QSIG training course description A concise overview of QSIG, covering the development, current use and future of this private network signalling protocol. What will you learn Describe the use of QSIG. Describe the evolution of QSIG. Describe functionality of the QSIGProtocol Stack. Describe functionality and use of the main Supplementary Services and Additional Network Functions within QSIG. QSIG training course details Who will benefit: Network/Systems Engineers Operators/Planners or anyone working within the QSIG Arena. Prerequisites: Telecommunications Introduction Duration 1 day QSIG training course contents Introduction What is QSIG? User benefits, flexible interconnection, public ISDN synergy, feature transparency-end to end intelligence, innovation specialist features - heterogeneous environment. Evolution of QSIG Evolution of QSIG, ISDN PBX Networking, Specification forum (IPNS), QSIG standardisation. The ITU-T reference model extended for corporate networks. QSIG Protocol Q Protocol stack, QSIG basic call layer 3 - SubLayer 1, QSIG Generic Functional layer 3 Sub-Layer 2 (GF), QSIG protocols for supplementary services & ANF's- Layer 3, Sub-Layer 3, Layer 3 Message Overview. Supplementary Services and ANFs QSIG supplementary services standardisation methodology. QSIG Services and additional network features: Advice of charge, Call Completion, (CCBS, CCNR), Call Forwarding and diversion (CFB, CFNR, CFU, CD), Services (CINT, CI, CO, CT, CW, DDI) Services cont. (DND, DNDO), Identification Services - (CLIP, COLP, CLIR, CNIP, CONP, CNIR), Other QSIG services and additional network features (Mobile, Multi Subscriber Number (MSN), Operator Services, Recall (RE), Sub-Addressing (SUB)), User to user signalling, compliance with services. Conclusion - QSIG1 FAQ's, European Computer Manufacturers Association. The Future.
Level 2 NVQ Certificate in Plant Operations - Movement Guide
SAFe® for Government: In-House Training Transitioning to Lean-Agile practices for building technology-based capabilities is especially challenging in the government context. But issues of legacy governance, contracting, and organizational barriers can be overcome with the right information and strategies. During this course, attendees will learn the principles and practices of the Scaled Agile Framework® (SAFe®), how to execute and release value through Agile Release Trains, and what it means to lead a Lean-Agile transformation of a program inside a government agency. Attendees gain an understanding of the Lean-Agile mindset and why it's an essential foundation for transformation. They'll also get practical advice on building high-performing, multi-vendor Agile teams and programs, managing technology investments in Lean flow, acquiring solutions with Agile contracting, launching the program, and planning and delivering value using SAFe®. Attendees also learn how specific leadership behaviors can drive successful organizational change in government. What you will Learn To perform the role of a SAFe® for Government leader, you should be able to: Transition government programs from traditional software and systems development models to Lean-Agile and DevOps mindsets, principles, and practices using SAFe® Adapt technology strategy, budgeting and forecasting, acquisition, compliance, and governance processes to flow-based practices using emerging government guidelines Organize government programs into one or more Agile Release Trains (ARTs) and execute in Program Increments (PIs) Explore Large Solution coordination in a government and multi-vendor environment Identify and internalize the mindset and leader behaviors essential to successful Lean-Agile transformation Follow success patterns for SAFe® implementations adapted to the government context Build a preliminary outline of next steps to begin and / or accelerate the SAFe® implementation in your program or agency Advancing Lean-Agile in government Embracing a Lean-Agile mindset Understanding SAFe® Principles Creating high-performing Agile teams and programs Planning with cadence and synchronization Delivering value in Program Increments Mapping the path to agency and program agility Leading successful change
SAFe® for Government Transitioning to Lean-Agile practices for building technology-based capabilities is especially challenging in the government context. But issues of legacy governance, contracting, and organizational barriers can be overcome with the right information and strategies. During this course, attendees will learn the principles and practices of the Scaled Agile Framework® (SAFe®), how to execute and release value through Agile Release Trains, and what it means to lead a Lean-Agile transformation of a program inside a government agency. Attendees gain an understanding of the Lean-Agile mindset and why it's an essential foundation for transformation. They'll also get practical advice on building high-performing, multi-vendor Agile teams and programs, managing technology investments in Lean flow, acquiring solutions with Agile contracting, launching the program, and planning and delivering value using SAFe®. Attendees also learn how specific leadership behaviors can drive successful organizational change in government. What you will Learn To perform the role of a SAFe® for Government leader, you should be able to: Transition government programs from traditional software and systems development models to Lean-Agile and DevOps mindsets, principles, and practices using SAFe® Adapt technology strategy, budgeting and forecasting, acquisition, compliance, and governance processes to flow-based practices using emerging government guidelines Organize government programs into one or more Agile Release Trains (ARTs) and execute in Program Increments (PIs) Explore Large Solution coordination in a government and multi-vendor environment Identify and internalize the mindset and leader behaviors essential to successful Lean-Agile transformation Follow success patterns for SAFe® implementations adapted to the government context Build a preliminary outline of next steps to begin and / or accelerate the SAFe® implementation in your program or agency Advancing Lean-Agile in government Embracing a Lean-Agile mindset Understanding SAFe® Principles Creating high-performing Agile teams and programs Planning with cadence and synchronization Delivering value in Program Increments Mapping the path to agency and program agility Leading successful change
This Health & Safety in the Care Sector Course works alongside, and helps, learners understand Standard 13 of the Care Certificate. This Standard touches on the legislation, policies & responsibilities relating to Health & Safety in the care sector, as well as looking at accidents and sudden illnesses.
Level 2 NVQ Diploma in Drilling Operations - Directional Drilling - Drill Rig Operator
Level 6 NVQ Diploma in Construction Site Management
Securing Linux systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure Linux accounts. Secure Linux file systems. Secure Linux access through the network. Securing Linux systems training course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing Linux systems training course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.
This Health & Safety in the Care Sector Course works alongside, and helps, learners understand Standard 13 of the Care Certificate. This Standard touches on the legislation, policies & responsibilities relating to Health & Safety in the care sector, as well as looking at accidents and sudden illnesses.