• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

21 Identity courses in Cardiff

Leadership Identity Through Self-Discovery

5.0(1)

By Puritas

This module focuses on developing leadership confidence through self-discovery, emphasising the importance of understanding one's unique leadership style and personal philosophy. Participants will explore their core identity as leaders and learn strategies to enhance their influence, credibility, and relationships within their organisation. Exploring the link between self-discovery and effective leadership, focusing on developing confidence to lead from within. Testimonial: “Without guidance, personal branding can quickly become an exercise in aspiration and competition; letting the carefully curated public personas of others dictate our own validity and definition of success. Clarity on who we truly are, what matters to us and therefore how we position ourselves in the world takes reflection and time. Rachael’s work in this area has inspired the nearly 100 delegates who have been part of our HR Leadership Academy over the past 8 years, and I have no doubt will continue to resonate with future cohorts.” MD, Nina Metson - Suffolk

Leadership Identity Through Self-Discovery
Delivered In-Person in Bishop Stortford + 9 more or UK WideFlexible Dates
£1,500 to £2,500

Total GSM

5.0(3)

By Systems & Network Training

GSM training course description GSM is in widespread use today. This seminar gives an comprehensive overview of GSM. What will you learn Explain what GSM is. Describe the architecture of the GSM network. Describe the GSM protocol stack. GSM training course details Who will benefit: Anyone who needs to know more about GSM. Prerequisites: Telecommunications Introduction Duration 2 days GSM training course contents Introduction History of GSM, analogue networks, digital networks, PCS1900. GSM services Telephony, digital encoding, data rates, Group 3 fax, SMS, Supplementary services. GSM architecture Mobile station Mobile Equipment (ME), Subscriber Identity Module (SIM). Base Station Subsystem Base Transceiver Station (BTS), Base Station Controller (BSC). Network Subsystem Mobile Services Switching Centre (MSC), Home Location Register (HLR), Visitor Location Register (VLR), Equipment Identity Register (EIR), Visitor Location register (VLR), Authentication Centre (AuC) Radio Link Aspects Bands, FDMA, TDMA, Traffic channels, Control channels, Speech coding, Channel coding and modulation, Multipath equalisation, Frequency hopping. GSM signalling SS7 overview, GSM SS7 nodes, Base Station Subsystem Application Part (BSSAP), Transaction Capabilities Application Part (TCAP), Mobile Application Part (MAP). Interfaces Um, Abis and A interfaces. Mobility and call processing in GSM Attach & location update process, mobile originate, mobile termination, handovers. GSM services Tele services, Bearer services, supplementary services, SMS, security. GSM futures GPRS, UMTS.

Total GSM
Delivered in Internationally or OnlineFlexible Dates
£2,477

Voice over LTE

5.0(3)

