• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1866 Fire courses delivered Online

IP in mobile networks

5.0(3)

By Systems & Network Training

Mobile IP training course description A detailed examination of the protocols and architecture of Mobile IP. What will you learn Recognise the benefits of ADSL. Configure and troubleshoot IS-IS. Explain how IS-IS works. Describe the use of Level 1 and Level 2. Design IS-IS networks. Mobile IP course details Who will benefit: Technical staff wanting to learn DNS.Network Administrators. Support personnel. Prerequisites: TCP/IP Foundation Duration 2 days Mobile IP course contents Introduction Quick review of IP, What is Mobile IP? What Mobile IP provides, Mobility requirements, Where Mobile IP is required, where mobile IP is not required, DHCP as an alternative, Proxy ARP as an alternative. Architecture Mobile node, home network, home agent, Foreign agent, Fixed home address, Care of address, Correspondent node, Tunnelling. How Mobile IP works Using two addresses, issues with TCP, discovering the care of address, registering care of address, tunnelling the care of address. The protocols involved. Issues with Mobile IP Routing inefficiencies, Security and firewalls, ingress filtering, QoS. MIP and IPv6 Stateless address configuration, Neighbour discovery, miscellaneous.

IP in mobile networks
Delivered in Internationally or OnlineFlexible Dates
£2,477

Definitive Kerberos for engineers

5.0(3)

By Systems & Network Training

Kerberos for engineers training course description This hands on course covers the details of Kerberos, from installation and administration through to how it all works including the protocols. What will you learn Describe what Kerberos is. Explain how Kerberos works. Install Kerberos. Configure Kerberos. Troubleshoot Kerberos. Kerberos for engineers training course details Who will benefit: Engineers interested in security. Prerequisites: TCP/IP foundation for engineers Duration 2 days Kerberos for engineers training course contents What is Kerberos? Single Sign On, The protocol, the standard, history, v4, v5, RFCs, Linux, Windows. Kerberos concepts and technology AAA, Authentication, Authorization, Accounting. Kerberos vs LDAP and directories. Privacy, integrity. Kerberos realms, principles, instances. Keys, salts, passwords. Key Distribution Centre, Authentication server, ticket granting server. Tickets. Installation and administration of Kerberos Installing Kerberos, creating realms, testing. DNS and Kerberos, Kerberos clients. Hands on Windows and Linux Kerberos. Kerberos protocols The Needham-Schroeder protocol, Kerberos v4. Authentication server, ticket granting server, Kerberos v5, encryption options, ticket options, other protocol features and extensions. Related protocols: GSSAPI, SPNEGO. Hands on Using Wireshark to 'see' Kerberos. Troubleshooting Kerberos Approach, debugging tools, errors and solutions. Hands on Kerberos troubleshooting. Kerberos security concerns Kerberos attacks, protocol security issues. Dictionary attacks, brute force attacks, replay attacks, MITM attacks, security solutions, protecting the KDC, firewalls, NAT and Kerberos. Hands on Kerberos logging. Software which uses Kerberos Kerberos logins, Kerberos and web based applications, Directory services. Advanced Kerberos issues Cross realm authentication, Windows issues, Windows and UNIX interoperability, Hands on Using a Windows DC for UNIX clients.

Definitive Kerberos for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

Junos Service Provider Switching

5.0(3)

