• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2468 Courses in Bideford

Hardening Cisco Devices

5.0(3)

By Systems & Network Training

Hardening Cisco devices training course description A hands on course focusing on how to lock down Cisco IOS routers and switches. What will you learn Harden Cisco devices. Hardening Cisco devices training course details Who will benefit: Technical network staff. Technical security staff. Prerequisites: TCP/IP foundation for engineers. Duration 5 days Hardening Cisco devices training course content Introduction Router security, Switch security, Cisco IOS, IOS versions, Cisco advisories, the management plane, control plane, data plane. Hands on Checking IOS versions and advisories. Access control Infrastructure ACLs, Transit ACLs. Hands on Restricting access to the device, Filtering data traffic. Management plane: Securing operations Passwords, privilege levels, AAA, TACACS+, RADIUS. Hands on Password management. Management plane: Other general hardening Logging best practices, secure protocols, encrypting management sessions, configuration management. Hands on Hardening the management plane. Control plane Disabling reception and transmission of certain messages, Limiting CPU impact of control plane traffic, securing routing protocols. Hands on Hardening the control plane. Data plane Transit ACLs, disabling unused services, disabling unnecessary protocols, anti spoofing, limiting CPU impact of data plane traffic, identifying and tracing traffic, Netflow, VLANs, port security. Hands on hardening the data plane.

Hardening Cisco Devices
Delivered in Internationally or OnlineFlexible Dates
£2,477

Total H.248 for Engineers

5.0(3)

By Systems & Network Training

Total H.248 training course description A course focusing purely on the H.248 protocol. Anyone working through the ITU standards documents can testify to the need of a training course to explain how H.248 really works. This course already assumes knowledge of other VoIP protocols and starts by positioning H.248 in relation to the other protocols. The course then looks at H.248 architectures and concepts before analysing H.248 messages and call flows. What will you learn Describe what H.248 is Recognise where H.248 fits in relation to other VoIP protocols. Explain how H.248 works. Analyse H.248 packets Total H.248 training course details Who will benefit: Technical staff working with H.248 Prerequisites: Voice Over IP. Duration 2 days Total H.248 training course contents What is H.248? Review of VoIP protocols: RTP, RTCP, SIP, SDP, H.323. The PSTN and SS7. Where H.248 fits into the picture. H.248 history. MGCP. The IETF. Megaco. ITU standards. H.248v1, v2, v3. H.248 architectures Media Gateways, Media Gateway Controllers, Gateway Control functions, Signalling Gateways. Reference architectures: IMS/TISPAN: IBCF, IWF, I-BGF, SPDF. MSF: S-SBG-NC, D-SBG-NC. GSMA: IPX Proxy. Softswitches. H.248 concepts The connection model, terminations, streams, contexts. Termination properties: descriptors, context properties. Events, signals, packages. H.248 messages Protocol stack, UDP, TCP. Message structure. Transactions, actions, commands. Requests, replies, acknowledgements. Sample message flows. Binary encoding, ASN syntax, Text encoding. H.248 commands Termination manipulation: Add, Subtract, Move, Modify. Event reporting: Notify. Management: AuditCapability, AuditValue, ServiceChange. H.248 Descriptors What are descriptors? Relationship with messages and commands. Basic descriptors, Descriptors composed of other descriptors. The 19 descriptors. Defaults. H.248 Transactions Groups of commands, transaction Ids, relationship with actions and commands. Requests and replies. H.248 wrap up What is a package? Basic packages. H.248 security. H.248 - SIP interoperation. H.248 interoperation with other protocols.

Total H.248 for Engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

3G demystified

5.0(3)

