IS-IS training course description A hands on course on IS-IS link state routing protocol. The main focus of the course is the use of IS-IS in an IP only environment but can be tailored to concentrate on the use of IS-IS in CLNP networks. Hands on sessions use Cisco routers. What will you learn Configure and troubleshoot IS-IS. Explain how IS-IS works. Describe the use of Level 1 and Level 2. Design IS-IS networks. IS-IS training course details Who will benefit: Network administrators. Network operators. Prerequisites: TCP/IP Foundation for engineers Duration 2 days IS-IS training course contents Introduction The history of IS-IS, OSI background, terminology, addressing, how OSI networking works, ES-IS, ISIS, IS types, basic OSI configuration, other configuration parameters. Running IS-IS in an IP environment Integrated routing, Dual IS-IS, OSI only IS-IS, IP only IS-IS, packet formats and the use of CLNP, Basic configuration. How IS-IS works in detail Link state theory, tuneable parameters, IS-IS metrics, hellos, CSNP intervals, retransmissions, TLVs, Sub TLVs, Designated routers and pseudo nodes, authentication. Level 1 and level 2 in detail Router types, circuit types, Hot potato routing, route leaking, Area partitioning. Multiple addresses Redistribution and summarisation Tagging and filtering
This case study is on a 2019 school history tour to the USA, which sadly ended in tragedy. This case study forms part of the Xcursion Online International School Travel Safety Course.
Kerberos for engineers training course description This hands on course covers the details of Kerberos, from installation and administration through to how it all works including the protocols. What will you learn Describe what Kerberos is. Explain how Kerberos works. Install Kerberos. Configure Kerberos. Troubleshoot Kerberos. Kerberos for engineers training course details Who will benefit: Engineers interested in security. Prerequisites: TCP/IP foundation for engineers Duration 2 days Kerberos for engineers training course contents What is Kerberos? Single Sign On, The protocol, the standard, history, v4, v5, RFCs, Linux, Windows. Kerberos concepts and technology AAA, Authentication, Authorization, Accounting. Kerberos vs LDAP and directories. Privacy, integrity. Kerberos realms, principles, instances. Keys, salts, passwords. Key Distribution Centre, Authentication server, ticket granting server. Tickets. Installation and administration of Kerberos Installing Kerberos, creating realms, testing. DNS and Kerberos, Kerberos clients. Hands on Windows and Linux Kerberos. Kerberos protocols The Needham-Schroeder protocol, Kerberos v4. Authentication server, ticket granting server, Kerberos v5, encryption options, ticket options, other protocol features and extensions. Related protocols: GSSAPI, SPNEGO. Hands on Using Wireshark to 'see' Kerberos. Troubleshooting Kerberos Approach, debugging tools, errors and solutions. Hands on Kerberos troubleshooting. Kerberos security concerns Kerberos attacks, protocol security issues. Dictionary attacks, brute force attacks, replay attacks, MITM attacks, security solutions, protecting the KDC, firewalls, NAT and Kerberos. Hands on Kerberos logging. Software which uses Kerberos Kerberos logins, Kerberos and web based applications, Directory services. Advanced Kerberos issues Cross realm authentication, Windows issues, Windows and UNIX interoperability, Hands on Using a Windows DC for UNIX clients.
If you enjoy the blend of history, human behaviour, and the odd skirmish, this bundle delivers just the right mix. With topics like English and Welsh history, anthropology, stress management, and a grounding in Microsoft Word, you’ll find it surprisingly relevant to both academic and administrative paths. It’s not just battles and dates—this bundle offers insight into the psychological and cultural effects of conflict, how to manage stress through the ages (and emails), and why the little things in Word formatting still matter. History isn’t dull—it’s just often badly explained. This isn’t one of those times. 🟪 Learning Outcomes: Understand the impact of conflict on English and Welsh culture. Explore anthropological factors in historical and modern warfare. Analyse historical change from social and military perspectives. Manage tasks efficiently using Microsoft Word functions. Recognise personal stress signs and manage them effectively. Engage critically with cultural and historical development trends. 🟪 Who Is This Course For: History enthusiasts with an eye for conflict and society. Students of humanities interested in structured perspectives. Admins working in education or academic research sectors. Writers exploring military or historical narratives. Professionals needing cultural or contextual understanding. Volunteers in heritage or museum environments. Individuals interested in conflict and psychological history. People curious about stress—then and now. 🟪 Career Path (UK Average Salaries): Historical Research Assistant – £27,000/year Academic Support Staff – £26,000/year Archival Administrator – £25,000/year Military History Writer – £30,000/year Museum Information Officer – £28,000/year Humanities Outreach Coordinator – £29,000/year
Essential DHCP training course description Almost all businesses use DHCP. This course builds on delegates existing IP knowledge and focuses on IP Address management using DHCP. Also covered is the role of DHCP in plug and play environments. What will you learn Explain how DHCP works. Configure DHCP servers. Troubleshoot DHCP. Essential DHCP training course details Who will benefit: Anyone working with TCP/IP. Prerequisites: TCP/IP Foundation for engineers Duration 1 day Essential DHCP training course contents Introduction What is DHCP?, IP configuration: Address, mask, default gateway, DNS. History of DHCP: RARP, BOOTP. Hands on Client configuration, releasing and renewing. DHCP servers Installation. Base configuration: Scope. Lease period. DHCP options. Hands on Server setup, Impact of lease times. Server monitoring. How DHCP works Client states. Obtaining, renewing leases. DHCP messages: DISCOVER, OFFER, REQUEST, NAK, ACK, DECLINE, RELEASE, INFORM. Hands on Troubleshooting DHCP using Wireshark. DHCP architecture DHCP relay agents. Server platforms, resilience, DHCP fail over, split scopes. Dynamic DNS and DHCP. Hands on DDNS, routers, Troubleshooting.
