ICA Professional Postgraduate Diploma in Governance, Risk & Compliance This leadership programme has been designed to sharpen the strategic skills of senior managers and those aspiring to hold the highest compliance positions within an organisation. This expert qualification offers: Specialist knowledge - the highest level in the field Strategic thinking - helps your leadership ambitions Innovation - explores new ideas, best practice, and future developments from a global perspective Fellowship of ICA - become automatically eligible for the highest grade of membership Networking - grow with other like-minded, senior professionals. Join hundreds of senior compliance professionals from over 50 countries who unlocked their leadership potential and improved their career growth opportunities with this qualification. This course is awarded in association with Alliance Manchester Business School, the University of Manchester. How and where can you study The course takes 9-12 months to complete. It is a blend of online self-study, research, attendance at masterclasses and interaction with other like-minded, senior practitioners. Attendance at eight virtual masterclasses Seven virtual classrooms Oral assessment. Delivered online This course is delivered online with materials delivered for you to study in your own time and at your own pace. There will be eight 3-hour virtual masterclasses over four weekends and seven live virtual classrooms spread over the duration of the course. Certification Practitioners who successfully complete the programme will be certificated as follows: ICA Certified Professional designation awarded by the ICA Professional Postgraduate Diploma in Governance, Risk and Compliance awarded by ICA in association with University of Manchester Business School Fellowship of the ICA (upon application) Designation, ICA Professional Postgraduate Diploma in Governance, Risk and Compliance: PG Dip (G.R.C.) Fellowship of ICA:FICA [E.g. Angela Watts PG Dip (G.R.C.), Certified Professional; FICA] National Occupational Standards of Competence Your performance on the programme will be measured, against the National Occupational Standards of Competence (2011 version) produced originally by the Financial Services Skills Council (FSSC) and the ICA and revised recently by the Financial Skills Partnership. The Standards are statements of competence which articulate the requirements for effective performance in the workplace. Competence is defined as a combination of skills as well as knowledge and understanding. The syllabus covers a variety of key issues relevant at a senior level and is designed to provide an insight into risks and potential hurdles faced by your organisation. The syllabus is delivered by an exclusive series of high profile masterclasses covering relevant topics. Building and leading a world class compliance team Strategic risk management for leaders Behavioural compliance: the role of psychology in culture and ethical behaviour Keeping up with emerging regulatory developments Governance, risk and compliance in the digital world Applying governance, conduct and outcomes for the benefit of the organisation Leading change in governance, risk and compliance Financial crime risk in the digital age.
About this Training Course This 5 full-day course is aimed at engineers and supervisors who already have a basic understanding of well construction methods but who would benefit from a more detailed knowledge of completion design. The course will concentrate on the important aspects of completion design and what makes a safe and efficient well. A common thread of practical examples will be used throughout the course in the form of a case study or 'red-thread' exercise. The case study is based around data all taken from a single field where those attending will work through all the basic issues of a completion design. The exercises associated with the case study is performed in the student's own time after each of the formal sessions. However, at the start of the next day, the case study is reviewed and discussed. The whole case study will continue through all sessions, with each element being reviewed at the start of the next session. There is no 'right' answer to the exercise - producing interesting discussions! The purpose of the course is not to go over specific equipment in detail. Teaching methods include presentations, videos, and animations and the case study. The course will cover: Types and configurations of completions The completion design process Inflow performance, skin and formation damage Perforating; selection, deployment and interface with rest of completion Stimulation and impact on completion and flow performance with coverage of modern horizontal multifrac tools Open hole, non-sand control completions including open hole packers and horizontal well clean up Sand control; when do you need it, basic types and selection guidelines. Includes standalone screens, ICDs, various gravel packing techniques, frac packs and expandable screens Tubing sizing, flow estimation and liquid loading Artificial lift; types and selection criteria, interface with drilling, reservoir and facilities. Design of gas lift and ESPs included Production chemistry impacts on completion, prevention and removal (scales, wax, asphaltene, hydrates, and souring) Metallurgy, corrosion, and erosion; metal types and selection of Elastomers and plastics; types and selection of Tubing stress analysis; picking the grade and weight of tubing, plus selection criteria for packers and expansion devices. Interface between tubing stress