• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

478 Engineer courses in Nottingham

Essential Cloud Technologies

5.0(3)

By Systems & Network Training

Cloud technologies training course description This course provides an introduction to cloud technologies, including, configuration and deployment, security, maintenance, and management. It covers all aspects of cloud computing infrastructure. It will help you to master the fundamental concepts, terminology, and characteristics of cloud computing. . What will you learn Contrast and compare AWS, GCP and Azure. Explain the different cloud services, models and characteristics. Explain cloud virtualization components and options. Explain cloud security options. Describe cloud automation, orchestration, monitoring and performance options. Cloud technologies training course details Who will benefit: Anyone working with or looking to work with cloud technologies. Prerequisites: None. Duration 2 days Cloud technologies training course contents What is the cloud? The Internet Cloud computing Benefits Disadvantages Cloud services IaaS, PaaS, SaaS, others. Cloud service providers AWS, GCP Microsoft Azure, others Cloud architectures Private, public, hybrid others Cloud based delivery The cloud and virtualization Virtual Machines, networks, storage, deployment. Accessing the Virtual Machine Secure cloud environments Security considerations. Data privacy considerations Automation and orchestration Monitoring and performance Performance Cost issues Cost containment

Essential Cloud Technologies
Delivered in Internationally or OnlineFlexible Dates
£1,497

Advanced Kibana

5.0(3)

By Systems & Network Training

Advanced Kibana training course description This training course is aimed at users who already have some experience with Kibana, who are looking to further their knowledge. What will you learn Lens Timelion Maps Custom Visualisations with Vega Canvas Filters and Controls Drilldown and Dashboards KQSL and ElasticQueries Scripted and RunTime Fields Alerts and Alarms Advanced Kibana training course details Who will benefit: Users who already have some experience with Kibana, who are looking to further their knowledge. Prerequisites: None Duration 1 day Advanced Kibana training course contents Topics Lens Visualisation types (tables,bars,charts) Category breakdown Adding multiple metrics Using formulas in metrics Labels Adding reference layer Limitations Visualise Library Timeseries, Metrics Different types of aggregations Maps GeoMapping Heat Maps Using ES index as data source Visualisation, tool tips Custom Visualisations with Vega Introduction to vega scripting Canvas Widgets and Texts Elasticsearch SQL Canvas Expressions Filters and Controls Dropdown filters Ad-hoc filters Searchbar filters Drilldown Dashboards Linking one dashboard to another KQSL and ElasticQueries Bool Query AND/OR Phrase Part match vs keyword search Wildcard search Scripted and RunTime Fields Creating ad-hoc calculated fields using scripts Performance issues Alerts and Alarms Query Based Formatting output Connector types(email,index,teams etc)

Advanced Kibana
Delivered in Internationally or OnlineFlexible Dates
£1,497

UNIX shell programming

5.0(3)

By Systems & Network Training

UNIX shell programming training course description This course has been designed as a follow on course for the XML primer course. The course looks at the use of XSLT in the transforming and styling XML documents. What will you learn Read shell scripts. Write shell scripts. Use different types of quotes. Recognise the role of shell scripts within the UNIX system. UNIX shell programming training course details Who will benefit: Programmers developing programs under UNIX. Anyone working with XML. Administrators Support personnel who wish to find out more about the workings of UNIX or write simple utility programs. Prerequisites: UNIX fundamentals Some programming experience would be useful although not essential. Duration 2 days UNIX shell programming training course contents Review of UNIX fundamentals Basic shell scripts What does the shell do? How are commands executed? Different shells. What is a shell script? Comments, creating shell scripts. Variables Setting variables, using variables, set, scope, export, sourcing, environmental variables, read. Positional parameters 0 to $9, $#, $* and others. shift parameter substitution. Control statements The test command, The if statement, while loops, for loops, The case statement, Special characters, Redirection of errors, here documents, quoting. Arithmetic in shell scripts The expr command. System shell scripts Screen handling The terminfo database The tput comand Avanced issues (optional session) Shell functions, getopts, xargs, debugging shell scripts, portability issues. Extras in the Korn shell. Optimising shell scripts The time command, performance tips.

