Frame Relay training course description A comprehensive look at Frame Relay, particularly with reference to a IP routed environment. Note this course is run as a workshop and therefore the contents are flexible. What will you learn Recognise the issues of using Frame Relay Describe Frame Relay. Configure a Cisco router to use Frame relay. Frame Relay training course details Who will benefit: Anyone working with Frame Relay. Prerequisites: Intro to data communications & networking Duration 1 day Frame Relay training course contents Introduction Packet switched networks, PVCs, SVCs. Topologies, Full mesh, partial mesh, Hub and spoke. Basics DLCI, CIR, LMI, the local loop. Configuring routers for Frame Relay Inverse ARP, static mappings, subinterfaces More Frame Relay Burst rates, FECN, BECN, the DE bit, Traffic shaping. Voice Over Frame Relay
Implementing Scrum for Teams: In-House Training Scrum is an iterative, incremental framework for developing products. It allows the team to deliver a potentially shippable set of functionalities for each iteration, providing the agility needed to respond to rapidly changing requirements. These characteristics have led to Scrum becoming the most popular method in the world of Agile projects. This two-day course provides a practical approach to implementing the Scrum method on your projects. You will learn how to initiate a Scrum project, how to build a Product Backlog, containing user stories, and how to plan and estimate releases and iterations. You will learn how to conduct Scrum events, such as the Sprint Planning Meeting, and how to track progress during an iteration. You will apply what you learn in a series of hands-on, team-based activities and simulations that take you through the entire Scrum process. The overall goal of the course is to enable you to successfully apply the Scrum method on appropriate projects in your environment. What you will Learn At the end of this program, you will be able to: Teach-back Agile and Scrum foundation concepts Initiate a Scrum Project Conduct Team Sprint Planning and Sprint Review meetings Develop Release Plans (including effective user stories and priorities) Build a Sprint plan (including effective estimates) Executive a Sprint (including essential Scrum ceremonies) Implement Scrum in your environment Foundation Concepts Agile Mindset, Values, and Tenets Agile Benefits and Methods Scrum Overview Teams: Self-Managing, Self-Organizing, and Self-Improving Initiating a Scrum Project 'Sprint Zero' Activities Defining the Vision The Product Backlog and User Stories Acceptance Criteria Story Map Planning Releases Planning releases Estimating user stories Prioritizing user stories Selecting a Sprint length Estimating velocity Creating a release plan Planning a Sprint The Sprint Planning Meeting Building the Sprint Backlog Creating a Sprint Plan Running a Sprint Conduct a Sprint Burn-down and Burn-up Charts Negotiating Changes During a Sprint The Sprint Review Meeting Sprint Retrospective Releasing into Production Closing the Scrum Project Implementing Scrum Scrum Simulation Exercise Conditions of Success for Implementing Scrum
4G training course description This course is designed to give the delegate an understanding of the technologies used within a 3G UMTS mobile network. During the course we will investigate the UMTS air interface and the use of Wideband-Code Division Multiple Access (WCDMA) to facilitate high speed data access, together with HSPA to offer mobile broadband services. We will describe the use of soft handover rather than hard handover procedures and soft capacity sharing. The course includes a brief exploration of the UMTS protocol stack and the use of PDP Context and QoS support features. What will you learn Explain the 3G UMTS architecture. Describe the role of a Drifting & Serving RNC. Explain the use of ARQ & HARQ for mobile broadband. Describe how IMS integrates into the architecture. Describe the use of Media Gateway Controllers. Identify the temporary identities used within 3G UMTS. 4G training course details Who will benefit: Anyone working within the telecommunications area, especially within the mobile environment. Prerequisites: Mobile communications demystified Telecommunications Introduction Duration 2 days 4G training course contents LTE Introduction The path to LTE, 3GPP. LTE to LTE advanced. LTE Architecture The core, Access, roaming. Protocols: User plane, Control plane. Example information flows. Bearer management. Spectrum allocation. LTE technologies Transmission, reception, OFDMA, multiple antenna, MIMO. LTE Air interface Air interface protocol stack. Channels, Resource Grid, cell acquisition. Up and downlink controls. Layer 2 protocols. Cell acquisition Power on, selecting networks and cells. RRC connection. Attach procedure. Mobility management Roaming, RRC_IDLE, RRC_CONNECTED, cell reselection, handover, interoperation with UMTS and GSM networks. Voice and text IMS, QoS, policy and charging.
