IPTV training course description A current hot topic in recent years has been the provision of multimedia services over IP networks aka triple or quadruple play. This course investigates the characteristics of video transmission and then studies the impact on IP networks. What will you learn Use Wireshark to analyse and troubleshoot TV streams. Describe techniques, which can be used in IP to provide low uniform delay. Evaluate IPTV technologies. Design data networks, which will support IPTV. IPTV training course details Who will benefit: Anyone working with IPTV. Prerequisites: TCP/IP Foundation for engineers Intro to data communications & networking. Duration 3 days IPTV training course contents What is IPTV? What is IP? What is TV? Pixels, frames, colour, digital modulation, digital video broadcasting. SDTV, HDTV, 4K. IPTV architectures, Contribution, distribution, delivery. IPTV standards. Hands on Base IP connectivity, VLC. IPTV protocol stacks IP, TCP, UDP, RTP. IPv6. HTTP. Bandwidth requirements. Hands on IPTV bandwidth calculations. Video codecs What is a CODEC, pictures and audio, digitisation, sampling, quantisation, encoding, compressing. MPEG, bit rates, resolution. I, B, P frames, GOP. MPEG 2, MPEG 4, H.264, H.265, VP9, AV1. Hands on Analysing MPEG frames. IP issues Quality vs. bandwidth. Bandwidth, delay, latency, jitter, signalling. Routers. Hands on Analysing jitter and other performance issues. IPTV performance and QoS IP DSCP field, queuing strategies; FIFO, WFQ, custom, priority, RED. Differentiated services, Diffserv. 802.1Q. Traffic shaping. QoE. Hands on best effort versus prioritisation. UDP versus TCP Reliable, unreliable, connection oriented, connectionless. Broadcasts, multicasts and unicasts. TCP flow control, TCP and performance. Hands on TCP window sizes. RTP RTP, ports, mixers, translators, RTCP, SMPTE, FEC. Hands on RTP analysis with Wireshark. Multicasting Multicasting compared to unicasting and broadcasting, when to use and when not to use multicasting. IGMP, PIM-SM, SSM. MLD. Hands on Analysing multicast streams. OTT TV HTTP, HTTPS, Chunked HTTP. Adaptive streaming. HTML5. DASH vs HLS. Hands on Analysing HTTP streams. Security Firewalls, TLS, DRM, watermarking. Encryption. Geolocation. VPNs. IPTV architecture and other protocols Content providers, Service providers, delivery networks, home networks. Caching, Service discovery. RTSP. SAP, SDP. DHCP, DNS, NTP Hands on Fixing the network.
DNS training course description This three-day hands on DNS training course studies both the UNIX BIND and the Microsoft (MS DNS) implementations. The course starts with the big picture of how DNS works, then client configuration. Primary and secondary servers are then configured, progressing to DDNS, subdomains and security issues. Hands on sessions follow all sections ensuring that troubleshooting techniques are used throughout the course. Students choose whether to use Windows or UNIX for the hands on sessions. What will you learn Describe the architecture of DNS. Explain how DNS works. Install, configure, maintain and troubleshoot DNS DNS training course details Who will benefit: Technical staff wanting to learn DNS including: Network personnel System administrators. Prerequisites: UNIX Fundamentals (or Windows knowledge). TCP/IP foundation for engineers. Duration 3 days DNS training course contents What is DNS? Hostnames, Name resolution, host files, host file problems, What is DNS? The DNS namespace, TLDs, gTLDs, registering domains, Nameservers, how DNS works. Hands on Testing DNS servers on the Internet. DNS clients Ways to use DNS, dynamic and static configuration, multiple nameservers, domain name, searchlist, resolution issues, testing the configuration. Hands on Client configuration. DNS server software Implementations, Microsoft, BIND, daemons and services, installation, starting and stopping servers. Hands on Setting up a DNS server. DNS zone files What is a zone, Zone file overview, Forward zones, Reverse zones, Resource records, A records, PTR, CNAME, Root hints, local zone file. BIND and Microsoft configuration. Hands on Server configuration files. NS and applications MX records, Mail server load balancing, SPF, SRV records, VoIP and SRV, Microsoft and SRV, NAPTR. Hands on Testing records with dig and nslookup. DNS slaves and other servers DNS server types, Server resilience, Slaves, Zone transfers, SOA records, Serial numbers, recommendations, polling based zone transfers, NOTIFY, AD integration, DNS caching, Negative caching, TTL, Caching only servers. Hands on Masters, slaves and zone transfers. The DNS protocol The DNS stack, DNS port numbers, DNS queries, The DNS header, header section format, question format, other section format. Hands on Troubleshooting DNS with Wireshark. Dynamic DNS DHCP, DDNS, IXFR, WINS integration. Hands on Dynamic DNS. Subdomains Root servers, root server selection, Authority, delegation, NS records, subdomain with and without delegation, reverse delegation. Hands on Delegation, setting up a subdomain server. DNS security Restricting queries, DNS and firewalls, Split DNS, forwarders, internal root servers, the use of proxy servers, DNSSEC, TSIG. Hands on Hardening a DNS server. DNS and IPv6 What is IPv6, IPv6 addressing, IPv6 DNS issues, AAAA, IPv6 reverse delegation. Troubleshooting DNS Problem solving, DNS troubleshooting, Zone file checking, Some common errors, Log files, tools, nslookup, dig, host, DNS design, performance, load balancing. Hands on Putting it all together. Summary Useful books, Internet sites, RFCs. Appendix: ENUM What is ENUM, How ENUM works, NAPTR.
