Lawful Intercept training course description Packet based networks require a different approach to Lawful Intercept (LI) than that used in circuit switched networks. This course focuses on what Lawful Interception and Data Retention (DR) means to communications service providers in the IP and NGN areas. The course assumes a basic knowledge of IP networking (i.e. DNS, TCP/UDP, IP, RTP) and the building of services on an IP platform (e.g. SIP, SDP, FTP, HTTP). The course first looks at the regulatory context for LI and DR and how this is translated to a practical architecture. What will you learn Recognise the legal and regulatory obligations to provide LI and DR. Identify the components of the handover architecture for each of LI and DR. Identify the preferred location of points of interception and points of retention in the IP network. Map intercepted material to handover protocols. Understand the data mapping defined in the available standards for both LI and DR. Lawful Intercept training course details Who will benefit: Technical and managerial staff needing to implement public networks. Prerequisites: TCP/IP Foundation Duration 1 day Lawful Intercept training course contents What is meant by LI and DR? Review of regulation: Data protection Directive; Data Retention Directive; RIPA. LI architectures Handover and Interception: ETSI standards ES 201 671 and TS 102 232. LI handover protocol IRI and CC handover; correlation; manual interfaces. DR architectures Handover of query results; points of retention. DR query command set Retrieval of retained records. Security concerns Operation privacy; target privacy; storage and transmission integrity. Implementation Identifying PoI and PoR for provided services. LI and DR wrap up Interaction with other services, storage obligations (volume, time, availability).
FourSquare Training specialise in private, corporate Power Automate courses delivered at your premises and tailored to your needs.
Total sFlow training course description A comprehensive hands on course covering sFlow. The course starts with the basics of flows moving swiftly onto configuring sFlow and studying the information it provides. What will you learn Describe sFlow. Use Nmap. Recognise how sFlow can be used. Describe the issues in using sFlow. Compare SFlow with SNMP and NetFlow. Total sFlow training course details Who will benefit: Technical staff working with sFlow. Prerequisites: TCP/IP foundation for engineers. Duration 1 day Total sFlow training course content What is SFlow? Where to monitor traffic. Packet based sampling, Time based sampling. Adaptive sampling. Flow samples, Counter samples. Hands on Wireshark flow analysis. Getting started with sFlow sFlow configuration. Enabling sFlow. Per interface. Hands on Accessing sFlow data using the CLI. sFlow architecture SFlow agents and collectors. When flows are exported. Distributed sFlow architecture, subagents. sFlow reporting products. SolarWinds. Hands on Collector software. sFlow features and benefits Troubleshooting with sFlow, controlling congestion, security and audit trail analysis. Hands on Using sFlow. sFlow versus other technologies Flows. sFlow impact and scalability. sFlow versus SNMP and RMON, SFlow versus NetFlow/IPFIX. Hands on Advanced sFlow configuration.
DDOS demystified training course description This course covers DDOS attacks and how to defend against them. The course starts by studying DOS attacks and then DDOS attack. Reflectors, booters and stressers are followed by reflection and amplification. Once the various DDOS attacks have been covered we then study the ways to defend against DDOS attacks. What will you learn Describe DDOS. Explain how DDOS attacks work. Recognise DDOS attack types. Describe how to defend DDOS attacks. DDOS demystified training course details Who will benefit: Anyone involved in network security. Prerequisites: Network fundamentals Duration 1 day DDOS demystified training course contents What is DOS? Denial Of Service, outages, Attackers, Command and control, Bots. Why DOS? What is DDOS? Distributed, reflectors, botnets, botnet topologies, amplification, attack bandwidth, attack vectors, booters, stressers, backscatter, DirtJumper, XOR. RUDY. High and Low orbit Ion Cannon. Attack types Application layer attacks, HTTP flood, protocol attacks, SYN floods, teardrop, volumetric attacks, slowloris, DNS cachebusting, fraggle, smurf. IP address spoofing. Reflectors Reflector attacks, amplification attacks, quotients, embedded devices, DNS, NTP, SSDP. DDOS defence Protecting devices from becoming bots. Onsite, outsourced scrubbing, Defending self, defending the Internet, Black hole routing, rate limiting, intelligent application firewalls, anycast, IPS, upstream filtering, BCP38, BCP 140. uRPF.