By Systems & Network Training

Voice over LTE training course description This course provides a basic understanding of the 3G LTE Air Interface, SAE, as well as Voice over LTE options and LTE Advanced features. Investigating the standards for the EPS , formulated by the 3GPP standards body, the course will set out to examine and explain the 4G environment from user equipment to border gateway and beyond. This course will ensure the delegate has a grasp of all aspects of the current global deployments, the next steps in upgrades and the promise of things to come. What will you learn Describe the complete EPC architecture. Explain the use of QoS within the air interface & core network. Explore the features of LTE advanced. Describe the various methods of supporting voice services with 3G LTE. Describe IMS structure and control entities. Explain an IMS session. Voice over LTE training course details Who will benefit: Any engineers who are assisting in the deployment of voice services within their LTE networks. Prerequisites: Intro to Data comms & networking Telecommunications Introduction Duration 3 days Voice over LTE training course contents 3GPP standards body Release 8 - Release 12, Supported and expected features. The EPC revisited EPC revisited 3G LTE & EPC Architecture, NB, MME, SGW, PDNGW, PCRF, Interworking capabilities, Protocol stack explored, NAS signalling, Default EPS bearer, Slot allocation algorithms, Scheduling algorithms, Quality of Service requirements, Dedicated EPS bearers. VoLTE deployment strategies Common networks everywhere, GSM/WCDMA view, CDMA view. VoLTE system architecture LTE radio, LTE Radio background, LTE radio architecture, Evolved packet core, EPC entities & functions, EPS mobility management, MS entities, Home subscriber server, Policy & charging rules function. VoLTE functionality Radio functionality, Bearers & schedulers, Mobility, Circuit switched fall back handover, Mobility from 2G/3G back to LTE, Power Saving Features, Positioning services, UE radio access capabilities for VoLTE users. EPC functionalities, LTE subscriber identification, PDN connectivity establishment, EPS dedicated bearer setup, IMS identification, IP multimedia identification module, Public user identity, Private user identity, Relationship between public & private identity, identification of users device, identification of network entities, identification of services, identification without ISIM. IMS service provisioning, Enforcement of allowed services, Service triggering information, Selection of the AS, AS behaviour, Service provisioning in action. VoLTE end-to-end & signalling VoLTE subscription & device configuration. EPS attach for CSFB/IMS VoIP & default bearer. IMS registration, Constructing the REGISTER request, From UE to P-CSCF, From P-CSCF to I-CSCF, From I-CSCF to S-CSCF, S-CSCF challenges the UE, UE's response to the challenge, Registration at the S-CSCF, The 200 OK response, Third-party registration to application servers, Subscription to registration event package, Re-registration & re-authentication, De-registration, Related standards. IMS VoIP session, Constructing the INVITE request, Routing, Media negotiation, Media resource reservation & policy control, Charging, Session release. Voice continuity, PS - PS intersystem handover, Single radio voice call continuity. IMS emergency session, PDN Connection setup for emergency session, Emergency registration, Emergency session. CS fallback for EPS call case, Architecture of CS fallback in EPS, Description of SGs interface, Idle mode signalling reduction, Idle mode vs active mode, CS fallback attachment, Mobile originating call using CSFB, Mobile terminating call using CSFB, Call unrelated CSFB procedures, Mobile terminating roaming retry & forwarding. VoLTE Messaging, Native IMS messages, SMS interworking, Multimedia messaging service. Unstructured supplementary services data simulation in IMS. IMS services VoLTE radio performance Coverage, Latency, Capacity. LTE advanced features Carrier aggregation, Coordinated mMulti-point Operation (CoMP), ICIC & eICIC, Relay node deployment & donor eNBs, Improved cell edge coverage, Reduced control plane latency, Heterogeneous networks, HeNB, security gateways, HeNB gateways.

Voice over LTE
Delivered in Internationally or OnlineFlexible Dates
£2,367

Strategic Brand Management

5.0(10)

By GBA Corporate

Overview Objectives Define brands and understand the opportunities and challenges facing them in highly competitive business landscapes Plan and craft a powerful brand positioning statement that reflects the brand's promise and the expectations of their most valued customers Build a strategic brand and track its growth and sustainability using researched processes Explore the elements of brand equity and the constituents of brand identity to build consistent and sustainable brands Identify various brand strategies to come up with sound actions aligned with the status of existing and new markets and products Master the process for conducting a full brand audit to evaluate brand performance and take remedial actions

Strategic Brand Management
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Windows server 2019 administration

5.0(3)