Enhance your knowledge in coal power plant life cycle management and flexible operations with EnergyEdge. Learn about decommissioning, preservation, repurposing, and recommissioning.
About this Training Energy insurance is a type of insurance designed to protect businesses that work in the energy industry. This type of insurance covers a wide range of risks that are unique to the energy industry, such as damage to oil rigs, power plants, pipelines, or other energy infrastructure, as well as accidents, explosions, fires, and environmental damage. Energy insurance can also provide coverage for business interruption caused by unforeseen events that can disrupt energy production or supply, such as natural disasters, equipment breakdown, and cyber-attacks. It may also include coverage for liability and loss of income resulting from lawsuits and legal claims. Training Objectives Upon completion of this course, participants will be able to: Understand the risk sharing between oil companies and contractors Know how this is dealt within the insurance products available Understand insurer's perception of risk Create awareness of how market insurance products meet industry needs Be familiar with insurer's pricing methodologies Better understanding of the broker interface Understand technical evaluation of the coverage wordings Putting technical knowledge into practice with claims workshop Target Audience The course is intended for individuals who work in the energy industry, particularly those who are involved in managing risk or making decisions related to insurance coverage. The following personnel will benefit from the knowledge shared in this course: Insurers Brokers Adjusters Lawyers Risk Managers Treasury Contracts Legals Contract Adjustor Project Managers Course Level Basic or Foundation Trainer Your expert course leader has worked in the insurance sector for 59 years. He has worked as a broker for reputable firms, such as Marsh, where he served as the managing director of Energy Construction. He has also participated in peer review for different Lloyds Syndicates. He also served as a broker for Sedgwick, AAA, and Miller in the offshore energy sector. He has helped businesses including Shell, BP, Chevron, ConocoPhillips, Petrofina, Woodside, ENI, and Brunei Shell for their policy reviews during his career. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
SIP security training course description A hands-on course covering SIP security. It is assumed that delegates already know SIP as this course focuses purely on the security issues in SIP IP telephony networks. Hands-on practicals follow each major theory session and include use of various SIP security tools such as vomit, sipp, sipsak and sivus amongst others. What will you learn Secure SIP networks Use various SIP security tools SIP security training course details Who will benefit: Technical staff working with SIP. Technical security staff. Prerequisites: SIP for engineers Duration 2 days SIP security training course contents SIP review SIP infrastructure and entities, example SIP session. Hands on Simple SIP network with and without authentication. SIP security attacks DOS attacks, infrastructure attacks, eavesdropping, spoofing, replay, message integrity. Hands on Basic SIP packet capture, infrastructure attacks. SIP tools SIP packet creation: Sivus, SIPsak, PROTOS, SFTF, SIP bomber, SIPp, Seagull, Nastysip. SIP packet generators: SIPNess, NetDude. Monitoring: Wireshark, Cain & Abel, Vomit, Oreka, VoiPong. Scripts and tools: SIP-Fun, Skora.net, kphone-ddos, sip-scan, sip-kill, sip-redirectrtp. Health of different tools. Hands on Generating SIP packets, rebuilding conversations from captured packets, password cracking. VPNs and SIP IPSec, AH, ESP, transport mode, tunnel mode, Pre Shared Keys, Public keys. Hands on SIP calls over IPSec. Secure SIP signaling SIP relationship with HTTP, Deprecated HTTP 1.0 basic authentication, HTTP 1.1 Digest authentication, S/MIME, SIPS, SIPS URI, TLS, DTLS, PKI infrastructures. Hands on SIP with TLS. Secure media streams SRTP, features, packet format, default encryption, default authentication, key distribution. S/MIME, MIKEY, SDP security descriptions. SIP security agreements. Hands on Analysing SRTP packets. Firewalls NAT traversal. Impact of firewall on infrastructure attacks. TLS and firewalls. SIP specific firewalls. Hands on SIP calls through a firewall.
