• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

18 Educators providing History courses in Newcastle upon Tyne

Fidas Safeguarding Training

fidas safeguarding training

Durham

I am Dorothea Scales. I have founded Fidas Consent Training because I want to share my knowledge and experience of dealing with sexual assaults and rapes which I gained during my career as a Detective Sergeant. I have combined my passion for safeguarding with my enthusiasm for training – having an MA in education and being a qualified teacher gave me the skills set to develop and deliver my courses. Since leaving the Police in October 2021, I have already delivered to hundreds of students, pupils and their teachers, to Designated Safeguarding Leaders and University students, colleges, youth organisations, charities, and apprentices   I have combined my expertise as an ex-Detective Sergeant in Safeguarding and my experience as a teacher, to develop my completely unique consent workshops, presentations and now a cost effective eLearning package . I have trained Detectives, Police cadets and Police Special constables and probationers. I have developed courses for Police officers in dealing sensitively with victims of rape and confronting myths and misconceptions. I have lead  leading a Pilot project for Durham County Council in delivering consent workshops to local secondary schools.   Fidas Consent Training is about sharing my passion for safeguarding the truly vulnerable and giving every person an informed choice about consent.   As a qualified, experienced, and passionate safeguarding specialist, I have 16 years’ experience as a Police Officer, protecting the rights of children, young people, and adults. I have always been driven by making a positive difference to the vulnerable. During my time in education and the Police, I have developed additional skills in risk management, people leadership and managing the most complex investigations which demand a sensitive and compassionate response. Victim focused and people centred in my work, I championed change in the police and built strong alliances with partner organisations As a Detective Sergeant within the Safeguarding unit I dealt with victims and suspects of rape and sexual assaults on a daily basis, often from report to court. I know and understand all the devastating consequences of not understanding or ignoring consent and want to share my experience with young people for a better future. I am a qualified Teacher and Safeguarding instructor committed to sharing my experience and expertise through my training courses. I have proactively developed partnerships to increase my impact and have worked closely with Social Services (adult and children’s team), schools, colleges and universities, MIND, healthcare professionals, domestic abuse charities and refuges, RAPE Crisis and regional police forces, which gives the training I am offering a particular knowledge-based advantage.  During my time in the Police I undertook a study which demonstrated why specialist rape teams are the way forward for all around victim care and successful prosecutions.   My Qualifications: MA in History, Education and Italian University of Durham, PGSE – postgraduate degree in education- qualified teacher status, Level 3 and 4 in Policing, NVQ, Sexual Assault Liaison officer, Tier Three victim interview trained– Achieving best evidence in victim interviews (including children under the age of 8) ICIDP (qualified Detective) Serious and complex Interviewing victim, witnesses and suspects Detective tutor ABELS – achieving Best Evidence Language screen Promotion to Detective Sergeant (in Safeguarding) Custody Sergeant Trained in misconduct and complaints procedures Investigations into counter corruption Investigator into sudden childhood death Counter corruption development programme Safeguarding First Responder Judge’s commendation for victim care in sexual abuse Chief Superintendent’s commendation for victim care Investigator into sudden childhood death Trauma processing and Trauma resilience in Policing Ofqual certified First Aid Mental Health Instructor Level 3, Ofqual certified Principles of Safeguarding and Protecting children (RQF) Level 3 RSE certified

