Apache NiFi, a robust, open-source data ingestion/distribution framework, is the core of Hortonworks DataFlow (HDF)
CWNA training course description A hands-on course focusing on the technical support of WiFi. Wireless LANs are often seen as simple communications that are simply installed and then left alone to work. This course ensures that delegates will be able to install WiFi networks which work but also enable the delegates to troubleshoot WiFi when it does go wrong. What will you learn Compare 802.11 standards. Configure WiFi networks. Troubleshoot WiFi networks using spectrum analysers, Wireshark and other tools. Implement 802.11 security. Perform RF surveys. CWNA training course details Who will benefit: Technical staff working with WiFi networks. Anyone wishing to pass the CWNA exam. Prerequisites: Intro to data communications & networking Duration 5 days CWNA training course contents Introduction History, standards. RF fundamentals What is RF? Wavelength, Frequency, Amplitude, Phase. Wave behaviour. RF components. Watts, mW, dB, SNR, Link budgets. Hands on Spectrum analysis. Listing WiFi networks. WiFi connection. inSSIDer. Antennas Radiation envelopes, polar charts, gain, Antenna types. Line of Sight, MIMO. Hands on Connecting, installing, changing antennae. RSSI values. 802.11 802.11-2007, 802.11 post 2007, 802.11 drafts. 802.11 b/g/n. Hands on WiFi performance measurement. Spread Spectrum RF frequency bands, FHSS, DSSS, OFDM. Channels. Hands on Configuring channels. Topologies Mesh, Access points, distribution systems, SSID. Hands on AP configuration. Client connection profiles. 802.11 MAC CSMA/CA, Management frames, control frames, data frames. Passive scanning, active scanning. Open system authentication. Shared Key authentication. Association. RTS/CTS. Power management. Hands on Capturing frames, analysing frames. WiFi architecture WiFi client, WLAN architecture: Autonomous, Centralised, distributed. WiFi bridges. WiFi routers. PoE. Hands on WLAN controllers. Troubleshooting RF interference, multipath, adjacent channels, low SNR, mismatched power. Coverage, capacity. 802.11 Security Basics, Legacy security: WEP, MAC filters, SSID cloaking. PSK, 8021.X/EAP, WPA/WPA2. TKIP/ CCMP encryption. Guest WLANs. Wireless attacks, intrusion monitoring. Hands on WEP cracking, WPA2 configuration. RADIUS. RF Site surveys Protocol and spectrum analysis, coverage analysis. Site survey tools. Hands on Performing a site survey.
Advanced Junos Security training course description This course provides students with intermediate routing knowledge and configuration examples. The course includes an overview of protocol-independent routing features, load balancing and filter-based forwarding, OSPF, BGP, IP tunneling, and high availability (HA) features. Junos Intermediate Routing (JIR) is an intermediate-level course. What will you learn Demonstrate the understanding of integrated user firewall. Implement next generation Layer 2 security features. Implement virtual routing instances in a security setting. Utilize Junos tools for troubleshooting Junos security implementations. Implement IPS policy. Advanced Junos Security training course details Who will benefit: Individuals responsible for implementing, monitoring, and troubleshooting Junos security components. Prerequisites: Intro to the Junos Operating System Duration 5 days Advanced Junos Security training course contents Junos Layer 2 Packet Handling and Security Features Transparent Mode Security Secure Wire Layer 2 Next Generation Ethernet Switching MACsec Lab 2 Implementing Layer 2 Security Virtualization Virtualization Overview Routing Instances Logical Systems Lab 3 Implementing Junos Virtual Routing AppSecure Theory AppSecure Overview AppID Overview AppID Techniques Application System Cache Custom Application Signatures AppSecure Implementation AppTrack AppFW AppQoS APBR SSL Proxy Lab 4 Implementing AppSecure Working with Log Director Log Director Overview Log Director Components Installing and setting up Log Director Clustering with the Log Concentrator VM Administrating Log Director Lab 5 Deploying Log Director Sky ATP Theory Sky ATP Overview Monitoring Sky ATP Analysis and Detection of Malware Sky ATP Implementation Configuring Sky ATP Installing Sky ATP Analysis and detection of Malware Infected Host Case Study Lab 6 Instructor Led Sky ATP Demo Implementing UTM UTM Overview AntiSpam AntiVirus Content and