Database design training course description Although this course mentions Microsoft Access the same course can be run with a variety of different databases. The duration of the course is dependent on the experience of the delegates. What will you learn Name and give 3 types of database structure. Explain the difference between standard SQL and different flavours. Use SQL statements to query databases. Use SQL statements to query and define databases. Describe the principles of relational database design and 3 types of relational joins. Normalise a given flat file table into relational tables. Database design training course details Who will benefit: Anyone who needs to be able to design an efficient, watertight database following the best practice of the principles of Relational Database design. Prerequisites: None. Duration 3 days Database design training course contents Database structure and terminology. Principles of Relational Database Design. Types of relationship. Normal Forms. Practical examples of relational database design. Hands-on creation of a database. On paper design a relational database applicable to the delegates work.
Administering Microsoft SQL Server course description This course provides students with the knowledge and skills to maintain a Microsoft SQL Server database. The course focuses on how to use SQL Server 2016 product features and tools related to maintaining a database. Note: This course is designed for customers who are interested in learning SQL Server 2014 or SQL Server 2016. It covers the new features in SQL Server 2016, but also the important capabilities across the SQL Server data platform. What will you learn Describe core database administration tasks and tools. Configure SQL Server databases and storage. Import and export data. Monitor SQL Server. Trace SQL Server activity. Manage SQL Server security. Audit data access and encrypt data. Administering Microsoft SQL Server course details Who will benefit: Individuals who work with SQL Server databases. Individuals who develop applications that deliver content from SQL Server databases. Prerequisites: Introduction to data communications & networking. Duration 3 days Administering Microsoft SQL Server course contents Introduction to SQL Server administration Database administration, SQL Server platform, database management tools and techniques. Hands on SQL Server Management Studio, sqlcmd Windows PowerShell with SQL Server. Working with databases and storage Data storage with SQL Server, managing storage for system databases, managing storage for user databases, moving database files, configuring the buffer pool extension. Hands on Configuring tempdb storage, creating databases, attaching a database. Importing and exporting data Transferring data, importing and exporting table data, copying or moving a database. Hands on import and export wizard, bcp utility, BULK INSERT statement, OPENROWSET function. Monitoring SQL Server 2014 Monitoring SQL Server, dynamic management views and functions, performance monitor. Hands on Baseline metrics, monitoring a workload. Tracing SQL Server activity Tracing workload activity, using traces. Hands on Capturing a trace in SQL Server profiler, generating tuning recommendations. Managing SQL Server security SQL Server security, server-level security, database-level principals, database permissions. Hands on SQL Server security. Testing access.
Junos Operating System training course description This course provides students with the foundational knowledge required to work with the Junos OS and to configure Junos devices. The course provides a brief overview of the Junos device families and discusses the key architectural components of the software. The course then delves into foundational routing knowledge and configuration examples including general routing concepts, routing policy, and firewall filters. Delegates will gain experience in configuring and monitoring the Junos OS and monitoring basic device operations. This course is based on Junos OS Release 15.1X49. What will you learn Describe the design architecture of the Junos OS. Navigate within the Junos CLI and perform tasks within the CLI operational and configuration modes. Configure and monitor network interfaces. Navigate within the Junos J-Web interface. Identify where you might use firewall filters. Explain basic routing operations and concepts. Identify key factors in Juniper Networks' security. Junos Operating System training course details Who will benefit: This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. Prerequisites: TCP/IP foundation for engineers Duration 3 days