFIGURATION Linux File System and Share/Service Permissions File / directory permission control, Samba interaction with Linux file system permissions and ACLs, Use Samba VFS to store Windows ACLs. Print Services Printer sharing, integration between Samba and CUPS, Manage Windows print drivers and configure downloading of print drivers, security concerns with printer sharing. SAMBA USER AND GROUP MANAGEMENT Managing User Accounts and Groups User and group accounts, mappings, user account management tools, smbpasswd, file/directory ownership of objects. Authentication, Authorization and Winbind Local password database, password synchronization, passdb backends, Convert between passdb backends, Integrate Samba with LDAP, Winbind service, PAM and NSS. SAMBA DOMAIN INTEGRATION Samba as a PDC and BDC Domain membership and trust relationships, Create and maintain a PDC and BDC with Samba3/4, Add computers to an existing domain, logon scripts, roaming profiles, system policies. Samba4 as an AD compatible Domain Samba 4 as an AD DC, smbclient, how Samba integrates with AD services: DNS, Kerberos, NTP, LDAP. Configure Samba as a Domain Member Server Joining Samba to NT4 and AD domains, obtain a TGT from a KDC. SAMBA NAME SERVICES NetBIOS and WINS WINS concepts, NetBIOS concepts, local master browser, domain master browser, Samba as a WINS server, name resolution, WINS replication, NetBIOS browsing and browser elections, NETBIOS name types. Active Directory Name Resolution DNS for Samba4 as an AD Domain Controller, DNS forwarding with the internal DNS server of Samba4. WORKING WITH LINUX AND WINDOWS CLIENTS CIFS Integration SMB/CIFS concepts, remote CIFS shares from a Linux client, securely storing CIFS credentials, features and benefits of CIFS, permissions and file ownership of remote CIFS shares. Working with Windows Clients browse lists and SMB clients from Windows, Share file/print resources from Windows, the smbclient program, the Windows net utility.

Integrating UNIX and Microsoft
Delivered in Internationally or OnlineFlexible Dates
£3,697

Integrating Linux and Microsoft

5.0(3)

By Systems & Network Training

Integrating Linux and Microsoft course description This course is designed for the enterprise-level Linux professional and represents the highest level of professional, distribution-neutral Linux certification within the industry. LPIC-3 300 covers administering Linux enterprise-wide with an emphasis on mixed environments. What will you learn Configure and troubleshoot OpenLDAP. Use OpenLDAP as an authentication backend. Manage software packages. Use Samba - Share configuration - User and group management - Domain integration - Name services - with Linux and Windows clients Integrating Linux and Microsoft course details Who will benefit: Enterprise-level Linux professionals. Prerequisites: Delegates must have an active LPIC-2 certification to receive LPIC-3 certification, but the LPIC-2 and LPIC-3 exams may be taken in any order. Duration 5 days Integrating UNIX and Microsoft course contents OPENLDAP CONFIGURATION OpenLDAP replication Replication concepts, OpenLDAP replication, replication log files, replica hubs, LDAP referrals, LDAP sync replication. Securing the Directory Securing the directory with SSL and TLS, Firewall considerations, Unauthenticated access methods, User/password authentication methods, Maintanence of SASL user DB, certificates. OpenLDAP Server Performance Tuning Measure OpenLDAP performance, Tune software configuration to increase performance, indexes. OPENLDAP AS AN AUTHENTICATION BACKEND LDAP Integration with PAM and NSS Configure PAM to use LDAP for authentication, NSS to retrieve information from LDAP and PAM modules in UNIX. Integrating LDAP with Active Directory and Kerberos Kerberos integration with LDAP, Cross platform authentication, Single sign-on concepts, Integration and compatibility limitations between OpenLDAP and Active Directory. SAMBA BASICS Samba Concepts and Architecture Samba daemons and components, key issues regarding heterogeneous network, Identify key TCP/UDP ports used with SMB/CIFS, Knowledge of Samba3 and Samba4 differences. Configure Samba Samba server configuration file structure, variables and configuration parameters, Troubleshoot and debug configuration problems. Regular Samba Maintenance Monitor and interact with running Samba daemons, Perform regular backups of Samba configuration and state data. Troubleshooting Samba Samba logging, Backup TDB files, Restore TDB files, Identify TDB file corruption, Edit / list TDB file content. Internationalization Internationalization character codes and code pages, differences in the name space between Windows and Linux/Unix with respect to share, names, user/group/computer naming in a non-English environment. SAMBA SHARE CONFIGURATION Linux File System and Share/Service Permissions File / directory permission control, Samba interaction with Linux file system permissions and ACLs, Use Samba VFS to store Windows ACLs. Print Services Printer sharing, integration between Samba and CUPS, Manage Windows print drivers and configure downloading of print drivers, security concerns with printer sharing. SAMBA USER AND GROUP MANAGEMENT Managing User Accounts and Groups User and group accounts, mappings, user account management tools, smbpasswd, file/directory ownership of objects. Authentication, Authorization and Winbind Local password database, password synchronization, passdb backends, Convert between passdb backends, Integrate Samba with LDAP, Winbind service, PAM and NSS. SAMBA DOMAIN INTEGRATION Samba as a PDC and BDC Domain membership and trust relationships, Create and maintain a PDC and BDC with Samba3/4, Add computers to an existing domain, logon scripts, roaming profiles, system policies. Samba4 as an AD compatible Domain Samba 4 as an AD DC, smbclient, how Samba integrates with AD services: DNS, Kerberos, NTP, LDAP. Configure Samba as a Domain Member Server Joining Samba to NT4 and AD domains, obtain a TGT from a KDC. SAMBA NAME SERVICES NetBIOS and WINS WINS concepts, NetBIOS concepts, local master browser, domain master browser, Samba as a WINS server, name resolution, WINS replication, NetBIOS browsing and browser elections, NETBIOS name types. Active Directory Name Resolution DNS for Samba4 as an AD Domain Controller, DNS forwarding with the internal DNS server of Samba4. WORKING WITH LINUX AND WINDOWS CLIENTS CIFS Integration SMB/CIFS concepts, remote CIFS shares from a Linux client, securely storing CIFS credentials, features and benefits of CIFS, permissions and file ownership of remote CIFS shares. Working with Windows Clients browse lists and SMB clients from Windows, Share file/print resources from Windows, the smbclient program, the Windows net utility.