By Systems & Network Training

Windows server 2019 administration course description This five-day instructor-led course is designed primarily for IT professionals who have some experience with Windows Server. It is designed for professionals who will be responsible for managing identity, networking, storage and compute by using Windows Server 2019, and who need to understand the scenarios, requirements, and options that are available and applicable to Windows Server 2019. The course teaches IT professionals the fundamental administration skills required to deploy and support Windows Server 2019 in most organizations. What will you learn Administrate Windows Server 2019. Configure file servers and storage. Manage Hyper-V virtualization and containers. Implement HA and disaster recovery solutions. Implement service monitoring and performance monitoring, and apply troubleshooting. Perform upgrades and migration related to AD DS, and storage. Windows server 2019 administration course details Who will benefit: Technical staff working with Windows server 2019. Prerequisites: TCP/IP foundation for engineers. Some Windows experience. Duration 5 days Windows server 2019 administration course contents Windows server administration overview Windows server administration principles and tools, Introducing Windows Server 2019, Windows Server Core Overview. Lab: Deploying and configuring Server Core, Implementing and using remote server administration. Identity Services in Windows server AD DS, Windows Server domain controllers, Azure AD, Group Policy, Active Directory Certificate Services. Lab: Deploying a new domain controller on Server Core, Configuring Group Policy, Deploying and using certificate services. Network Infrastructure services in Windows server DHCP, DNS services, IPAM. Lab: Deploying and configuring DHCP, Deploying and configuring DNS. File Servers and Storage management Volumes and file systems, sharing in Windows Server, Storage Spaces in Windows Server, Data Deduplication, Iscsi, Distributed File System. Lab: Implementing Data Deduplication, Configuring iSCSI storage, Configuring redundant storage spaces, Implementing Storage Spaces Direct. Hyper-V virtualization and containers Hyper-V in Windows Server, Configuring VMs, Securing virtualization in Windows Server, Containers in Windows Server, Overview of Kubernetes. Lab: Creating and configuring VMs, Installing and configuring containers. High Availability in Windows Server Planning for failover clustering implementation, Creating and configuring failover cluster, stretch clusters, High availability and disaster recovery solutions with Hyper-V VMs. Lab: Configuring iSCSI storage, Configuring a failover cluster, Deploying and configuring a highly available file server, Validating the highly available file server deployment. Disaster recovery in Windows Server Hyper-V Replica, Backup and restore infrastructure in Windows Server. Lab: Implementing Hyper-V Replica, Implementing backup and restore with Windows Server Backup. Windows Server security Credentials and privileged access protection, Hardening Windows Server, Just Enough Administration in Windows Server, Securing and analyzing SMB traffic, Windows Server update management. Lab: Configuring Windows Defender Credential Guard, Locating problematic accounts, Implementing LAPS. Remote Desktop Services in Windows Server Remote Desktop Services, session-based desktop deployment, personal and pooled virtual desktops. Lab: Implementing RDS, Configuring RemoteApp collection settings, Configuring a virtual desktop template. Remote access and web services in Windows Server Overview of RAS in Windows Server, Implementing VPNs, Implementing NPS, Implementing Always On VPN, Implementing Web Server in Windows Server. Lab: Implementing Web Application Proxy, Implementing VPN in Windows Server, Deploying and Configuring Web Server. Monitoring, performance, and troubleshooting Windows Server monitoring tools, Performance Monitor, Monitoring event logs for troubleshooting. Lab: Establishing a performance baseline, Identifying the source of a performance problem, Viewing and configuring centralized event logs, Identifying the source of a performance problem, Describe monitoring tools and performance monitoring in Windows Server, Describe event logging and perform event logging monitoring for troubleshooting purposes. Upgrade and migration in Windows Server AD DS migration, Storage Migration Service, Windows Server migration tools. Lab: Selecting a process to migrate server workloads, Planning how to migrate files by using Storage Migration Service.

Windows server 2019 administration
Delivered in Internationally or OnlineFlexible Dates
£2,797

Definitive Tetra

5.0(3)

By Systems & Network Training

TETRA training course description This 2 day training course covers the network architecture required for TETRA. It also looks at the Air Interface, TETRA Functions and Procedures. What will you learn Describe the TETRA Architecture Describe the Air Interface Explain the TETRA Functions Explain the TETRA Procedures TETRA training course details Who will benefit: Anyone working with TETRA. Prerequisites: None. Duration 2 days TETRA training course contents Introduction History of PMR, ETSI development, Tetra function, Tetra markets, Tetra standards, Tetra supplier base, Tetra Release 1, Tetra Release 2. Network Architecture Mobile network Identity, Mobile stations, Base station, Switching & Management, Addresses & Identitie. Air Interface Modulation, TDMA Format, FD, Framin, Burst format, Traffic Channel TCH, Dedicated Channel DCC, Common Control Channel CCC, Signalling Channel SCH, Logical Control mapping LCM, Protocol stack, Voice coded. TETRA Functions Trunked mode operation, User hierarchies, Individual calling, Group calling, Supplementary services, Voice and Data, Data services, Direct mode operation, Tetra WAP, Circuit mode priorities, Circuit mode data, Packet mode data, Discrete and Ambient listening. Automatic vehicle locator. TETRA Procedures MS operational modes, Mobility management, Cell selection, Security & Authentication, Decryption options, Cell setup, Channel assignment, Network management - internal, Network management -external, PSTN Gateway, ISDN Gateway, Control Room Gateway.