Flourishing Language Solution

flourishing language solution

London

Let me know what I can help you with.Translation ServiceInterpreter Service---Welcome ToFlourishing Language Solution Ltd Flourishing Language Solution Ltd is a Private limited Company registered in England and wales. Quality service provision is what our company prioritises, and we strive to achieve this through the provision of tailored services to Tigrinya and Amharic speaking serviceFlourishing Language Solution Ltd is a Private limited Company registered in England and wales. Quality service provision is what our company prioritises, and we strive to achieve this through the provision of tailored services to Tigrinya and Amharic speaking service users, who require an interpreter or translation services to fully access services available to them. We supply linguists who are DPSI qualification holders and NRPSI registered to ensure quality service provision. We also work in partnership with other NRPSI registered and regulated linguists and supply other rare languages. Company Director: Mr Tesfom Gebrehiwet Mr Tesfom is a DPSI certified and NRPSI registered & regulated linguist. He has been working as a Freelance Interpreter and translator since May 2008 and DPSI Language Specialist since August 2017. His strong professional academic background (B.A Degree in History, Eritrea; B.A Hons in Community and Youth Studies and M.A in Social Work, UK); along with his teaching and mentoring experiences has enabled him to gain relevant skills in training and assessing other linguists. As a Freelance interpreter and translator, he has been delivering various interpreting assignments including court trials, tribunals, police stations, probation services, NHS, Asylum Screening, Detention Centres, Mental Health Hospitals, schools, DWP, JCP, HMRC, CAFCASS, Medical Health Assessment centres (ATOS & CHDA), Social services (LAC Review, TAF Meetings, safeguarding issues including S. 47 enquiry …etc), local law firms and so on. Read More

Disability North

disability north

Newcastle upon Tyne

Disability North is a registered charity (no. 514733) promoting inclusion, independence and choice for disabled people and their families by providing information, advice and support on any aspect of disability. Services are also provided for students or professionals working in the statutory, voluntary and the public sector. We are a user-led charity with a constitutional majority of disabled people on our executive committee. The needs of disabled people, older adults and their families are at the heart of our services and our free, impartial advice empowers them to make informed decisions, maximizing the control they have over their own lives. Please see ‘Independent Living Support’ to discover the services we offer and how we can help you to live independently. Our Mission: To promote inclusion, independence and choice for disabled people and their families. Our Vision: To be the best resource for Disability in the North History: The Charity was originally known as Newcastle Council for the Disabled working from Mea House in Newcastle. In the early nineteen eighties Newcastle City Council offered the land now known as the Dene Centre to the Council for the Disabled with the proviso that they raise part of the funds to build the regions centre of excellence for disability. The Council for the Disabled accepted the challenge and the funds were raised. The centre was officially opened in 1985. In 1995 the Charity changed its name and became Disability North.

Durham Johnston Comprehensive School

durham johnston comprehensive school

Durham

We are a happy and thriving school in the heart of Durham City. We believe that each word in our school name is hugely important and is linked directly to our ethos and values, and what we seek to do on a daily basis. We are proud to serve the people of County Durham and our students are drawn from a wide geographical area. We take our name from James Finley Weir Johnston, a successful scientist who bequeathed money so that both boys and girls from Durham could access a high-quality education. We have been providing a rich and varied academic curriculum since 1901 and are proud to have a long and distinguished history. Subject specific knowledge and an awareness of Britain and the wider world are hugely important as students develop and learn. The quality of education that we offer is comprehensive in terms of both breadth and scope. We are also a comprehensive school in terms of the wide variety of backgrounds and circumstances that members of our school community come from. Increasingly, our students are drawn from a wide variety of nations and continents too. That diversity is one of our greatest strengths Our staff are highly experienced and combine subject specialism with a commitment to pastoral care and student support. All students have equal access to a well-planned curriculum, a wide range of opportunities for personal development and the chance to learn from the others within our school community. We believe firmly in social justice and equality of opportunity for all; when students cross our threshold each morning, they have access to the same opportunities. As a school we believe in education in its widest sense; students can learn a huge amount both in and beyond the classroom, and, of equal importance, by interacting and working with others. The personal development of each student is key to their future success, and we offer a diverse range of extracurricular opportunities, as well as encouraging participation in public service, particularly through our well established House System. In their time with us we want all of our students to make excellent academic progress based upon their starting points, to acquire knowledge, to access opportunities regardless of previous experiences or circumstance, to support others within and beyond our community and to leave us for further success as adults. We are a big and busy comprehensive school, and all teaching and support staff are united in wanting the best for our students. We work hard, and look for ways to adapt, improve, and create new opportunities for our young people. We don’t always get things right and sometimes encounter issues and circumstances for which there aren't easy solutions, but we are honest about that and seek to work closely with parents and carers. We want all students to enjoy their time with us, to be successful and to look back on their time at Durham Johnston Comprehensive School positively.