Junos Operating System training course contents Junos Operating System Fundamentals The Junos OS Traffic Processing Overview of Junos Devices User Interface Options-The Junos CLI User Interface Options The Junos CLI: CLI Basics The Junos CLI: Operational Mode The Junos CLI: Configuration Mode User Interface Options-The J-Web Interface The J-Web GUI Configuration Lab 1: User Interface Options Initial Configuration Factory-Default Configuration Initial Configuration Interface Configuration Lab 2: Initial System Configuration Secondary System Configuration User Configuration and Authentication System Logging and Tracing Network Time Protocol Archiving Configurations SNMP Lab 3: Secondary System Configuration Operational Monitoring and Maintenance Monitoring Platform and Interface Operation Network Utilities Maintaining the Junos OS Password Recovery System Clean-Up Lab 4: Operational Monitoring and Maintenance Interface Configuration Examples Review of the Interface Configuration Hierarchy Interface Configuration Examples Using Configuration Groups Routing Fundamentals Routing Concepts: Overview of Routing Routing Concepts: The Routing Table Routing Concepts: Routing Instances Static Routing Dynamic Routing Lab 5: Routing Fundamentals Routing Policy Routing Policy Overview Case Study: Routing Policy Lab 6: Routing Policy Firewall Filters Firewall Filters Overview Case Study: Firewall Filters Unicast Reverse-Path-Forwarding Checks Lab 7: Firewall Filters Class of Service CoS Overview Traffic Classification Traffic Queueing Traffic Scheduling Case Study: CoS Lab 8: Class of Service JTAC Procedures Opening a Support Case Customer Support Tools Transferring Files to JTAC Juniper Security Concepts Security Challenges Juniper's Security Focus Appendix A: IPv6 Fundamentals IPv6 Addressing Protocols and Services Configuration
OSPF training course description A detailed hands on examination of OSPF. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. The course starts with a recap of reading routing tables and then jumps straight in with simple OSPF configuration. OSPF features are then studied and configured before moving onto how OSPF works within an area. Multi area OSPF is then studied before looking at OSPF operation in detail by analysing OSPF packets. Finally areas are covered again in more detail followed by troubleshooting. What will you learn Design OSPF networks. Design IP addressing schemes suitable for route summarisation. Troubleshoot OSPF networks. Describe the operation of OSPF. OSPF training course details Who will benefit: Technical staff working with OSPF. Prerequisites: TCP/IP Foundation for engineers Duration 3 days OSPF training course contents Basic routing and OSPF Reading routing tables, routing protocols, What is OSPF? Process IDs, passive interfaces. Hands on Simple OSPF configuration. OSPF History of OSPF, metrics, costs, convergence, Distance Vector vs. Link state routing protocols, IGPs, classless, OSPF features, load sharing, per packet/destination, OSPF authentication. Hands on Configuring OSPF features. OSPF within an area How OSPF works, LSDB, LSDB benefits and disadvantages, LSA types, Type 1 and 2, LSA propagation, router IDs, hellos, configuring hellos, the exchange protocol. Hands on Investigating OSPF structures. Areas Scalability, why areas? Area IDs, area 0, ABRs, ABR resilience, areas & LSDBs, areas & LSAs, Type 3 LSAs, virtual links. Hands on Multi area OSPF. Redistribution Multiple routing protocols, common scenarios, routing distance, External LSAs, E1 and E2. Type 4 LSAs. OSPF and default routes. Hands on Configuring static route redistribution. Route aggregation Route summarisation. How to aggregate, ABR summarisation, ASBR summarisation. Hands on OSPF address summarisation. OSPF packet formats OSPF packets, protocol stack, OSPF stages, packet flows, packet types, the OSPF header, multicasts, Hello, DDB, LS request, LS update, LS ACK, LSA header, LSA formats, neighbours, neighbour states, DRs, adjacencies, BDRs, DR election. Hands on Analysing OSPF packets, troubleshooting. OSPF network types BMA, NBMA, Point to point links. Hands on Configuring OSPF over Frame Relay. OSPF stub areas LSA types, area types, area architecture, stub areas, default routes, benefits and disadvantages of stub areas, TSSAs, NSSAs, Type 7 LSAs. Hands on Stub and TSSA configuration. The OSPF MIB SNMP overview, MIB 2, the OSPF MIB, OSPF MIB groups, useful objects, OSPF traps. Hands on the OSPF MIB. troubleshooting. Summary RFCs, OSPF design guidelines. OSPF variants (appendix) OSPF on demand, MOSPF, multicast overview, Type 6 LSAs, OSPF for IPv6 (OSPFv3).