About this Virtual Instructor Led Training (VILT) Electrical machines, mainly power transformers and electric motors are critical equipment that run production, and it must operate without any abnormalities. A wide variety of tests and standards have been developed to assist manufacturers and users of motors and transformer winding, assess the condition of the electrical insulation. The objective of this training course is to provide an understanding of power transformers and electric motors, their materials, components, and how they operate. It will also emphasize the importance of transformer life management, especially for those transformers and electric motors which have been in operation for than 10 years. The course will address in detail all aspects related to transformer principles, calculations, operation, testing and maintenance. Training Objectives This course aims to provide participants with the understanding of the fundamentals and constructional features of power transformers and electric motors, with particular reference to the design, testing, operation and maintenance of transformers in power systems. Delegates will gain a detailed appreciation of the following: Practical solutions for specifying, operating and maintaining power transformers and electric motors in a utility or plant environment Comprehensive understanding of principles, protection, maintenance and troubleshooting of power transformers and electric motors The necessary safe procedures relating to transformer operation and related circuitry Understand the principles of operation of the transformer and electric motors Identify the different features of power transformers and electric motors Appreciate the principles of transformer design, ratings, winding, core structure and materials, insulation and cooling methods, insulation and lifetime Utilize thermal limits and loading guides of transformers Analyze transformer and electric motors failure modes Target Audience Engineers of all disciplines Managers Technicians Maintenance personnel Other technical individuals Course Level Basic or Foundation Training Methods The VILT will be delivered online in 4 half-day sessions comprising 4 hours per day, with 1 x 10 minutes break per day, including time for lectures, discussion, quizzes and short classroom exercises. Additionally, some self-study will be requested. Participants are invited but not obliged to bring a short presentation (10 mins max) on a practical problem they encountered in their work. This will then be explained and discussed during the VILT. A short test or quiz will be held at the end the course. Trainer Our key expert is actively involved in electrical inspections, energy audits, energy efficiency and technical consultation for M&E activities for industrial and commercial sectors. He is involved in testing and commissioning works of factory substations of up to 132kV system. He previously worked for Jimah coal-fired power plant in Port Dickson for 9 years with his last position being Electrical Maintenance Section Head. He was involved in the commissioning of coal-fired power plant mainly with 500kV generator transformer, 934 MVA generator, and up to 33kV MV motors and switchgear panels. Our key expert has managed the maintenance team to perform routine maintenance activities (together with supporting tools such as motor lube oil analysis, infrared thermography analysis, transformer oil analysis) & electrical troubleshooting and plant outages for critical and non-critical equipment. Besides that, our key expert has published several IEEE conference papers and journals such as: (2009). Effectiveness of auxiliary system monitoring & continuous hydrogen scavenging operation on hydrogen-cooled generator at power plant. In Energy and Environment, 2009. ICEE 2009. 3rd International Conference on (pp. 151-160). IEEE. (2010). Study on electric motor mass unbalance based on vibration monitoring analysis technique. In Mechanical and Electrical Technology (ICMET), 2010 2nd International Conference on (pp. 539-542). IEEE. (2012). Re-Design of AC Excitation Busduct based on Infrared (IR) Thermography: Condition-Based Monitoring (CBM) data analysis. eMaintenance, 101. (2016). Energy Saving Studies for a University Campus: An Educational-Based Approach, 3rd International Conference on Language, Education, Humanities and Innovation 2016. 'Grid-tied photovoltaic and battery storage systems with Malaysian electrcity tariff - A review on maximum demand shaving.' Energies 10.11 (2017): 1884 'Techno-Economic Optimization of Grid-Connected Photovoltaic (PV) and Battery Systems Based on Maximum Demand Reduction (MDRed) Modelling in Malaysia.' Energies 12.18 (2019): 3531 POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations
