• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

87 History courses in Ryton

Definitive VSAT

5.0(3)

By Systems & Network Training

VSAT training course description This 2 day training course examines what VSAT is, its usages and users. It then looks at the hardware required for VSAT. What will you learn Explain how VSAT is used Describe the hardware required for VSAT operation. VSAT training course details Who will benefit: Anyone working with VSAT. Prerequisites: None. Duration 2 days VSAT training course contents Introduction History of PMR VSAT Introduction A Brief History Satellite Services Satellite Communications Satellite Footprint Radio Frequency Bands ITU Definitions VSAT Users What is a VSAT? VSATs - Usage VSATs - Users VSAT Hardware Typical System Hardware VSAT ODU and IDU VSAT Station Equipment Diplexer and Feed Horn Typical Waveguide Element Polarisation VSAT Hub Antenna Pointing Outdoor Unit Outdoor (continued) VSAT Network Earth Stations Indoor Unit VSAT Network Earth Stations Indoor Unit Element Hub Station Hub Sub-station Hub Options Hub Options (2) Hub Options (3) Temporary Mount

Definitive VSAT
Delivered in Internationally or OnlineFlexible Dates
£1,727

Definitive WANs for engineers

5.0(3)

By Systems & Network Training

WAN training course description A hands on Introduction to Wide Area Networks for engineers. This course covers all current major WAN technologies from a perspective of design, evaluating technologies available as well as hands on to consolidate the theory What will you learn Describe the seven-layer model and realise how it applies to the real world. Evaluate and describe WAN technologies. Describe the architecture of WANs in the core. Use WANS to interconnect LANS. WAN training course details Who will benefit: Technical staff wishing to find out more about how their WAN works. Prerequisites: Intro to data communications & networking Duration 5 days WAN training course contents Introduction LANs, MANS and WANS, protocols, the OSI seven layer model, ITU-T, ETSI, DTE, DCE, and the overall picture. WAN architectures Service providers, core, access, DTE, DCE, CPE, dialup, circuit switched, packet switched, how to choose a WAN, common bandwidths, site to site, remote access. Topologies: Star, Full mesh, partial mesh. History of WANs Before IP was ubiquitous, The PSTN, Dial up networks, modems, ISDN, Stat mux, TDM, 64k, N*64, E1, X25, Frame Relay The role of IP and routers The growth of IP, the role of routers, routing tables, routing protocols. Hands on: IP and routing. Layer 1 Physical Copper, Fibre, Wireless, Microwave, Phone lines, FTTC, FTTH, mobile networks. Service provider technologies The transport plane, SDH, SONET, DWDM. WAN access Phone lines, leased lines, xDSL, WiMax, satellite, the role of PPP. Broadband adband xDSL, ADSL, SDSL, local loops, DSLAM, DSL architecture. ATM Cell switching principles, ATM switching, Virtual paths, QOS, CBR, VBR, ABR, UBR, AAL1 to AAL5, MPOA, LANE, Voice over ATM. The Internet VPNs, IPSEC, QOS. What is MPLS? Core MPLS, MPLS and the 7 layer model, MPLS protocol, MPLS standard, MPLS runs on routers, MPLS history, Why MPLS? MPLS architecture LSRs, PE and P router roles, FEC, swapping labels, MPLS packet format, Loops, TTL control. Ethernet What is Ethernet? LANs, MANs, WANs, Ethernet and switches in the LAN. Traditional LAN/WAN integration, routers. The Ethernet interface for the WAN. Standards: Transporting carrier Ethernet.

Definitive WANs for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697

Certified Wireless Security Professional

5.0(3)

