The NVQ Level 3 Diploma in Trowel Occupations provides a nationally recognised qualification for those working in the construction and the built environment and specialise in the erection of masonry structures. Upon completion of the qualification, you will be awarded the NVQ Level 3 Diploma in Trowel Occupations which allows the holder to obtain the Gold Advanced Craft CSCS Card. The qualification modules will be discussed and agreed upon with each individual candidate to ensure that the qualification will be suited to your job role. Each candidate will be allocated a qualified assessor to provide support throughout the qualification and provide information, advice and guidance to candidates in order that they can achieve the qualification. If you require further information or are looking to undertake this qualification, please contact us. CSCS Cards Candidates can undertake the CSCS test and obtain the red (Provisional) CSCS card on signing up for various Train 4 Growth qualifications. The red card can usually be obtained within 7 to 14 days and can be used to access the construction sites for a period of 12 months. Upon completion the card is upgraded to the full 5 year CSCS Card.
ISDN training course description A comprehensive look at ISDN, as used in voice and data environments. What will you learn Recognise the issues and impacts of using dial up networks. Describe ISDN. Describe ISDN signalling in voice and data environments. Configure a Cisco router to use ISDN. ISDN training course details Who will benefit: Anyone working with ISDN. Prerequisites: Intro to data communications & networking Duration 2 days ISDN training course contents Introduction Dialup connectivity vs. leased lines vs. packet switched networks. ISDN offerings, services, benefits vs. modems. ISDN architectures Use of ISDN by routers, Dial up, top up, backup. Internet access, PCs and ISDN. BRI and PRI ISDN switches, B channels, D channel, ISDN functions and reference points, NT1, NT2, TE1, TE2, Terminal adapters, R,S,T,U interfaces, ISDN standards. PPP Encapsulation, PPP services, PAP and CHAP, Multilink PPP, BACP. ISDN and the seven layer model B channel layers versus D channel layers, the I standards, Q.921, Q.931. Configuration issues for ISDN E.164 addressing and IP addresses, ensuring only the correct traffic brings up the ISDN line. ISDN services Bearer services, teleservices, supplementary services, MSN, sub addressing, CLIâ¦
CCNP (ENARSI) training course description The Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) v1.0 gives you the knowledge you need to install, configure, operate, and troubleshoot an enterprise network. This course covers advanced routing and infrastructure technologies, expanding on the topics covered in the Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.0 course. This course helps prepare for the exam, Implementing Cisco Enterprise Advanced Routing and Services (300- 410 ENARSI), which leads to the new CCNP What will you learn Gain the knowledge you need to install, configure, operate, and troubleshoot an enterprise network. Qualify for professional-level job roles in advance routing and services Prepare for the Implementing Cisco Enterprise Advanced Routing and Services Exam (300-410 ENARSI). CCNP (ENARSI) training course details Who will benefit: Enterprise network engineers, System engineers, System administrators, Network administrators. Prerequisites: CCNP core Duration 5 days CCNP (ENARSI) training course content Course Objectives Configure classic Enhanced Interior Gateway Routing Protocol (EIGRP) and named EIGRP for IPv4 and IPv6 Optimize classic EIGRP and named EIGRP for IPv4 and IPv6 Troubleshoot classic EIGRP and named EIGRP for IPv4 and IPv6 Configure Open Shortest Path First (OSPF)v2 and OSPFv3 in IPv4 and IPv6 environments Optimize OSPFv2 and OSPFv3 behaviour Troubleshoot OSPFv2 for IPv4 and OSPFv3 for IPv4 and IPv6 Implement route redistribution using filtering mechanisms Troubleshoot redistribution Implement path control using Policy-Based Routing (PBR) and IP Service Level Agreement (SLA) Configure Multiprotocol-Border Gateway Protocol (MPBGP) in IPv4 and IPv6 environments Optimize MPBGP in IPv4 and IPv6 environments Troubleshoot MPBGP for IPv4 and IPv6 Describe the features of Multiprotocol Label Switching (MPLS) Describe the major architectural components of an MPLS VPN Identify the routing and packet forwarding functionalities for MPLS VPNs Explain how packets are forwarded in an MPLS VPN environment Implement Cisco Internetwork Operating System (IOS) Dynamic Multipoint VPNs (DMVPNs) Implement Dynamic Host Configuration Protocol (DHCP) Describe the tools available to secure the IPV6 first hop Troubleshoot Cisco router security features Troubleshoot