About this Virtual Instructor Led Training (VILT) This Virtual Instructor Led Training (VILT) course presents advanced methodologies that implement demand response and energy conservation programs in light of the integration of new technologies, regulatory changes and the accelerated penetration of renewable energy resources. This VILT course provides examples and case studies from North American and European jurisdictions covering the operational flexibilities on the demand side including requirements for new building codes to achieve zero net energy. The course describes a public agency's goals and objectives for conserving and otherwise reducing energy consumption and managing its demand for energy. This course presents the demand response implemented for economics and system security such as system balancing and relieving transmission congestion, or for system adequacy. The course also presents the principal attributes of conservation programs and the associated success criteria. In a system with increased penetration of renewable resources, demand response provides flexibility to system operators, helping them to maintain the reliability and the security of supply. Demand response is presented as a competitive alternative to additional power sources, enhancing competition and liquidity in electricity markets. The unique characteristics are discussed from a local, consumer centric and also from a system perspective bringing to life the ever changing paradigm for delivery energy to customers. Interoperability aspects and standards are discussed, as well as the consumer centric paradigm of Transactive Energy with IOT enabled flexibilities at system level, distribution networks and microgrids. The VILT course introduces the blockchain as a new line of defense against cyber threats and its increasing application in P2P transactions and renewable certificates. Our trainer's industry experience spans three decades with one of the largest Canadian utilities where she led or contributed to large operational studies and energy policies and decades of work with IEEE, NSERC and CIGRE. Our key expert also approaches to the cross sectional, interdisciplinary state of the art methodologies brings real life experience of recent industry developments. Training Objectives Innovative Digital Technologies How systems Facilitate Operational Flexibility on the Demand Side The Ecosystem of Demand Side Management Programs Advanced Machine Learning techniques with examples from CAISO Regulatory Policy Context and how to reduce regulatory barriers Industry Examples from NERC and ENTSO Relevant Industry standards: IEEE and IEC Manage Congestion with Distributed Operational Flexibilities: Grid to Distribution Controls; examples from NERC (NA) and ENTSO (Europe) Grid solutions with IEC 61850 communication protocols Decentralized grid controls The New Grid with accelerated V2G and Microgrids How DSM is and will be applied in Your System: Examples and discussions Target Audience Regulators and government agencies advising on public energy conservation programs All professionals interested in expanding their expertise, or advancing their career, or take on management and leadership roles in the rapidly evolving energy sector Energy professionals implementing demand side management, particularly in power systems with increased renewable penetration, to allow the much needed operational flexibility paramount to maintaining the reliability and stability of the power system and in the same time offering all classes of customers flexible and economical choices Any utility professional interested in understanding the new developments in the power industry Course Level Basic or Foundation Training Methods The VILT course will be delivered online in 5 half-day sessions comprising 4 hours per day, with 2 x 10 minutes break per day, including time for lectures, discussion, quizzes and short classroom exercises. Course Duration: 5 half-day sessions, 4 hours per session (20 hours in total). Trainer Your first expert course leader is a Utility Executive with extensive global experience in power system operation and planning, energy markets, enterprise risk and regulatory oversight. She consults on energy markets integrating renewable resources from planning to operation. She led complex projects in operations and conducted long term planning studies to support planning and operational reliability standards. Specializing in Smart Grids, Operational flexibilities, Renewable generation, Reliability, Financial Engineering, Energy Markets and Power System Integration, she was recently engaged by the Inter-American Development Bank/MHI in Guyana. She was the Operations Expert in the regulatory assessment in Oman. She is a registered member of the Professional Engineers of Ontario, Canada. She is also a contributing member to the IEEE Standards Association, WG Blockchain P2418.5. With over 25 years with Ontario Power Generation (Revenue $1.2 Billion CAD, I/S 16 GW), she served as Canadian representative in CIGRE, committee member in NSERC (Natural Sciences and Engineering Research Council of Canada), and Senior Member IEEE and Elsevier since the 90ties. Our key expert chaired international conferences, lectured on several continents, published a book on Reliability and Security of Nuclear Power Plants, contributed to IEEE and PMAPS and published in the Ontario Journal for Public Policy, Canada. She delivered seminars organized by the Power Engineering Society, IEEE plus seminars to power companies worldwide, including Oman, Thailand, Saudi Arabia, Malaysia, Indonesia, Portugal, South Africa, Japan, Romania, and Guyana. Your second expert course leader is the co-founder and Director of Research at Xesto Inc. Xesto is a spatial computing AI startup based in Toronto, Canada and it has been voted as Toronto's Best Tech Startup 2019 and was named one of the top 10 'Canadian AI Startups to Watch' as well as one of 6th International finalists for the VW Siemens Startup Challenge, resulting in a partnership. His latest