By Systems & Network Training

CWSP training course description A hands-on training course concentrating solely on WiFi security with an emphasis on the delegates learning the necessary knowledge and skills to pass the CWSP exam. The course progresses from simple authentication, encryption and key management onto in depth coverage of 802.X and EAP along with many other security solutions such as access control, intrusion prevention and secure roaming. What will you learn Demonstrate the threats to WiFi networks. Secure WiFi networks. Configure: WPA2 RADIUS 802.1x EAP Pass the CWSP exam. CWSP training course details Who will benefit: Technical network staff. Technical security staff. Prerequisites: Certified Wireless Network Associate. Duration 5 days CWSP training course contents WLAN Security overview Standards, security basics, AAA, 802.11 security history. Hands on WLAN connectivity. Legacy 802.11 security Authentication: Open system, shared key. WEP. VPNs. MAC filters. SSID segmentation, SSID cloaking. Hands on Analysing 802.11 frame exchanges, viewing hidden SSIDs. Encryption Basics, AES, TKIP, CCMP, WPA, WPA2. Hands on Decrypting 802.11 data frames. 802.11 layer 2 authentication 802.1X: Supplicant, Authenticator, Authentication server. Credentials. Legacy authentication. EAP, Weak EAP protocols, Strong EAP protocols: EAP -PEAP, EAP-TTLS, EAP-TLS, EAP-FAST. Hands on Analysing 802.1X/EAP frames. 802.11 layer 2 dynamic key generation Robust Security Network. Hands on Authentication and key management. SOHO 802.11 security WPA/WPA2 personal, Preshared Keys, WiFi Protected Setup (WPS). Hands on PSK mapping. WLAN security infrastructure DS, Autonomous APs, WLAN controllers, split MAC, mesh, bridging, location based access control. Resilience. Wireless network management system. RADIUS/LDAP servers, PKI, RBAC. Hands on 802.1X/EAP configuration. RADIUS configuration. 802.11 Fast secure roaming History, RSNA, OKC, Fast BSS transition, 802.11k. Hands on Roaming. Wireless security risks Rogue devices, rogue prevention. Eavesdropping, DOS attacks. Public access and hotspots. Hands on Backtrack. WiFi security auditing Layer 1 audit, layer 2 audit, pen testing. WLAN security auditing tools. WiFi security monitoring Wireless Intrusion Detection and Prevention Systems. Device classification, WIDS/WIPS analysis. Monitoring. 802.11w. Hands on Laptop spectrum analysers. VPNs, remote access, guest access Role of VPNs in 802.11, remote access, hotspots, captive portal. Wireless security policies General policy, functional policy, recommendations.

Certified Wireless Security Professional
Delivered in Internationally or OnlineFlexible Dates
£3,697

Git and GitHub for engineers

5.0(3)

By Systems & Network Training

Git and GitHub course description This course covers version control using Git but also using GUI frontends such as GitHub. The course starts with a tour of using GitHub but then quickly moves onto using git from the command line. All elements of git version control are covered including creation of repositories, adding and editing files, branches and merging, rewriting history and handling merge conflicts. Hands on sessions are used throughout the course. What will you learn Install git. Add and edit files in a repository. Create branches and perform merges. Handle merge conflicts. Git and GitHub course details Who will benefit: Anyone requiring version control. Prerequisites: None. Duration 1 day Git and GitHub course contents Introduction Version control for software, configuration management. Other uses. Version control systems. What is git? What is GitHub? Distributed version control. Comparison of git to other systems. GitHub Getting started, creating an account, account types, repositories, access control, bug tracking, feature requests. Alternatives to GitHub. Hands on Using GitHub. Installing git Linux install, Windows install, git config, levels, user.name, user.email. Hands on Installing and configuring git. Creating repositories git clone, github, git remote, git init. Hands on Creating a repository. Adding and editing files Staging and adding, git add, git commit, git push, git pull, git status, git log. Two stage process. File states: Working, staging, history, untracked. git mv, git rm, .gitignore, git diff, git difftool. Undoing changes. Hands on Adding and editing files in git. Branching and merging What is a branch, HEAD label, master branch, git branch, git checkout. Feature branches, bux fix branches, integration branches, production branches, fast forward merges, 3 way merges, git merge, git status, git log, tags. Hands on Making branches, merging. Rewriting history git reset, git rebase, advantages. Hands on Reset commits, rebase a branch. Merge conflicts What is a conflict, conflict resolution process, resolving merges, rebasing, git log, merge tools, configuring merge tools, avoiding conflicts. Hands on Merge resolution.

