Essential DHCP training course description Almost all businesses use DHCP. This course builds on delegates existing IP knowledge and focuses on IP Address management using DHCP. Also covered is the role of DHCP in plug and play environments. What will you learn Explain how DHCP works. Configure DHCP servers. Troubleshoot DHCP. Essential DHCP training course details Who will benefit: Anyone working with TCP/IP. Prerequisites: TCP/IP Foundation for engineers Duration 1 day Essential DHCP training course contents Introduction What is DHCP?, IP configuration: Address, mask, default gateway, DNS. History of DHCP: RARP, BOOTP. Hands on Client configuration, releasing and renewing. DHCP servers Installation. Base configuration: Scope. Lease period. DHCP options. Hands on Server setup, Impact of lease times. Server monitoring. How DHCP works Client states. Obtaining, renewing leases. DHCP messages: DISCOVER, OFFER, REQUEST, NAK, ACK, DECLINE, RELEASE, INFORM. Hands on Troubleshooting DHCP using Wireshark. DHCP architecture DHCP relay agents. Server platforms, resilience, DHCP fail over, split scopes. Dynamic DNS and DHCP. Hands on DDNS, routers, Troubleshooting.
Definitive Segment Routing course description This Segment Routing (SR) training course is a comprehensive program designed to equip network professionals with the knowledge and skills needed to implement and manage SR in modern networking environments. Segment Routing is a cutting-edge network architecture that enhances network flexibility, scalability, and efficiency. This course offers in-depth coverage of SR principles, protocols, and practical implementation techniques. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. What will you learn Explain packet paths when implementing SLB. Explain how Segment Routing works. Explain the relationship between SR and MPLS. Use SR for Traffic Engineering. Troubleshoot Segment Routing. Implement TI-LFA using Segment Routing Definitive Segment Routing course details Who will benefit: This course is ideal for network engineers, architects, and administrators who want to stay up-to-date with the latest networking technologies and enhance their expertise in Segment Routing. Prerequisites: Concise MPLS for engineers Duration 3 days Definitive Segment Routing course contents Introduction to Segment Routing (SR) What is SR? Source based routing, SPRING, history, segments, why SR? SR benefits.SR usage: Traffic Engineering, Shortest path, local protection. Relationship between SR and MPLS, SRv6. Hands on Investigating the base network. Segment Routing architecture SR domains, SR paths, SR segments. Segment types. Segment IDs, combining segments, IGP extensions, control plane components. Hands on Configuring SR, exploring how SR works, Segment Routing protocols SR-MPLS. MPLS label stack operations. Segment Routing Global Block (SRGB). SRLB. IS-IS and OSPF extensions for SR. Prefix segments, adjacency segments. SRGB/IGP interactions. Multidomain SR policies. SPF, Strict SPF. Hands on Analysing IGP SR extension operation. Investigating the SRGB. Segment Routing Traffic Engineering RSVP-TE versus SR-TE. SR policies. Anycast and binding SIDs. SR flexible algorithm flex-algo, Performance measurement delay. Hands on Optimising network paths for various applications. SR integration with 'older' technologies MPLS and LDP integration with SR. Hands on Integration. Topology Independent Loop Free Alternative Classic LFA and IP/MPLS protection mechanisms. TI-LFA protection options. Hands on TI-LFA operation with SR and LDP traffic. Scenarios SDN. Managing SR with SR controllers. Analyse, optimise, automate. Network slicing. BGP peering segments Path Computation Elements, BGP Link State. BGP prefix segments, BGP peer segments. Egress peer engineering. SR enabled VPNs. Hands onBGP segment routing. Troubleshooting Segment Routing IP toolkit: ping and traceroute. MPLS toolkit: MPLS ping, MPLS echo request/reply, MPLS ping, MPLS traceroute and path discovery. Router show commands. Hands on Used throughout the course during exercises. SRv6 Note this is an optional extra day. See our one day SRv6 course for details. IPv6 headers review, routing headers, IPv6 segment, SRv6 segment Identifiers. IPv6 Segment Routing Header. SRH procedures. Hands on Configuring SRv6, Analysing SRv6 operation.