By Systems & Network Training

Junos Service Provider Switching training course description This course provides students with an overview of switching concepts such as LANs, Layer 2 address learning, bridging, virtual LANs (VLANs), provider bridging, VLAN translation, spanning-tree protocols, and Ethernet Operation, Administration, and Maintenance (OAM). This course also covers Junos operating system-specific implementations. Junos Service Provider Switching is an intermediatelevel course. What will you learn Describe carrier Ethernet. Describe the function of an Ethernet LAN. Implement VLAN tagging. Describe the components of provider bridging. Identify and use available tools to resolve network issues. Configure and monitor Ethernet OAM, ERP, LAG, STP, the RSTP, the MSTP, and the VSTP. Junos Service Provider Switching training course details Who will benefit: Individuals responsible for configuring and monitoring devices running the Junos OS. Prerequisites: Junos Intermediate Routing Duration 2 days Junos Service Provider Switching training course contents Ethernet Switching and Virtual LANs Ethernet LANs Bridging Configuring and Monitoring VLANs Automating VLAN Administration Configuring and Monitoring IRB Layer 2 Address Learning and Forwarding Layer 2 Firewall Filtering Ethernet Switching and VLANs Lab Virtual Switches Routing Instances Overview Configuring and Monitoring Virtual Switches Interconnecting Routing Instances Logical Systems Virtual Switches Lab Provider Bridging Expanding the Bridged Network Provider Bridging Configuring and Monitoring Provider Bridging Provider Bridging Lab Spanning-Tree Protocols Overview of STP Overview of RSTP Overview of MSTP Overview of VSTP Configuring and Monitoring Spanning-Tree Protocols Understanding BPDU, Loop, and Root Protection MSTP Lab Ethernet OAM OAM Overview LFM CFM Configuring and Monitoring Ethernet OAM Ethernet OAM Lab High Availability and Network Optimization ERP Overview Configuring and Monitoring ERP Link Aggregation Group Overview Configuring and Monitoring a LAG MC-LAG Overview Configuring and Monitoring an MC-LAG High Availability and Network Optimization Lab Troubleshooting and Monitoring Introduction to Troubleshooting and Monitoring Troubleshooting and Monitoring Tools Troubleshooting Case Study: Network Congestion Troubleshooting and Monitoring Lab Appendix A: Carrier Ethernet Ethernet in the WAN Ethernet Standards Organizations MX Series Layer 2 Features Appendix B: Deprecated Syntaxes Appendix C: MX Series Overview

Junos Service Provider Switching
Delivered in Internationally or OnlineFlexible Dates
£2,477

Essential EVPN

5.0(3)

By Systems & Network Training

Essential EVPN training course description Ethernet VPN (E-VPN) and Provider Backbone Bridging E-VPN (PBB-EVPN) are emerging technologies providing Ethernet services over MPLS. This course studies the technologies in E-VPN/PBB-EVPN providing multi-homing, multi pathing, auto discovery, multicast, forwarding and fast convergence. What will you learn Differentiate between E-VPN and PBB-EVPN. Explain how E-VPN operates. Explain how PBB-EVPN operates. Explain how E-VPN provides: Multi homing Multi pathing Auto discovery. Essential EVPN training course details Who will benefit: Network engineers. Staff working for carriers. Prerequisites: Definitive Ethernet switching for engineers Concise MPLS for engineers Duration 2 days Essential EVPN training course contents Introduction to EVPN Network virtualization What Is network virtualization? types of virtual networks, network tunnelling, the consequences of tunnelling, packet load balancing, network interface card behaviour. maximum transmission unit, lack of visibility, VXLAN, protocols to implement the control plane, support for network virtualization technologies, merchant silicon Software, standards. The building blocks of Ethernet VPN A brief history of EVPN, architecture and protocols for traditional EVPN deployment, EVPN in the data center BGP constructs for Virtual networks, address family indicator/subsequent address family indicator, route distinguisher, route target, RD, RT, and BGP processing, route types, modifications to support EVPN over eBGP, keeping the NEXT HOP unmodified, retaining route targets, FRR support for EVPN, automatic propagation of NEXT HOP, RT/RD derivation, what Is not supported in FRR. Bridging with Ethernet VPN An overview of traditional bridging, overview of bridging with EVPN, what Ifs, why does NVE L3 get an advertisement for MACA? handling BUM packets, handling MAC moves, support for dual-attached hosts, the host-switch Interconnect, VXLAN model for dual-attached hosts, switch peering solutions, handling Link failures, duplicate multi-destination frames, ARP/ND suppression. Routing with Ethernet VPN The case for routing in EVPN, routing use cases in the data center, routing models, where is the routing performed? centralized routing, distributed routing, how routing works in EVPN, asymmetric routing, symmetric routing, VRFs in EVPN routing, summarized route announcements, BGP support for EVPN routing, comparing asymmetric and symmetric models, vendor support for EVPN routing. Configuring and administering Ethernet VPN The sample topology, configuration cases, configuring the MTU, the end first: complete FRR configurations, the Invariants: configuration for the spines, firewall, and servers, centralized routing, asymmetric distributed routing, symmetric routing, dissecting the configuration, configuring the underlay, configuring the overlay: FRR configuring the overlay: interfaces, examining an EVPN network, show running configuration, show BGP summary, show EVPN VNIs and VTEPs, identify which VTEP advertised a MAC address, comparing FRR and Cisco EVPN configurations, considerations for deploying EVPN in large networks.