app Xesto-Fit demonstrates how advanced AI and machine learning is applied to the e-commerce industry, as a result of which Xesto has been recently featured in TechCrunch. He specializes in both applied and theoretical machine learning and has extensive experience in both industrial and academic research. He is specialized in Artificial Intelligence with multiple industrial applications. At Xesto, he leads projects that focus on applying cutting edge research at the intersection of spatial analysis, differential geometry, optimization of deep neural networks, and statistics to build scalable rigorous and real time performing systems that will change the way humans interact with technology. In addition, he is a Ph.D candidate in the Mathematics department at UofT, focusing on applied mathematics. His academic research interests are in applying advanced mathematical methods to the computational and statistical sciences. He earned a Bachelor's and MSc in Mathematics, both at the University of Toronto. Having presented at research seminars as well as instructing engineers on various levels, he has the ability to distill advanced theoretical concept to diverse audiences on all levels. In addition to research, our key expert is also an avid traveler and plays the violin. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations
SMPTE 2110 training course description This course studies the new SMPTE ST 2110 suite of standards. The course covers all parts of the standard from SMPTE ST 2110-10 through to SMPTE ST 2110- 50. The course begins with an introduction to all IP studios and separating video and audio streams, then moves on to PTP and synchronisation. Video encapsulation is then followed by audio encapsulation. Handling ancillary data finishes the course. What will you learn Recognise the benefits of SMPTE ST 2110. Describe SMPTE ST 2110. Explain how the SMPTE 2110 standards work. Compare and contrast SMPTE 2110 and SMPTE 2022. SMPTE 2110 training course details Who will benefit: Anyone working in broadcast. Prerequisites: IP broadcast fundamentals Duration 1 day SMPTE 2110 training course contents Introduction The all IP studio. Review of IP and RTP. Role of SMPTE, SMPTE 2022, What is SMPTE 2110, SMPTE 2022 versus 2110, SMPTE 2110 parts, multiplex standards, 2110 separate streams, Video, Audio, ANC. Essences. Separate streams and synchronisation The old way, blackburst, time code, DARS. SMPTE 2110-10, ST2059, PTP, PTP architecture, PTP accuracy, How PTP works, Offset and delay PTP clock types, Hardware time stamping SDP. Hybrids. Uncompressed video SMPTE 2110-20, 2110-21. Image support, raster sizes, bit depth, active video and no blanking, bandwidth and bandwidth savings, pgroups. Timestamps. Packing modes. Packet sizes, pixels per packet. Audio SMPTE 2110-30, 2110-31, PCM, AES3. Allowed versus required. Channels and streams. Ancillary data SMPTE 2110-40, RFC on RTP payloads for ST 291 ancillary data.
Our Team Building Programmes are 'simply excellent' (quote from Unilever). They always deliver much greater energy' motivation and efficiently accelerates to a galvanised, integrated team for their Manager/Team Leader. They're great fun and very commercially orientated - the best of both key elements to a successful and long-lasting high performance team. A successful company is always made up of successful teams. Teams that can work autonomously with a clearly defined set of goals, roles, vision, responsibility and culture will always reach for and achieve far greater success than a team that works just as a group of individuals. Our team building solutions are individually built and geared towards teams at any level within an organisation, providing an independent and objective perspective to promote a common purpose such as the creation of a 'high performance team'. Out With The Old Traditionally, team building events have been restricted to certain levels of management where they head off site for a bit of archery, quad biking and paintballing or something along those lines. Then over some coffee and cocktails, business plans and more efficient ways to work are casually discussed. Whilst being out having fun instead of being at work may improve an individual person's mood, the effect will only be short-term, and will not go far in creating permanent and cohesive teams who are able to overcome challenges together and drive the business forward when back in the workplace. In With The New Today's business thinking is more strategic and certainly has to look for returns on the investment. That is why Dickson Training Ltd's team building programmes are bespoke and built to your requirements through research, understanding your business and, most importantly, what results and achievements you are looking to get out of the programme. Once "what success looks like" has been established, we create tasks and activities that will test your leadership, problem solving, communication and team work skills. When the tasks have been completed, the learning - both practical and theory - is debriefed to the group as well as how it will translate back in your business. Not only are our events great fun, but they provide participants with learning points they can act upon to improve or enhance the working practices/environment. Team Building That Gets Results We have a highly innovative team who design team builds to suit all budgets and time or space restrictions. Large or small, we will develop the perfect event to meet your commercial objectives, keeping in line with your values and company culture. More recently we have combined team galvanising events with ways to engage the participants with and support their local communities. This solution has proved extremely popular with our clients and we are continuing to develop more and more programmes doing exactly this. " Phil did everything in a very professional and focused manner, without losing sight of the overall aims or having 'fun'. When I moved to Airbus UK and subsequently European Aeronautic Defense and Space Company (EADS), I had no hesitation in recommending Phil and the team to deliver the required training and team events. Without doubt Phil and his team are excellent providers of training, to suit even bespoke requirements, and I would not hesitate in recommending the team to any business in the future. " Glenn Brown, Systems & Expertise Manager, Airbus Personnel Service Augmented Skills – an Essay by Phil Dickson All of you, who are reading this, and all the people you meet and work with will have – ‘Augmented Skills’. So – if you are an IT Engineer or a Pharmacist; perhaps you are, or know, a Departmental Leader and you work with a Logistics Project Manager; these roles will demand core skills, whether they be technical know-how or qualifications in the discipline. But to be that bit better; more reliable; more effective & productive and therefore more valuable and, frankly, marketable – capitalizing on ‘Augment Skills’ comes into play. The I T Engineer who was a Chess Champion at Uni, which would indicate that they possess some key ‘Augmented skills’ including how they plan 3 steps ahead and are always prepared for the unexpected. The Pharmacist, who is a keen sportsperson in their private life, will likely be tenacious, team-orientated and disciplined – again these are superb qualities to have in this – or any – role. Your colleagues, as well as yourself, will have ‘Augmented Skills’ that will be an asset if only they are explored and applied to their role and indeed, career. Everyone has their own 'Super-power' If they love gardening, they are probably strategic, patient and inclined to research; if they cook or bake, they are usually well organized and comfortable with multi-tasking. A big reader will tend to be considered and possess good critical thinking faculties, and an amateur mechanic or keen DIY person will often be practical, resourceful and very determined. I have observed that many new Parents discover they have ‘Augmented Skills’ they didn’t know they had... such as getting order out of chaos and displaying industrial amounts of patience and good grace when they really do not feel like it. They very often become far more compassionate and empathetic. Most people have their very own ‘Superpower’. Invite your team members to offer their ‘Augmented Skills’ to your work-place – and just watch as it elevates the motivation levels and improves results. It’ll be very rewarding for all concerned – and for meeting the Team’s objectives, to encourage the person who is a talented artist to be a sounding board on some of the marketing imagery and layouts; for the team member who is great at Maths or resolving crosswords to be asked for their input to solving a problem that is causing logistical or operational headaches. Never exploit a Team member’s unique special skills at their expense I would like to stress, however, that it must never be an area where a team member gets exploited by harvesting their unique special skills to coerce them into taking on greater responsibilities and tasks without providing them with the commensurate salary and status. To do so would be immoral and, ultimately, counter-productive as it would lead to resentment and disenfranchisement. This is about encouraging people’s capability and inviting their input to boost confidence and enhance the team’s capability. Often, we need to be more than what our Job Description says It is also important to highlight that whatever a person’s role or function is – they will definitely need to have additional capabilities to be effective. The best example of this is when we designed and delivered a range of ‘Advanced Customer Care skills’ training sessions for the Met Office a few years ago…we met so many remarkably super-bright Meteorologists, many of whom were having to make significant adjustments to answering questions from Customers that seemed to be illogical and often, obtuse. It wasn’t enough for these Meteorologists to be highly skilled at interpreting data and identifying patterns – they needed ‘Augmented skills’ to make that information accessible to members of the public (and Council workers and Air Traffic controllers and Shipping agents) and many other people, as to what that particular weather system was going to be like in their area and at what time. They have to know how to ‘de-jargonise’ the material and provide succinct, clear, and yet temperate, descriptions without ever appearing exasperated, impatient or judgmental in response to sometimes quite silly questions. For a highly trained scientist – that can be counter-intuitive. Being Philosophical... and a wee bit pretentious At the risk of being a little Philosophical (and probably a wee bit pretentious) – in my own role of Trainer – my core skills have to include – being a very good communicator, an active listener and have innovative and engaging ways to convert an idea, or a model, into practical application that my Delegates and Clients gain tangible benefits from. This is how it applies to me... I really enjoy composing short, light classical-style piano pieces. Now, to do this well, you need to be able to find a transition from one chord or melody to a different theme or key. It has to be worked out very carefully to have incremental transitions and pleasant-sounding developments as the piece unfolds. I think I have become better at this as I have honed my skills as a composer. But I have realized that these very same skills have ‘Augmented’ my ability to help a Manager, or a Team, move from a state of conflict; tension; disfunction; disenfranchisement; lack of confidence to a place that is more harmonious with far greater productivity. The very same process of careful listening, considering options, taking well-considered steps, having a creative, sometimes brave, move towards a resolution are at play in both Training and Piano Compositions! Scheduled Courses Unfortunately this course is not one that is currently scheduled as an open course, and is only available on an in-house basis. Please contact us for more information.