Web Filtering Lab 7 Implementing UTM Introduction to IPS IPS Overview Network Asset Protection Intrusion Attack Methods Intrusion Prevention Systems IPS Inspection Walkthrough IPS Policy and Configuration SRX IPS Requirements IPS Operation Modes Basic IPS Policy Review IPS Rulebase Operations Lab 8 Implementing Basic IPS Policy SDSN SDSN Overview, Components & Configuration Policy Enforcer Troubleshooting SDSN Use Cases Lab 9 Implementing SDSN Enforcement, Monitoring, and Reporting User Role Firewall and Integrated User Firewall Overview User Role Firewall Implementation Monitoring User Role Firewall Integrated User Firewall Implementation Monitoring Integrated User Firewall Lab 10 Configure User Role Firewall and Integrated User Firewall Troubleshooting Junos Security Troubleshooting Methodology Troubleshooting Tools Identifying IPsec Issues Lab 11 Performing Security Troubleshooting Techniques Appendix A: SRX Series Hardware and Interfaces Branch SRX Platform Overview High End SRX Platform Overview SRX Traffic Flow and Distribution SRX Interfaces
Course Description Get instant knowledge from this bite-sized Logistics Management (Intermediate): Part 2 course. This course is very short and you can complete it within a very short time. In this Logistics Management (Intermediate): Part 2 course you will get fundamental ideas of logistics management, the key understanding of supplier relationship management, channels of distribution and so on. Enrol in this course today and start your instant first step towards learning about sourcing, purchasing, and procurement. Learn faster for instant implementation. Learning Outcome Familiarise with supplier relationship management Understand sourcing, purchasing, and procurement Gain in-depth knowledge of inventory planning and management Learn about the channels of distribution How Much Do Logistics Managers Earn? Senior - £68,000 (Apprx.) Average - £46,000 (Apprx.) Starting - £30,000 (Apprx.) Requirement Our Logistics Management (Fundamentals): Part 2 is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Logistics Management (Intermediate): Part 2 Module 01: Sourcing, Purchasing, and Procurement 00:27:00 Module 02: Channels of Distribution 00:30:00 Module 03: Supplier Relationship Management 00:22:00 Module 04: Inventory Planning and Management 00:37:00 Assignment Assignment - Logistics Management (Intermediate): Part 2 00:00:00
SIP security training course description A hands-on course covering SIP security. It is assumed that delegates already know SIP as this course focuses purely on the security issues in SIP IP telephony networks. Hands-on practicals follow each major theory session and include use of various SIP security tools such as vomit, sipp, sipsak and sivus amongst others. What will you learn Secure SIP networks Use various SIP security tools SIP security training course details Who will benefit: Technical staff working with SIP. Technical security staff. Prerequisites: SIP for engineers Duration 2 days SIP security training course contents SIP review SIP infrastructure and entities, example SIP session. Hands on Simple SIP network with and without authentication. SIP security attacks DOS attacks, infrastructure attacks, eavesdropping, spoofing, replay, message integrity. Hands on Basic SIP packet capture, infrastructure attacks. SIP tools SIP packet creation: Sivus, SIPsak, PROTOS, SFTF, SIP bomber, SIPp, Seagull, Nastysip. SIP packet generators: SIPNess, NetDude. Monitoring: Wireshark, Cain & Abel, Vomit, Oreka, VoiPong. Scripts and tools: SIP-Fun, Skora.net, kphone-ddos, sip-scan, sip-kill, sip-redirectrtp. Health of different tools. Hands on Generating SIP packets, rebuilding conversations from captured packets, password cracking. VPNs and SIP IPSec, AH, ESP, transport mode, tunnel mode, Pre Shared Keys, Public keys. Hands on SIP calls over IPSec. Secure SIP signaling SIP relationship with HTTP, Deprecated HTTP 1.0 basic authentication, HTTP 1.1 Digest authentication, S/MIME, SIPS, SIPS URI, TLS, DTLS, PKI infrastructures. Hands on SIP with TLS. Secure media streams SRTP, features, packet format, default encryption, default authentication, key distribution. S/MIME, MIKEY, SDP security descriptions. SIP security agreements. Hands on Analysing SRTP packets. Firewalls NAT traversal. Impact of firewall on infrastructure attacks. TLS and firewalls. SIP specific firewalls. Hands on SIP calls through a firewall.