Essential 5G training course description This course is designed to give delegates an explanation of the technologies and interworking requirements of the next generation of cellular communications. It is not a definitive set of descriptions but a possibility of the final deployment. we will investigate the 10 pillars for 5G which will include various Radio Access Technologies that are required to interwork smoothly. We will look at the 4G Pro features and other RATs. What will you learn List the ten pillars of 5G deployment. Describe the 5G Internet. Explain virtualization and RAT virtulization. Describe Software Defined Networks (SDN). Explain carrier aggregation. Describe the mobile cloud. Explain an overall picture of 5G architecture. Essential 5G training course details Who will benefit: Anyone looking for an understanding of the technologies and interworking requirements of the next generation of cellular communications. Prerequisites: None. Duration 3 days Essential 5G training course contents Drivers for 5G 5G Road Map, 10 Pillars of 5G, evolving RATs, oSON, MTCm, mm-wave, backhaul, EE, new spectrum, spectrum sharing, RAN virtualisation. 4G LTE Advanced MIMO technology in release 8, Downlink & uplink MIMO R8, MIMO technology in LTE advanced, Downlink 8-layer SU-MIMO, Downlink MU-MIMO, Uplink MU-MIMO, Uplink transmit diversity, Coordinated multi-point operation (CoMP), Independent eNB & remote base station configurations, Downlink CoMP. ICIC & eICIC ICIC, Homogeneous to heterogeneous network evolution, Introduction to eICIC, Macro-pico scenario, Macro-femto scenario, Time orthogonal frequencies. Almost Blank Subframe (ABS). Carrier aggregation Component carriers (CC), CC aggregation deployments, Intra-band contiguous solutions, Intra-band non-contiguous solutions, Inter-band non-contiguous solutions, CA bandwidth classes, Aggregated transmission bandwidth configurations (ATBC), Possible carrier aggregation configs. eIMTA TDD UL-DL reconfig. for traffic adaptation, Reconfig. mechanisms, Interference mitigation schemes, Dynamic & flexible resource allocation. 5G architectures 5G in Europe, horizon 2020 framework, 5G infrastructure PPP, METIS project, 5G in North America, academy research, company R&D, 5G specifications. The 5G internet High-level view of Cloud Services, The Internet of Things & context awareness, Network reconfiguration & virtualization support, server proliferation, how VMs fix underutilised server problem, enter the hypervisor, why are VM such a big deal? SDN, evolution of the data centre network, high availability, low latency, scalability, security, cost model explodes, service-oriented API. OpenFlow switches, OpenFlow controllers, how SDN works. The big picture, pulling it all together, why the network had to change, how SDN & NFV tie together. Evolutionary approach to the internet, architectures for distributed mobility management, MEDIEVAL & MEDIVO projects, a clean slate approach, mobility first architecture. VNet, INM, NetInf, ForMux, MEEM. Generic Path (GP) & anchorless mobility (AM), Quality of Service support, network resource provisioning, resourcing inside a network. IntServ, RSVP, DiffServ, CoS. Emerging approach for resource over- provisioning, example use case architecture for scalable resource control scenarios in the 5G internet. Integrating SDN/NFV for efficient resource over-reservation control, control information repository, service admission control policies, network resource provisioning, control enforcement functions, network configurations & operations. Small cells for 5G Average spectral efficiency evolution, WiFi & Femto cells, Capacity limits. Achievable gains with densifications, multi-antenna techniques, small cells. Mobile data demand, approach & methodology, subscriber density and traffic demand projections to 2020. Demand versus capacity, global mobile data traffic increase modelling, country level backhaul traffic projections, Small cell challenges, backhaul, spectrum, automation. Cooperation for next gen wireless networks Diversity & relaying strategies, cooperation & network coding, ARQ & MAC protocols, NCCARQ & PRCSMA packet exchange, Physical layer impact on MAC protocol analysis, NCCARQ overview, PHY layer impact, Case study on NCCARQ. Mobile clouds Mobile cloud, Mobile cloud enablers, mobile user domain, wireless technologies, WWAN WLAN and WPAN range, Bluetooth, IEEE.802.15.4 & software stacks, infrared, near field communications (NFC). Network coding, store & forward vs compute & forward, linear network coding, random linear coding. Security for 5G communications Potential 5G communication systems architectures, Security issues & challenges. Mobile malware attacks targeting the UE, 5G mobile botnets, access networks, attacks on 4G networks, C-RNTI & packet sequence number based UE location tracking, false buffer status reports attacks, message insertion attacks, HeNB attacks, physical attacks, credential attacks, configuration and protocol attacks, attacks on MON, user data & identity attacks, mobile operator's core network, DDoS attacks targeting MON, signalling amplification, HSS saturation, external IP networks.
