• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1508 Courses in Bradford

Introduction to containers

5.0(3)

By Systems & Network Training

Intro to containers training course description This course looks at the technologies of containers and microservices. The course starts with a look at what containers are, moving onto working with containers. Networking containers and container orchestration is then studied. The course finishes with monitoring containers with Prometheus and other systems. Hands on sessions are used to reinforce the theory rather than teach specific products, although Docker and Kubernetes are used. What will you learn Use containers. Build containers. Orchestrate containers. Evaluate container technologies. Intro to containers training course details Who will benefit: Those wishing to work with containers. Prerequisites: Introduction to virtualization. Duration 2 days Intro to containers training course contents What are containers? Virtualization, VMs, What are containers? What are microservices? Machine containers, application containers. Benefits. Container runtime tools Docker, LXC, Windows containers. Architecture, components. Hands on Installing Docker client and server. Working with containers Docker workflow, Docker images, Docker containers, Dockerfile, Building, running, storing images. Creating containers. Starting, stopping and controlling containers. Public repositories, private registries. Hands on Exploring containers. Microservices What are microservices? Modular architecture, IPC. Hands on Persistence and containers. Networking containers Linking, no networking, host, bridge. The container Network Interface. Hands on Container networking Container orchestration engines Docker swarm: Nodes, services, tasks. Apache Mesos: Mesos master, agents, frameworks. Kubernetes: Kubectl, master node, worker nodes. Openstack: Architecture, containers in OpenStack. Amazon ECS: Architecture, how it works. Hands on Setup and access a Kubernetes cluster. Managing containers Monitoring, logging, collecting metrics, cluster monitoring tools: Heapster. Hands on Using Prometheus with Kubernetes.

Introduction to containers
Delivered in Internationally or OnlineFlexible Dates
£1727

Securing Kubernetes and Containers

5.0(3)

By Systems & Network Training

Securing Kubernetes training course description This course introduces concepts, procedures, and best practices to harden Kubernetes based systems and container-based applications against security threats. It deals with the main areas of cloud-native security: Kubernetes cluster setup, Kubernetes cluster hardening, hardening the underlying operating system and networks, minimizing microservices vulnerabilities, obtaining supply chain security as well as monitoring, logging, and runtime security. What will you learn Harden Kubernetes systems and clusters. Harden containers. Configure and use Kubernetes audit logs. Securing Kubernetes training course details Who will benefit: Technical staff working with Kubernetes Prerequisites: Kubernetes_for_engineers_course.htm Definitive Docker for engineers Duration 2 days Securing Kubernetes training course contents This course does not only deal with the daily security administration of Kubernetes-based systems but also prepares delegates for the official Certified Kubernetes Security Specialist (CKS) exams of the Cloud Native Computing Foundation (CNCF). Structure: 50% theory 50% hands on lab exercise Module 1: User and authorization management Users and service accounts in Kubernetes Authenticating users Managing authorizations with RBAC Module 2: Supply chain security Vulnerabilit checking for images Image validation in Kubernetes Reducing image footprint Secure image registries Module 3: Validating cluster setup and penetration testing Use CIS benchmark to review the security configuration of Kubernetes components. Modify the cluster components' configuration to match the CIS Benchmark. Penetration testing Kubernetes for known vulnerabilities. Module 4: System hardening Use kernel hardening tools Setup appropriate OS level security domains Container runtime sandboxes Limit network access Module 5: Monitoring and logging Configure Kubernetes audit logs Configure Audit Policies Monitor applications behaviour with Falco

Securing Kubernetes and Containers
Delivered in Internationally or OnlineFlexible Dates
£1727

Total MPLS VPN for engineers

5.0(3)