Git and GitHub for engineers
Delivered in Internationally or OnlineFlexible Dates
£797

M.D.D HOW TO HAVE CONFIDENCE PACKAGE (DATING/RELATIONSHIP COURSES)

4.9(27)

By Miss Date Doctor Dating Coach London, Couples Therapy

A training course for those lacking in confidence and suffering from low self-esteem. Confidence and self-esteem issues can have a very detrimental effect on progressing in your dating life and having healthy relationships. This course will consist of a full assessment of your history. emotions, self-belief, dating history, and insight into how to build your confidence and forge a stronger self-belief pattern and supporting you to become a better and more confident person able to face the ups and downs and challenges of daily life and believing in yourself and knowing you can overcome any obstacle in dating, relationships or daily life. Confidence can be lost when we face negative situations but can be regained with indoctrination and social awareness and emotional intelligence education. https://relationshipsmdd.com/product/how-to-have-confidence-package/

M.D.D HOW TO HAVE CONFIDENCE PACKAGE (DATING/RELATIONSHIP COURSES)
Delivered in London or UK Wide or OnlineFlexible Dates
£1,200

Professional Diplomatic Protocol Management

5.0(10)

By GBA Corporate

Overview The protocol is one of the most modern terms in terms of language but very old in terms of history as the word protocol is a development of the word of the conventions and understandings this is in the world of politics and at the international level, but within the field of business management has become the formulation of protocols is one of the important and necessary skills and very necessary for people who wish to They must take administrative duties. Through this course, we are going to introduce the rules and practices of gentle behaviour, the best practices for communication with others, and good reception, since all such related matters represent a large portion of our personality.

Professional Diplomatic Protocol Management
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,779

CWISA Wireless IoT Solutions Administrator

5.0(3)

By Systems & Network Training

CWISA training course description This CWISA course covers wireless technologies with reference to IoT. It examines from an IoT perspective how wireless works, and is an excellent introduction to IoT for the wireless engineer. Topics range from wireless technologies, RF, to mobile networks, IoT, and security. What will you learn Describe wireless networking and IoT technologies. Explain basic RF communications. Plan wireless solutions. Describe how to implement wireless solutions. Use best practices in implementing wireless solutions. CWISA training course details Who will benefit: Anyone working with IoT technologies. Prerequisites: RF fundamentals. Duration 4 days CWISA training course contents Introduction to wireless technologies History of wireless, radio waves and frequencies, wireless technologies and related components, common components of wireless solutions, LAN networking requirements, Network security, Implementing wireless solutions, staging, documentation, security updates, Industry organizations, IEEE, compatibility and certification groups. Wireless network use cases Wireless BANs, Wireless PANs, Wireless LANs, Wireless MANs, Wireless WANs, Wireless sensor networks, New network driver-Internet of Things, IoT for industry (IIoT), IoT for connected vehicles, Residential environments, Retail, Education (K12), Higher education, Agriculture, Smart cities / Public access, Health care, Office buildings, Hospitality, Industry, Stadiums, arenas, and large public venues. Planning wireless solutions Identifying use cases and applications, common wireless requirements and constraints, performing a wireless system design, selecting and evaluating design parameters. RF communications RF wave characteristics, RF propagation behaviours, RF signal metrics, fundamentals of wireless modulation. other wireless carriers, common frequency bands. Radio frequency hardware Hardware levels, basic RF hardware components (circuit board level), RF link types (use category). RF device types. Mobile communications networks Mobile networks, LTE, 5G, Use cases. Short-range, low-rate, and low-power networks RF and speed, RF and range, RF and power, 802.11, 802.15.4, Bluetooth, LoRa (Long range) / LoRaWAN, ZigBee, 6LoWPAN, NB-IoT and LTE-M. Wireless sensor networks What is a Wireless Sensor Network (WSN)? WSN applications, Sensors and actuators, WSN architectures, Planning a WSN. Internet of Things (IoT) Internet of Things (IoT) defined, IoT history and its definition revisited, one more comment on the definition of IoT, IoT verticals, Oil & Gas, IoT structure/ architecture basics, IoT connected objects. Securing wireless networks Confidentiality, integrity and availability, Privacy, non-repudiation, authenticity & safety, Importance of authentication in wireless networks, Key cryptographic technologies & concepts, Authentication methods, Authorisation, OAuth 2.0 authorisation framework, monitoring. Troubleshooting wireless solutions Proper solutions design, designing and implementing wireless solutions, basic installation procedures, general configuration considerations, troubleshooting and remediation, troubleshoot common problems in wireless solutions. Programming, scripting and automation What is an API? categories of APIs, common API communication methods, choosing a language, why are we integrating systems? Application & integration architectures. Data structures & types, XML, YAML, API types.