analysis and casing design Completion equipment; basic types of equipment, reliability and selection criteria for each (tree, safety valve, mandrel, packers, expansion devices etc) Completion installation; importance of wellbore clean-out, function and types of brines, pointers for efficient completion installation Non-conventional wells; types and when / where to use them (multilaterals, smart (intelligent) wells and also SAGD, CO2 sequestration, CBM, etc) Training Objectives By the end of this course, the participants should be able to: Have a good understanding of the completion design process and what makes a good completion design Understand the importance of the installation process (completion running) in the design process Have an appreciation of new and developing completion techniques (intelligent wells) Target Audience This course will benefit engineers and field-based personnel such as completion supervisors and production engineers. It is also suitable for completion vendors, specialists such as chemists and subsurface personnel including geologists, reservoir engineers and petrophysicists. Trainer Your expert course leader has 30 years of oil and gas industry experience. A first class degree in geophysics and a master degree in Petroleum Engineering was a prelude to seven years with BP as a petroleum engineer. He left BP and following a short spell in Camco, jointly founded ICE Energy. After six years of completions and petroleum engineering consultancy and training, ICE Energy merged with TRACS International, where he continued with petroleum and completion engineering studies, leading integrated teams, and developing / delivering training courses for a variety of different clients in diverse world-wide locations. In the last five years, he is independent again - focusing on technical consulting and course delivery. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
Course Information Join us for a comprehensive refresher focusing on crucial Good Laboratory Practice (GLP) requirements, including an emphasis on data integrity, recent developments, and emerging trends gleaned from MHRA inspections. The programme dives into specific domains such as risk assessment, OECD guidance on sponsor influence, and the advisory from OECD on QA. Additionally, delegates can benefit from a dedicated GLP clinic, facilitating discussions on understanding and upholding GLP compliance. Is this course for you? This course is tailored for study directors, principal investigators, test facility management, and QA professionals seeking to refresh their knowledge and responsibilities within the GLP framework. Tutors Tutors will be comprised of (click the photos for biographies): Vanessa Grant -, - Tim Stiles Consultant, Qualogy Ltd Programme Please note timings may be subject to alteration. Day 1 09:00 Registration, Welcome and Introduction 09:20 Development of Good Laboratory Practice A reminder of the history of GLP, its current scope and application, with a synopsis of current UK, European and international standards. 09:50 Roles and Responsibilities of Study Director, Test Facility Management, Principal Investigator, Test Site Management, Study Staff and QA A reminder of the roles and responsibilities with regard to the GLP management and oversight of the Test Facility and the management and control of the study, as defined by GLP. 10:30 Break 10:45 Workshop 1 Workshop 1 Roles and responsibilities 11:15 Influence of Sponsors The published OECD Position Paper No. 21 regarding Possible Influence of Sponsors on conclusions of GLP Studies is reviewed and discussed. 11:45 Data Integrity The fundamentals of data integrity according to the OECD Guidance No. 22 on Data Integrity is discussed along with the responsibilities of Study Director, Test Facility Management, and study staff in ensuring the integrity of the GLP study data. 12:30 Lunch 13:15 Quality Assurance and GLP OECD Advisory No. 23 (Revision of OECD No.4)- A walk through of the changes to the OECD Guidance on the role and activities of Quality Assurance 13:45 Quality Improvement Tools and GLP The tools that might be considered for GLP and their role and operation when used in Test Facilities- OECD Position Paper No.24 published July 2022 14:15 Workshop 2 Workshop 2 Change control 14:30 Risk Assessment How should we assess risk and how can we use the process to assist in evaluation audit findings? 15:00 Break 15:15 Current hot topics in GLP Explore the current issues in Industry and trends /types of Regulatory inspection findings 15:50 GLP Clinic An opportunity to discuss any other issues regarding understanding and maintaining GLP Compliance. 16:30 Close of Course Extra Information Course Material This course will be run completely online. You will receive an email with a link to our online system, which will house your licensed course materials and access to the remote event. Please note this course will run in UK timezone. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course Access to an online course group to enhance networking. You will need a stable internet connection, a microphone and a webcam. CPD Points 7 Points Development Level Learn