Network+ training course description This network+ course covers the TCP/IP side of the exam. For delegates to pass the exam it is important that they meet the prerequisites, self study is also required. An intensive hands on IP foundation. The course focuses on all parts of TCP/IP including layers 4 to 7 on end stations as well as layer 3 on routers. The TCP/IP protocols are also studied to enable delegates to be able to troubleshoot TCP/IP using Wireshark. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. What will you learn Use ping, traceroute and other tools to diagnose faults on a network. Configure IP on PCs and routers. Plan IP addresses and subnets. Analyse IP and TCP packets using an analyser. Troubleshoot TCP/IP. Network+ training course details Who will benefit: Those wishing to pass the Network+ exam. Prerequisites: Introduction to data communications & networking Duration 5 days Network+ training course contents What is TCP/IP? TCP and IP are protocols, 7 layer model, network layers, hardware/software layers, internetworking, protocols, What is IP? What is TCP? The internet, The IAB, RFCs. Ping and Wireshark Host configuration, IP addresses, subnet masks, default gateways, ping. Hands on Base configuration. Testing with ping. Analysing packets with Wireshark. Switches and Wireshark Switches versus hubs, layer 2 forwarding table, flooding, broadcasts. Hands on Building a switched based network. Configuring network devices Configuration options, console port, putty, telnet. Hands on Configuring switches, telnet. IP IP packet format, protocol field, TTL, DiffServ, fragments, ICMP. Hands on IP packet analysis. IP addressing 32 bits, dotted decimal, rules, networks, role of subnet masks, simple subnetting, prefix notation. Broadcasts, special use addresses. Hands on Planning and implementing addressing. IP and the lower layers ARP, media not supporting ARP. Hands on ARP. Routing What are routers? What routers do, default gateways, routing and addressing, routing tables, ways to update routing tables. Hands on Building a routed network, traceroute. Routing protocols IGPs and EGPs, RIP, RIPv2, Why not to use RIP, OSPF, OSPF metrics, convergence, distance vector protocols, link state protocols. Hands on OSPF, analysing routing tables, loopbacks. Network simulators Network simulators, EVE-NG, GNS3, CML. Hands on Using EVE-NG. Subnetting Subnetting to the bit level, ranges, how prefixes are used. Hands on Subnetting. VLANS and IP addressing What are VLANs, tagging, 802.1Q, Inter VLAN routing. Hands on Inter VLAN routing. TCP and UDP Layer 4, port numbers, client ports, broadcasts multicasts and layer 4, UDP header, TCP header, connections, ACK, sliding windows, options, connection states. Sockets. Hands on Analysing TCP packets. IPv4 address configuration Private addresses, NAT, NAPT, dynamic addressing, DHCP, link local addresses. Hands on DHCP, NAT. IPv6 What is IPv6, 128 bit addresses, address formats, IPv6 address allocation, header format, migration, dual stack, tunnelling, NAT64, DNS64. Hands on IPv6 setup troubleshooting. IPv6 address configuration Static addressing, EUI-64 addresses, IPv6 address order, SLAAC, DHCPv6. Hands on SLAAC. Applications Clients, servers, HTTP, Email, resource sharing, VoIP, video, terminal emulation, remote desktop. Network management and SNMP. Hands on Servers, TFTP, VoIP packet analysis. DNS Names and addresses, hosts file, how DNS works. FQDNs, DNS client configuration. Hands on Troubleshooting DNS. Security Firewalls, firewall architectures, DMZ, how firewalls work, proxy servers, filtering, ACLs, IDS, VPNs, authentication, encryption, tunnels, secure protocols. Hands on Firewalls, SSH Troubleshooting Methods, tools. Using the 7 layer model. Troubleshooting toolkits. Hands on Fixing the network.
CCNA training course description The Implementing and Administering Cisco Solutions (CCNA) course gives you a broad range of fundamental knowledge for all IT careers. Through a combination of lecture, hands-on labs, and self-study, you will learn how to install, operate, configure, and verify basic IPv4 and IPv6 networks. The course covers configuring network components such as switches, routers, and wireless LAN controllers; managing network devices; and identifying basic security threats. It also gives a foundation in network programmability, and software-defined networking What will you learn Install, configure, and operate a small to medium sized network Gain a foundation in the essentials of networking, security, and automation Prepare for the 200-301 CCNA exam, which earns CCNA certification CCNA training course details Who will benefit: Network support help desk technicians involved in the basic installation, operation, and verification of Cisco networks. Anyone seeking CCNA certification. Prerequisites: Introduction to Data communications & networking Duration 5 days CCNA training course content After taking this course, you should be able to: Identify the components of a computer network and describe their basic characteristics. Understand the model of host-to-host communication. Describe the Cisco IOS software. Describe LANs and the role of switches within LANs. Describe Ethernet and describe the operation of switches. Install