Data comms training course description A hands on training course introducing the concepts of data communications, moving on to covering both LAN and WAN technology. Quizzes are used extensively to ensure material has sunk in and to maximise learning time. Hands on sessions ensure that by the end of the course delegates have made cables, built LANS and WANS, configured TCP/IP, switches and routers. What will you learn Use the seven layer model to classify networking buzzwords. Build and troubleshoot Ethernet, LAN/WAN and WiFi networks Explain the difference between switches and routers. Connect networks with routers. Data comms training course details Who will benefit: Anyone who requires a technical introduction to networks. Prerequisites: None. Duration 3 days Data comms training course contents What are networks? What is data communications? What are networks? Types of network, LANs, LAN choices, WANs, WAN choices, PANs, SANs, MANs, connecting networks. Internetworks, the internet, clouds. Networks and standards Standards bodies, ISO, ITU, IEEE, IETF, OSI 7 layer reference model, TCP/IP and OSI, ping and the 7 layer model, encapsulation, fragmentation. The physical layer Transmission media: Copper, Fibre, RF, UTP, Cat 5/5e/6/7..., RJ45, straight and cross over cables. Coax, Fibre cable & connectors, SFP, MMF, SMF, radio spectrum, frequencies, ranges, noise and electrical distortion, repeaters. Hands on Cabling, ping. Bandwidth Definition, Bits, bytes, speeds, simplex, half/full duplex, a/symmetrical, aggregation, latency. Calculating bandwidth requirements. The Data Link layer Frames, classifications, standards, LAN/WAN layer 2 technologies (Point to point, virtual circuits). Ethernet What is Ethernet? 802.3, evolution from CSMA/CD, choosing cables, topologies, NICs, MAC addresses. Ethernet frame format. Hands on Analysing Ethernet frames. Ethernet switches Connecting multiple devices, switches work at layer 2, Switches vs. hubs, simultaneous conversations, full duplex, MAC address database, how switches work, switch benefits, loops, STP. Console ports. Hands on Switches and WireShark, configuring switches, broadcast storms, STP. VLANS What are VLANs, why have VLANs. Hands on The effect of VLANs on network traffic. Wireless LANs Type of wireless network. WiFi, 802.11b/g/n/ac, WiFi6, antennae, interference, 802.11 frame format, CSMA/CA, half duplex, Wireless Access Points, security. Hands on Building a WiFi network. WANS WAN architecture, WAN types, service providers, access equipment, DTE, DCE, core equipment, WANs and the 7 layer model, choosing a WAN. WAN access Point to point, multi access, Internet, phone lines, leased lines, xDSL, broadband architecture. DOCSIS, FTTH, PON, SD-WAN. Older technologies (if required): Modems, ISDN, 64k, E1, TDM. Packet switched networks Packet switching, virtual circuits, Hub & spoke, partial & full mesh, MPLS, MPLS and routers, Why MPLS? MPLS -TE, MPLS VPN, Internet VPN. Older technologies (if required). Service provider technologies Transport plane, SDH, SONET, WDM, CWDM, DWDM, DWDM architectures, OTN. TCP/IP Definition, protocols, services, internetworking, the Internet, intranets, IAB, RFCs, IP header, IP addressing, subnet masks, IPv6, TCP, UDP. Hands on IP address and subnet mask configuration. Routers What are routers? Routers vs switches, when to route and when to switch, default gateways, routing tables, static routes, routing protocols. Firewalls, how firewalls work. Hands on Router configuration, tracert. Applications Clients, servers, web, HTTP, Email, resource sharing, IM, VoIP, Video over IP, terminal emulation, ftp, ssh. Hands on telnet
Network virtualization training course description This course covers network virtualization. It has been designed to enable network engineers to recognise and handle the requirements of networking Virtual Machines. Both internal and external network virtualization is covered along with the technologies used to map overlay networks on to the physical infrastructure. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer implementations. What will you learn Evaluate network virtualization implementations and technologies. Connect Virtual Machines with virtual switches. Explain how overlay networks operate. Describe the technologies in overlay networks. Network virtualization training course details Who will benefit: Engineers networking virtual machines. Prerequisites: Introduction to virtualization. Duration 2 days Network virtualization training course contents Virtualization review Hypervisors, VMs, containers, migration issues, Data Centre network design. TOR and spine switches. VM IP addressing and MAC addresses. Hands on VM network configuration Network virtualization What is network virtualization, internal virtual networks, external virtual networks. Wireless network virtualization: spectrum, infrastructure, air interface. Implementations: Open vSwitch, NSX, Cisco, others. Hands on VM communication over the network. Single host network virtualization NICs, vNICs, resource allocation, vSwitches, tables, packet walks. vRouters. Hands on vSwitch configuration, MAC and ARP tables. Container networks Single host, network modes: Bridge, host, container, none. Hands on Docker networking. Multi host network virtualization Access control, path isolation, controllers, overlay networks. L2 extensions. NSX manager. OpenStack neutron. Packet walks. Distributed logical firewalls. Load balancing. Hands on Creating, configuring and using a distributed vSwitch. Mapping virtual to physical networks VXLAN, VTEP, VXLAN encapsulation, controllers, multicasts and VXLAN. VRF lite, GRE, MPLS VPN, 802.1x. Hands on VXLAN configuration. Orchestration vCenter, vagrant, OpenStack, Kubernetes, scheduling, service discovery, load balancing, plugins, CNI, Kubernetes architecture. Hands on Kubernetes networking. Summary Performance, NFV, automation. Monitoring in virtual networks.
About this Virtual Instructor Led Training (VILT) Hydrogen will play an increasingly critical role in the future of energy system as it moves forward to supplement and potentially replace fossil fuels in the long run. Offshore wind offers a clean and sustainable renewable resource for green hydrogen production. However, it can also be volatile and presents inherent risks that need to be managed. Even though offshore production of hydrogen has yet to achieve a high state of maturity, many current projects are already dealing with the conditions and effects of offshore production of hydrogen and are grappling with the technological requirements and necessary gas transportation with grid integration. This 2 half-day Virtual Instructor Lead Training (VILT) course will examine the technological options for on-site production of hydrogen by electrolysis (onshore or offshore directly at the platform) as well as the transport of hydrogen (pipeline or ship). This VILT course will also explore the economic considerations and the outlook on future market opportunities. There will be exercises for the participants to work on over the two half-days. This course is delivered in partnership with Fraunhofer IEE. Training Objectives By the end of this VILT course, participants will be able to: Understand the technological attributes and options for green hydrogen production based on electricity from offshore wind. Explore the associated economic analysis for offshore wind hydrogen production, including CAPEX, OPEX, LCOE and LCOH Identify the critical infrastructure and technical configuration required for offshore green hydrogen including transportation networks and grid connectivity Learn from recent findings from current Research & Development projects concerning the differences between onshore and offshore hydrogen production. Target Audience This VILT course is intended: Renewable energy developers and operators Offshore oil & gas operators Energy transport and marine operators Energy policy makers and regulators IPPs and power utilities Training Methods The VILT course will be delivered online in 2 half-day sessions comprising 4 hours per day, including time for lectures, discussion, quizzes and short classroom exercises. Course Duration: 2 half-day sessions, 4 hours per session (8 hours in total). Trainer Trainer 1: Your expert course leader is Director of Energy Process Technology Division at the Fraunhofer Institute for Energy Economics and Energy System Technology, IEE. The research activities of the division link the areas of energy conversion processes and control engineering. The application fields covered are renewable energy technologies, energy storage systems and power to gas with a strong focus on green hydrogen. From 2006 - 2007, he worked as a research analyst of the German Advisory Council on Global Change, WBGU, Berlin. He has extensive training experience from Bachelor and Master courses at different universities as well as in the context of international training activities - recently on hydrogen and PtX for partners in the MENA region and South America. He holds a University degree (Diploma) in Physics, University of Karlsruhe (KIT). Trainer 2: Your expert course leader is Deputy Head of Energy Storage Department at Fraunhofer IEE. Prior to this, he was the director of the Grid Integration Department at SMA Solar Technology AG, one of the world's largest manufacturers of PV power converters. Before joining SMA, he was manager of the Front Office System Planning at Amprion GmbH (formerly RWE TSO), one of the four German transmission system operators. He holds a Degree of Electrical Engineering from the University of Kassel, Germany. In 2003, he finished his Ph.D. (Dr.