Frame Relay training course description A comprehensive look at Frame Relay, particularly with reference to a IP routed environment. Note this course is run as a workshop and therefore the contents are flexible. What will you learn Recognise the issues of using Frame Relay Describe Frame Relay. Configure a Cisco router to use Frame relay. Frame Relay training course details Who will benefit: Anyone working with Frame Relay. Prerequisites: Intro to data communications & networking Duration 1 day Frame Relay training course contents Introduction Packet switched networks, PVCs, SVCs. Topologies, Full mesh, partial mesh, Hub and spoke. Basics DLCI, CIR, LMI, the local loop. Configuring routers for Frame Relay Inverse ARP, static mappings, subinterfaces More Frame Relay Burst rates, FECN, BECN, the DE bit, Traffic shaping. Voice Over Frame Relay
Definitive SRv6 course description This one day SRv6 training course is a condensed, intensive program designed to provide network professionals with a fast-track introduction to SRv6 (Segment Routing over IPv6). SRv6 is a revolutionary networking technology that combines the power of IPv6 with the flexibility of Segment Routing, enabling efficient and scalable network operations. In just one day, participants will gain essential knowledge and practical skills to understand, configure, and work with SRv6 in modern network environments. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. What will you learn Explain packet paths when implementing SLB. Explain how SRv6 works. Explain the difference between SR and SRv6. Implement SRv6. Troubleshoot SRv6. Definitive SRv6 course details Who will benefit: Network engineers, architects, and administrators who want to quickly grasp the fundamentals of SRv6 and its practical applications in their network. Prerequisites: Definitive Segment Routing for engineers Duration 1 day Definitive SRv6 course contents Introduction to SRv6 What is SRv6? Source based routing, difference between SR-MPLS and SRv6. IPv6 headers review, routing headers. SRv6 simplified solution. Hands on Enabling IPv6 in the legacy network. SRv6 transport Segment Routing Extension Header. SRv6 segment identifiers. End SID, End.X SID. ISIS distribution of SIDs. Header processing in a SRv6 topology. Locators. Hands on Configuring SRv6 transport. Analysing SRv6 operation. SRv6 services End.DT4 SID, End.DT6 SID. SRH encapsulation modes: Insert and Encap modes. SRv6 TE policy. Hands on Migrating to SRv6, TI-LFA protection. Micro loop avoidance. SRv6 integration with 'older' technologies MPLS. The role of iBGP and eBGP v6 sessions. Hands on Integration with legacy network. Troubleshooting SRv6 SRv6 ping and traceroute. Hands on: Used throughout the course during exercises.
Jenkins training course description An introduction to Continuous Integration and development (CI/CD) in network automation using Jenkins. The course focusses specifically on the network Devops case of using Jenkins. What will you learn Explain how Jenkins can help with network automation. Configure Jenkins for network Devops. Use Jenkins for network automation. Jenkins training course details Who will benefit: Network engineers. Prerequisites: TCP/IP Foundation Duration 1 day Jenkins training course contents What is Jenkins? DevOps, CI/CD, version control systems, git, automating execution of tasks, Jenkins job, Jenkins pipeline, Jenkins plugins, CI server. Hands on Installing Jenkins. Example pipeline for network automation YAML, GitHub, Jenkins, ansible, network devices. Hands on Investigating a workflow: Auto deploying network configurations. Configuring Jenkins Code repository, build triggers, gerrit and reviews, build environment. A Jenkins job, build step, post build actions, running a Jenkins job, build log, home directory. Hands on Configuring Jenkins. CI using Jenkins Branches, pipeline, git, the git plugin. Hands on A Jenkins job to poll, build and unit test network configurations.
Are you looking to create the perfect business strategy to put you higher than your competitors? Are you tired of not hitting your strategic objectives? If your answers to above questions are 'yes', this course helps you a lot. What you will learn: To build your own ‘blue ocean strategy’ to avoid fierce competition & price wars. To understand strategy process and strategy mapping. To appropriately position your company in the marketplace. To make the competition irrelevant. How you will benefit from this workshop: You will gain key insights into the strategy articulation process. We help you develop your leadership skills with some practice. You will learn how to use the Balanced scorecard to map your strategy. You will learn how effective your current differentiation is and how to improve that.
Total FabricPath training course description A comprehensive look at Cisco's FabricPath. This course starts with the problems in traditional switched networks then moves onto to how FabricPath solves these problems. As IS-IS is key to loop free topologies in FabricPath networks, this protocol is also studied. What will you learn Explain the benefits of FabricPath. Explain how FabricPath works Explain the role of IS-IS in FabricPath. Integrate FabricPath into existing networks. Total FabricPath training course details Who will benefit: Technical staff working with FabricPath. Prerequisites: Definitive Ethernet switching for engineers Duration 1 day Total FabricPath training course contents What is FabricPath? Layer 2 versus Layer 3, STP problems: One path, convergence, MAC explosion. Frame routing. Shortest path. Comparison with TRILL. FabricPath architecture Core and edge, VLANs, vPC+. IS-IS Link layer IS-IS, SPF trees, traffic management. IS -IS extensions for FabricPath. ISIS TLV. FabricPath forwarding Routing table, Switch IDs, multi destination trees, IGMP snooping. Roots. MAC versus switch tables. FabricPath Dynamic Resource Allocation Protocol (DRAP). FabricPath frames Encapsulation, frame format, Switch ID, Forwarding tag. Miscellaneous Basic configuration, interoperation with STP, TCN forwarding