Introducing Celebrity Therapist London Package: Discreet and Customized Counseling for Public Figures Are you a public figure seeking confidential and personalized counseling in London? Miss Date Doctor’s Celebrity Therapist London Package offers you discreet and specialized therapy services tailored to meet the unique needs and challenges faced by individuals in the public eye. Being a public figure can come with its own set of stressors and pressures. Our experienced celebrity therapists are dedicated to providing you with a safe and non-judgmental space to address personal concerns, manage stress, and find support for emotional well-being. Here’s how the Celebrity Therapist London Package can support you: Confidentiality: Our celebrity therapists are well-versed in maintaining confidentiality and respecting your privacy at all times. Specialized Support: We offer customized counseling, recognizing the specific challenges that public figures may encounter in their personal and professional lives. Emotional Regulation: Therapy can assist you in managing emotions related to public scrutiny, criticism, and constant attention. Stress Management: We’ll work on stress management techniques to help you navigate the demands of your public role. Coping Strategies: Our therapists will equip you with effective coping strategies to manage the unique stressors you may face. Balancing Personal and Professional Life: Therapy can help you find a balance between your personal life and the demands of your public career. Building Resilience: We’ll focus on developing resilience to handle the challenges of public life with strength and grace. Self-Care and Well-being: Our celebrity therapists emphasize self-care practices to support your emotional and mental well-being. The Celebrity Therapist London Package at Miss Date Doctor is designed to cater to your specific needs as a public figure, offering you a supportive and understanding space to navigate challenges and enhance your overall well-being. Invest in your emotional health and take the first step towards confidential support with the Celebrity Therapist London Package. Embrace the opportunity to receive specialized therapy services tailored to your unique experiences and demands as a public figure. Let our experienced celebrity therapists guide you towards greater emotional resilience, balance, and well-being. 6×1 hour sessions https://relationshipsmdd.com/product/celebrity-therapist-london-package/
Complete C# programming training course description This training course teaches developers the programming skills that are required for developers to create Windows applications using the C# language. Students review the basics of C# program structure, language syntax, and implementation details, and then consolidate their knowledge throughout the week as they build an application that incorporates several features of the .NET Framework. What will you learn Use the syntax and features of C#. Create and call methods, catch and handle exceptions, and describe the monitoring requirements of large-scale applications. Implement a typical desktop application. Create class, define and implement interfaces, and create and generic collections. Read and write data to/from files. Build a GUI using XAML. Complete C# programming training course details Who will benefit: Programmers wishing to learn C#. Prerequisites: Developers attending this course should already have gained some limited experience using C# to complete basic programming tasks. Duration 5 days Complete C# programming training course contents Review of C# Syntax Overview of Writing Applications using C#, Datatypes, Operators, and Expressions. C# Programming Language Constructs. Hands on Developing the Class Enrolment Application. Methods, exceptions and monitoring apps Creating and Invoking Methods. Creating Overloaded Methods and Using Optional and Output Parameters. Handling Exceptions. Monitoring Applications. Hands on Extending the Class Enrolment Application Functionality. Developing a graphical application Implementing Structs and Enums. Organizing Data into Collections. Handling Events. Hands on Writing the Grades Prototype Application. Classes and Type-safe collections Creating Classes. Defining and Implementing Interfaces. Implementing Type-safe Collections. Hands on Adding Data Validation and Type-safety to the Grades Application. Class hierarchy using Inheritance Class hierarchies. Extending .NET framework classes. Creating generic types. Hands on Refactoring common functionality into the User Class. Reading and writing local data Reading and Writing Files. Serializing and Deserializing Data. Performing I/O Using Streams. Hands on Generating the Grades Report. Accessing a Database Creating and using entity data models. Querying and updating data by using LINQ. Hands on Retrieving and modifying grade data. Accessing remote data Accessing data across the web and in the cloud. Hands on Modifying grade data in the Cloud. Designing the UI for a graphical applicatione Using XAML to design a User Interface. Binding controls to data. Styling a UI. Hands on Customizing Student Photographs and Styling the Application. Improving performance and responsiveness Implementing Multitasking by using tasks and Lambda Expressions. Performing operations asynchronously. Synchronizing concurrent data access. Hands on Improving the responsiveness and performance of the application. Integrating with unmanaged code Creating and using dynamic objects. Managing the Lifetime of objects and controlling unmanaged resources. Hands on Upgrading the grades report. Creating reusable types and assemblies Examining Object Metadata. Creating and Using Custom Attributes. Generating Managed Code. Versioning, Signing and Deploying Assemblies. Hands on Specifying the Data to Include in the Grades Report. Encrypting and Decrypting Data Implementing Symmetric Encryption. Implementing Asymmetric Encryption. Hands on Encrypting and Decrypting Grades Reports.