a switch and perform the initial configuration. Describe the TCP/IP Internet layer, IPv4, its addressing scheme, and subnetting. Describe the TCP/IP Transport and Application layers Explore functions of routing. Implement basic configuration on a Cisco router. Explain host-to-host comms across switches and routers. Identify and resolve common switched network issues and common problems associated with IPv4 addressing. Describe IPv6 main features and addresses, and configure and verify basic IPv6 connectivity. Describe static routing. Describe, implement, and verify VLANs and trunks. Describe inter VLAN routing. Explain the basics of dynamic routing protocols and describe components and terms of OSPF. Explain how STP and RSTP work. Configure link aggregation using EtherChannel. Describe the purpose of Layer 3 redundancy protocols. Describe basic WAN and VPN concepts. Describe the operation of access control lists (ACLs) and their applications in the network. Configure Internet access using DHCP clients and explain and configure NAT on Cisco routers. Describe basic QoS concepts. Describe the concepts of wireless networks, which types of wireless networks can be built, and how to use Wireless LAN Controllers (WLCs). Describe network and device architectures, introduce virtualization, network programmability and SDN and describe smart network management solutions such as Cisco DNA Centerâ¢, SD-Access, and SD-WAN. Configure basic IOS system monitoring tools. Describe the management of Cisco devices. Describe the current security threat landscape. Describe threat defence technologies. Implement a basic security configuration of the device management plane. Implement basic steps to harden network devices. Detailed course outline Exploring the Functions of Networking. The Host-to-Host Communications Model. Operating Cisco IOS Software. Introducing LANs. Exploring the TCP/IP Link Layer. Starting a Switch. The TCP/IP IP layer, IPv4 Addressing, and Subnets. The TCP/IP Transport Layer and Application Layer. Exploring the Functions of Routing. Configuring a Cisco Router. Exploring the Packet Delivery Process. Troubleshooting a Simple Network. Introducing Basic IPv6. Configuring Static Routing. Implementing VLANs and Trunks. Routing Between VLANs. Introducing OSPF. Redundant Switched Topologies with EtherChannel. Explaining Basics of ACL. Enabling Internet Connectivity. Explaining the Evolution of Intelligent Networks. Introducing System Monitoring. Managing Cisco Devices. Securing Administrative Access. Implementing Device Hardening. Self-Study: Building Redundant Switched Topologies. Exploring Layer 3 Redundancy. Introducing WAN Technologies. Introducing QoS. Explaining Wireless Fundamentals. Introducing Architectures and Virtualization. Examining the Security Threat Landscape. Threat Defense Technologies.
CompTIA A+ bootcamp training course description This course includes A+ Certification: Systems Hardware and Networking Support Skills and A+ Certification: Operating Systems and Security Support Skills. The course will provide IT "super users" or new support professionals with the fastest route to A+ Certification. Full practical sessions will prepare students for the two A+ Certification exams. Note: Some self-study each evening will be required. What will you learn Install, configure, and troubleshoot peripheral devices, system components, print devices, wired and wireless LAN links and internet access devices. Install, configure, and troubleshoot the Microsoft Windows, Linux, and Mac OS PC operating systems plus iOS, Android, and Windows mobile devices. Perform basic PC maintenance. Configure access control measures. Perform basic PC maintenance. CompTIA A+ bootcamp training course details Who will benefit: Students wishing to take both CompTIA A+ exams. Prerequisites: PC fundamentals Duration 5 days Networking Microsoft Systems course contents Peripherals and Adapters Motherboard Components, Connection Interfaces, Display Devices, Audio and Multimedia Devices, Removable Storage Devices. System Components Mass Storage Devices, System Memory, Processors, BIOS and UEFI, Power Supplies. Troubleshooting and Mobile Devices Troubleshooting System Components, Laptops, Mobile Devices, Troubleshooting Mobile Devices. Printer and Network Hardware Printers, Configuring Printers, Troubleshooting Printers, Network Architectures, Ethernet Networks. Networks Wireless Networks, Internet Connections, Internet Protocol, Routers and Firewalls, Troubleshooting Networks. Supporting Windows (1) Windows Operating System, Administration Tools, Managing Storage, Managing Files, Managing Applications. Supporting Windows (2) Managing Devices, Managing Performance, Troubleshooting Windows, Installing Windows. Supporting Windows Troubleshooting Boot Problems, Maintenance and Backup, Threats and Vulnerabilities, Viruses and Malware, Securing Workstations, Securing Data. Supporting Windows Networks Configuring Network Connections, Securing Network Connections, Configuring Shared Resources, Virtualization and Services. Linux, OS X, and Mobile OS Linux Operating System, OS X, Mobile Operating Systems, Mobile OS Security and Troubleshooting, Safety and Environmental Procedures, Professionalism and Communication.