Courses matching "History"

Show all 87

Definitive VSAT

5.0(3)

By Systems & Network Training

VSAT training course description This 2 day training course examines what VSAT is, its usages and users. It then looks at the hardware required for VSAT. What will you learn Explain how VSAT is used Describe the hardware required for VSAT operation. VSAT training course details Who will benefit: Anyone working with VSAT. Prerequisites: None. Duration 2 days VSAT training course contents Introduction History of PMR VSAT Introduction A Brief History Satellite Services Satellite Communications Satellite Footprint Radio Frequency Bands ITU Definitions VSAT Users What is a VSAT? VSATs - Usage VSATs - Users VSAT Hardware Typical System Hardware VSAT ODU and IDU VSAT Station Equipment Diplexer and Feed Horn Typical Waveguide Element Polarisation VSAT Hub Antenna Pointing Outdoor Unit Outdoor (continued) VSAT Network Earth Stations Indoor Unit VSAT Network Earth Stations Indoor Unit Element Hub Station Hub Sub-station Hub Options Hub Options (2) Hub Options (3) Temporary Mount

Definitive VSAT
Delivered in Internationally or OnlineFlexible Dates
£1,727

Definitive WANs for engineers

5.0(3)

By Systems & Network Training

WAN training course description A hands on Introduction to Wide Area Networks for engineers. This course covers all current major WAN technologies from a perspective of design, evaluating technologies available as well as hands on to consolidate the theory What will you learn Describe the seven-layer model and realise how it applies to the real world. Evaluate and describe WAN technologies. Describe the architecture of WANs in the core. Use WANS to interconnect LANS. WAN training course details Who will benefit: Technical staff wishing to find out more about how their WAN works. Prerequisites: Intro to data communications & networking Duration 5 days WAN training course contents Introduction LANs, MANS and WANS, protocols, the OSI seven layer model, ITU-T, ETSI, DTE, DCE, and the overall picture. WAN architectures Service providers, core, access, DTE, DCE, CPE, dialup, circuit switched, packet switched, how to choose a WAN, common bandwidths, site to site, remote access. Topologies: Star, Full mesh, partial mesh. History of WANs Before IP was ubiquitous, The PSTN, Dial up networks, modems, ISDN, Stat mux, TDM, 64k, N*64, E1, X25, Frame Relay The role of IP and routers The growth of IP, the role of routers, routing tables, routing protocols. Hands on: IP and routing. Layer 1 Physical Copper, Fibre, Wireless, Microwave, Phone lines, FTTC, FTTH, mobile networks. Service provider technologies The transport plane, SDH, SONET, DWDM. WAN access Phone lines, leased lines, xDSL, WiMax, satellite, the role of PPP. Broadband adband xDSL, ADSL, SDSL, local loops, DSLAM, DSL architecture. ATM Cell switching principles, ATM switching, Virtual paths, QOS, CBR, VBR, ABR, UBR, AAL1 to AAL5, MPOA, LANE, Voice over ATM. The Internet VPNs, IPSEC, QOS. What is MPLS? Core MPLS, MPLS and the 7 layer model, MPLS protocol, MPLS standard, MPLS runs on routers, MPLS history, Why MPLS? MPLS architecture LSRs, PE and P router roles, FEC, swapping labels, MPLS packet format, Loops, TTL control. Ethernet What is Ethernet? LANs, MANs, WANs, Ethernet and switches in the LAN. Traditional LAN/WAN integration, routers. The Ethernet interface for the WAN. Standards: Transporting carrier Ethernet.

Definitive WANs for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697

Certified Wireless Security Professional

5.0(3)