Integrating Linux and Microsoft
Delivered in Internationally or OnlineFlexible Dates
£3,697

30th January Donald Winchester #Agent121. Looking for: ADULT FICTION, NON-FICTION

5.0(1)

By I Am In Print

LOOKING FOR: ADULT FICTION, NON-FICTION Donald Winchester began his publishing career at Penguin Press – working on a variety of non-fiction titles – before moving to A P Watt, then the world’s oldest literary agency. There he worked for five years with a number of acclaimed and prize-winning authors and began building a list of fiction and non-fiction for adults. He joined Watson, Little as an agent in 2013. Donald is building his list and is interested in literary fiction and well-written commercial fiction, particularly debut authors, as well as memoir. He is particularly interested in literary fiction which maintains a high level of prose, pushes boundaries of style, while retaining emotional heart and a sense of plot. He’s also looking for upmarket fiction which builds a fully-formed plot with a satisfying emotional arc, whether that be historical or contemporary – and the mixing of tropes from genre fiction (crime, sci-fi, romance, etc) also interest him. In non-fiction, he is keen to see writing on history, popular science, social issues, nature, music, sport, film and technology. In all these areas he’s looking for experts in their fields who can convey their expertise and enthusiasm to a wide audience in an appealing way. Donald would like you to submit a covering letter, 1 - 2 page synopsis and the first three chapters of your manuscript in a single word document.  (In addition to the paid sessions, Donald is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Wednesday 22 January 2025

30th January Donald Winchester #Agent121. Looking for: ADULT FICTION, NON-FICTION
Delivered Online + more
£72

Network design

5.0(3)