UNIX system administration training course description This five day hands on course provides a comprehensive coverage of core UNIX administration tasks. The course covers generic UNIX and is available for any UNIX distribution required. What will you learn Administer & configure UNIX systems. Maintain UNIX by handling disk space and taking regular backups. Manage software packages. Perform basic troubleshooting. Maintain a secure UNIX system. Describe the organisation and implementation of the filesystem. UNIX system administration training course details Who will benefit: System administrators Network administrators. Prerequisites: UNIX fundamentals. Duration 5 days UNIX system administration training course contents Part 1 Exploring UNIX command-line tools Using a shell, shell configuration, environment variables, getting help, streams, redirection and pipes, processing text using filters, manipulating files, regular expressions, grep, sed. Managing software Package concepts, comparison of package formats, RPM, rpm commands, yum, dpkg, apt-cache, apt-get, dselect, aptitude, converting between package formats, dependencies and conflicts, startup script problems, shared libraries, library management, managing processes, the kernel: the first process, process lists, foreground & background processes, process priorities, killing processes. Configuring hardware Configuring firmware and hardware, RQs, I/O addresses, DMA addresses, Boot disks, coldplug and hotplug devices, configuring expansion cards and PCI cards, kernel modules, USB devices, UNIX USB crivers, configuring hard disks, partitioning systems, LVM, common layouts, creating partitions and filesystems, maintaining filesystem health, tuning, journals, checking filesystems, monitoring disk use, mounting and unmounting filesystems. Managing files File management commands, file naming and wildcards, file archiving, links, directory commands, file ownership and group, file access control, permissions, chmod, defaults, file attributes, disk quotas, enabling and setting quotas, locating files, the FHS. Booting UNIX and editing files Installing boot loaders, GRUB legacy, GRUB 2, alternative boot loaders, the boot process, boot messages, runlevels and the initialization process, runlevel functions, runlevel services, alternative boot systems, upstart, system. Part 2 Configuring the X window system Localization, configuring basic X features, X server options, methods of configuring X, X display information, X fonts, the X GUI login system, XDMCP server, using X for remote access, screen display settings, setting your time zone, your locale, configuring printing, conceptualizing the UNIX printing architecture, understanding PostScript and ghostscript, running a printing system, configuring CUPS, monitoring and controlling the print queue. Administering the system Managing users and groups, tuning user and system environments, using system log files, understanding syslogd, setting logging options, manually logging data, rotating l;og files, reviewing log file contents, maintaining the system time, UNIX time concepts, manually setting the time, using NTP, running jobs in the future, understanding the role of cron, creating system cron jobs, creating user cron jobs, using anacron, using at. Configuring basic networking TCP/IP, network hardware, network addresses, hostnames, network ports, configuring UNIX for a local network, configuring with DHCP, static IP address, configuring routing, using GUI configuration tools, ifup and ifdown, diagnosing network connections, testing connectivity, tracing a route, checking network status , examining network traffic, additional tools. Writing scripts, configuring email, and using databases The shell environment, aliases, shell configuration files, writing scripts, commands, variables, conditional expressions, loops, functions, managing email, choosing email software, securing your email server, managing data with SQL, picking a SQL package, understanding SQL basics, using MySQL. Securing your system Administering network security, super server restrictions, disabling unused servers, administering local security, securing passwords, limiting root access, setting login, process, SUID/SGID files, configuring SSH, using GPG, generating, importing and revoking keys, encrypting and decrypting data, signing messages and verifying signatures.
LPIC-1 training course description This five day hands on course provides a comprehensive coverage of core Linux administration tasks. The course covers generic Linux and is available for any Linux distribution required. It closely follows the LPIC curriculum allowing delegates to achieve the relevant certification if required. What will you learn Administer & configure Linux systems. Maintain Linux by handling disk space and taking regular backups. Manage software packages. Perform basic troubleshooting. Maintain a secure Linux system. Describe the organisation and implementation of the filesystem. LPIC-1 training course details Who will benefit: System administrators. Network administrators. Prerequisites: Linux fundamentals (LPI 010) Duration 5 days LPIC-1 training course contents Part I Exam 101 Exploring Linux Command-Line Tools Using a Shell, Shell Configuration, Environment Variables, Getting Help, Streams, Redirection and Pipes, Processing Text Using Filters, Manipulating files, Regular Expressions, grep,sed. Managing Software Package Concepts, Comparison of package formats, RPM, rpm Commands, Yum, Debian Packages, dpkg, apt-cache, apt-get, dselect, aptitude, Converting Between Package Formats, Dependencies and Conflicts, Startup Script Problems, Shared Libraries, Library Management, Managing Processes, the Kernel: The First Process, Process Lists, Foreground & Background Processes, Process Priorities, Killing Processes. Configuring Hardware Configuring Firmware and Hardware, IRQs, I/O Addresses, DMA Addresses, Boot Disks, Coldplug and Hotplug Devices, Configuring Expansion Cards and PCI Cards, Kernel Modules, USB Devices, Linux USB Drivers, Configuring Hard Disks, Partitioning Systems, LVM, Common Layouts, Creating Partitions and Filesystems, Maintaining Filesystem Health, Tuning, Journals, Checking