By Systems & Network Training

CWSP training course description A hands-on training course concentrating solely on WiFi security with an emphasis on the delegates learning the necessary knowledge and skills to pass the CWSP exam. The course progresses from simple authentication, encryption and key management onto in depth coverage of 802.X and EAP along with many other security solutions such as access control, intrusion prevention and secure roaming. What will you learn Demonstrate the threats to WiFi networks. Secure WiFi networks. Configure: WPA2 RADIUS 802.1x EAP Pass the CWSP exam. CWSP training course details Who will benefit: Technical network staff. Technical security staff. Prerequisites: Certified Wireless Network Associate. Duration 5 days CWSP training course contents WLAN Security overview Standards, security basics, AAA, 802.11 security history. Hands on WLAN connectivity. Legacy 802.11 security Authentication: Open system, shared key. WEP. VPNs. MAC filters. SSID segmentation, SSID cloaking. Hands on Analysing 802.11 frame exchanges, viewing hidden SSIDs. Encryption Basics, AES, TKIP, CCMP, WPA, WPA2. Hands on Decrypting 802.11 data frames. 802.11 layer 2 authentication 802.1X: Supplicant, Authenticator, Authentication server. Credentials. Legacy authentication. EAP, Weak EAP protocols, Strong EAP protocols: EAP -PEAP, EAP-TTLS, EAP-TLS, EAP-FAST. Hands on Analysing 802.1X/EAP frames. 802.11 layer 2 dynamic key generation Robust Security Network. Hands on Authentication and key management. SOHO 802.11 security WPA/WPA2 personal, Preshared Keys, WiFi Protected Setup (WPS). Hands on PSK mapping. WLAN security infrastructure DS, Autonomous APs, WLAN controllers, split MAC, mesh, bridging, location based access control. Resilience. Wireless network management system. RADIUS/LDAP servers, PKI, RBAC. Hands on 802.1X/EAP configuration. RADIUS configuration. 802.11 Fast secure roaming History, RSNA, OKC, Fast BSS transition, 802.11k. Hands on Roaming. Wireless security risks Rogue devices, rogue prevention. Eavesdropping, DOS attacks. Public access and hotspots. Hands on Backtrack. WiFi security auditing Layer 1 audit, layer 2 audit, pen testing. WLAN security auditing tools. WiFi security monitoring Wireless Intrusion Detection and Prevention Systems. Device classification, WIDS/WIPS analysis. Monitoring. 802.11w. Hands on Laptop spectrum analysers. VPNs, remote access, guest access Role of VPNs in 802.11, remote access, hotspots, captive portal. Wireless security policies General policy, functional policy, recommendations.

Certified Wireless Security Professional
Delivered in Internationally or OnlineFlexible Dates
£3,697

Git and GitHub for engineers

5.0(3)

By Systems & Network Training

Git and GitHub course description This course covers version control using Git but also using GUI frontends such as GitHub. The course starts with a tour of using GitHub but then quickly moves onto using git from the command line. All elements of git version control are covered including creation of repositories, adding and editing files, branches and merging, rewriting history and handling merge conflicts. Hands on sessions are used throughout the course. What will you learn Install git. Add and edit files in a repository. Create branches and perform merges. Handle merge conflicts. Git and GitHub course details Who will benefit: Anyone requiring version control. Prerequisites: None. Duration 1 day Git and GitHub course contents Introduction Version control for software, configuration management. Other uses. Version control systems. What is git? What is GitHub? Distributed version control. Comparison of git to other systems. GitHub Getting started, creating an account, account types, repositories, access control, bug tracking, feature requests. Alternatives to GitHub. Hands on Using GitHub. Installing git Linux install, Windows install, git config, levels, user.name, user.email. Hands on Installing and configuring git. Creating repositories git clone, github, git remote, git init. Hands on Creating a repository. Adding and editing files Staging and adding, git add, git commit, git push, git pull, git status, git log. Two stage process. File states: Working, staging, history, untracked. git mv, git rm, .gitignore, git diff, git difftool. Undoing changes. Hands on Adding and editing files in git. Branching and merging What is a branch, HEAD label, master branch, git branch, git checkout. Feature branches, bux fix branches, integration branches, production branches, fast forward merges, 3 way merges, git merge, git status, git log, tags. Hands on Making branches, merging. Rewriting history git reset, git rebase, advantages. Hands on Reset commits, rebase a branch. Merge conflicts What is a conflict, conflict resolution process, resolving merges, rebasing, git log, merge tools, configuring merge tools, avoiding conflicts. Hands on Merge resolution.