-Ing.) on the topic of wind power forecasting at the Institute of Solar Energy Supply Technology (now known as Fraunhofer IEE) in Kassel. In 2004, he started his career at RWE TSO with a main focus on wind power integration and congestion management. He is Chairman of the IEC SC 8A 'Grid Integration of Large-capacity Renewable Energy (RE) Generation' and has published several papers about grid integration of renewable energy source and forecasting systems on books, magazines, international conferences and workshops. Trainer 3: Your expert course leader is Deputy Director of the Energy Process Technology division and Head of the Renewable Gases and Bio Energy Department at Fraunhofer IEE. His work is mainly focused on the integration of renewable gases and bioenergy systems into the energy supply structures. He has been working in this field since more than 20 years. He is a university lecturer in national and international master courses. He is member of the scientific advisory council of the European Biogas Association, member of the steering committee of the Association for Technology and Structures in Agriculture, member of the International Advisory Committee (ISAC) of the European Biomass Conference and member of the scientific committees of national bioenergy conferences. He studied mechanical engineering at the University of Darmstadt, Germany. He received his Doctoral degree on the topic of aerothermodynamics of gas turbine combustion chambers. He started his career in renewable energies in 2001, with the topic of biogas fired micro gas turbines. Trainer 4: Your expert course leader has an M. Sc. and she joined Fraunhofer IEE in 2018. In the Division of Energy Process Technology, she is currently working as a Research Associate on various projects related to techno-economic analysis of international PtX projects and advises KfW Development Bank on PtX projects in North Africa. Her focus is on the calculation of electricity, hydrogen and derivative production costs (LCOE, LCOH, LCOA, etc) based on various methods of dynamic investment costing. She also supervises the development of models that simulate different PtX plant configurations to analyze the influence of different parameters on the cost of the final product, and to find the configuration that gives the lowest production cost. She received her Bachelor's degree in Industrial Engineering at the HAWK in Göttingen and her Master's degree in renewable energy and energy efficiency at the University of Kassel. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations
IP security training course description Connection to the Internet is becoming an essential business tool. This course looks at firewalls, digital certificates, encryption and other essential topics for e-commerce sites. A generic course that looks at firewalls and VPNs. Hands on sessions include using hacking tools and configuring firewalls. What will you learn Describe: Basic security attacks RADIUS SSL IPSec VPNs Implement digital certificates Deploy firewalls to protect Web servers and users. Secure Web servers and clients. IP security training course details Who will benefit: Network administrators. Network operators. Security auditors Prerequisites: TCP/IP foundation for engineers Duration 2 days IP security training course contents TCP/IP review Brief overview of the relevant headers. Hands on Download software for course, use analyser to capture passwords on the wire. Security review Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits The Internet worm, IP spoofing, SYN attack, hijacking, Ping o' Death⦠keeping up to date with new threats. Hands on Use a port scanning tool, use a 'hacking' tool. Firewalls Products, Packet filtering, DMZ, content filtering, stateful packet inspection, Proxies, firewall architectures, Intrusion Detection Systems, Viruses. Hands on Set up a firewall and prevent attacks. NAT NAT and PAT, Why use NAT, NAT-ALG, RSIP. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Run a password-cracking program. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, PPP authentication, RADIUS. Hands on Using certificates. Web client and server security Cookies, browser certificates, censorship, PICS. Operating system security, Web server user authentication, Restricting access, Logging, Securing CGI scripts. Hands on Browser security. VPNs and IPSec What is a VPN, tunnelling, L2F, PPTP, L2TP, IPSec, AH, ESP, transport mode, tunnel mode.