By Systems & Network Training

Total MPLS VPN for engineers training course description A hands on course concentrating solely on MPLS VPNs. The course begins with a review of VPN basics before moving onto L3VPNs and MBGP, followed by L2VPNs. What will you learn Compare, contrast and evaluate MPLS L2VPNs versus L3VPNs. Describe, configure and troubleshoot MPLS L3VPNs. Configure and troubleshoot MBGP. Describe, configure and troubleshoot MPLS L2VPNs. Total MPLS VPN for engineers training course details Who will benefit: Anyone working with MPLS VPNs. Prerequisites: Concise MPLS for engineers Duration 2 days Total MPLS VPN for engineers training course contents MPLS VPN basics LSR, PE and P router roles. What is a VPN? MPLS VPN types, MPLS VPN comparison, MPLS L3VPN, L2VPN. VPN architectures. Hands on: Building the base network. L3VPN Separate routing tables, The Virtual Routing Table, VRFs, Route Distinguisher (RD), VNPv4 addresses. Hands on: Minimal VRF configuration, routing between customer and provider (PE-CE). MBGP MP-BGP, IPv4 routing, IPv6 routing, VPNv4 addresses, VPNv6 addresses. Exchanging labels. Exchanging routes. Route targets, communities. Route reflectors. Hands on: MBGP setup. MPLS L3VPN troubleshooting. L2VPN Why L2 not L3? Services: TDM, ATM, Frame Relay, Ethernet. Pseudowires. Hands on: Simple L2VPN configuration. Pseudowires VPWS, AToM, Attachment Circuit, Traffic encapsulation, Ethernet over MPLS. Ethernet MTU considerations. VC types. Hands on: PW configuration and troubleshooting. VPLS Ethernet multipoint connectivity. Virtual Forwarding Instance (VFI), Virtual Switching Instance. Flooding, MAC address management, split horizons. Hierarchical VPLS. Signalling: LDP based. BGP based. Auto discovery. Hands on: VPLS configuration and troubleshooting. Next generation L2VPN E-VPN, PBB-EVPN.

Total MPLS VPN for engineers
Delivered in Internationally or OnlineFlexible Dates
£1727

Advanced Level - Assessing and Monitoring the Condition of Power Transformers by Oil Analysis

By EnergyEdge - Training for a Sustainable Energy Future

About this Virtual Instructor Led Training (VILT) The objective of this 4-half-day Virtual Instructor Led Training (VILT) course is to equip participants with the required knowledge so that they can define and implement an effective oil analysis programme, monitor the condition of transformers and understand oil analysis reports as part of their maintenance strategy. This VILT course is delivered in partnership with ENGIE Laborelec. Training Objectives Participants will be able to go through the following areas during the VILT course: Condition monitoring of power transformers through oil analyses: Transformer Health Index, Transformer Fleet Condition Assessment, Risk Matrix Best practices Which oil analyses/how frequent DGA: focus on partial discharges, sparking, stray gassing, catalytic effects / interpretation systems. Interpretation of results Why and when to perform electrical measurements? International standards: IEEE, IEC, Duval, ASTM, etc Maintenance guidelines Trending and reporting Sampling techniques Use of online monitoring for DGA/water: implementation and real-case advantages etc: New developments: importance of methanol as ageing marker, temperature correction of ageing markers, stray gassing of oils in service etc REX, case studies and real-case exercises concerning power transformers within generation and high-voltage grids Discussion of reports on power transformers Use of unused insulating transformer oils Market trends in the use of inhibited and uninhibited oils Differences, advantages and drawbacks of uninhibited compared with inhibited oils Importance of additives, oxidation stability tests, stray gassing, etc Target Audience The VILT course is intended for a wide audience, including professionals who are maintenance staff, electrical engineers and asset managers responsible for transformers. Typical industries are powerplants, high voltage grids or large industrial sites. Course Level Basic or Foundation Training Methods The VILT course will be delivered online in 4 half-day sessions comprising 4 hours per day, with 2 x 10 minutes break per day, including time for lectures, discussion, quizzes and short classroom exercises. Course Duration: 4 half-day sessions, 4 hours per session (16 hours in total). This VILT course is delivered in partnership with ENGIE Laborelec. Trainer Your expert course leader is a senior expert in the field of insulating and lubricating oils and of condition monitoring of power transformers and turbines. He has 20 years of experience within power industry and since 2010 Key Expert within the ENGIE group. He has worked on various international projects such as the Al Dur power plant in Bahrain, Shuweihat II power plant in UAE, PP11 and Jubail Marafiq power plants in Saudi Arabia and Sohar II and Barka III power plants in Oman. He has also been involved in consulting work in Malaysia for Hyrax Oil. Other assignments include Shell, Nynas, Total, ABB, Alstom, CG Pauwels in Europe. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Advanced Level - Assessing and Monitoring the Condition of Power Transformers by Oil Analysis
Delivered in Internationally or OnlineFlexible Dates
£1719 to £1999