By Systems & Network Training

3G training course description This course is designed to give the delegate an understanding of the technologies used within a 3G UMTS mobile network. During the course we will investigate the UMTS air interface and the use of Wideband-Code Division Multiple Access (WCDMA) to facilitate high speed data access, together with HSPA to offer mobile broadband services. We will describe the use of soft handover rather than hard handover procedures and soft capacity sharing. The course includes a brief exploration of the UMTS protocol stack and the use of PDP Context and QoS support features. What will you learn Explain the 3G UMTS architecture. Describe the role of a Drifting & Serving RNC. Explain the use of ARQ & HARQ for mobile broadband. Describe how IMS integrates into the architecture. Describe the use of Media Gateway Controllers. Identify the temporary identities used within 3G UMTS. 3G training course details Who will benefit: Anyone working within the telecommunications area, especially within the mobile environment. Prerequisites: Mobile communications demystified Telecommunications Introduction Duration 2 days 3G training course contents D3GPP specifications 3GPP standards body, Evolution path, Frequency and bandwidth, Conceptual model, UMTS general architecture, UTRAN architecture & radio access bearer. CDMA principles CDMA principle, Code characteristics, Code requirements. CDMA requirements Synchronization, Power control, Soft handover, Rake receiver, Antenna consideration, Multi-user detection. Radio interface protocol architecture Access stratum & non-access stratum, Overall protocol structure, Logical and transport channels, Physical channels, Protocol termination. Layer 2 Protocols Medium Access Control (MAC) Protocol, Radio Link Control (RLC) Protocol, Packet Data Convergence Protocol (PDCP) protocol, Radio Interface for Broadcast/Multicast Services. Radio Resource Control (RRC) Protocol RRC Architecture, RRC Protocol State, Broadcast of information, RRC connection management, Radio bearer management, RRC connection mobility functions, Power control, Ciphering and Integrity. Mobile procedures Mobility management states and transitions, UMTS identities, Procedures in Idle mode (location updates, cell selection/ re-selection), Circuit-switched call set-up, Packet-switched context activation and context preservation, Data transfer initialization, Soft-handover procedure. Introduction to HSPA The need for high speed data, Fast HARQ, Improved scheduling, Additional channels, Soft combining, HS-DSCH codes, Uplink HSPA vs downlink HSPA, Full HSPA, Use of MIMO, Enhanced CELL_FACH.

3G demystified
Delivered in Internationally or OnlineFlexible Dates
£2,477

HP iMC for engineers

5.0(3)

By Systems & Network Training

HP iMC for engineers training course description A hands on course focusing on network management using HP iMC on Microsoft Windows or UNIX. What will you learn Describe the network management architecture. Use HP NNMi. Diagnose faults using HP iMC. Recognise the MIB structure. HP iMC for engineers training course details Who will benefit: Network administrators. Network operators Those wishing to find out more about how their NMS works Anyone wishing to implement NFV using OpenStack. Prerequisites: Introduction to Virtualization Duration 2 day HP iMC for engineers training course content Network management What is network management? Benefits, issues. Getting started with HP iMC Starting HP iMC, IP discovery, IP monitoring, controlling IP discovery. Hands on Initial HP iMC configuration. Using HP iMC Viewing devices, Device view, IP view, network view, polling. Hands on Using HP iMC. Agents Configuring Cisco devices for SNMP support, communities, traps, syslog. Hands on Configuring network devices for HP iMC. Parts of SNMP SNMP architecture, MIBs, The protocol. HP iMC SNMP configuration. Hands on HP iMC SNMP configuration. MIBs The MIB2 groups, additional MIBs, MIB compilers, vendor MIBs. HP iMC MIB loader and browser. Hands on MIB browsing. Monitoring devices Polling, obtaining MIB information. Hands on HP iMC performance management. Configuration and change management Configuration templates, software library, configuration compare, configuration audit and reports. Hands on Using the configuration center. Reports Report templates, Real time reports, scheduling reports. Hands on Using real time reports. HP iMC fault management Alarms, polling, fault management, setting thresholds and configuring traps. Syslog. Hands on Working with alarms. Security alarms.

HP iMC for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

Definitive Kerberos for engineers

5.0(3)

