One of our greatest strengths is our ability to tailor any of our open management courses to the needs and requirements of different businesses in different industries. We understand that whilst our open management training courses provide a wealth of knowledge in their particular area of focus, not all of it may be relevant for your business and the particular industry you operate in.Rather than making delegates sit through management training that is irrelevant to their job role, we offer bespoke management training where we tailor the course to cover the specific needs of your organisation, ultimately relieving the inevitable boredom and "switching off" that would come with having to sit through training that a person knew they would not need. Why choose us for your bespoke management training needs? We have provided tailored, bespoke management training courses to some of the largest organisations in the UK. Using our acquired experience and knowledge of running these courses, we will be able to work with you to create a bepoke management training programme that delivers a significant return on investment, both in terms of tangible and intangible results. ILM accredited management training courses Because we charge a daily training rate rather than a per delegate fee, if you have a number of delegates requiring management training, a bespoke management training course can often be less expensive than putting them all on an open course. A number of courses have been accredited by the ILM, which means you can be assured as to the standard of the course content and delivery. For more information on these, please see our page on ILM Management Training. All of our ILM Programmes are provided in partnership with BCF Group Limited, which is the ILM Approved Centre we deliver under. Interested in finding out more about bespoke management training? Between us, we can come up with a training plan which will provide relevant, bespoke management training for your delegates which will maximise the return on both your time and cost. We are happy to come to your premises or arrange training facilities nearer to your location if this would be more convenient. Feedback Below is a small selection of past feedback for our management training and development courses and programmes: "Excellent instructor. I looked forward to our monthly lectures knowing that I would have a good laugh but also that I would learn more about the subject and myself. He has been very helpful to me and the rest of the students, not just during the lectures but often in his own time. His enthusiasm for all of the subjects covered during the course was evident throughout, which again helped me to enjoy and understand the subjects and lectures. If I get the chance in future to attend a further course with you, I would jump at the chance."Senior Acquisitions SurveyorGalliford Try "A very accomplished trainer and someone who I would very much like to be involved in our business training going forward. The feedback I have had from all levels of our team structure is excellent."Group HR OperationsEADS Personnel Services UK "Phil has a lot of energy which he throws into the course. This visably broke down resistance and attendees entered into the exercises wholeheartedly."Senior QSBullock Construction Scheduled Courses Unfortunately this course is not one that is currently scheduled as an open course, and is only available on an in-house basis. Please contact us for more information.
NFV training course description Network Functions Virtualization (NFV) brings many benefits, this training course cuts through the hype and looks at the technology, architecture and products available for NFV. What will you learn Explain how NFV works. Describe the architecture of NFV. Explain the relationship between NFV and SDN. Recognise the impact NFV will have on existing networks. NFV training course details Who will benefit: Anyone wishing to know more about NFV. Prerequisites: Introduction to Virtualization. Duration 2 days NFV training course content Introduction What is NfV? What are network Functions? NfV benefits, NfV market drivers. ETSI NfV framework. Virtualization review Server, storage and network virtualization and NfV. Virtual machines, containers and docker. Data centres, clouds, SaaS, IaaS, PaaS. Virtualization of Network Functions Network virtualization versus Network Function virtualization. ETSI NfV architecture ETSI documents, Architecture overview, compute domain, hypervisor domain, infrastructure network domain. IETF and NfV Creating services, Service Functions, Service Function Chaining. SPRING and source packet routing. YANG and NetConf. RESTCONF. VLANs, VPNs, VXLAN. MANO Management and Orchestration. OpenStack, OpenDaylight PaaS and NfV. The VNF domain. Service graphs, MANO descriptors, Open orchestration. The virtualization layer VM centric model, containers versus hypervisors, FD.io. Summary Deploying NfV, performance, testing. Futures.