Overview This comprehensive course on Statistics & Probability for Data Science & Machine Learning will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Statistics & Probability for Data Science & Machine Learning comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Statistics & Probability for Data Science & Machine Learning. It is available to all students, of all academic backgrounds. Requirements Our Statistics & Probability for Data Science & Machine Learning is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Learning this new skill will help you to advance in your career. It will diversify your job options and help you develop new techniques to keep up with the fast-changing world. This skillset will help you to- Open doors of opportunities Increase your adaptability Keep you relevant Boost confidence And much more! Course Curriculum 10 sections • 89 lectures • 11:27:00 total length •Welcome!: 00:02:00 •What will you learn in this course?: 00:06:00 •How can you get the most out of it?: 00:06:00 •Intro: 00:03:00 •Mean: 00:06:00 •Median: 00:05:00 •Mode: 00:04:00 •Mean or Median?: 00:08:00 •Skewness: 00:08:00 •Practice: Skewness: 00:01:00 •Solution: Skewness: 00:03:00 •Range & IQR: 00:10:00 •Sample vs. Population: 00:05:00 •Variance & Standard deviation: 00:11:00 •Impact of Scaling & Shifting: 00:19:00 •Statistical moments: 00:06:00 •What is a distribution?: 00:10:00 •Normal distribution: 00:09:00 •Z-Scores: 00:13:00 •Practice: Normal distribution: 00:04:00 •Solution: Normal distribution: 00:07:00 •Intro: 00:01:00 •Probability Basics: 00:10:00 •Calculating simple Probabilities: 00:05:00 •Practice: Simple Probabilities: 00:01:00 •Quick solution: Simple Probabilities: 00:01:00 •Detailed solution: Simple Probabilities: 00:06:00 •Rule of addition: 00:13:00 •Practice: Rule of addition: 00:02:00 •Quick solution: Rule of addition: 00:01:00 •Detailed solution: Rule of addition: 00:07:00 •Rule of multiplication: 00:11:00 •Practice: Rule of multiplication: 00:01:00 •Solution: Rule of multiplication: 00:03:00 •Bayes Theorem: 00:10:00 •Bayes Theorem - Practical example: 00:07:00 •Expected value: 00:11:00 •Practice: Expected value: 00:01:00 •Solution: Expected value: 00:03:00 •Law of Large Numbers: 00:08:00 •Central Limit Theorem - Theory: 00:10:00 •Central Limit Theorem - Intuition: 00:08:00 •Central Limit Theorem - Challenge: 00:11:00 •Central Limit Theorem - Exercise: 00:02:00 •Central Limit Theorem - Solution: 00:14:00 •Binomial distribution: 00:16:00 •Poisson distribution: 00:17:00 •Real life problems: 00:15:00 •Intro: 00:01:00 •What is a hypothesis?: 00:19:00 •Significance level and p-value: 00:06:00 •Type I and Type II errors: 00:05:00 •Confidence intervals and margin of error: 00:15:00 •Excursion: Calculating sample size & power: 00:11:00 •Performing the hypothesis test: 00:20:00 •Practice: Hypothesis test: 00:01:00 •Solution: Hypothesis test: 00:06:00 •T-test and t-distribution: 00:13:00 •Proportion testing: 00:10:00 •Important p-z pairs: 00:08:00 •Intro: 00:02:00 •Linear Regression: 00:11:00 •Correlation coefficient: 00:10:00 •Practice: Correlation: 00:02:00 •Solution: Correlation: 00:08:00 •Practice: Linear Regression: 00:01:00 •Solution: Linear Regression: 00:07:00 •Residual, MSE & MAE: 00:08:00 •Practice: MSE & MAE: 00:01:00 •Solution: MSE & MAE: 00:03:00 •Coefficient of determination: 00:12:00 •Root Mean Square Error: 00:06:00 •Practice: RMSE: 00:01:00 •Solution: RMSE: 00:02:00 •Multiple Linear Regression: 00:16:00 •Overfitting: 00:05:00 •Polynomial Regression: 00:13:00 •Logistic Regression: 00:09:00 •Decision Trees: 00:21:00 •Regression Trees: 00:14:00 •Random Forests: 00:13:00 •Dealing with missing data: 00:10:00 •ANOVA - Basics & Assumptions: 00:06:00 •One-way ANOVA: 00:12:00 •F-Distribution: 00:10:00 •Two-way ANOVA - Sum of Squares: 00:16:00 •Two-way ANOVA - F-ratio & conclusions: 00:11:00 •Wrap up: 00:01:00 •Assignment - Statistics & Probability for Data Science & Machine Learning: 00:00:00
MOS Core Excel - 77-727 : Complete Techniques for Exam Success
Definitive SRv6 course description This one day SRv6 training course is a condensed, intensive program designed to provide network professionals with a fast-track introduction to SRv6 (Segment Routing over IPv6). SRv6 is a revolutionary networking technology that combines the power of IPv6 with the flexibility of Segment Routing, enabling efficient and scalable network operations. In just one day, participants will gain essential knowledge and practical skills to understand, configure, and work with SRv6 in modern network environments. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. What will you learn Explain packet paths when implementing SLB. Explain how SRv6 works. Explain the difference between SR and SRv6. Implement SRv6. Troubleshoot SRv6. Definitive SRv6 course details Who will benefit: Network engineers, architects, and administrators who want to quickly grasp the fundamentals of SRv6 and its practical applications in their network. Prerequisites: Definitive Segment Routing for engineers Duration 1 day Definitive SRv6 course contents Introduction to SRv6 What is SRv6? Source based routing, difference between SR-MPLS and SRv6. IPv6 headers review, routing headers. SRv6 simplified solution. Hands on Enabling IPv6 in the legacy network. SRv6 transport Segment Routing Extension Header. SRv6 segment identifiers. End SID, End.X SID. ISIS distribution of SIDs. Header processing in a SRv6 topology. Locators. Hands on Configuring SRv6 transport. Analysing SRv6 operation. SRv6 services End.DT4 SID, End.DT6 SID. SRH encapsulation modes: Insert and Encap modes. SRv6 TE policy. Hands on Migrating to SRv6, TI-LFA protection. Micro loop avoidance. SRv6 integration with 'older' technologies MPLS. The role of iBGP and eBGP v6 sessions. Hands on Integration with legacy network. Troubleshooting SRv6 SRv6 ping and traceroute. Hands on: Used throughout the course during exercises.