Git and GitHub for engineers
Delivered in Internationally or OnlineFlexible Dates
£797

M.D.D HOW TO HAVE CONFIDENCE PACKAGE (DATING/RELATIONSHIP COURSES)

4.9(27)

By Miss Date Doctor Dating Coach London, Couples Therapy

A training course for those lacking in confidence and suffering from low self-esteem. Confidence and self-esteem issues can have a very detrimental effect on progressing in your dating life and having healthy relationships. This course will consist of a full assessment of your history. emotions, self-belief, dating history, and insight into how to build your confidence and forge a stronger self-belief pattern and supporting you to become a better and more confident person able to face the ups and downs and challenges of daily life and believing in yourself and knowing you can overcome any obstacle in dating, relationships or daily life. Confidence can be lost when we face negative situations but can be regained with indoctrination and social awareness and emotional intelligence education. https://relationshipsmdd.com/product/how-to-have-confidence-package/

M.D.D HOW TO HAVE CONFIDENCE PACKAGE (DATING/RELATIONSHIP COURSES)
Delivered in London or UK Wide or OnlineFlexible Dates
£1,200

Professional Diplomatic Protocol Management

5.0(10)

By GBA Corporate

Overview The protocol is one of the most modern terms in terms of language but very old in terms of history as the word protocol is a development of the word of the conventions and understandings this is in the world of politics and at the international level, but within the field of business management has become the formulation of protocols is one of the important and necessary skills and very necessary for people who wish to They must take administrative duties. Through this course, we are going to introduce the rules and practices of gentle behaviour, the best practices for communication with others, and good reception, since all such related matters represent a large portion of our personality.

Professional Diplomatic Protocol Management
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,779

CWISA Wireless IoT Solutions Administrator

5.0(3)

By Systems & Network Training

CWISA training course description This CWISA course covers wireless technologies with reference to IoT. It examines from an IoT perspective how wireless works, and is an excellent introduction to IoT for the wireless engineer. Topics range from wireless technologies, RF, to mobile networks, IoT, and security. What will you learn Describe wireless networking and IoT technologies. Explain basic RF communications. Plan wireless solutions. Describe how to implement wireless solutions. Use best practices in implementing wireless solutions. CWISA training course details Who will benefit: Anyone working with IoT technologies. Prerequisites: RF fundamentals. Duration 4 days CWISA training course contents Introduction to wireless technologies History of wireless, radio waves and frequencies, wireless technologies and related components, common components of wireless solutions, LAN networking requirements, Network security, Implementing wireless solutions, staging, documentation, security updates, Industry organizations, IEEE, compatibility and certification groups. Wireless network use cases Wireless BANs, Wireless PANs, Wireless LANs, Wireless MANs, Wireless WANs, Wireless sensor networks, New network driver-Internet of Things, IoT for industry (IIoT), IoT for connected vehicles, Residential environments, Retail, Education (K12), Higher education, Agriculture, Smart cities / Public access, Health care, Office buildings, Hospitality, Industry, Stadiums, arenas, and large public venues. Planning wireless solutions Identifying use cases and applications, common wireless requirements and constraints, performing a wireless system design, selecting and evaluating design parameters. RF communications RF wave characteristics, RF propagation behaviours, RF signal metrics, fundamentals of wireless modulation. other wireless carriers, common frequency bands. Radio frequency hardware Hardware levels, basic RF hardware components (circuit board level), RF link types (use category). RF device types. Mobile communications networks Mobile networks, LTE, 5G, Use cases. Short-range, low-rate, and low-power networks RF and speed, RF and range, RF and power, 802.11, 802.15.4, Bluetooth, LoRa (Long range) / LoRaWAN, ZigBee, 6LoWPAN, NB-IoT and LTE-M. Wireless sensor networks What is a Wireless Sensor Network (WSN)? WSN applications, Sensors and actuators, WSN architectures, Planning a WSN. Internet of Things (IoT) Internet of Things (IoT) defined, IoT history and its definition revisited, one more comment on the definition of IoT, IoT verticals, Oil & Gas, IoT structure/ architecture basics, IoT connected objects. Securing wireless networks Confidentiality, integrity and availability, Privacy, non-repudiation, authenticity & safety, Importance of authentication in wireless networks, Key cryptographic technologies & concepts, Authentication methods, Authorisation, OAuth 2.0 authorisation framework, monitoring. Troubleshooting wireless solutions Proper solutions design, designing and implementing wireless solutions, basic installation procedures, general configuration considerations, troubleshooting and remediation, troubleshoot common problems in wireless solutions. Programming, scripting and automation What is an API? categories of APIs, common API communication methods, choosing a language, why are we integrating systems? Application & integration architectures. Data structures & types, XML, YAML, API types.