How to be a Great Executive Sponsor: In-House Training This three-hour course provides key tips and techniques for becoming an actively engaged, and impactful, Executive Sponsor of projects and programs. It will explain not just what your role is, but the very specific actions you can, and must, take to increase your project's probability of success. This three-hour course provides key tips and techniques for becoming an actively engaged, and impactful, Executive Sponsor of projects and programs. It will explain not just what your role is, but the very specific actions you can, and must, take to increase your project's probability of success. And, it will highlight the key personality and other traits that are found in successful Sponsors. Regardless if you're sponsoring an Agile software development project, a construction megaproject, or any other type of project in between, this course will help get you 'hit the ground running' and being an 'impact player' on day one. Various activities and discussions will acquaint you with this important role and what you need to do to become a great executive sponsor. What you Will Learn At the end of this program, you will be able to: Define project success so everyone is 'singing from the same sheet of music' Immediately apply the ten key attributes of a great sponsor on your project Recognize great sponsorship and determine if you're the right fit for the role Practice Sponsorship over the course of the project life cycle by engaging in very specific actions and activities Be a better investment manager by analyzing the behaviors of successful activist investors Foundation Concepts The quantifiable benefits of being an actively engaged Sponsor Sponsor defined Clarence Kelly Johnson and the SR-71 Blackbird: An example of the power of Sponsorship Defining Project Success Project success: More than meeting the triple constraints Benefits management: The Sponsor's focus The Investment - Life-cycle vs. the Project Life-cycle The three questions Sponsors need to ask to define project success 10 Key Attributes of a Great Sponsor 10 Key Attributes of a Great Sponsor The Makings of a Great Sponsor The most important skills and competencies of an executive sponsor What great Sponsors do and when Four Things a Great Sponsor Can Learn from an Activist Investor The story of Outerwall, Inc. and Glen Welling of Engaged Capital, LLC Sponsors and Activist Investors Sponsorship of the 2nd Avenue Subway in Manhattan: A classic textbook example
Cyber Security training course description The reliance of the world on the Internet and computer systems means the protection of information systems is vitally important. This is even more important smart devices and the Internet of Things increase the number of devices. This Cyber Security provides a concise overview on the threats and attacks that can happen along with the counter measures that can be taken. What will you learn Recognise the different types of attack. Describe the attacks that can be made against information systems. Describe the counter measures available. Cyber Security training course details Who will benefit: Non-technical staff working with computers. Prerequisites: None. Duration 1 day Cyber Security training course contents What is Cyber Security? Computer security, Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response. Attacks Physical access, Social engineering, Privilege escalation, Malware, Trojans, worms, viruses, rootkits, Backdoors, Denial of Service (DOS), Distributed DOS, Eavesdropping, Spoofing, Man the middle tampering. Countermeasures Prevention, detection, response. Physical, user accounts, Firewalls, IDS, AAA, authentication, cryptography, encryption, data integrity. Cyber security standards ETSI, ISO 27001, 27002, NIST, ISA/IEC 62443.
Hypnotherapy Learning Retreat, immersive four-day retreat designed to elevate your skills and knowledge in the serene environment of our exclusive venue. Whether you are a seasoned professional or just beginning your journey, this retreat offers a unique opportunity to learn, grow, and connect with like-minded individuals.
This first aid at work course is ideal for organisations whose needs assessment has identified a requirement for additional first aid training, such as having employees with a disability or a medical condition. In addition to the topics covered on an emergency first aid at work course, this course covers treatment for a variety of injuries and medical conditions. For more information click on the tabs below, or get in touch, we’d be more than happy to answer any queries. At Immerse Training we pride ourselves on offering First Aid and Pre-Hospital Care Training that meets your specific needs. All our courses meet the requirements of the relevant awarding body. On top of that, we are more than happy to create bespoke elements that tailor each programme to suit your first aid or care responsibilities. Qualification Information This qualification and learning outcomes are based on the recommendations of: The Resuscitation Council (UK) Skills for Health Assessment Principles for First Aid Qualifications Course Content Following this course students will be able to Understand the role and responsibilities of a first aider. Be able to administer first aid to a casualty with injuries to bones, muscles and joints. Assess an incident. Be able to administer first aid to a casualty with suspected head and spinal injuries. Manage an unresponsive casualty who is breathing normally. Be able to administer first aid to a casualty with suspected chest injuries. Manage an unresponsive casualty who is not breathing normally. Be able to administer first aid to a casualty with burns and scalds. Be able to recognise and assist a casualty who is choking. Be able to administer first aid to a casualty with an eye injury. Be able to manage a casualty with external bleeding. Be able to administer first aid to a casualty with sudden poisoning. Be able to manage a casualty who is in shock. Be able to administer first aid to a casualty with anaphylaxis. Be able to manage a casualty with a minor injury. Be able to provide first aid to a casualty with suspected major illness. Be able to conduct a secondary survey. Who should attend? This qualification is for people who deal with first aid at work. Enabling them to be workplace first aiders under the Health and Safety (First Aid) Regulations 1981. This qualification is also for people who have a specific responsibility at work, or in voluntary and community activities. This will allow them to provide basic first aid to people in a range of situations. Pre-requisites Students must be at least 14 years old on the first day of training. Assessment and Certifications Assessment of this course is continuous and includes two theory/multiple choice question papers. Successful students will receive an Immerse Training Certificate, which is valid for three years. This certificate will be issued by Qualsafe, the awarding body for Immerse Training. Additional Information Completion of the Level 3 Award in First Aid at Work includes 3 credits at Level 3 of the Regulated Qualifications Framework (RQF). Workplace First Aid Courses First Aid courses for employers and employees. Our workplace courses are fully accredited, registered and meet Health and Safety Executive (HSE) guidelines. From 1 day Emergency First Aid at Work (previously appointed person) to 3 day First Aid at Work courses. We specialise in on-site courses at your workplace, tailored to the specific risks associated with your business. All courses can be delivered at our training centre in Poole, Dorset or we can deliver on-site across Bournemouth, Poole, Dorset, Hampshire and the South of England.