Filesystems, Monitoring Disk Use, Mounting and Unmounting Filesystems. Managing Files File Management Commands, File Naming and Wildcards, File Archiving, Links, Directory Commands, File Ownership and Group, File access control, Permissions, chmod, Defaults, File Attributes, Disk Quotas, Enabling and setting Quotas, Locating Files, The FHS. Booting Linux and Editing Files Installing Boot Loaders, GRUB Legacy, GRUB 2, Alternative Boot Loaders, the Boot Process, Boot Messages, Runlevels and the Initialization Process, Runlevel Functions, Runlevel Services, Alternative Boot Systems , Upstart, system. Part II Exam 102 265 Securing the X Window System Localization, Configuring Basic X Features, X Server Options, Methods of Configuring X, X Display Information, X Fonts, The X GUI Login System, XDMCP Server, Using X for Remote Access, Screen Display Settings, Setting Your Time Zone, Your Locale, Configuring Printing, Conceptualizing the Linux Printing Architecture, Understanding PostScript and Ghostscript, Running a Printing System, Configuring CUPS, Monitoring and Controlling the Print Queue. Administering the System Managing Users and Groups, Tuning User and System Environments, Using System Log Files, Understanding syslogd , Setting Logging Options, Manually Logging Data, Rotating Log Files, Reviewing Log File Contents, Maintaining the System Time, Linux Time Concepts, Manually Setting the Time, Using NTP, Running Jobs in the Future, Understanding the Role of cron, Creating System cron Jobs, Creating User cron Jobs, Using anacron, Using at. Configuring Basic Networking TCP/IP, Network Hardware, Network Addresses, Hostnames, Network Ports, Configuring Linux for a Local Network, Configuring with DHCP, Static IP Address, Configuring Routing, Using GUI Configuration Tools, ifup and ifdown, Diagnosing Network Connections, Testing Connectivity, Tracing a Route, Checking Network Status , Examining Network Traffic, Additional Tools. Writing Scripts, Configuring Email, and Using Databases The Shell Environment, Aliases, Shell Configuration Files, Writing Scripts, Commands, Variables, Conditional Expressions, Loops, Functions, Managing Email, Choosing Email Software, Securing Your Email Server, Managing Data with SQL, Picking a SQL Package, Understanding SQL Basics, Using MySQL Securing Your System Administering Network Security, Super Server Restrictions, Disabling Unused Servers, Administering Local Security, Securing Passwords, Limiting root Access, Setting Login, Process, SUID/SGID Files, Configuring SSH, Using GPG, Generating, Importing and Revoking Keys, Encrypting and Decrypting Data, Signing Messages and Verifying Signatures.
Querying Microsoft SQL Server course description This course covers the technical skills required to write basic Transact-SQL queries for Microsoft SQL Server and provides the foundation for all SQL Server-related disciplines; namely, database administration, database development and business intelligence. This course helps prepare for exam 70-761. Note: This course is designed for SQL Server 2014or SQL Server 2016. What will you learn Write SELECT statements. Create and implement views and table-valued functions. Transform data by implementing pivot, unpivot, rollup and cube. Create and implement stored procedures. Add programming constructs such as variables, conditions, and loops to T-SQL code. Querying Microsoft SQL Server course details Who will benefit: Database administrators, database developers, and business intelligence professionals. SQL power users, namely, report writers, business analysts and client application developers. Prerequisites: Database fundamentals Duration 5 days Querying Microsoft SQL Server course contents Introduction to Microsoft SQL Server Management studio, creating and organizing T-SQL scripts, using books online. Hands on working with SQL Server tools. T-SQL querying Introducing T-SQL, sets, predicate logic, logical order of operations in SELECT statements, basic SELECT statements, queries that filter data using predicates, queries that sort data using ORDER BY. Hands on introduction to T-SQL querying. Writing SELECT queries Writing simple SELECT statements, eliminating duplicates with DISTINCT, column and table aliases, simple CASE expressions. Hands on writing basic SELECT statements. Querying multiple tables cross joins and self joins, write queries that use Inner joins, write queries that use multiple-table inner joins, write queries that use self-joins, write queries that use outer joins, write queries that use cross joins. Hands on querying multiple tables. Sorting and filtering data Sorting data, filtering data with predicates, filtering data with TOP and OFFSET-FETCH, working with unknown values, WHERE clause, ORDER BY clause, TOP option, OFFSET-FETCH clause. Hands on sorting and filtering data. SQL Server data types Introducing SQL Server data types, Character data, date and time data, queries that return date and time data, write queries that use date and time functions, write queries that return character data, write queries that return character functions. Hands on working with SQL Server data types. DML Adding data to tables, modifying and removing data, generating automatic column values, Inserting records with DML, updating and deleting records using DML. Hands on using DML to modify data. Built-in functions Queries with built-in functions, conversion functions, logical functions, functions with NULL, queries that use conversion functions, queries that use logical functions, queries that test for nullability. Hands on built-in functions Grouping and aggregating data Aggregate functions, the GROUP BY clause, filtering groups with HAVING, queries that use the GROUP BY clause, queries that use aggregate functions, queries that use distinct aggregate functions, queries that filter groups with the HAVING clause. Hands on grouping and aggregating data. Subqueries Self-contained subqueries, correlated subqueries, EXISTS predicate with subqueries, scalar and multi-result subqueries. Hands on subqueries. Table expressions Views, inline table-valued functions, derived tables, common table expressions. queries that use views, write queries that use derived tables, Common