CWISA Wireless IoT Solutions Administrator
Delivered in Internationally or OnlineFlexible Dates
£2,797

Complete JavaScript

5.0(3)

By Systems & Network Training

Complete JavaScript training course description A hands on course covering JavaScript programming. Core JavaScript is covered first, including the basics, arrays, functions, classes, modules and Regular expressions. Client side JavaScript is then covered including JavaScript in browsers, Scripting CSS, the jQuery library and HTML APIs. What will you learn Read JavaScript. Write JavaScript. Debug JavaScript. Complete JavaScript training course details Who will benefit: Anyone wishing to learn JavaScript. Prerequisites: None. Duration 3 days Complete JavaScript training course contents CORE JAVASCRIPT Lexical structure: Character set, comments, literals, identifiers, and reserved words, optional semicolons.. Types, values and variables: Numbers, text, boolean values, null and undefines, the global object, wrapper objects, immutable primitive values and mutable object references, type conversions, variable declaration, variable scope. Expressions and operators: Primary expressions, object and array initializers, function definition expressions, property access expressions, invocation expressions, object creation expressions, operator overview, arithmetic expressions, relational expressions, logical expressions, assignment expressions, evaluation expressions, miscellaneous operators. Statements: Expression statements, compound and empty statements, declaration statements, conditionals, loops, jumps, miscellaneous statements, summary of JavaScript statements. Objects: Creating objects, querying and setting properties, deleting properties, testing properties, enumerating properties, property getters and setters, property attributes, object attributes, serializing objects, object methods. Arrays: Creating arrays, reading and writing array elements, sparse arrays, array length, adding and deleting array elements, iterating arrays, multi-dimensional arrays, array methods, FCMAScript 5 array methods, array type, array-like objects, strings as arrays. Functions: Defining functions, invoking functions, function arguments and parameters, functions as values, functions as namespaces, closures, function properties, methods and constructor, functional programming. Classes and modules: Classes and prototypes, classes and constructors, Java-style classes in JavaScript, augmenting classes, classes and types, object oriented techniques in JavaScript, subclasses, classes in ECMAScript 5, modules. Pattern matching and regular expressions: Defining regular expressions, string methods for pattern matching, the RegExp object. JavaScript subsets and extensions: JavaScript subsets, constants and scoped variables, destructuring assignment, iteration, shorthand functions, multiple catch clauses, E4X: ECMAScript for XML. Server-side JavaScript: Scripting Java with Rhino, asynchronous I/O with node. CLIENT SIDE JAVASCRIPT JavaScript in web browsers: Client side JavaScript, embedding JavaScript in HTML, execution of JavaScript programs, compatibility and interoperability, accessibility, security, client side frameworks. The Window object: Timers, browser location and navigation, browsing history, browser screen information, dialog boxes, error handling, document elements as window properties, multiple windows and frames. Scripting Documents: Overview of the DOM, selecting document elements, document structure and traversal, attributes, element content, creating, inserting and deleting nodes. Example: generating a table of contents, document and element geometry and scrolling, HTML forms, other document features. Scripting CSS: Overview of CSS, important CSS properties, scripting inline styles, querying computed styles, scripting CSS classes, scripting stylesheets. Handling events: Types of events, registering event handlers, event handler invocation, document load events, mouse events, mousewheel events, drag and drop events, text events, keyboard events. Scripted HTTP: Using XMLHttpRequest, HTTP by <script>: JSOMP, Comet with server-sent events. The jQuery library: jQuery basics, jQuery getters and setters, altering document structure, handling events with jQuery, Animated effects, Ajax with jQuery, Utility functions, jQuery selectors and selection methods, Extending jQuery with plug-ins. The jQuery UI library. Client side storage: localStorage and sessionStorage, Cookies, IE usingData persistence, Applicatioin storage and offline webapps. Scripted media and graphics: Scripting images, Scripting audio and video, SCG:scalable vector graphics, Graphics in a <canvas>. Scripted HTTP: Using XMLHttpRequest, HTTP by <script>: JSOMP, Comet with server-sent events. The jQuery library: jQuery basics, jQuery getters and setters, altering document structure, handling events with jQuery, Animated effects, Ajax with jQuery, Utility functions, jQuery selectors and selection methods, Extending jQuery with plug-ins. The jQuery UI library. Client side storage: localStorage and sessionStorage, Cookies, IE usingData persistence, Applicatioin storage and offline webapps. Scripted media and graphics: Scripting images, Scripting audio and video, SCG:scalable vector graphics, Graphics in a <canvas>. HTMLS APIs: Geolocation, history management, cross-origin messaging, web workers, type arrays and ArrayBuffers, blobs, the filesystem API, client side databases, web sockets.