HTTP streaming training course description This course looks at the delivery of video streams using HTTP adaptive streaming. Both MPEG DASH and HLS are investigated. Hands on sessions primarily involve using Wireshark to analyse streams. What will you learn Use Wireshark to analyse and troubleshoot HTTP video streams. Explain HTTP adaptive streaming works. Evaluate and compare MPEG DASH and HLS. Use tools to create HTTP adaptive streams. HTTP streaming training course details Who will benefit: Anyone working in the broadcast industry. Prerequisites: TCP/IP foundation for engineers Duration 2 days HTTP streaming training course contents What is HTTP streaming? The old way. Progressive downloads versus streaming. Why not UDP and RTP for delivery? Adaptive bit rate streaming. Standards. Hands on Base network setup. Using WireShark for HTTP streams. HTTP protocol stack IP, TCP, IPv6. HTTP. HTTP 1.0, HTTP 1.1, HTTP 2.0, HTTP header fields. HTML 5. Hands on Analysing HTTP. Adaptive bitrate streaming principles Chunks, fragments, segments. Manifest files. Encoding, resolution, bitrates. Addressing, relative and absolute URLs, redirection. When does the client switch streams? Switch points. Hands on Walk through of client behaviours on a stream. HTTP streaming architecture Server components, distribution components, client software. CDN, caching, multiple servers. Hands on Analysing CDN and Internet delivery. TCP and HTTP streaming interactions TCP ACK, TCP connections, unicast only. TCP flow control, TCP and performance. Hands on TCP window sizes. MPEG DASH Stakeholders, DASH architecture and model, codec agnostic, XML, Media Presentation Description, Media Presentation, segment formats. Hands on MPEG DASH analysis. HTTP Live Streaming and others Stakeholders. Media segments, media playlists, master playlists. Adobe HTTP dynamic streaming, Microsoft smooth streaming. Hands on Analysing HLS. Tools mp4dash, mp4fragment, libdash. Apple developer tools for HLS. Hands on Creating segmented content. Security HTTPS, encryption, content protection. Hands on Encryption analysis. Summary Choosing a streaming method. Impact of live versus VoD. Web sockets.
Linux fundamentals training course description An introduction to using the Linux operating system with a focus on the command line. Appropriate for all versions of Linux. The starting point for all Linux work, we concentrate on the technical aspects rather than issues such as using browsers. The course is heavily practical in nature. The course can be run on any Linux distribution you wish. What will you learn Describe Linux. Log in and use Linux commands to perform a variety of tasks from manipulating and printing files to looking at and killing processes. Create and edit files with vi. Recognise the role of the administrator. Write simple shell scripts. Customise the user environment. Linux fundamentals training course details Who will benefit: Anybody who needs to use a Linux system. Prerequisites: None. Duration 3 days Linux fundamentals training course contents What is Linux? Operating systems, Linux flavours, Linux distributions, open source software. Getting started Logging in, changing passwords, logging out. Linux basics Command structure. The Linux manuals, basic commands (who, date, tty, uname, echo, banner...) Filesystem commands Home directories, manipulating files and directories, Filesystem layout, Pathnames, hard and symbolic links. Viewing files. The Linux editors ed, vi, shell escapes, .exrc Extracting data from files grep, find, cut, sort and paste... Permissions Theory, chmod, chown, newgrp.. Processes ps, kill, background processes, at, exec, priorities. Managing Linux log files. The Shell Metacharacters, piping and redirection. Basic shell scripting What are shell scripts? Simple scripts, control structures. Variables. Arguments. Customising your environment Environmental variables, stty, .profile and other startup files More shell features Bash and other shells, the history facility, command line editing, aliases, job control, miscellaneous features. Introduction to administration The root user, su. Managing users and groups Archiving files Backups, tar, cpio, dd, gzip. Linux and hardware Main hardware components, Linux device drivers. Connecting to a network IP configuration, ifconfig, ping, netstat, traceroute, dig.