Docker for engineers training course description Docker is the container platform of choice. This course covers how to use Docker to package your applications with all of their dependencies and then test, deploy, scale and support your containers. Hands on sessions follow all the major sessions. What will you learn Work with Docker images, containers and command line tools. Deploy and test Docker containers. Debug Docker containers. Describe Docker networking, deployment tools, orchestration and security. Docker for engineers training course details Who will benefit: Anyone working with Docker. Prerequisites: Introduction to virtualization. Duration 2 days Docker for engineers training course contents Introduction The birth of Docker, the promise of Docker, what Docker isn't. Docker at a glance Process simplification, broad support and adoption, architecture, getting the most from Docker, the Docker workflow. Installing Docker Important terminology, Docker client, Docker server, test the setup. Working with Docker images Anatomy of a Dockerfile, building an image, running your image, custom base images, storing images. Working with Docker containers What are containers? creating a container, starting a container, auto-restarting a container, stopping a container, killing a container, pausing and unpausing a container, cleaning up containers and images, next steps. Exploring Docker Printing the Docker version, server information, downloading image updates, inspecting a container, getting inside a running container, exploring the shell, returning a result, docker logs, monitoring Docker, exploration. The path to production containers Deploying, testing containers. Debugging containers Process output, process inspection, controlling processes, network inspection, image history, inspecting a container, filesystem inspection, moving along. Docker at scale Docker swarm, centurion, amazon EC2 container service. Advanced topics Pluggable backends, containers in detail, security, networking. Designing your production container platform The twelve-factor app, the reactive manifesto. Conclusion The challenges, the Docker workflow, minimizing deployment artifacts, optimizing storage and retrieval, the payoff, the final word.
Introduction to Virtualization course description A comprehensive tour of virtualization. The course concentrates on the actual technologies involved as opposed to any one vendor solution. What will you learn Explain the concepts of virtualization. Partition servers. Create Virtual Machines. Introduction to Virtualization course details Who will benefit: Anyone looking for an introduction to Virtualization. Prerequisites: None. Duration 2 days Introduction to Virtualization course contents Virtualization Concepts What is Virtualisation? What are virtual machines (VMs)? Virtualisation Landscape. Network Virtualisation. Suitability for Organisations. Advantages of deploying Virtualisation. Downsides of deploying Virtualisation. Overview of Virtualisation products. Hypervisors What is a hypervisor? Difference between type 1 and 2 hypervisors. Available hypervisors. Hypervisors and device drivers. Hands on: Installing Oracle VirtualBox on Windows. Creating/Importing/Configuring VMs. Virtualization Hosts Hardware and resource requirements. Installation of the hypervisor. Hands on: Installing Hyper-V role into Windows Server. Creating/Importing/Configuring VMs. Virtual Machines Creating virtual machines. Resource requirements. Settings. Installation of the guest OS. Additional tools/ extensions for hypervisor integration. VM files and their uses. Virtual hard disk and their formats. Hardware pass through. Hands on: Connecting to VMWare ESXi via WebGUI and using ESXi to create/import/configure VMs. VM Snapshots/Checkpoints What is a snapshot? How to use them and how they impact performance? Creating/deleting/merging of snapshots. Hands on: Using ESXi to create/manage snapshots. Command Line use on the Hypervisor Interacting with the hypervisor through the command line. Simple commands to configure the hypervisor and VMs. Simple scripts. Hands on: Connecting to VMWare ESXi via PowerCLI to manipulate VMs and snaphshots. Virtualization Storage Different types of storage: local vs remote. Local and remote storage technologies. Configuring storage. Hands on: Using ESXi to deploy VMs on remote NFS storage. Virtual Networking How is networking done in virtualization environments. What is a virtual switch and vNIC and what are their performance characteristics? NIC teaming and trunking in the virtual world. Port groups and isolation. Physical NICs and their use in virtual switches. Hands on: Using ESXi to create and configure vswitches and networking. Templates and clones What is a template? What is a clone? When to use templates and clones to optimize VM deployment. Migrating/Importing VMs What is migration? Migrating compute and storage. Importing VMs from files or physical machines. Hands on: Using VMWare vCenter Server to clone/ template/migrate VMs, tag resources, create local user accounts and assign permissions. VMs and Backups Taking backups of your VMs. Restoring your VMs from backups. Virtualization and Licensing Different licensing models and costs. Containerization Concepts What is a container and how is it different from a virtual machine. When to use containers. Docker and Kubernetes