Hydrogen - Technology, Economics and Business Cases

By EnergyEdge - Training for a Sustainable Energy Future

About this Virtual Instructor Led Training (VILT) Asia Pacific is set to be the largest and fastest growing Hydrogen market globally. This growth is driven by decarbonisation of energy-use, ammonia production and rising demand of fuel cell electric vehicles. Hydrogen as a fuel has outstanding energy carrying capacity and many application possibilities ranging from Petroleum refinery, Ammonia and Methanol production, Transportation and Power generation. Although the current petrochemical market segment will remain strongest in the near future, it is the transport and power sector which spurs the vision of a massive market takeoff in the next decade. The ever-rising share of renewable energies require flexible and scalable storage solutions, which in turn offers many additional revenue streams beyond pure electricity sales. Adding to this the strong impetus towards decarbonization of the transport sector from cars, trucks, trains to ships and even airplanes creates the breed for an exciting and yet untapped market potential. This course aims to clarify and assess the hydrogen business case along its value chain and versatile market applications. Training Objectives Understanding current hydrogen market status and recent developments Major drivers and inhibitors influencing the growth of the market Understanding and comparing various production technology processes Challenges and solutions in transport, distribution and storage of hydrogen Mapping the many petrochemical, energy and transport applications Analyse business cases from around the world and understand their economics Target Audience Project developers Equipment Manufacturers Oil, Gas and Petrochemical sector companies IPPs and utilities Transport sector companies and port operators Policy makers and regulators Investors and lenders Course Level Basic or Foundation Training Methods The VILT will be delivered online in 4 half-day sessions comprising 4 hours per day, including time for lectures, discussion, quizzes and short classroom exercises. Additionally, some self-study will be requested. Participants are invited but not obliged to bring a short presentation (10mins max) on a practical problem they encountered in their work. This will then be explained and discussed during the VILT. A short test or quiz will be held at the end the course. Trainer Your expert course leader is an internationally renowned energy communicator and business educator, focused on the interconnected clean energy transition topics of renewable power, energy storage, energy system electrification and hydrogen. His own independent technology tracking, market assessment and opportunity/risk analysis is delivered to clients through a mix of business advisory work, commissioned content, small-group training (online & in-person), and one-to-one executive coaching (online). In the hydrogen sector, he is currently lead consultant and trainer to the World Hydrogen Leaders network, and writer of their 'This Week in Hydrogen' news column. He is also co-presenter of the 'New Energy Chinwag' podcast, which regularly covers hydrogen-related issues. During more than 15 years as an independent energy expert, he has helped companies from large multinationals to innovative start-ups - totalling assignments in over 30 countries across 5 continents. Most recently, he has presented clean energy training in locations as diverse as Singapore, the UK, South Africa, The Philippines, the USA, Mexico, Spain and Dubai - and, in recent times of course, online to international audiences from across the world. Prior to this, he was Research Director for over 10 years at Informa, a $9 billion business intelligence provider; where he drove new market identification, analysis and project deployment work, and managed teams in the UK and US. He has a strong science background, holding a 1st Class Honours degree in Natural Sciences from the University of Cambridge, a PhD in Earth Sciences and a further Diploma in Economics & Sustainability from the UK's Open University. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Hydrogen - Technology, Economics and Business Cases
Delivered in Internationally or OnlineFlexible Dates
£1719 to £1999