Never before have so many children been labelled with ADHD – not just labelled but also given powerful amphetamines as a ‘treatment’. ADHD is described as impacting on school-aged children and resulting in restlessness, impulsive actions, and lack of focus impairing their ability to learn properly. Course Category Behaviour and Relationships Meeting emotional needs Autism and Communication Description Never before have so many children been labelled with ADHD – not just labelled but also given powerful amphetamines as a ‘treatment’. ADHD is described as impacting on school-aged children and resulting in restlessness, impulsive actions, and lack of focus impairing their ability to learn properly. It is the most commonly studied and diagnosed psychiatric disorder in children, affecting about 3 to 5 percent of children globally and diagnosed in about 2 to 16 percent of school-aged children. 30 to 50 percent of those individuals diagnosed in childhood continue to have symptoms into adulthood. Adolescents and adults with ADHD tend to develop coping mechanisms to compensate for some or all of their impairments. ADHD is diagnosed two to four times more frequently in boys than in girls. ADHD management usually involves some combination of medications, Applied behaviour analysis (ABA, the new term for Behaviour modification), lifestyle changes, and counselling. ADHD and its diagnosis and treatment have been considered controversial since the 1970s. The controversies have involved clinicians, teachers, policy-makers, parents and the media. Topics include ADHD’s causes, and the use of stimulant medications in its treatment. So join us on a reflective, creative day where we look deeper at this whole area – seeing what we can learn from other areas that may help us in our understanding and inclusion of children and young people with this label Learning Objectives Increased confidence and understanding regarding ADHD labelled pupils and their inclusion in mainstream schools Access to a wider range of practical strategies to impact on movement and behaviour issues New skills and processes to strengthen the inclusion of young people with ADHD labels in all settings Opportunity to reflect and understand more deeply what might be happening in situations for someone labelled ADHD Who Is It For ? Any professional, carer or parent concerned with the education and inclusion of children labelled ADHD Course Content We will explore what is known about: Movement differences and accommodations for these – starting, stopping, switching, continuing, combining and so on… Anxiety and its link to activity levels Emotional roots to activity – the Circle of Courage will guide us
C++ training course description A hands on introduction to programming in the C++ language. The course concentrates on aspects that will be new to experienced C programmers and so is not suitable for those without C knowledge. What will you learn Write C++ programs Debug C++ programs. Examine existing code and determine its function. Use classes, function overloading, operator overloading, inheritance and virtual functions within C++ programs. C++ training course details Who will benefit: Programmers needing to write C++ code. Programmers needing to maintain C++ code. Prerequisites: C programming foundation. Duration 5 days C++ training course contents The origins of C++ C++ as a better C, C++ and Object Oriented Programming, encapsulation, polymorphism, inheritance. C++ standards. Getting started Simple C++ programs. Classes Basics, constructor and destructor functions, member and friend functions. Using objects. Default, copy and conversion constructors. A better C Arrays, pointers and references, new and delete. Improved safety with smart pointers, Resource Acquisition in Initialization (RAII). Functions in C++ Function overloading, default arguments, inline functions, Lambda functions. Templates Template classes and functions. Standard Library Containers, Iterators, algorithms, function objects. Operator overloading Basics, binary operators, the this pointer, relational operators, unary operators. Members versus friends. Inheritance Base class access control, protected members, multiple inheritance, virtual base classes. More I/O Manipulators, customising inserters, extractors. File I/O. Virtual functions Pointers to derived classes, run time polymorphism. Exception handling Throwing errors, trying code and catching errors.
Advanced C++ training course description The course will give a broad overview of the C++ Programming language, focusing on modern C++, up to C++17. This course will cover the use of the Standard Library, including containers, iterator, function objects and algorithms. From the perspective of application development, a number of design patterns will be considered. What will you learn Write C++ programs using the more esoteric language features. Utilise OO techniques to design C++ programs. Use the standard C++ library. Exploit advanced C++ techniques Advanced C++ training course details Who will benefit: Programmers needing to write C++ code. Programmers needing to maintain C++ code. Prerequisites: C++ programming foundation. Duration 5 days Advanced C++ training course contents Study of a string class Create a string class as a means to investigate many issues, involving the use of operator overloading and including overloading new and delete. Creation of the class will also require consideration of 'const correctness'. Exception handling Consider the issues involved in exception handling including the concept of exception safety. Templates Review definition of template functions, including template parameter type deduction. Introduction to template metaprogramming. Newer features including template template parameters and variadic templates. Creation of template classes. Design patterns Introduction to Design Patterns and consideration of a number of patterns, such as, factory method, builder, singleton and adapter. The standard C++ library (STL) Standard Library features, such as, Containers, Iterator, Function Objects and Algorithms. Introduction to Lambda expressions. C++ and performance The writing of code throughout the course will be oriented towards performant code, including use of R Value references and 'move' semantics. Pointers The use of pointers will be considered throughout the course. Smart pointers will be considered to improve program safety and help avoid the use of 'raw' pointers. Threading This section will consider the creation of threads and synchronisation issues. A number of synchronisation primitives will be considered. Async and the use of Atomic will also be considered. New ANSI C++ features Summarising some of the newer features to be considered are: Auto, Lambdas expression, smart pointers, variadic templates and folds, R Value references and tuple together with structured binding.