Complete JavaScript
Delivered in Internationally or OnlineFlexible Dates
£2,367

Essential RFID

5.0(3)

By Systems & Network Training

RFID training course description This training course focuses on the technologies used in Radio Frequency Identification (RFID). What will you learn Describe the RFID architecture. Design RFID systems. Evaluate tag types. Recognise common RFID problems. RFID training course details Who will benefit: RFID technologists and system engineers. Prerequisites: RF fundamentals. Duration 2 days RFID training course contents What is RFID? Review of RF basics, what is RFID, RFID history, RFID base system architecture, frequency bands used by RFID, comparison with barcodes. RFID applications Supply chain, asset tracking, theft reduction, retail, access control, tolls. Tags Tag features, types of tag, passive and active, chips, read only, read write, affixing tags, selecting location to affix a tag, tag orientation and location, tag stacking, impact of rate of movement, tag data formats. Interrogators/readers Interrogation zones, interrogator types, antennas, read distance tests, multiple interrogators, synchronisation, dense interrogator environment issues. RFID peripherals. Standards and regulations Global regulatory requirements, regional regulatory requirements, ISO, ETSI, FCC, EPC, safety regulations/issues. Testing and troubleshooting Read rate problems, improperly tagged items, tag failure. RFID system design Antenna types, interference, antenna location and spacing, how many antennas? How many interrogators? tag types, grounding considerations, cabling, site diagrams.

Essential RFID
Delivered in Internationally or OnlineFlexible Dates
£2,477

Definitive Tetra

5.0(3)

By Systems & Network Training

TETRA training course description This 2 day training course covers the network architecture required for TETRA. It also looks at the Air Interface, TETRA Functions and Procedures. What will you learn Describe the TETRA Architecture Describe the Air Interface Explain the TETRA Functions Explain the TETRA Procedures TETRA training course details Who will benefit: Anyone working with TETRA. Prerequisites: None. Duration 2 days TETRA training course contents Introduction History of PMR, ETSI development, Tetra function, Tetra markets, Tetra standards, Tetra supplier base, Tetra Release 1, Tetra Release 2. Network Architecture Mobile network Identity, Mobile stations, Base station, Switching & Management, Addresses & Identitie. Air Interface Modulation, TDMA Format, FD, Framin, Burst format, Traffic Channel TCH, Dedicated Channel DCC, Common Control Channel CCC, Signalling Channel SCH, Logical Control mapping LCM, Protocol stack, Voice coded. TETRA Functions Trunked mode operation, User hierarchies, Individual calling, Group calling, Supplementary services, Voice and Data, Data services, Direct mode operation, Tetra WAP, Circuit mode priorities, Circuit mode data, Packet mode data, Discrete and Ambient listening. Automatic vehicle locator. TETRA Procedures MS operational modes, Mobility management, Cell selection, Security & Authentication, Decryption options, Cell setup, Channel assignment, Network management - internal, Network management -external, PSTN Gateway, ISDN Gateway, Control Room Gateway.