Essential EVPN
Delivered in Internationally or OnlineFlexible Dates
£2,477

Unreal Engine 4: The Complete Beginner's Course

By Packt

Unreal Engine 4: The Complete Beginner's Course teaches you the fundamentals of video game development using Unreal Engine 4. Whether you have prior programming knowledge or not, this course will help you leverage the cutting-edge 3D game design software in developing the video games you always wanted.

Unreal Engine 4: The Complete Beginner's Course
Delivered Online On Demand10 hours 11 minutes
£142.99

Reiki Master Teacher Level IV (Usui/Holy Fire III) ~ with Advanced Reiki Master, Sensei Alison

By British Reiki Circle

Open to Reiki Masters only Learn from experienced Reiki Master and teacher, Alison on how to become your own teacher of Reiki Levels I, II and Master level. Your course includes a certificate & lineage.

Reiki Master Teacher Level IV (Usui/Holy Fire III)  ~ with Advanced Reiki Master, Sensei Alison
Delivered Online On Demand
£149

AZ-500T00 Microsoft Azure Security Technologies

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for Azure Security Engineers who are planning to take the associated certification exam, or who are performing security tasks in their day-to-day job. This course would also be helpful to an engineer that wants to specialize in providing security for Azure-based digital platforms and play an integral role in protecting an organization's data. This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization?s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations. Prerequisites AZ-104T00 - Microsoft Azure Administrator Security best practices and industry security requirements such as defense in depth, least privileged access, role-based access control, multi-factor authentication, shared responsibility, and zero trust model. Be familiar with security protocols such as Virtual Private Networks (VPN), Internet Security Protocol (IPSec), Secure Socket Layer (SSL), disk and data encryption methods. Have some experience deploying Azure workloads. This course does not cover the basics of Azure administration, instead the course content builds on that knowledge by adding security specific information. Have experience with Windows and Linux operating systems and scripting languages. Course labs may use PowerShell and the CLI. 1 - Manage identities in Microsoft Entra ID Secure users in Microsoft Entra ID Secure groups in Microsoft Entra ID Recommend when to use external identities Secure external identities Implement Microsoft Entra Identity protection 2 - Manage authentication by using Microsoft Entra ID Configure Microsoft Entra Verified ID Implement multifactor authentication (MFA) Implement passwordless authentication Implement password protection Implement single sign-on (SSO) Integrate single sign-on (SSO) and identity providers Recommend and enforce modern authentication protocols 3 - Manage authorization by using Microsoft Entra ID Configure Azure role permissions for management groups, subscriptions, resource groups, and resources Assign built-in roles in Microsoft Entra ID Assign built-in roles in Azure Create and assign a custom role in Microsoft Entra ID Implement and manage Microsoft Entra Permissions Management Configure Microsoft Entra Privileged Identity Management Configure role management and access reviews by using Microsoft Entra Identity Governance Implement Conditional Access policies 4 - Manage application access in Microsoft Entra ID Manage access to enterprise applications in Microsoft Entra ID, including OAuth permission grants Manage app registrations in Microsoft Entra ID Configure app registration permission scopes Manage app registration permission consent Manage and use service principals Manage managed identities for Azure resources Recommend when to use and configure a Microsoft Entra Application Proxy, including authentication 5 - Plan and implement security for virtual networks Plan and implement Network Security Groups (NSGs) and Application Security Groups (ASGs) Plan and implement User-Defined Routes (UDRs) Plan and implement Virtual Network peering or gateway Plan and implement Virtual Wide Area Network, including secured virtual hub Secure VPN connectivity, including point-to-site and site-to-site Implement encryption over ExpressRoute Configure firewall settings on PaaS resources Monitor network security by using Network Watcher, including NSG flow logging 6 - Plan and implement security for private access to Azure resources Plan and implement virtual network Service Endpoints Plan and implement Private Endpoints Plan and implement Private Link services Plan and implement network integration for Azure App Service and Azure Functions Plan and implement network