ITIL® 4 Specialist: Create, Deliver and Support: In-House Training The ITIL® 4 Specialist: Create, Deliver, and Support module is part of the Managing Professional stream for ITIL® 4. Candidates need to pass the related certification exam for working towards the Managing Professional (MP) designation. This course is based on the ITIL® 4 Specialist: Create, Deliver, and Support exam specifications from AXELOS. With the help of ITIL® 4 concepts and terminology, exercises, and examples included in the course, candidates acquire the relevant knowledge required to pass the certification exam. What You Will Learn The learning objectives of the course are based on the following learning outcomes of the ITIL® 4 Specialist: Create, Deliver, and Support exam specification: Understand how to plan and build a service value stream to create, deliver, and support services Know how relevant ITIL® practices contribute to the creation, delivery, and support across the SVS and value streams Know how to create, deliver, and support services Organization and Culture Organizational Structures Team Culture Continuous Improvement Collaborative Culture Customer-Oriented Mindset Positive Communication Effective Teams Capabilities, Roles, and Competencies Workforce Planning Employee Satisfaction Management Results-Based Measuring and Reporting Information Technology to Create, Deliver, and Support Service Integration and Data Sharing Reporting and Advanced Analytics Collaboration and Workflow Robotic Process Automation Artificial Intelligence and Machine Learning CI / CD Information Model Value Stream Anatomy of a Value Stream Designing a Value Stream Value Stream Mapping Value Stream to Create, Deliver, and Support Services Value Stream for Creation of a New Service Value Stream for User Support Value Stream Model for Restoration of a Live Service Prioritize and Manage Work Managing Queues and Backlogs Shift-Left Approach Prioritizing Work Commercial and Sourcing Considerations Build or Buy Sourcing Models Service Integration and Management
We invite adults, children, complete beginners, and advanced pianists alike to join us at our studio on Baker Street for the finest and most comprehensive piano lessons London has to offer, thanks to a wonderful team of piano instructors. Please contact us for in-person or online lesson availability.
IP security training course description Connection to the Internet is becoming an essential business tool. This course looks at firewalls, digital certificates, encryption and other essential topics for e-commerce sites. A generic course that looks at firewalls and VPNs. Hands on sessions include using hacking tools and configuring firewalls. What will you learn Describe: Basic security attacks RADIUS SSL IPSec VPNs Implement digital certificates Deploy firewalls to protect Web servers and users. Secure Web servers and clients. IP security training course details Who will benefit: Network administrators. Network operators. Security auditors Prerequisites: TCP/IP foundation for engineers Duration 2 days IP security training course contents TCP/IP review Brief overview of the relevant headers. Hands on Download software for course, use analyser to capture passwords on the wire. Security review Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits The Internet worm, IP spoofing, SYN attack, hijacking, Ping o' Death⦠keeping up to date with new threats. Hands on Use a port scanning tool, use a 'hacking' tool. Firewalls Products, Packet filtering, DMZ, content filtering, stateful packet inspection, Proxies, firewall architectures, Intrusion Detection Systems, Viruses. Hands on Set up a firewall and prevent attacks. NAT NAT and PAT, Why use NAT, NAT-ALG, RSIP. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Run a password-cracking program. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, PPP authentication, RADIUS. Hands on Using certificates. Web client and server security Cookies, browser certificates, censorship, PICS. Operating system security, Web server user authentication, Restricting access, Logging, Securing CGI scripts. Hands on Browser security. VPNs and IPSec What is a VPN, tunnelling, L2F, PPTP, L2TP, IPSec, AH, ESP, transport mode, tunnel mode.
Streaming telemetry training course description An introduction to streaming telemetry. The course progresses from a brief look at the weaknesses of SNMP onto what streaming telemetry is, how it differs from the xflow technologies, the data formats available and how to configure it. What will you learn Describe streaming telemetry. Explain how streaming telemetry works. Describe the data presentation formats available. Configure streaming telemetry. Streaming telemetry training course details Who will benefit: Network engineers. Prerequisites: TCP/IP foundation for engineers. Duration 1 day Streaming telemetry training course content What is streaming telemetry? SNMP weaknesses, Netflow, sflow, polling and the old models, push vs pull, What is streaming telemetry? Telemetry streaming architecture Model driven versus event driven telemetry, subscriptions, publications. Periodic versus on change, model selection and scalability. Telemetry streaming protocols TCP, UDP, SSH, HTTP, HTTP2, NETCONF, RESTCONF, gRPC, gNMI. Models and Encoding The role of YANG. YANG models and tools. XML/ NETCONF, JSON/RESTCONF, JSON over UDP. Protocol buffers/gRPC. Google Protocol Buffers Decoder ring, protocol definition file. GPB-KV, GPB-Compact. Keys. Streaming telemetry configuration Router: Destination, Sensor, subscription. Collector: YANG models, .proto file. Pipeline. ELK: Consume, store, visualise streaming data. Collection tools APIs, YANG development Kit, Downstream consumers, influxdata, Grafana, Kafka, Prometheus, others.