Python training course description This Python course focusses on teaching Python for use in network automation and network DevOps. We focus on getting delegates up and running with Python and network automation as quickly as possible rather than making them great programmers. In other words we concentrate on enabling delegates to use network automation libraries such as netmiko, NAPALM and Nornir, and APIs such as NETCONF and RESTCONF rather than enabling delegates to produce object oriented programs. Hands on sessions use Cisco and Juniper devices. What will you learn Run Python programs. Read Python programs. Write Python programs. Debug Python programs. Automate network tasks with Python programs. Configure network devices with Python. Collect data from network devices with Python. Python training course details Who will benefit: Network engineers. Prerequisites: TCP/IP Foundation Duration 5 days Python training course contents What is Python? Programming languages, Why Python? Python in interactive mode, Python scripts, ipython, Python version 2 versus version 3. A simple Python script. Comments. Hands on Installing Python, Hello world. A network example On box vs off box Python. telnet, ssh, NETCONF, HTTP, APIs, manufacturers and API support, analysis of a simple telnetlib program. Hands on Using Python to retrieve the configuration from a network device. Using wireshark to analyse the actions. Python basics I/O, operators, variables and assignment, types, indentation, loops and conditionals. Hands on Modifying the telnet program, changing configurations on a network devices. Functions, classes and methods What are functions, calling functions, builtin functions, useful builtin functions, file handling, classes, objects, creating instances. Hands on Storing configurations in files, configuring devices from files, using an inventory file to work on multiple devices. Libraries and modules Modules, files and packages, import, from-import, Python standard library, other packages, pip install, executing other programs. Managing python libraries. Hands on Using pip, installing and using ipaddress, subprocess to access netsnmp. For the more advanced, using the sockets library. Paramiko and netmiko SSH, enabling SSH on devices, keys. Paramiko versus netmiko, example scripts. pexpect. Hands on Configuring VLANs from Python. pySNMP Gathering facts using previous methods, SNMP review, pySNMP GET, pySNMP and SNMPv3. easySNMP library. Hands on Walking a MIB from Python. NETCONF What is NETCONF? Enabling NETCONF on devices, A first ncclient script, device handlers, get_config, edit_config, copy_config, delete_config, commit, validate, pyEZ, utils_config, utils.sw. Hands on Configuration using ncclient and PyEZ. This session is expanded for those interesting in JunOS automation. Manipulating configuration files Builtin functions, string handling. Unicode. Sequences, strings, lists, tuples. Dictionaries. TextFSM. Regular expressions. JSON, YAML, XML, YANG, Jinja2, templates. Hands on Jinja2 templating with Python to configure network devices. NAPALM Getters, configuration operations, supported devices, NAPALM transport, Config-replace, Config-merge, Compare config, Atomic changes, rollback. Example NAPLAM scripts. Hands on Using NAPALM to gather facts, Using NAPALM for configuration management REST and RESTCONF What is REST, HTTP methods, GET, POST, cURL, Postman, Python requests library. RESTCONF, a RESTCONF example. Hands on Modifying a configuration using RESTCONF. Scapy What is scapy, Scapy in interactive mode, Scapy as a module. Hands on Packet crafting from Python. Warning Errors and exceptions, Exception handling, try, except. Memory management. Garbage collection. Context management, With. Hands on Improving Python code. Nornir What is Nornir? A network automation framework, inventories, connection management and parallelization. Nornir architecture and other libraires. Hands on Setting up nornir, nornir fact gathering, nornir tasks. Optional Writing your own functions, Writing your own classes. pyntc. Hands on Writing reusable code.
Securing Linux systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure Linux accounts. Secure Linux file systems. Secure Linux access through the network. Securing Linux systems training course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing Linux systems training course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.