Essential LTE

5.0(3)

By Systems & Network Training

LTE training course description This course is designed to give the delegate an understanding of the technologies used within a 3G UMTS mobile network. During the course we will investigate the UMTS air interface and the use of Wideband-Code Division Multiple Access (WCDMA) to facilitate high speed data access, together with HSPA to offer mobile broadband services. We will describe the use of soft handover rather than hard handover procedures and soft capacity sharing. The course includes a brief exploration of the UMTS protocol stack and the use of PDP Context and QoS support features. What will you learn Explain the 3G UMTS architecture. Describe the role of a Drifting & Serving RNC. Explain the use of ARQ & HARQ for mobile broadband. Describe how IMS integrates into the architecture. Describe the use of Media Gateway Controllers. Identify the temporary identities used within 3G UMTS. LTE training course details Who will benefit: Anyone working within the telecommunications area, especially within the mobile environment. Prerequisites: Mobile communications demystified Telecommunications Introduction Duration 2 days LTE training course contents LTE Introduction The path to LTE, 3GPP. LTE to LTE advanced. LTE Architecture The core, Access, roaming. Protocols: User plane, Control plane. Example information flows. Bearer management. Spectrum allocation. LTE technologies Transmission, reception, OFDMA, multiple antenna, MIMO. LTE Air interface Air interface protocol stack. Channels, Resource Grid, cell acquisition. Up and downlink controls. Layer 2 protocols. Cell acquisition Power on, selecting networks and cells. RRC connection. Attach procedure. Mobility management Roaming, RRC_IDLE, RRC_CONNECTED, cell reselection, handover, interoperation with UMTS and GSM networks. Voice and text IMS, QoS, policy and charging.

Essential LTE
Delivered in Internationally or OnlineFlexible Dates
£1727

Advanced Kibana

5.0(3)

By Systems & Network Training

Advanced Kibana training course description This training course is aimed at users who already have some experience with Kibana, who are looking to further their knowledge. What will you learn Lens Timelion Maps Custom Visualisations with Vega Canvas Filters and Controls Drilldown and Dashboards KQSL and ElasticQueries Scripted and RunTime Fields Alerts and Alarms Advanced Kibana training course details Who will benefit: Users who already have some experience with Kibana, who are looking to further their knowledge. Prerequisites: None Duration 1 day Advanced Kibana training course contents Topics Lens Visualisation types (tables,bars,charts) Category breakdown Adding multiple metrics Using formulas in metrics Labels Adding reference layer Limitations Visualise Library Timeseries, Metrics Different types of aggregations Maps GeoMapping Heat Maps Using ES index as data source Visualisation, tool tips Custom Visualisations with Vega Introduction to vega scripting Canvas Widgets and Texts Elasticsearch SQL Canvas Expressions Filters and Controls Dropdown filters Ad-hoc filters Searchbar filters Drilldown Dashboards Linking one dashboard to another KQSL and ElasticQueries Bool Query AND/OR Phrase Part match vs keyword search Wildcard search Scripted and RunTime Fields Creating ad-hoc calculated fields using scripts Performance issues Alerts and Alarms Query Based Formatting output Connector types(email,index,teams etc)

Advanced Kibana
Delivered in Internationally or OnlineFlexible Dates
£1497

Advanced UNIX shell programming

5.0(3)