Definitive Tetra
Delivered in Internationally or OnlineFlexible Dates
£2,477

Cloud deployment

5.0(3)

By Systems & Network Training

Cloud deployment training course description This course covers the important topics every cloud professional needs, including, configuration and deployment, security, maintenance, management, and troubleshooting. It covers all aspects of cloud computing infrastructure and administration, with a practical focus on real-world skills. It will help you to master the fundamental concepts, terminology, and characteristics of cloud computing. Deploy and implement cloud solutions, manage the infrastructure, and monitor performance. You will also be able to install, configure, and manage virtual machines. What will you learn Cloud services, models, and characteristics. Virtualization components, installation, and configuration. Infrastructure configurations and optimization. Resource management and specific allocations. IT security concepts, tools, and best practices. Recovery, availability and continuity in the cloud. Cloud deployment training course details Who will benefit: IT professionals looking to deploy and implement cloud solutions, manage the infrastructure, and monitor performance, Install, configure, and manage virtual machines. Prerequisites: Introduction to virtualization. Duration 5 days Cloud deployment training course contents Preparing to Deploy Cloud Solutions Deploying a Pilot Project Testing Pilot Project Deployments Designing a Secure and Compliant Cloud Infrastructure Designing and Implementing a Secure Cloud Environment Planning Identity and Access Management for Cloud Deployments Determining CPU and Memory Sizing for Cloud Deployments Determining Storage Requirements for Cloud Deployments Analysing Workload Characteristics to Ensure Successful Migration Maintaining Cloud Systems Implementing Backup, Restore, Disaster Recovery, and Business Continuity Measures Analysing Cloud Systems for Performance Analysing Cloud Systems for Anomalies and Growth Forecasting Troubleshooting Deployment, Capacity, Automation, and Orchestration Issues Troubleshooting Connectivity Issues Troubleshooting Security Issues

Cloud deployment
Delivered in Internationally or OnlineFlexible Dates
£2,797

Leadership Professional - Intermediate Programme

By Mpi Learning - Professional Learning And Development Provider

Five half-day Leadership modules with mini work placed projects to bring the learning into action in the workplace.

Leadership Professional - Intermediate Programme
Delivered in Loughborough or UK Wide or OnlineFlexible Dates
£1,995

Penetration testing and Ethical Hacking

5.0(3)

By Systems & Network Training

Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.

Penetration testing and Ethical Hacking
Delivered in Internationally or OnlineFlexible Dates
£4,997

Total SNMP for engineers

5.0(3)

By Systems & Network Training

SNMP training course description A hands-on generic look at the technical operation of SNMP. The course starts with an overview of all the components, which make up SNMP. Hands on starts early with configuration of a managed network. The major versions of SNMP are then put into perspective followed by a look at the SNMP protocol. MIBs are then studied both from the perspective of reading MIBs and writing MIBs. The course finishes with a look at the security implications of SNMP. What will you learn Describe the SNMP architecture. Analyse SNMP packets. Recognise the MIB structure. Describe the SMI. Recognise the strengths and weaknesses of SNMPv2 and SNMPv3. SNMP training course details Who will benefit: Network administrators. Network operators. Programmers writing MIBs and agents. Prerequisites: TCP/IP Foundation for engineers Hands on experience of an SNMP management station would also be beneficial. Duration 3 days SNMP training course contents Network management What is network management? Benefits, issues. What is SNMP? SNMP architecture, SNMP MIBs, SMI, the SNMP protocol, polling security, alternatives to SNMP: CMIP, web based management. Configuring SNMP Auto discovery for management stations, NMS configuration, agent configuration, traps. Hands on Configuring agents and an NMS. SNMP background SNMP history, RFCs, standards, SNMP protocol versions, SNMPv1, SNMPv2, SNMPv3, SNMP SMI versions, which version should you use? Futures. SNMPv1 packets SNMP in the 7 layer model, port numbers, general packet format, BER, GET, GET-NEXT, tables, SET, TRAP, bandwidth issues, in band versus out of band management. Hands on Analysing SNMPv1 packets. SNMPv2 packets SNMPv2 improvements, error handling, GETBULK, v2traps, INFORM. Hands on Analysing SNMPv2 packets. SNMPv3 packets SNMPv3 packet format, use of SNMPv2 messages, REPORT PDU. MIB structure The internet MIB branch, standard mib-2, extra parts of mib-2, private enterprise MIBs, loading extra MIBs. Hands on MIB browsing. mib-2 The mib-2 groups, system group, interfaces group, IP group, ICMP group, TCP group, UDP group, transmission group, SNMP group, RMON. Hands on mib-2 browsing in detail. SMI The MIB layout, obtaining a private enterprise number, MIB definitions, IMPORT, Module identity, Textual conventions, object definitions, notifications, compliance statements, object groups, base SMI data types, application data types, scalars, instances, tables, table definition, writing agents, SMIng. SNMP security Community strings, SNMPv1 and SNMPv2c security practices, SNMPv3 security, SNMPv3 architecture, SNMP applications, the SNMP engine, the EngineID, security fields in SNMPv3 packets, USM, authentication, encryption, timeliness, VBAC, SNMPv3 configuration.