NOCN NVQ Level 2 Diploma in Hire and Rental Operations
This course will provide an opportunity to begin to understand what commercial and financial awareness means and the importance of everyone in thinking commercially.
About this Training Course In today's business environment, there has never been more of a need to make Asset Management and Maintenance more cost effective and efficient. By utilising the Reliability Centred Maintenance process (RCM), you can increase safety performance, reduce maintenance costs, improve the effectiveness of your operations, boost machine uptime, and gain a greater understanding of the level of risk your organisation manages. RCM is just one component of an overall integrated Asset Management Process. All participants will complete detailed pre-course questionnaires before this 3 full-day course, enabling the trainer to tailor course content in order to meet specific delegate needs. Participant objectives are re-visited before, during and after the course, allowing the trainer to focus on outcomes and address any participant concerns and specific issues during the program. Training Objectives At the end of this course, participants will be able to: Develop skills to carry out successful RCMs and introduce the RCM process into their own and their company's daily activities. Be aware of our changing business environment and the need to apply RCM to drive continuous improvement, in safety, cost reduction, and minimise their environmental footprint Understand the impact of human reliability and the various methods used to improve this important area Understand the basics of Change Management and the methods used to securely anchor this process and make it routine Develop an appreciation for a holistic 'Asset Management' program, and know where the RCM process fits in, and the benefits it will deliver Target Audience Reliability Centred Maintenance is primarily a team activity and benefits from a cross functional team participation. This course is aimed at managers, engineers, technicians and operators at all levels who are responsible for the operation and maintenance of plant equipment and who will benefit from the elimination of bad actors (recurring equipment failure) and continuous improvement in the areas of safety, environmental impact, reliability and integrity. Trainer Your expert course leader has enjoyed a 37-year career with Shell International in a variety of leadership roles predominantly in Turnaround, Maintenance and Engineering Management before he left in late 2017 to pursue his interest in Turnaround and Maintenance Management consultancy. He has undertaken several Asset Management and Engineering positions within Shell Australia including the implementation and establishment of formal Reliability Studies including FMEA, RCA, RCM, Maintenance Planning and Turnaround Management programs at Geelong Refinery. Additionally, he was appointed Shell's Regional Turnaround Advisor within Australia and South East Asia supporting Shell Operating Companies throughout several Australasian and European sites. In more recent times, he had been engaged to implement and establish a formal Turnaround Management program within Brunei Shell Petroleum as well as becoming the appointed Regional Turnaround Management Subject Matter Expert (SME), TA Network and Governance & Assurance lead for Shell within the Shell Australasian, Russian Federation and Indian Sub-Continent OpCo community. His career repertoire includes hands-on practitioner, supervisory, reliability, contracts and management roles and he holds several maintenance and engineering tertiary qualifications including an Associate Diploma in Mechanical Engineering. He has presented at several Maintenance, Reliability, Asset Management & Turnaround forums and conferences. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
CWDP training course description The CWDP course consists of instructor-led training applicable to the design of wireless LANs using the latest technologies including 802.11n and 802.11ac. The course goes in-depth into the design process and provides attendees with the knowledge needed to plan, deploy and test modern 802.11-based networks. It also prepares students for the CWDP examination. Students who complete the course will acquire the necessary skills for preparing, planning performing and documenting site surveys and wireless LAN design procedures. What will you learn Design enterprise WiFi networks. Select appropriate antennas and Access points. Perform site surveys. Describe the security requirements required for enterprise networks. Test, validate and troubleshoot installations. CWDP training course details Who will benefit: Anyone looking for the skills to analyze, troubleshoot, and optimize any enterprise level Wi-Fi network, no matter which brand of equipment your organization deploys. Anyone looking to become a