By Systems & Network Training

Advanced UNIX shell scripting training course description A follow on hands on course from the Introduction to shell programming course covering the powerful sed and awk tools along with the extra Korn shell programming features. What will you learn Use regular expressions within grep, ed and many other utilities. Use awk and sed. Integrate sed and awk into shell scripts. Recognise the role of shell scripts within the UNIX system. Write shell scripts using new Korn shell features including: The select construct Arrays Arithmetic evaluation Advanced UNIX shell scripting training course details Who will benefit: Programmers developing applications under UNIX. Administrators who need time saving utilities. Technical personnel who wish to make the most out of the Korn Shell. Prerequisites: UNIX shell scripting Duration 3 days Advanced UNIX shell scripting training course contents Regular Expressions What are REs? How can they be used? How to write REs More REs e REs Tagging, matching words, repetitions. The sed editor Basic usage: Saving output, options. sed script files, sed commands, Specifying lines to edit, Hold space and pattern space, advanced commands Awk Basic usage, nawk script files, Patterns, Records and fields, Actions if, while, do, for... System variables NF, NR, RS... Arrays Functions length, printf, cos, user defined... Using nawk in shell scripts Korn shell scripts Review of Bourne shell scripts functions... Variables typeset, manipulating strings Arrays Arithmetic evaluation the let command, (( )), typeset -i The select construct Syntax, workings, REPLY, PS3 Miscellaneous Enhanced I/O, ${10}

Advanced UNIX shell programming
Delivered in Internationally or OnlineFlexible Dates
£1697

Certified Business Relationship Manager (CBRM)

By IIL Europe Ltd

Certified Business Relationship Manager (CBRM®): In-House Training The CBRM® Practitioner Qualification is intended for the intermediate-to-advanced Business Relationship Manager, as it focuses on advancing to the role of Strategic Business Relationship Manager. As such, the primary focus is on strategic business relationship management, leveraged to optimize business value to the enterprise. The purpose of the Practitioner qualification is to confirm whether the candidate has achieved sufficient understanding and competence to perform the role of Strategic Business Relationship Manager. To pursue the CBRM® certification, a candidate must be a certified Business Relationship Management Professional (BRMP®).

Certified Business Relationship Manager (CBRM)
Delivered in London or UK Wide or OnlineFlexible Dates
£3195

SIP security for engineers

5.0(3)

By Systems & Network Training

SIP security training course description A hands-on course covering SIP security. It is assumed that delegates already know SIP as this course focuses purely on the security issues in SIP IP telephony networks. Hands-on practicals follow each major theory session and include use of various SIP security tools such as vomit, sipp, sipsak and sivus amongst others. What will you learn Secure SIP networks Use various SIP security tools SIP security training course details Who will benefit: Technical staff working with SIP. Technical security staff. Prerequisites: SIP for engineers Duration 2 days SIP security training course contents SIP review SIP infrastructure and entities, example SIP session. Hands on Simple SIP network with and without authentication. SIP security attacks DOS attacks, infrastructure attacks, eavesdropping, spoofing, replay, message integrity. Hands on Basic SIP packet capture, infrastructure attacks. SIP tools SIP packet creation: Sivus, SIPsak, PROTOS, SFTF, SIP bomber, SIPp, Seagull, Nastysip. SIP packet generators: SIPNess, NetDude. Monitoring: Wireshark, Cain & Abel, Vomit, Oreka, VoiPong. Scripts and tools: SIP-Fun, Skora.net, kphone-ddos, sip-scan, sip-kill, sip-redirectrtp. Health of different tools. Hands on Generating SIP packets, rebuilding conversations from captured packets, password cracking. VPNs and SIP IPSec, AH, ESP, transport mode, tunnel mode, Pre Shared Keys, Public keys. Hands on SIP calls over IPSec. Secure SIP signaling SIP relationship with HTTP, Deprecated HTTP 1.0 basic authentication, HTTP 1.1 Digest authentication, S/MIME, SIPS, SIPS URI, TLS, DTLS, PKI infrastructures. Hands on SIP with TLS. Secure media streams SRTP, features, packet format, default encryption, default authentication, key distribution. S/MIME, MIKEY, SDP security descriptions. SIP security agreements. Hands on Analysing SRTP packets. Firewalls NAT traversal. Impact of firewall on infrastructure attacks. TLS and firewalls. SIP specific firewalls. Hands on SIP calls through a firewall.

SIP security for engineers
Delivered in Internationally or OnlineFlexible Dates
£1727