security configurations for an App Service Environment (ASE) Plan and implement network security configurations for an Azure SQL Managed Instance 7 - Plan and implement security for public access to Azure resources Plan and implement Transport Layer Security (TLS) to applications, including Azure App Service and API Management Plan, implement, and manage an Azure Firewall, Azure Firewall Manager and firewall policies Plan and implement an Azure Application Gateway Plan and implement an Azure Front Door, including Content Delivery Network (CDN) Plan and implement a Web Application Firewall (WAF) Recommend when to use Azure DDoS Protection Standard 8 - Plan and implement advanced security for compute Plan and implement remote access to public endpoints, Azure Bastion and just-in-time (JIT) virtual machine (VM) access Configure network isolation for Azure Kubernetes Service (AKS) Secure and monitor AKS Configure authentication for AKS Configure security for Azure Container Instances (ACIs) Configure security for Azure Container Apps (ACAs) Manage access to Azure Container Registry (ACR) Configure disk encryption, Azure Disk Encryption (ADE), encryption as host, and confidential disk encryption Recommend security configurations for Azure API Management 9 - Plan and implement security for storage Configure access control for storage accounts Manage life cycle for storage account access keys Select and configure an appropriate method for access to Azure Files Select and configure an appropriate method for access to Azure Blob Storage Select and configure an appropriate method for access to Azure Tables Select and configure an appropriate method for access to Azure Queues Select and configure appropriate methods for protecting against data security threats, including soft delete, backups, versioning, and immutable storage Configure Bring your own key (BYOK) Enable double encryption at the Azure Storage infrastructure level 10 - Plan and implement security for Azure SQL Database and Azure SQL Managed Instance Enable database authentication by using Microsoft Entra ID Enable and monitor database audit Identify use cases for the Microsoft Purview governance portal Implement data classification of sensitive information by using the Microsoft Purview governance portal Plan and implement dynamic mask Implement transparent data encryption? Recommend when to use Azure SQL Database Always Encrypted 11 - Plan, implement, and manage governance for security Create, assign, and interpret security policies and initiatives in Azure Policy Configure security settings by using Azure Blueprint Deploy secure infrastructures by using a landing zone Create and configure an Azure Key Vault Recommend when to use a dedicated Hardware Security Module (HSM) Configure access to Key Vault, including vault access policies and Azure Role Based Access Control Manage certificates, secrets, and keys Configure key rotation Configure backup and recovery of certificates, secrets, and keys 12 - Manage security posture by using Microsoft Defender for Cloud Implement Microsoft Defender for Cloud Identify and remediate security risks by using the Microsoft Defender for Cloud Secure Score and Inventory Assess compliance against security frameworks and Microsoft Defender for Cloud Add industry and regulatory standards to Microsoft Defender for Cloud Add custom initiatives to Microsoft Defender for Cloud Connect hybrid cloud and multicloud environments to Microsoft Defender for Cloud Identify and monitor external assets by using Microsoft Defender External Attack Surface Management 13 - Configure and manage threat protection by using Microsoft Defender for Cloud Enable workload protection services in Microsoft Defender for Cloud, including Microsoft Defender for Storage, Databases, Containers, App Service, Key Vault, Resource Manager, and DNS Configure Microsoft Defender for Servers Configure Microsoft Defender for Azure SQL Database Manage and respond to security alerts in Microsoft Defender for Cloud Configure workflow automation by using Microsoft Defender for Cloud Evaluate vulnerability scans from Microsoft Defender for Server 14 - Configure and manage security monitoring and automation solutions Monitor security events by using Azure Monitor Configure data connectors in Microsoft Sentinel Create and customize analytics rules in Microsoft Sentinel Configure automation in Microsoft Sentinel Additional course details: Nexus Humans AZ-500T00 Microsoft Azure Security Technologies training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-500T00 Microsoft Azure Security Technologies course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-500T00 Microsoft Azure Security Technologies
Delivered OnlineFlexible Dates
£2,380