By Systems & Network Training

Kerberos for engineers training course description This hands on course covers the details of Kerberos, from installation and administration through to how it all works including the protocols. What will you learn Describe what Kerberos is. Explain how Kerberos works. Install Kerberos. Configure Kerberos. Troubleshoot Kerberos. Kerberos for engineers training course details Who will benefit: Engineers interested in security. Prerequisites: TCP/IP foundation for engineers Duration 2 days Kerberos for engineers training course contents What is Kerberos? Single Sign On, The protocol, the standard, history, v4, v5, RFCs, Linux, Windows. Kerberos concepts and technology AAA, Authentication, Authorization, Accounting. Kerberos vs LDAP and directories. Privacy, integrity. Kerberos realms, principles, instances. Keys, salts, passwords. Key Distribution Centre, Authentication server, ticket granting server. Tickets. Installation and administration of Kerberos Installing Kerberos, creating realms, testing. DNS and Kerberos, Kerberos clients. Hands on Windows and Linux Kerberos. Kerberos protocols The Needham-Schroeder protocol, Kerberos v4. Authentication server, ticket granting server, Kerberos v5, encryption options, ticket options, other protocol features and extensions. Related protocols: GSSAPI, SPNEGO. Hands on Using Wireshark to 'see' Kerberos. Troubleshooting Kerberos Approach, debugging tools, errors and solutions. Hands on Kerberos troubleshooting. Kerberos security concerns Kerberos attacks, protocol security issues. Dictionary attacks, brute force attacks, replay attacks, MITM attacks, security solutions, protecting the KDC, firewalls, NAT and Kerberos. Hands on Kerberos logging. Software which uses Kerberos Kerberos logins, Kerberos and web based applications, Directory services. Advanced Kerberos issues Cross realm authentication, Windows issues, Windows and UNIX interoperability, Hands on Using a Windows DC for UNIX clients.

Definitive Kerberos for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

Essential Bluetooth

5.0(3)

By Systems & Network Training

Bluetooth training course description Bluetooth is used by many kids these days but is probably under-utilised in business environments. This hands on training course provides an overview of what Bluetooth is, how it works, what it can be used for and how to configure it on different devices. What will you learn Explain what Bluetooth is. Describe the Bluetooth protocol stack. Recognise the applications of Bluetooth. Configure Bluetooth. Bluetooth training course details Who will benefit: Anyone who needs to know more about Bluetooth. Prerequisites: None. Duration 2 days Bluetooth training course contents Classic Bluetooth Bluetooth overview Basics, standards, competing technologies. Bluetooth radio RF bands, power losses, frequency hopping. Bluetooth modulation PSK, DPSK, DPQSK. Bluetooth data transfer FH, TDD, FDMA, ACL, SCO, Bluetooth packets. Making connections Piconets, Scatternets, Pairing The protocol stack Baseband, Link Manager, L2CAP, SDP, GAP, RFCOMM. Profiles FTP, DUN, LAN, Synch, HDP, GOEP/OBEX etc. Security Authentication, authorisation, encryption, risks. Bluetooth Low Energy Introduction Bluetooth Smart and Bluetooth Smart Ready. BLE device types Design goals, terminology and core concepts. BLE usage models Presence detection, data broadcasting connectionless models, gateways. BLE architecture Controller, host, applications and stack splits. BLE protocol stack Link layer, HCI, L2CAP. BLE profiles GAP roles, models, procedures, security modes, data advertising. BLE security Pairing, bonding, data signing BLE applications Devices, services, profiles, peripherals

Essential Bluetooth
Delivered in Internationally or OnlineFlexible Dates
£2,477

XSLT training course description This course has been designed as a follow on course for the XML primer course. The course looks at the use of XSLT in the transforming and styling XML documents. What will you learn Transform and style XML documents using XSLT. XSLT training course details Who will benefit: Anyone working with XSLT. Prerequisites: XML primer Duration 2 days XSLT training course contents Introduction Extensible Stylesheet Language (XSL), transforming and formatting XML. XML refresher The basic rules for building an XML document. An introduction to XSLT The basic concepts of XSLT, xsl:output, xsl:template, xsl:value-of. XML documents as trees How the original XML is transformed into a set of nodes, the general terms for manipulating node trees. Paths (XPath) Use of path matching to select required nodes for transformation. Using templates xsl:apply-templates, xsl:template match, nested templates, xsl:copy , <comment> and <element> , default templates, parameters. Control xsl:if, xsl:choose, xsl:for-each, xsl:sort. Constructing the result tree xsl:output, xsl:attribute, xsl:attribute-set, xsl:comment, xsl:processing-instruction, xsl:text, xsl:value-of, xsl:variable. Combining templates xsl:include, xsl:import, xsl:apply-imports. Transforming to text

XSLT
Delivered in Internationally or OnlineFlexible Dates
£2,477

Definitive 802.1X for engineers

5.0(3)