Definitive Tetra
Delivered in Internationally or OnlineFlexible Dates
£2,477
123...9

Educators matching "History"

Show all 17
Slamfresh

slamfresh

London

At SlamFresh, we believe poetry can make a big difference to young people’s lives. But the need to create a nurturing and supportive environment in which to write has never been greater. Although the popularity of the art form, particularly spoken word, continues to grow on an unprecedented scale, last year, for the first time in our country’s history, poetry was nearly made an optional GCSE subject. As well as this, the recent closure of schools has meant that young people from lower economic backgrounds have been put at an even greater disadvantage than they already were. Cut off from schools, many of these young people simply have not had the space or resources to access creative opportunities, at a time when they need them more than ever. SlamFresh is a CIC based in the Newcastle upon Tyne which aims to address these problems. We run workshops that focus on the contemporary styles of spoken word and slam poetry, styles of writing which we have found can engage some of the most reluctant students. SlamFresh work in partnership with schools and community centres to mentor young people in writing, editing and performance. We have 3 company directors, Rowan McCabe, Michael MacDonald and Jeff Price. Rowan McCabe and Michael MacDonald (stage name Donald Jenkins) also serve as the two primary facilitators for the workshops, although guests may be brought in on a freelance basis where required. The directors met through their work as professional poets. Collectively, they have spent over 40 years working with children and young people.

Fidas Safeguarding Training

fidas safeguarding training

Durham

I am Dorothea Scales. I have founded Fidas Consent Training because I want to share my knowledge and experience of dealing with sexual assaults and rapes which I gained during my career as a Detective Sergeant. I have combined my passion for safeguarding with my enthusiasm for training – having an MA in education and being a qualified teacher gave me the skills set to develop and deliver my courses. Since leaving the Police in October 2021, I have already delivered to hundreds of students, pupils and their teachers, to Designated Safeguarding Leaders and University students, colleges, youth organisations, charities, and apprentices   I have combined my expertise as an ex-Detective Sergeant in Safeguarding and my experience as a teacher, to develop my completely unique consent workshops, presentations and now a cost effective eLearning package . I have trained Detectives, Police cadets and Police Special constables and probationers. I have developed courses for Police officers in dealing sensitively with victims of rape and confronting myths and misconceptions. I have lead  leading a Pilot project for Durham County Council in delivering consent workshops to local secondary schools.   Fidas Consent Training is about sharing my passion for safeguarding the truly vulnerable and giving every person an informed choice about consent.   As a qualified, experienced, and passionate safeguarding specialist, I have 16 years’ experience as a Police Officer, protecting the rights of children, young people, and adults. I have always been driven by making a positive difference to the vulnerable. During my time in education and the Police, I have developed additional skills in risk management, people leadership and managing the most complex investigations which demand a sensitive and compassionate response. Victim focused and people centred in my work, I championed change in the police and built strong alliances with partner organisations As a Detective Sergeant within the Safeguarding unit I dealt with victims and suspects of rape and sexual assaults on a daily basis, often from report to court. I know and understand all the devastating consequences of not understanding or ignoring consent and want to share my experience with young people for a better future. I am a qualified Teacher and Safeguarding instructor committed to sharing my experience and expertise through my training courses. I have proactively developed partnerships to increase my impact and have worked closely with Social Services (adult and children’s team), schools, colleges and universities, MIND, healthcare professionals, domestic abuse charities and refuges, RAPE Crisis and regional police forces, which gives the training I am offering a particular knowledge-based advantage.  During my time in the Police I undertook a study which demonstrated why specialist rape teams are the way forward for all around victim care and successful prosecutions.   My Qualifications: MA in History, Education and Italian University of Durham, PGSE – postgraduate degree in education- qualified teacher status, Level 3 and 4 in Policing, NVQ, Sexual Assault Liaison officer, Tier Three victim interview trained– Achieving best evidence in victim interviews (including children under the age of 8) ICIDP (qualified Detective) Serious and complex Interviewing victim, witnesses and suspects Detective tutor ABELS – achieving Best Evidence Language screen Promotion to Detective Sergeant (in Safeguarding) Custody Sergeant Trained in misconduct and complaints procedures Investigations into counter corruption Investigator into sudden childhood death Counter corruption development programme Safeguarding First Responder Judge’s commendation for victim care in sexual abuse Chief Superintendent’s commendation for victim care Investigator into sudden childhood death Trauma processing and Trauma resilience in Policing Ofqual certified First Aid Mental Health Instructor Level 3, Ofqual certified Principles of Safeguarding and Protecting children (RQF) Level 3 RSE certified