CWNP. Prerequisites: CWNA Duration 5 days CWDP training course contents WLAN design overview Importance of good design, Impact of bad design, Design process, Design skills, Design toolkit. Requirements analysis Pre-planning, Customer interaction, Requirements gathering, Discovering existing systems, Documenting the environment, Defining constraints, Creating documentation. Designing for clients and applications Client Device types, Application types, Application-specific design, High density design issues. Designing for industry Standard corporate networks, Industry-specific designs, Government, Healthcare, Hospitality, Retail, Public hotspots, Transportation, Mobile offices, Outdoor and mesh, Remote networks and branch offices, Last-miles / ISP and bridging. Vendor selection processes Defining vendor issues, Operational planes, Design models, Understanding architectures. Radio Frequency (RF) planning RF spectrum, RF behaviors, Modulation and coding schemes, RF accessories, Throughput factors. WLAN hardware selection Antennas, 802.11n and antennas, Choosing Aps, Powering Aps. Site surveys Site survey tools, Site survey preparation, Predictive site surveys, Manual site surveys, Site survey principles and processes. Designing for Quality of Service (QoS) QoS overview, QoS application points, Roaming support. Designing for security Bad security, Authentication solutions, Encryption solutions, Security best practices, Intrusion prevention. Installation testing, validation and troubleshooting Network health status, Troubleshooting and validation process, Troubleshooting and validation tools, Common problems. Hands-on lab exercises Hands-on labs depend on the audience and can include use of: Spectrum analyzers, Protocol analyzers, Site Survey software, Diagramming software, Various wireless access points, Various wireless adapters and antennas.
Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.
Supporting Microsoft IIS training course description This course provides students with the fundamental knowledge and skills to configure and manage Internet Information Services. This course is intended to help provide pre-requisite skills supporting a broad range of Internet web applications, security, and knowledge to help support other products that use IIS such as Exchange and SharePoint. What will you learn Install IIS. Configure IIS. Secure websites. Maintain IIS. Supporting Microsoft IIS training course details Who will benefit: Technical staff working with Microsoft IIS. Prerequisites: TCP/IP foundation for engineerss Supporting Windows ( XP or 2000 or 2003) Duration 5 days Supporting Microsoft IIS course contents Overview and Installing IIS Web Server infrastructure, installing IIS. Hands on Default install of IIS, verify and test.. Configuring the default website Default website, IIS Manager, default IIS file structure, configuring DNS records for a website, creating virtual directories and Applications. Hands on Configuring the Default website for public access. Creating Virtual Directories and Applications. Application Pools Application Pool Architecture, Application Pool recycling. Hands on Creating and managing Application Pools. Creating additional websites Multiple websites on a single server, website bindings. Hands on Creating new websites. Website and Web application support Configuring Common features, adding support for web applications. Hands on Adding support for web applications. Securing Websites and applications Access control, sites, applications, authentication and permissions. URL authorization rules. Hands on Configuring Authentication and permissions. Securing Data Transmissions with SSL Certificates and SSL, creating certificates for a web server, adding a certificate to a website. Hands on Certificates and HTTPS. Using the Central Certificate Store The Central Certificate Store. Hands on Install and configure the Central Certificate Store. Configuring Remote Administration Installing and Configuring the Management Service. Connecting to remote web servers and websites. Delegating Management Access. Hands on Remote administration. Implementing FTP Implementing FTP, configuring an FTP site. Hands on Install and configure a secured FTP site. Monitoring IIS IMonitoring IIS logs with Log Parser. Hands on Analyze a set of IIS log files for possible issues using Log Parser. Analyze performance data for performance related problems using PerfMon. Backing up and Restoring IIS The IIS environment. Hands on Performing a backup and restore of a website. Building Load-Balanced Web Farms Load-balancing mechanisms, building a Load-Balanced Web Farm using ARR, sharing content to a Web Farm using a network share, Sharing content to a Web Farm using DFS-R, Sharing IIS Configurations in a Web Farm. Hands on Installing and configuring ARR, sharing content to a Web Farm using network share and DFS-R, sharing IIS Configurations in a Web Farm.