Total Video conferencing over IP for engineers

5.0(3)

By Systems & Network Training

Video conferencing over IP course description A current hot topic in recent years has been the provision of multimedia services over IP networks - triple play. This course investigates the characteristics of video transmission and then studies the impact on IP networks. What will you learn Describe the issues of video and data convergence. Describe techniques, which can be used in IP to provide low uniform delay. Evaluate video technologies. Design data networks, which will support video.. Video conferencing over IP course details Who will benefit: Technical staff. Prerequisites: TCP/IP fundamentals Intro to data communications & networking Duration 3 days Video conferencing over IP course contents Review Traditional video, digital video, video formats, MPEG, brief review of IP, Uses of video: downloading, streaming, TV, CCTV, conferencing. Video over IP issues Delivery methods: FTTH, ADSL, VDSL, 3G and others. Bandwidth, delay, jitter, signalling. Digitising video, CODECS, packetising video, comparison of techniques. IP performance and QOS IP TOS field, queuing strategies; FIFO, WFQ, custom, priority, RED. Differentiated services, diffserv. Video over IP protocol stack RTP, RTCP, mixers and translators, RSVP. IPv6. Conferencing Traditional solutions, Video conferencing over IP, point to point, multipoint, architectures, bridges. IETF - Session Initiation Protocol Comparison with H.323, SIP proxy, proxy server, redirect server. SDP. Multicasting Multicasting compared to unicasting and broadcasting, when to use and when not to use multicasting. IGMP, DVMRP, PIM. Security Impact of firewalls and NAT, ISMA, DRM, DTCP.

Total Video conferencing over IP for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,367

Definitive SIP for engineers

5.0(3)