UNIX shell programming
Delivered in Internationally or OnlineFlexible Dates
£1,497

Essential SD-WAN

5.0(3)

By Systems & Network Training

Essential SD-WAN training course description SD-WAN is rapidly growing in use. This vendor neutral course starts with an introduction to what SD-WAN is and when it is useful. Each main area of SD-WAN is then studied in more detail to enable delegates to recognise the technologies used in SD-WAN and then use this information to evaluate SD-WAN products. What will you learn Describe what SD-WAN is (and isn't). Explain how SD-WAN works. Evaluate SD-WAN products. Compare and contrast SD-WAN with other technologies such as MPLS, Ethernet, SDN, NFV and WAN optimisation. Essential SD-WAN training course details Who will benefit: Anyone wishing to learn about SD-WAN. Prerequisites: Network fundamentals. Duration 1 day Essential SD-WAN training course contents What is SD-WAN? What is SD and SDN? What is WAN? Branch/ Office. MPLS, MPLS vs Internet, Ethernet, Broadband, LTE/4G, Cable, Satellite. The impact of the cloud. Single console, Dynamic path selection, automation. Why SD-WAN? Single console Network management, orchestration, administration. Example GUI interfaces. Northbound and southbound APIs. Dynamic path selection SD-WAN transports, Overlay networks, security. VPNs, IPsec. QoS and prioritization. Policies, traffic path rules. Application specific routing, bonding, optimisation. Automation Time saving, removing errors. Zero touch, ZOOM, ZTP. The role of the orchestrator. Real time monitoring of the network. APIs. Architecture and products Hardware solutions, software solutions, virtual appliances. Clouds. SD-WAN edge devices, SDWAN controllers, Orchestrators. HA and SD-WAN. Riverbed, Cisco, Juniper, others. Summary SD-WAN doesn't replace MPLS, virtualisation and SD-WAN. Relationship with SDN and NFV. SDWAN versus WAN optimisation.

Essential SD-WAN
Delivered in Internationally or OnlineFlexible Dates
£1,397

DDOS demystified

5.0(3)

By Systems & Network Training

DDOS demystified training course description This course covers DDOS attacks and how to defend against them. The course starts by studying DOS attacks and then DDOS attack. Reflectors, booters and stressers are followed by reflection and amplification. Once the various DDOS attacks have been covered we then study the ways to defend against DDOS attacks. What will you learn Describe DDOS. Explain how DDOS attacks work. Recognise DDOS attack types. Describe how to defend DDOS attacks. DDOS demystified training course details Who will benefit: Anyone involved in network security. Prerequisites: Network fundamentals Duration 1 day DDOS demystified training course contents What is DOS? Denial Of Service, outages, Attackers, Command and control, Bots. Why DOS? What is DDOS? Distributed, reflectors, botnets, botnet topologies, amplification, attack bandwidth, attack vectors, booters, stressers, backscatter, DirtJumper, XOR. RUDY. High and Low orbit Ion Cannon. Attack types Application layer attacks, HTTP flood, protocol attacks, SYN floods, teardrop, volumetric attacks, slowloris, DNS cachebusting, fraggle, smurf. IP address spoofing. Reflectors Reflector attacks, amplification attacks, quotients, embedded devices, DNS, NTP, SSDP. DDOS defence Protecting devices from becoming bots. Onsite, outsourced scrubbing, Defending self, defending the Internet, Black hole routing, rate limiting, intelligent application firewalls, anycast, IPS, upstream filtering, BCP38, BCP 140. uRPF.

DDOS demystified
Delivered in Internationally or OnlineFlexible Dates
£1,397

Essential Lawful Intercept

5.0(3)

By Systems & Network Training

Lawful Intercept training course description Packet based networks require a different approach to Lawful Intercept (LI) than that used in circuit switched networks. This course focuses on what Lawful Interception and Data Retention (DR) means to communications service providers in the IP and NGN areas. The course assumes a basic knowledge of IP networking (i.e. DNS, TCP/UDP, IP, RTP) and the building of services on an IP platform (e.g. SIP, SDP, FTP, HTTP). The course first looks at the regulatory context for LI and DR and how this is translated to a practical architecture. What will you learn Recognise the legal and regulatory obligations to provide LI and DR. Identify the components of the handover architecture for each of LI and DR. Identify the preferred location of points of interception and points of retention in the IP network. Map intercepted material to handover protocols. Understand the data mapping defined in the available standards for both LI and DR. Lawful Intercept training course details Who will benefit: Technical and managerial staff needing to implement public networks. Prerequisites: TCP/IP Foundation Duration 1 day Lawful Intercept training course contents What is meant by LI and DR? Review of regulation: Data protection Directive; Data Retention Directive; RIPA. LI architectures Handover and Interception: ETSI standards ES 201 671 and TS 102 232. LI handover protocol IRI and CC handover; correlation; manual interfaces. DR architectures Handover of query results; points of retention. DR query command set Retrieval of retained records. Security concerns Operation privacy; target privacy; storage and transmission integrity. Implementation Identifying PoI and PoR for provided services. LI and DR wrap up Interaction with other services, storage obligations (volume, time, availability).