Internet of Things training course description A concise overview course covering The Internet of Things and the technologies involved. Particular emphasis is placed on the high level architecture of IoT and the benefits achievable. What will you learn Describe the structure of the IoT List the technologies involved in IoT. Explain how IoT works. Internet of Things training course details Who will benefit: Non-technical staff working with IoT. Prerequisites: None. Duration 1 day Internet of Things training course contents What is IoT The Internet, what is IoT? IoT and M2M, IoT technologies, IoT architecture. Wired and wireless communication. IoT applications; Smart houses, smart cities, smart cars, wearable, environment, other domain specific IoTs. IoT architecture Physical objects, virtual objects, cloud computing, data capture, communications. Big data. Components Hardware, sensors, actuators, chips, firmware, embedded systems. Open source platforms. Power options: Battery, solar, PoE. IoT communication RF, ZigBee, Bluetooth, Bluetooth LE, RFID, WiFi, 802.11ah, mobile technologies. Wired. Arduino (as an example) Microcontrollers, the platform, development, Arduino software, reading from sensors, I2C, SPI. Arduino and the Internet, HTTP, WiFi, GSM. The cloud and IoT: Pachube, nimbits, ThingSpeak Security in IoT Authentication, Encryption, secure booting, firewalls.
NTP and PTP training course description This course looks at timing and synchronization as provided by NTP and PTP. Hands on sessions primarily involve using Wireshark to analyse the protocols. What will you learn Recognise the importance of timing and synchronisation. Explain how NTP works. Explain how PTP works. NTP and PTP training course details Who will benefit: Anyone using NTP or PTP but particularly relevant for those in the broadcast industry. Prerequisites: TCP/IP foundation for engineers Duration 1 day NTP and PTP training course contents Introduction Clock drift. Timing and synchronization. Importance in computing. Importance in broadcasting. NTP NTP versions, v0 to v4. Architecture. The intersection algorithm. Accuracy. Clock strata, Stratum 0, 1, 2 and 3. Protocol modes. Hands on NTP configuration More NTP NTP packet header. Timestamps. Variables in the header. Clock synchronization algorithm. SNTP. The Windows Time service. Hands on Wireshark and NTP analysis. PTP PTP v2, IEEE 1588. Architecture. Accuracy. Synchronization with PTP. Offset and delay. Hands on Analysing PTP packet flows. More PTP Ordinary clocks, boundary clocks, masters and grandmasters. PTP specific switch types. Hardware time stamping. SMPTE ST2059-2. PTP packet header. PTP domains. Best master clock algorithm. Hands on More Wireshark and PTP.
WiFi demystified training course description A concise overview aimed at less technical staff requiring an overview of WiFi networks. The course covers the technologies at a high level allowing delegates to discuss WiFi networks with others recognising the buzzwords used. The course will also allow the delegates to recognise the issues involved in planning and installing WiFi networks as well as securing them. What will you learn Recognise the different WiFi technologies available. Describe the architecture of WiFi networks including the role of Access Points. Recognise the distance limitations of WiFi networks. Describe the buzzwords used in WiFi. Recognise the security issues of WiFi networks. WiFi demystified training course details Who will benefit: Anyone working with WiFi networks. Prerequisites: None. Duration 1 day WiFi demystified training course contents Introduction When to use wireless, when to use wired, WiFi technologies: 802.11, 802.11a, 802.11b, 802.11g, 802.11n, WiFi speeds and distances, comparison to other wireless technologies, 802.15 (Bluetooth), 802.16 (WiMax). Simple WiFi networks Network cards, Antennae, Access Points, WiFi routers. Enterprise WiFi networks SSIDs, Multiple WiFi networks, Repeaters, Wireless bridges, Controller based access points, Wireless switches, Power Over Ethernet. RF site surveys Steps and techniques, tools, analysing the feasibility of WiFi, range, performance, roaming. Security How safe are WiFi networks? Encryption, Authentication, WEP WPA WPA2. 802.1x, EAP, RADIUS.