Total SNMP for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,367

Educators matching "Identity"

Show all 1
Graduate School for Interdisciplinary Studies

graduate school for interdisciplinary studies

9LB,

Discover your subject from a truly interdisciplinary perspective with the Graduate School for Interdisciplinary Studies. Interdisciplinary study Graduate School degrees use ideas from different disciplines to give students a more rounded understanding of their subject. Learning across subject boundaries Interdisciplinary learning is at the heart of the Graduate School. Core modules on Graduate School degrees use themed seminars led by subject experts from across the University. Students consider their subject from different disciplinary perspectives, developing an interdisciplinary understanding. This approach also enables students to show skills such as flexibility and creativity. Optional modules allow students to further develop the interdisciplinary character of their studies. In the end of degree project students explore a topic in depth. The project can also be interdisciplinary in scope and may have an applied character. On most degrees, students have a choice in how to present the project. This might be as a dissertation or in more applied format - such as a policy report or multi-media portfolio. Academic and personal skills Graduate School Masters degrees help students develop advanced subject knowledge and research skills. Students also develop skills in: critical thinking and creativity analysis and appraisal problem solving and decision making personal leadership and project management interpersonal communication and team working Core modules have an integrated skills development programme. The skills development programme connects academic learning with the development of professional skills. The skills development programme has three parts. Study support sessions prepare students for postgraduate study. Career support sessions help students look beyond their degree. Experiential sessions address real social justice problems faced by partner organisations. Community The Graduate School is a vibrant, stimulating postgraduate community. Graduate School events bring students together and help foster interdisciplinary identity. Students make social and intellectual connections within and across their Masters degree groups. St Leonard's Postgraduate College The University postgraduate community, St Leonard’s Postgraduate College, welcomes Graduate School students. St Leonard's Postgraduate College hosts networking and training events for all postgraduates. Through these Graduate School students can make connections with postgraduates from other schools. Postgraduate Society St Leonard’s Postgraduate College works closely with the Postgraduate Society. The Postgraduate Society is one of the Students’ Association's most active societies. All Masters students are welcome into the Postgraduate Society. The Postgraduate Society organises events for postgraduates. These include beach bonfires, day trips around Scotland, pub nights, and graduation balls. History and location The Graduate School for Interdisciplinary Studies welcomed its first students in 2018. The Graduate School now welcomes students from around the world. In 2020 more than 90 students joined Graduate School MSc and MLitt degrees. Since 2021, the Graduate School has been based in the Old Burgh School. The Old Burgh School has office, teaching, and study space for the Graduate School. It is also home to the University’s postgraduate study centre. Graduate School Meeting Room The Graduate School Meeting Room situated at the Old Burgh School is available to be booked by staff and postgraduate students Monday-Friday between 9am-6pm. The room has a capacity of 6 (current covid occupancy) and is equipped with a projector and screen. There is kitchen facilities directly adjacent. Staff can book directly via our online room booking system. For student room bookings, please email gradschool@st-andrews.ac.uk. Priority will be given to bookings related to Graduate School or Postgraduate St Leonards College activities. Please note, this room should not be booked by students as an additional study space.