Executive Coaching provides a safe space for leaders to explore new ideas and techniques without judgement, fostering personal growth and benefiting the wider business. Sessions are confidential, 90 minutes long, and tailored to individual developmental needs, with a bi-weekly schedule of six sessions suggested. These sessions are conducted via Zoom, with face-to-face options available in East Anglia and London; email engage@puritas.org.uk for details.
Supporting Microsoft SQL server course description A concise hands on course enabling delegates to manage and administer a Microsoft SQL server database. What will you learn Install SQL server. Backup SQL server databases. Recover SQL server databases. Secure SQL server databases. Perform routine maintenance. Automate tasks. Supporting Microsoft SQL server course details Who will benefit: Anyone working with Microsoft SQL server Prerequisites: Supporting Windows server. Duration 3 days Supporting Microsoft SQL server course contents SQL server introduction Platform, Tools, services. Installation. Creating databases. Backups Back up types, transaction logging, restoring from a backup: Full database, individual files. Security Users, server roles, database roles. Permissions. Monitoring Routine database maintenance. Performance data. Jobs and alerts The SQL server agent, database mail, alerts, jobs.
MPLS training course description A hands-on introduction to MPLS covering the basics of what MPLS is and how to configure it, through to more advanced concepts such as MPLS VPNs and traffic engineering with MPLS. What will you learn Describe MPLS Explain how MPLS works Describe the interaction between OSPF/IS-IS/BGP and MPLS Describe MPLS traffic engineering MPLS training course details Who will benefit: Anyone working with MPLS. Prerequisites: IP Routing BGP Duration 3 days MPLS training course contents What is MPLS? What does MPLS stand for? What is MPLS? Core MPLS, MPLS and the 7 layer model, MPLS is a protocol, MPLS is a standard, MPLS runs on routers, MPLS history, Why MPLS? For service providers, For enterprises. MPLS Architecture Label Switch Routers, two types of LSR, PE and P router roles, FEC, swapping labels, MPLS packet format, Loops, TTL control. Hands on: Building the base network. Enabling MPLS. Simple testing and troubleshooting of MPLS. Label distribution Label review, label switch path, label distribution methods, piggybacking, Label distribution Protocols, LDP, LDP operation, LDP packets, discovery messages, session messages, advertisement messages, notification message, Label Information Base, routing tables, the LFIB, MPLS forwarding, penultimate hop popping, handling labels, LSP control modes, when to distribute labels, how long to keep labels, aggregation, label merging. Hands on: LDP traffic analysis. MPLS TE and QoS What is MPLS TE? Why TE? TE versus shorted path, how MPLS TE works, CR-LDP, OSPF-TE, IS-IS-TE, TE with BGP, RSVP-TE, MPLS Fast reroute, MPLS QoS. Hands on: Enabling MPLS-TE. BFD BFD, hello the BFD protocol. MPLS VPN What is a VPN? MPLS VPN types, MPLS VPN comparison, MPLS L3 VPN, VRFs, MBGP, MPLS VPN architecture, VRF RD, VRF RT, the label stack, L2 VPNs, VPWS, AToM, VPLS. Hands on: MPLS L3 VPN setup, troubleshooting.