Table Expressions (CTEs), write queries that se inline Table valued expressions (TVFs). Hands on table expressions. Set operators The UNION operator, EXCEPT and INTERSECT, APPLY, queries that use UNION set operators and UNION ALL, CROSS APPLY and OUTER APPLY operators. Hands on set operators. Windows ranking, offset, and aggregate functions OVER, window functions, ranking functions, offset functions, window aggregate functions. Hands on; windows ranking, offset, and aggregate functions. Pivoting and grouping sets PIVOT and UNPIVOT, grouping sets, queries that use the PIVOT operator, queries that use the UNPIVOT operator, queries that use the GROUPING SETS CUBE and ROLLUP subclauses. Hands on pivoting and grouping sets Executing stored procedures Querying data with stored procedures, passing parameters to stored procedures, simple stored procedures, dynamic SQL, the EXECUTE statement to invoke stored procedures. Hands on executing stored procedures. Programming with T-SQL T-SQL programming elements, controlling program flow, declaring variables and delimiting batches, control-of-flow elements, variables in a dynamic SQL statement, synonyms. Hands on programming with T-SQL Error handling T-SQL error handling, structured exception handling, redirect errors with TRY/CATCH, THROW to pass an error message back to a client. Hands on implementing error handling. Implementing transactions Transactions and the database engines, controlling transactions, BEGIN, COMMIT, and ROLLBACK, adding error handling to a CATCH block. Hands on implementing transactions.
MySQL server admins training course description This MySQL Server administration course is designed for MySQL Server administrators who have a basic understanding of a MySQL database and a good working knowledge of SQL commands. The course provides an understanding of MySQL Architecture and practical experience in setting up, configuring and maintaining a MySQL server, backing up and recovering data and optimising query performance. This MySQL Server administration course also covers MySQL replication and its role in high availability and scalability. What will you learn Use MySQL Workbench. Install and configure a MySQL Server . Administer and tune a MySQL server. Configure log files and interpret error messages.. Secure the Server. Administer a replication topology. MySQL server admin training course details Who will benefit: Database administrators, Database developers and Technical consultants. Prerequisites: Introduction to MySQL Duration 5 days MySQL server admin training course contents Introduction to Oracle Application Express APEX concepts APEX main components Workspaces, database applications and websheet applications Creating a workspace The Workspace Administrator Upgrading APEX Logging into APEX Running an application SWL Workshop Use APEX to browse, create and modify objects Process ad hoc SQL statements Manage scripts in APEX Create, run and save SQL queries Build a database application Application components Create an application Create an application from a spreadsheet Create reports Create reports using wizards Edit report attributes Add links to reports Create a link to a printer-friendly version of a report Save and print reports in different formats Using files Uploading images Creating cascading stylesheet files Uploading static files Adding an Image as an application logo Adding a reference to a Javascript file Pages and regions Web form behaviour in APEX Create a form based on a table Create a form based on a procedure Create a form with a report Create a tabular form Format a form Locking in APEX forms Creating lists of values Overview of application express shared Components Dynamic and static lists of values Create a dynamic list of values Create a static list of values Use a list of values to control data in a report Create a cascading list of values Items and buttons Understand the different Types of items Create items Understand and edit item attributes Use Javascript with item Manipulate items in tabular forms Add dynamic items to a report Create and edit buttons Page Processing Page rendering and page processing Create computations Validate input data Process Data Understand application branching Create conditional branches Shared components Overview of application express navigation components Manage parent and standard tabs Create navigation bar entries Create and use lists and list items Manage breadcrumbs Create shortcuts Shared component subscription User interface defaults Display dynamic content Filter reports with dynamic queries Create charts with a wizard Format charts Create calendars Add links to calendars Create hierarchical trees State and debugging Understand session state Set a session state value Clear the session state Review the session state Review the messages in debug mode Enabling feedback Managing feedback and team development Themes and templates Switch to a different theme View existing templates Understand and manage templates Create a new template Add references to cascading stylesheet and Javascript files Dynamic actions and plug-in components Identify plug-in components and their types Plug In a component Create dynamic actions Use a plug-in in a dynamic action Building website applications Websheet applications and their components Create a websheet application Enable SQL and PL/SQL in a websheet application Add sections and pages to a websheet application Add links on a websheet page Add a data grid to a websheet application Create SQL reports ion websheet applications Add annotations to a websheet application Implementing security Authentication and authorization Provide an authentication scheme Create an authorization scheme using access control Enable and configure session state protection Deploy an appliction Define supporting objects Package an application Export an application Import an application Install supporting objects Administer Apex workspaces Manage workspaces and users Request a schema or storage Purge session state Monitor developer activity log Monitor workspace activity View activity reports Import a workspace Utility programs Import and export data Generate DDL statements View objects reports