By Systems & Network Training

Network design training course description This course provides you with the knowledge needed to perform the design of a network infrastructure that supports desired network solutions to achieve effective performance, scalability, and availability. We recognise that the role of design does not normally require hands on skills but hands on sessions are used to reinforce the theory not to teach configuration or troubleshooting. What will you learn Create HA enterprise network designs. Develop optimum Layer 3 designs. Design effective modern WAN and data center networks. Develop effective migration approaches to IPv6. Create effective network security designs. Network design training course details Who will benefit: Anyone involved with network design. Prerequisites: TCP/IP Foundation for engineers Duration 5 days Network design training course contents Part I Reliable, resilient enterprise L2/3 network designOptimal Enterprise Campus Design:Enterprise campus design principles, hierarchy, modularity, flexibility, resiliency.EIGRP design:EIGRP Design, Should you use EIGRP?OSPF design: OSPF scalability designs, OSPF area design, OSPF Full-Mesh Design, OSPF Hub-and-Spoke Design, OSPF convergence design and optimization techniques. IS-IS Design:The protocol, IS-IS hierarchical architecture, IS-IS vs OSPF, IS-IS Deep Dive, IS-IS Design Considerations. BGP design:BGP overview, Designing Scalable iBGP Networks, BGP Route Reflector Design, Enhancing the Design of BGP Policies with BGP Communities, Case Study: Designing Enterprise wide BGP Policies Using BGP Communities, BGP Load-Sharing Design.Part II Enterprise IPv6 Design ConsiderationsIPv6 Design Considerations in the Enterprise: IPv6 Deployment and Design Considerations, Considerations for Migration to IPv6 Design, IPv6 Transition Mechanisms, Final Thoughts on IPv6 Transition Mechanisms. Challenges of the Transition to IPv6: IPv6 Services, Link Layer Security Considerations. Part III Modern Enterprise Wide-Area Networks DesignService Provider-Managed VPNs:Choosing Your WAN Connection, Layer 3 MPLS VPNs, Case Study: MPLS VPN Routing Propagation, Layer 2 MPLS VPN Services. Enterprise-Managed WANs: Enterprise-Managed VPNs, GRE, Multipoint GRE, Point-to-Point and Multipoint GRE, IPsec, IPsec and dynamic VTI, DMVPN, Case Study: EIGRP DMVPN, DMVPN and Redundancy, Case Study: MPLS/VPN over GRE/DMVPN, SSL VPN. Enterprise WAN Resiliency Design: WAN Remote-Site Overview, MPLS L3 WAN Design Models, Common L2 WAN Design Models, Common VPN WAN Design Models, 3G/4G VPN Design Models, Remote Site Using Local Internet, Remote-Site LAN, Case Study: Redundancy and Connectivity, NGWAN, SDWAN, and IWAN Solution Overview, IWAN Design Overview, Enterprise WAN and Access Management. Part IV Enterprise Data Center DesignsMultitier Data Center Designs: Case Study: Small Data Centers (Connecting Servers to an Enterprise LAN), Case Study: Two-Tier Data Center Network Architecture, Case Study: Three-Tier Data Center Network Architecture.Trends and Techniques to Design Modern Data Centers: The Need for a New Network Architecture, Limitations of Current Networking Technology, Modern Data Center Design Techniques and Architectures, Multitenant Data Center. SDN:SDN characteristics, How SDN addresses current Networking Limitations, SDN Architecture Components, SDN Network Virtualization overlays. Data Center Connections:Data Center Traffic Flows, The Need for DCI, IP Address Mobility, Case Study: Dark Fiber DCI, Pseudowire DCI. Part V Design QoS for Optimized User ExperienceQoS Overview:QoS Overview, IntServ versus DiffServ, Classification and Marking, Policers and Shapers, Policing Tools: Single-Rate Three-Color Marker, Policing Tools: TwoRate Three-Color Marker, Queuing Tools, Dropping Tools. QoS design principles and best practices: QoS overview, classification and marking design principles, policing and remarking design principles, queuing design principles, dropping design principles, Per-Hop behavior queue design principles, RFC 4594 QoS Recommendation, QoS Strategy Models. Campus QoS, WAN QoS, Data Center QoS.MPLS VPN QoS Design: The Need for QoS in MPLS VPN, Layer 2 Private WAN QoS Administration, Fully Meshed MPLS VPN QoS Administration, MPLS DiffServ Tunneling Modes, Sample MPLS VPN QoS Roles. IPsec VPN QoS Design: The Need for QoS in IPsec VPN, VPN Use Cases and Their QoS Models, IPsec Refresher, Encryption and Classification: Order of Operations, MTU Considerations, DMVPN QoS Considerations. Part VI IP Multicast DesignEnterprise IP Multicast Design: How Does IP Multicast Work? Multicast Protocols, Multicast Forwarding and RPF Check, Multicast Protocol Basics, PIM-SM Overview, Multicast Routing Table, Basic SSM Concepts, Bidirectional PIM. RP discovery, Anycast RP Features, MSDP. Part VII Designing Optimum Enterprise Network SecurityDesigning Security Services and Infrastructure Protection Network Security Zoning, Designing Infrastructure Protection.Designing firewall & IPS solutions: Firewall architectures, virtualized firewalls. Case Study: Application Tier separation, Case Study: Firewalls in a Data Center, Case Study: Firewall High Availability, IPS Architectures, Case Study: Secure Campus Edge Design (Internet and Extranet Connectivity). IP Multicast Security: Multicast Security Challenges, Multicast Network Security Considerations. Designing Network Access Control Solutions:IEEE 802.1X, EAP, 802.1X supplicants, 802.1X phased deployment, Case Study: Authorization Options. Part VIII Design scenariosDesign Case Studies: 1: Enterprise Connectivity, 2: Enterprise BGP with Internet Connectivity, 3: IPv6, 4: Data Center Connectivity, 5: Resilient Enterprise WAN, 6: Secure Enterprise Network, 7: QoS in the Enterprise Network.

Network design
Delivered in Internationally or OnlineFlexible Dates
£3,697

Advanced REST APIs with Flask and Python

By Packt

Take your REST APIs to a whole new level with this advanced Flask and Python course!

Advanced REST APIs with Flask and Python
Delivered Online On Demand5 hours 58 minutes
£82.99