CWISA Wireless IoT Solutions Administrator
Delivered in Internationally or OnlineFlexible Dates
£2,797

Complete JavaScript

5.0(3)

By Systems & Network Training

Complete JavaScript training course description A hands on course covering JavaScript programming. Core JavaScript is covered first, including the basics, arrays, functions, classes, modules and Regular expressions. Client side JavaScript is then covered including JavaScript in browsers, Scripting CSS, the jQuery library and HTML APIs. What will you learn Read JavaScript. Write JavaScript. Debug JavaScript. Complete JavaScript training course details Who will benefit: Anyone wishing to learn JavaScript. Prerequisites: None. Duration 3 days Complete JavaScript training course contents CORE JAVASCRIPT Lexical structure: Character set, comments, literals, identifiers, and reserved words, optional semicolons.. Types, values and variables: Numbers, text, boolean values, null and undefines, the global object, wrapper objects, immutable primitive values and mutable object references, type conversions, variable declaration, variable scope. Expressions and operators: Primary expressions, object and array initializers, function definition expressions, property access expressions, invocation expressions, object creation expressions, operator overview, arithmetic expressions, relational expressions, logical expressions, assignment expressions, evaluation expressions, miscellaneous operators. Statements: Expression statements, compound and empty statements, declaration statements, conditionals, loops, jumps, miscellaneous statements, summary of JavaScript statements. Objects: Creating objects, querying and setting properties, deleting properties, testing properties, enumerating properties, property getters and setters, property attributes, object attributes, serializing objects, object methods. Arrays: Creating arrays, reading and writing array elements, sparse arrays, array length, adding and deleting array elements, iterating arrays, multi-dimensional arrays, array methods, FCMAScript 5 array methods, array type, array-like objects, strings as arrays. Functions: Defining functions, invoking functions, function arguments and parameters, functions as values, functions as namespaces, closures, function properties, methods and constructor, functional programming. Classes and modules: Classes and prototypes, classes and constructors, Java-style classes in JavaScript, augmenting classes, classes and types, object oriented techniques in JavaScript, subclasses, classes in ECMAScript 5, modules. Pattern matching and regular expressions: Defining regular expressions, string methods for pattern matching, the RegExp object. JavaScript subsets and extensions: JavaScript subsets, constants and scoped variables, destructuring assignment, iteration, shorthand functions, multiple catch clauses, E4X: ECMAScript for XML. Server-side JavaScript: Scripting Java with Rhino, asynchronous I/O with node. CLIENT SIDE JAVASCRIPT JavaScript in web browsers: Client side JavaScript, embedding JavaScript in HTML, execution of JavaScript programs, compatibility and interoperability, accessibility, security, client side frameworks. The Window object: Timers, browser location and navigation, browsing history, browser screen information, dialog boxes, error handling, document elements as window properties, multiple windows and frames. Scripting Documents: Overview of the DOM, selecting document elements, document structure and traversal, attributes, element content, creating, inserting and deleting nodes. Example: generating a table of contents, document and element geometry and scrolling, HTML forms, other document features. Scripting CSS: Overview of CSS, important CSS properties, scripting inline styles, querying computed styles, scripting CSS classes, scripting stylesheets. Handling events: Types of events, registering event handlers, event handler invocation, document load events, mouse events, mousewheel events, drag and drop events, text events, keyboard events. Scripted HTTP: Using XMLHttpRequest, HTTP by <script>: JSOMP, Comet with server-sent events. The jQuery library: jQuery basics, jQuery getters and setters, altering document structure, handling events with jQuery, Animated effects, Ajax with jQuery, Utility functions, jQuery selectors and selection methods, Extending jQuery with plug-ins. The jQuery UI library. Client side storage: localStorage and sessionStorage, Cookies, IE usingData persistence, Applicatioin storage and offline webapps. Scripted media and graphics: Scripting images, Scripting audio and video, SCG:scalable vector graphics, Graphics in a <canvas>. Scripted HTTP: Using XMLHttpRequest, HTTP by <script>: JSOMP, Comet with server-sent events. The jQuery library: jQuery basics, jQuery getters and setters, altering document structure, handling events with jQuery, Animated effects, Ajax with jQuery, Utility functions, jQuery selectors and selection methods, Extending jQuery with plug-ins. The jQuery UI library. Client side storage: localStorage and sessionStorage, Cookies, IE usingData persistence, Applicatioin storage and offline webapps. Scripted media and graphics: Scripting images, Scripting audio and video, SCG:scalable vector graphics, Graphics in a <canvas>. HTMLS APIs: Geolocation, history management, cross-origin messaging, web workers, type arrays and ArrayBuffers, blobs, the filesystem API, client side databases, web sockets.