Total IP multicast training course description This training course provides an advanced three day hands on study of IP multicast technology focusing on architectures, applications and protocols. All aspects of IP multicasting are covered including PC, server and switch implementations. Design, configuration, support and troubleshooting are all covered in the course. Hands on sessions are used to reinforce the theory rather than teach specific implementations. What will you learn Design multicast networks. Explain how multicast networks work. Compare and contrast the different multicast routing protocols, such as DVMRP, PIM, MBGP and SSM. Configure PCs, servers, switches and routers for multicasting. Configure multicast routing protocols including: PIM Dense Mode. PIM Sparse Mode BGP SSM Troubleshoot multicast networks. Total IP multicast training course details Who will benefit: Technical staff working with IP multicasts. Prerequisites: TCP/IP Foundation for engineers Duration 3 days Total IP multicast training course contents Introduction What is multicasting? Why multicast? Why not multicast? Multicasting vs. multiple unicasts, Multicasting vs. broadcasts, multicasting applications, the use of unicast addressing for setting up multicast applications, multicast use within standard protocols such as OSPF. hands on Example multicast applications. Addressing Layer two multicast addresses, Class D addresses, mapping layer 3 addresses onto layer 2 multicast addresses. Multicast addresses on NBMAs, scoping multicast traffic, Multicast address blocks, GLOP, IPv6 and multicasting, anycasting. hands on Multicast addressing. Multicast architectures Where the different protocols are used, PC to router, router to router, how switches can get involved. hands on Analysing multicast packets. PC to router Configuring Class D addresses, IGMP, packet formats, queries, reports, maintaining groups, enhancements to IGMP (v2 and v3), Leaving a group, querier elections, hands on Analysing IGMP packets. Switches and multicasting Controlling multicast traffic with switches, VLANS, static bridge table entries, IGMP snooping, CGMP. hands on Configuring switches for multicast environments. Router to router MOSPF, DVMRP, PIM Sparse Mode, PIM Dense Mode, MBGP. hands on Simple router configuration for multicasting. Theory behind multicast routing protocols Distribution trees, source distribution trees, shared trees, core based trees. Reverse path forwarding, Multicast routing protocol types. PIM DM: Flooding, pruning, PIM designated routers, hands on configuring PIM DM. PIM Sparse mode Rendevous points, discovering RPs, hands on Configuring PIM SM, using different protocols for different groups. PIM SM with one RP, using multiple RPs, Auto RP. MBGP Multiprotocol routing, how does MBGP work? How MBGP carries multiple protocol information, MBGP and multicasts, MBGP and IPv6. hands on Configuring MBGP for multicasts. Internet multicasting The internet, ISPs, the MBone, tunnelling, Inter domain multicasting, the role of MBGP, Inter domain problem, MSDP, MSDP operation SSM, PIM-SM and shared trees, SSM, PIM-SSM operation, SSM benefits. hands on MSDP configuration. SSM configuration.
Software development training course description This three-day MTA Training course helps you prepare for Microsoft Technology Associate Exam 98-361, and build an understanding of these topics: Core programming, Object-Oriented programming, general software development, web applications, desktop applications, and databases. This course leverages the same content as found in the Microsoft Official Academic Course (MOAC) for this exam. What will you learn Describe core programming. Explain Object Oriented programming. Describe general software development. Describe Web applications. Describe desktop applications. Explain how databases work. Software development training course details Who will benefit: Anyone looking to learn the fundamentals of software. Prerequisites: None. Duration 3 days Software development training course contents Core programming Computer storage and data types How a computer stores programs and the instructions in computer memory, memory stacks and heaps, memory size requirements for the various data storage types, numeric data and textual data. Computer decision structures Various decision structures used in all computer programming languages; If decision structures; multiple decision structures, such as Ifâ¦Else and switch/Select Case; reading flowcharts; decision tables; evaluating expressions. Handling repetition For loops, While loops, Do...While loops and recursion. Understand error handling Structured exception handling. Object-oriented programming Classes Properties, methods, events and constructors; how to create a class; how to use classes in code. Inheritance Inheriting the functionality of a base class into a derived class. Polymorphism Extending the functionality in a class after inheriting from a base class, overriding methods in the derived class. Encapsulation Creating classes that hide their implementation details while still allowing access to the required functionality through the interface, access modifiers. General software development Application life cycle management Phases of application life cycle management, software testing. Interpret application specifications Application specifications, translating them into prototypes, code, select appropriate application type and components. Algorithms and data structures Arrays, stacks, queues, linked lists and sorting algorithms; performance implications of various data structures; choosing the right data structure. Web applications Web page development HTML, CSS, JavaScript. ASP.NET web application development Page life cycle, event model, state management, client-side versus server-side programming. Web hosting Creating virtual directories and websites, deploying web applications, understanding the role of Internet Information Services. Web services Web services that will be consumed by client applications, accessing web services from a client application, SOAP, WSDL. Desktop applications Windows apps UI design guideline categories, characteristics and capabilities of Store Apps, identify gestures. Console-based applications Characteristics and capabilities of console- based applications. Windows Services Characteristics and capabilities of Windows Services. Databases Relational database management systems Characteristics and capabilities of database products, database design, ERDs, normalisation concepts. Database query methods SQL, creating and accessing stored procedures, updating and selecting data. Database connection methods Connecting to various types of data stores, such as flat file; XML file; in-memory object; resource optimisation.