In-depth analysis of relationship history Personality test Self-improvement Dating advice for singles Introspection Understanding your core needs Behavioural pattern exercises Inclusive free support calls
English language book club to use and improve your English. Qualified and experienced British English teacher.
Broadband access training course description ADSL is a broadband technology providing fast Internet access (amongst other applications) over existing telephone lines. This course covers an overview of the DSL family, what ADSL is through to how ADSL works. What will you learn Describe what ADSL is. Describe how ADSL works. Describe the ADSL architecture. Recognise the limitations of ADSL. List the elements required for an ADSL installation. Broadband access training course details Who will benefit: Network engineers and anyone who will be working with ADSL. Prerequisites: Intro to data communications & networking Duration 2 days Broadband access training course contents What is ADSL? Broadband definitions, OSI layer 1, ADSL services, WANS. ADSL features: always on, point to point, Asymmetric, speeds. ADSL benefits, xDSL family, standards, history, example DSL forum documents. ADSL architecture The big picture, The PSTN and telephones, Digital and analogue, PSTN and modems, ADSL vs. modem speeds, Block 1: Customer premises, Block 2: The last mile, Block 3: The exchange, Block 4: the core network. Customer premises Splitters, micro filters, splitter architectures, Splitterless ADSL, ADSL modems, USB, ADSL routers. The local loop ADSL PHY, Some basics, ADSL margins, speed implications, distances, RADSL, Line testing, whoosh tests, line coding, multiple channels, FDM, echo cancellation, Modulation: AM, FM, PM, QAM, QAM constellations, DMT, CAP, Framing, Superframes, fast data mode, interleaved mode, RADSL revisited. The exchange Local exchange ADSL items, DSLAMs, ADSL racks, Contention. The core network The role of the core network, ATM, ATM VPI/VCI, ATM cells, ATM layers, AAL5, RAS, Home gateways. ADSL and the higher layers Layer 2 choices, PPPoA, PPP, CHAP, Layer 4 and above, ADSL and ATM. Installing and configuring ADSL Choosing providers, line activation, hardware requirements, Configuring layer 1 and layer 2, Configuring IP. Summary ITU ADSL standards
This course takes you through the history of cellular wireless technology and explains the new features that you will experience in 5G technology. From what is an antenna to how can cloud aid 5G and what is frequency to how Voice Over Internet Protocol (VoIP) fits in mobile communication, you will learn it all.
MPLS training course description A hands-on introduction to MPLS covering the basics of what MPLS is and how to configure it, through to more advanced concepts such as MPLS VPNs and traffic engineering with MPLS. What will you learn Describe MPLS Explain how MPLS works Describe the interaction between OSPF/IS-IS/BGP and MPLS Describe MPLS traffic engineering MPLS training course details Who will benefit: Anyone working with MPLS. Prerequisites: IP Routing BGP Duration 3 days MPLS training course contents What is MPLS? What does MPLS stand for? What is MPLS? Core MPLS, MPLS and the 7 layer model, MPLS is a protocol, MPLS is a standard, MPLS runs on routers, MPLS history, Why MPLS? For service providers, For enterprises. MPLS Architecture Label Switch Routers, two types of LSR, PE and P router roles, FEC, swapping labels, MPLS packet format, Loops, TTL control. Hands on: Building the base network. Enabling MPLS. Simple testing and troubleshooting of MPLS. Label distribution Label review, label switch path, label distribution methods, piggybacking, Label distribution Protocols, LDP, LDP operation, LDP packets, discovery messages, session messages, advertisement messages, notification message, Label Information Base, routing tables, the LFIB, MPLS forwarding, penultimate hop popping, handling labels, LSP control modes, when to distribute labels, how long to keep labels, aggregation, label merging. Hands on: LDP traffic analysis. MPLS TE and QoS What is MPLS TE? Why TE? TE versus shorted path, how MPLS TE works, CR-LDP, OSPF-TE, IS-IS-TE, TE with BGP, RSVP-TE, MPLS Fast reroute, MPLS QoS. Hands on: Enabling MPLS-TE. BFD BFD, hello the BFD protocol. MPLS VPN What is a VPN? MPLS VPN types, MPLS VPN comparison, MPLS L3 VPN, VRFs, MBGP, MPLS VPN architecture, VRF RD, VRF RT, the label stack, L2 VPNs, VPWS, AToM, VPLS. Hands on: MPLS L3 VPN setup, troubleshooting.