Essential Lawful Intercept
Delivered in Internationally or OnlineFlexible Dates
£1,397

Essential Frame Relay

5.0(3)

By Systems & Network Training

Frame Relay training course description A comprehensive look at Frame Relay, particularly with reference to a IP routed environment. Note this course is run as a workshop and therefore the contents are flexible. What will you learn Recognise the issues of using Frame Relay Describe Frame Relay. Configure a Cisco router to use Frame relay. Frame Relay training course details Who will benefit: Anyone working with Frame Relay. Prerequisites: Intro to data communications & networking Duration 1 day Frame Relay training course contents Introduction Packet switched networks, PVCs, SVCs. Topologies, Full mesh, partial mesh, Hub and spoke. Basics DLCI, CIR, LMI, the local loop. Configuring routers for Frame Relay Inverse ARP, static mappings, subinterfaces More Frame Relay Burst rates, FECN, BECN, the DE bit, Traffic shaping. Voice Over Frame Relay

Essential Frame Relay
Delivered in Internationally or OnlineFlexible Dates
£1,397

CITB Health & Safety Awareness (On-Site)

4.9(182)

By You Can Do It .Training

This CITB HSA course highlights potential hazards when on a construction site.

CITB Health & Safety Awareness (On-Site)
Delivered In-Person in Stoke on Trent or UK WideFlexible Dates
£790

Telecommunications Introduction

5.0(3)

By Systems & Network Training

Telecomms training course description A comprehensive tour of the telecommunications technologies and terminology currently in use, and under development. What will you learn List and describe components of the PSTN. Explain how calls are made over the PSTN Compare analog and digital transmission methods. Describe the technologies within the transport plane. Recognise the benefits of extra features available in today's telephone networks. Telecomms training course details Who will benefit: Anyone new to the Telecommunications industry. Prerequisites: None. Duration 2 days Telecomms training course contents Telephone network architecture Handsets, local loop, distribution points, Local exchanges, main telephone switches, PBXs. Making a call - some basics Telephone call components, how a telephone call works, accessing the local exchange, loop disconnect, DTMF, standards, E.164, PSTN routing, Intelligent Networks, Special Rate Services. Analogue vs Digital Voice characteristics, PSTN bandwidth, analogue signalling, Digital encoding, PCM and the 64k, ADPCM and other voice compression methods. PBXs PABX, Call processing, networking PBXs, PBX facilities, bandwidth, blocking probability and Erlangs, Erlang models, using Erlang tables. Transmission methods Two wire transmission, 64k circuits, Nx64, E1, 2 wire to 4 wire conversion, echo, echo suppression, echo cancellers, twisted pair, coax, fibre optic, power lines, satellite systems, microwave. Signalling Analogue signalling, loop start, earth calling, E&M, AC15. Digital signalling -CAS, robbed bits and E1 slot 16 signalling. Digital signalling CCS, Q.931, SS7, Q.SIG, DPNSS, DASS2. Transport planes PDH, PDH issues, SDH, SDH architecture, SDH standards, SDH bit rates, SDH mulitplexors, DWDM. Networks Circuit Switched Networks, TDM, Packet Switched Networks, Frame Relay, Message Switching, Circuit Switching, STDM, Cell Switching, ATM, ATM cells, ATM traffic parameters, ATM QoS, MPLS. Other network access Modems, modulation, speeds, ISDN, BRI, PRI, xDSL, SDSL, ADSL. Other Services Centrex, VPNs, FeatureNet, CTI, Call Processing Systems, Voice Mail, Automated Attendant Systems, Interactive Voice Response, Call Management Systems, Call Conferencing, Star Services. Mobile communications 3 types of wireless telephone, mobile generations, base stations, cells, GSM, GPRS, 3G, UMTS, WCDMA, 4G, LTE. VoIP overview What is VoIP, VoIP benefits, What is IP? The IP header, Packetising voice, VoIP addressing, H.323, SIP, RTP. Bandwidth requirements.

Telecommunications Introduction
Delivered in Internationally or OnlineFlexible Dates
£1,327

Level 2 NVQ Certificate in Highways Maintenance - Excavation and Reinstatement Operations

By Dynamic Training and Assessments Ltd

Level 2 NVQ Certificate in Highways Maintenance - Excavation and Reinstatement Operations

Level 2 NVQ Certificate in Highways Maintenance - Excavation and Reinstatement Operations
Delivered In-Person in Nottinghamshire or UK WideFlexible Dates
£695