Complete JavaScript
Delivered in Internationally or OnlineFlexible Dates
£2,367

Essential RFID

5.0(3)

By Systems & Network Training

RFID training course description This training course focuses on the technologies used in Radio Frequency Identification (RFID). What will you learn Describe the RFID architecture. Design RFID systems. Evaluate tag types. Recognise common RFID problems. RFID training course details Who will benefit: RFID technologists and system engineers. Prerequisites: RF fundamentals. Duration 2 days RFID training course contents What is RFID? Review of RF basics, what is RFID, RFID history, RFID base system architecture, frequency bands used by RFID, comparison with barcodes. RFID applications Supply chain, asset tracking, theft reduction, retail, access control, tolls. Tags Tag features, types of tag, passive and active, chips, read only, read write, affixing tags, selecting location to affix a tag, tag orientation and location, tag stacking, impact of rate of movement, tag data formats. Interrogators/readers Interrogation zones, interrogator types, antennas, read distance tests, multiple interrogators, synchronisation, dense interrogator environment issues. RFID peripherals. Standards and regulations Global regulatory requirements, regional regulatory requirements, ISO, ETSI, FCC, EPC, safety regulations/issues. Testing and troubleshooting Read rate problems, improperly tagged items, tag failure. RFID system design Antenna types, interference, antenna location and spacing, how many antennas? How many interrogators? tag types, grounding considerations, cabling, site diagrams.

Essential RFID
Delivered in Internationally or OnlineFlexible Dates
£2,477

Definitive Tetra

5.0(3)

By Systems & Network Training

TETRA training course description This 2 day training course covers the network architecture required for TETRA. It also looks at the Air Interface, TETRA Functions and Procedures. What will you learn Describe the TETRA Architecture Describe the Air Interface Explain the TETRA Functions Explain the TETRA Procedures TETRA training course details Who will benefit: Anyone working with TETRA. Prerequisites: None. Duration 2 days TETRA training course contents Introduction History of PMR, ETSI development, Tetra function, Tetra markets, Tetra standards, Tetra supplier base, Tetra Release 1, Tetra Release 2. Network Architecture Mobile network Identity, Mobile stations, Base station, Switching & Management, Addresses & Identitie. Air Interface Modulation, TDMA Format, FD, Framin, Burst format, Traffic Channel TCH, Dedicated Channel DCC, Common Control Channel CCC, Signalling Channel SCH, Logical Control mapping LCM, Protocol stack, Voice coded. TETRA Functions Trunked mode operation, User hierarchies, Individual calling, Group calling, Supplementary services, Voice and Data, Data services, Direct mode operation, Tetra WAP, Circuit mode priorities, Circuit mode data, Packet mode data, Discrete and Ambient listening. Automatic vehicle locator. TETRA Procedures MS operational modes, Mobility management, Cell selection, Security & Authentication, Decryption options, Cell setup, Channel assignment, Network management - internal, Network management -external, PSTN Gateway, ISDN Gateway, Control Room Gateway.

Definitive Tetra
Delivered in Internationally or OnlineFlexible Dates
£2,477