By Systems & Network Training

Definitive 802.1X training course description A hands-on training course concentrating solely on 802.1X. Hands on sessions follow major chapters to reinforce the theory. What will you learn Describe 802.1X. Explain how 802.1X works Configure 802.1X Troubleshoot 802.1X. Definitive 802.1X training course details Who will benefit: Technical network staff. Technical security staff. Prerequisites: SIP for engineers Duration 2 days Definitive 802.1X training course contents Introduction What is 802.1X? Authentication access, 802.3, 802.11. IEEE, 802, 802.1X-2001, 802.1X-2010. Architecture Supplicant, Authenticator, Authentication server, EAP, EAPOL, RADIUS, Diameter. Port configuration 802.1X in a switch environment. Hands on Configuring 802.1X. How it works Controlled ports, uncontrolled ports. Authentication flow chart, Initialisation, initiation, negotiation, authentication. Hands on 802.1X packet analysis. 802.1X and 802.11 WiFi, WiFi security. Hands on 802.1X WiFi port access. EAP Extensible Authentication Protocol, RFC 3748, RFC 5247. EAP methods: Weak, MD5, LEAP, Strong: TTLS, TLS, FAST. Encapsulation: 802.1X, PEAP, RADIUS, Diameter, PPP. 802.1X accounting RADIUS, accounting messages, 802.1X accounting AV pairs. 8021.X and VLANS VLANs, Guest VLAN, restricted VLAN, voice VLAN. Hands on VLAN assignments with 802.1X.

Definitive 802.1X for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

WhatsUp Gold for engineers

5.0(3)

By Systems & Network Training

WhatsUp Gold training course description A hands on course focusing on network management using WhatsUp Gold. What will you learn Discover devices using WhatsUp Gold. Use WhatsUp Gold. Poll and monitor devices using WhatsUp Gold. Create Alarms, alerts and reports. Diagnose faults using WhatsUp Gold. Administrate a WhatsUp Gold system. WhatsUp Gold training course details Who will benefit: Technical staff working with WhatsUp Gold. Prerequisites: None. Duration 2 days WhatsUp Gold for engineers Getting started with WhatsUp Gold Starting WhatsUp Gold, manual discovery, automatic discovery, controlling IP discovery, mapping network devices. Hands on Using WhatsUp Gold. Agents Configuring Cisco devices for SNMP support, communities, traps, syslog. MIBs. Hands on Device discovery. Adding devices. Customising maps. Using WhatsUp Gold Polling, obtaining MIB information, MIB walking, Active monitors, critical monitors, passive monitors. Hands on Monitoring devices. Groups. MIB walking. SNMP trap monitor. Syslog monitor. Alarms Actions, Alert centre, thresholds, actions on events. Hands on Using the alert centre. Web tools. Reports Creating reports, automatic reports, customising reports. Hands on Performance reports. Graphs. Administration Users, backups, the database. Hands on Adding a user. Backups.

WhatsUp Gold for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

Total GPRS

5.0(3)

By Systems & Network Training

Total GPRS training course description GPRS is a packet switched access mode for GSM systems, which will enable more efficient use of the radio resources leading to increased data speeds and capacity. It is an important migration step toward 3G networks. This course provides a detailed analysis of the workings and implications of GPRS. What will you learn Explain what GPRS is. Describe the GPRS protocol stack. Describe the GPRS architecture Total GPRS training course details Who will benefit: Anyone who needs to know more about GPRS. Prerequisites: Total GSM Duration 2 days Total GPRS training course contents GPRS network architecture Review of GSM architecture, the new network entities required for GPRS. How the existing GSM network entities needs to be upgraded. How GPRS roaming will work. How intra and inter PLMNs work together. How billing works in the GPRS network. IP over GPRS Brief review of IP, IP stack over GPRS, IP addressing in GPRS, DHCP, GPRS configuration for IP. IP packet flows. WAP and GPRS. GPRS interfaces Messaging scenarios used over the GPRS Gb, Gs and Gp Interfaces. How the handset performs a GPRS attach and detach. GPRS roaming and how it works. Links used between GPRS Roaming Exchanges (GRX). GPRS terminal attach message flow in the NSS, PDP context message flow in the NSS, GPRS paging message flow, GPRS terminal detach message flow. GPRS protocol stack The components of the protocol stack. How each component works. How encapsulated packets are sent. How each component links to the next component. GPRS air interface The new GPRS channels required. How the new channels work. How to map GPRS logical channels onto physical channels. How they enable session activation. The difference between master PDCHs and slave PDCHs. GPRS terminals The 3 classes of terminal available. How the handset performs a GPRS attach and detach.

Total GPRS
Delivered in Internationally or OnlineFlexible Dates
£2,477