By Systems & Network Training

SIP training course description A hands on course covering IP telephony with SIP. The course starts with a brief review of knowledge students should already possess including RTP and RTCP. The main focus is on SIP though, progressing from what SIP is through SIP signalling, call processing and architectures, moving onto more advanced issues including security, multimedia, and interoperability. Hands-on practicals follow each major theory session. What will you learn Explain how SIP works. Analyse SIP packets. Deploy SIP IP telephony solutions. Integrate SIP with other telephony solutions. SIP training course details Who will benefit: Technical staff working with SIP. Prerequisites: Definitive VoIP for engineers Duration 3 days SIP training course contents VoIP review What is VoIP? Brief review of IP, Brief review of telephones and voice. RTP, RTCP, mixers and translators. Hands on Analysing RTP packets. What is SIP? Why SIP? SIP history, SIP standards, SIP capabilities, key services, how SIP works, and a basic SIP call. Hands on Peer to peer SIP. SIP messages SIP sessions, SIP flows, Message structure, INVITE, ACK, BYE, CANCEL, OPTIONS, REGISTER. Extension methods. Response codes. SIP call flows. Hands on Analysing SIP packets. SIP architectures UA client, UA server, Proxy servers, Redirect servers, registrars. SIP phones, gateways, application servers, and other products. Stateful and stateless servers. Various call scenarios. Hands on SIP proxies. SIP addressing URLs, SIP addresses, registration, Location and Directory servers. Address tracking. Hands on SIP and DNS. Supplementary services SIP signalling, signalling compression, Call hold, Call forwarding, Home and away scenarios, transfers, conferences, call control. Hands on Analysing SIP supplementary services. SDP What is SDP? Multimedia, multimedia session announcement, invitation and others. Relationship with SIP. Hands on Video conferencing with SIP. SIP security Access control, Authentication, encryption, firewalls. Hands on SIP authentication. Interoperability Inter working with PSTN, ISUP to SIP mapping, SIP and 3G, SIP-T, SIP and SIGTRAN. SIP and H323. Hands on SIP and gateways. SIP mobility Terminal mobility, service mobility, personal mobility, Mobile IP, SIP signalling flows in 3G.

Definitive SIP for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,367

IP broadcast fundamentals

5.0(3)

By Systems & Network Training

IP broadcast training course description A current hot topic in recent years has been the provision of multimedia services over IP networks aka triple or quadruple play. This course investigates the characteristics of video transmission and then studies the impact on IP networks. What will you learn Use Wireshark to analyse and troubleshoot TV streams. Describe techniques, which can be used in IP to provide low uniform delay. Evaluate IPTV technologies. Design data networks, which will support IPTV. IP broadcast training course details Who will benefit: Anyone working in broadcast. Prerequisites: TCP/IP foundation for engineers Duration 3 days IP broadcast training course contents What is IPTV? What is IP? What is TV? Pixels, frames, colour, digital modulation, digital video broadcasting. SDTV, HDTV, 4K. IPTV architectures, Contribution, distribution, delivery. IPTV standards. Hands on Base IP connectivity, VLC. IPTV protocol stacks IP, TCP, UDP, RTP. IPv6. HTTP. Bandwidth requirements. Hands on IPTV bandwidth calculations. Video codecs What is a CODEC, pictures and audio, digitisation, sampling, quantisation, encoding, compressing. MPEG, bit rates, resolution. I, B, P frames, GOP. MPEG 2, MPEG 4, H.264, H.265, VP9, AV1. Hands on Analysing MPEG frames. IP issues Quality vs. bandwidth. Bandwidth, delay, latency, jitter, signalling. Routers. Hands on Analysing jitter and other performance issues. IPTV performance and QoS IP DSCP field, queuing strategies; FIFO, WFQ, custom, priority, RED. Differentiated services, Diffserv. 802.1Q. Traffic shaping. QoE. Hands on best effort versus prioritisation. UDP versus TCP Reliable, unreliable, connection oriented, connectionless. Broadcasts, multicasts and unicasts. TCP flow control, TCP and performance. Hands on TCP window sizes. RTP RTP, ports, mixers, translators, RTCP, SMPTE, FEC. Hands on RTP analysis with Wireshark. Multicasting Multicasting compared to unicasting and broadcasting, when to use and when not to use multicasting. IGMP, PIM-SM, SSM. MLD. Hands on Analysing multicast streams. OTT TV HTTP, HTTPS, Chunked HTTP. Adaptive streaming. HTML5. DASH vs HLS. Hands on Analysing HTTP streams. Security Firewalls, TLS, DRM, watermarking. Encryption. Geolocation. VPNs. IPTV architecture and other protocols Content providers, Service providers, delivery networks, home networks. Caching, Service discovery. RTSP. SAP, SDP. DHCP, DNS, NTP

IP broadcast fundamentals
Delivered in Internationally or OnlineFlexible Dates
£2,367