infrastructure security and services Course Outline Implementing EIGRP Optimizing EIGRP Troubleshooting EIGRP Implementing OSPF Optimizing OSPF Troubleshooting OSPF Configuring Redistribution Troubleshooting Redistribution Implementing Path Control Implementing Internal Border Gateway Protocol (IBGP) Optimizing BGP Implementing MP-BGP Troubleshooting BGP Exploring MPLS Introducing MPLS L3 VPN Architecture Introducing MPLS L3 VPN Routing Configuring Virtual Routing and Forwarding (VRF)-Lite Implementing DMVPN Implementing DHCP Introducing IPv6 First Hop Security Securing Cisco Routers Troubleshooting Infrastructure Security and Services Troubleshooting with DNA Center Assurance. Lab outline Configure EIGRP Using Classic Mode and Named Mode for IPv4 and IPv6 Verify the EIGRP Topology Table Configure EIGRP Stub Routing, Summarization, and Default Routing Configure EIGRP Load Balancing and Authentication Troubleshoot EIGRP Issues Configure OSPFv3 for IPv4 and IPv6 Verify the LinkState Database Configure OSPF Stub Areas and Summarization Configure OSPF Authentication Troubleshoot OSPF Issues Implement Routing Protocol Redistribution Manipulate Redistribution Manipulate Redistribution Using Route Maps Troubleshoot Redistribution Issues Implement PBR Configure IBGP and External Border Gateway Protocol (EBGP) Implement BGP Path Selection Configure BGP Advanced Features Configure BGP Route Reflectors Configure MP-BGP for IPv4 and IPv6 Troubleshoot BGP Issues Configure Routing with VRF -Lite Implement Cisco IOS DMVPN Obtain IPv6 Addresses Dynamically Troubleshoot DHCPv4 and DHCPv6 Issues Troubleshoot IPv4 and IPv6 Access Control List (ACL) Issues Configure and Verify Unicast Reverse Path Forwarding (uRPF) Troubleshoot Network Management Protocol Issues: Lab 1 and 2
RFID training course description This training course focuses on the technologies used in Radio Frequency Identification (RFID). What will you learn Describe the RFID architecture. Design RFID systems. Evaluate tag types. Recognise common RFID problems. RFID training course details Who will benefit: RFID technologists and system engineers. Prerequisites: RF fundamentals. Duration 2 days RFID training course contents What is RFID? Review of RF basics, what is RFID, RFID history, RFID base system architecture, frequency bands used by RFID, comparison with barcodes. RFID applications Supply chain, asset tracking, theft reduction, retail, access control, tolls. Tags Tag features, types of tag, passive and active, chips, read only, read write, affixing tags, selecting location to affix a tag, tag orientation and location, tag stacking, impact of rate of movement, tag data formats. Interrogators/readers Interrogation zones, interrogator types, antennas, read distance tests, multiple interrogators, synchronisation, dense interrogator environment issues. RFID peripherals. Standards and regulations Global regulatory requirements, regional regulatory requirements, ISO, ETSI, FCC, EPC, safety regulations/issues. Testing and troubleshooting Read rate problems, improperly tagged items, tag failure. RFID system design Antenna types, interference, antenna location and spacing, how many antennas? How many interrogators? tag types, grounding considerations, cabling, site diagrams.
The NVQ Level 3 Diploma in Insulation and Building Treatments provides a nationally recognised qualification for those working in the construction and the built environment sector and specialise in one or more of the following categories: External Wall Insulation Room in the Roof Park Homes Hybrid Wall Insulations Insulating Framed Sections The qualification modules will be discussed and agreed upon with each individual candidate to ensure that the qualification will be suited to your job role and will be achievable in order to demonstrate their competence and become eligible for the Gold CSCS Card. Each candidate will be allocated a designated and qualified assessor to provide support throughout the qualification and provide information, advice and guidance to candidates in order that they can achieve the qualification. If you require further information or are looking to undertake this qualification, please contact us. CSCS Cards Candidates can undertake the CSCS test and obtain the red (Provisional) CSCS card on signing up for various qualifications. The red card can usually be obtained within 7 to 14 days and can be used to access the construction sites for a period of 12 months. On completion of the qualification, you will receive a full advanced craft, 5 year, CSCS card.
Essential GEPON training course description Designed to benefit those requiring an in depth knowledge of the principles and applications of the IEEE Ten Gigabit Ethernet and Gigabit Ethernet Passive Optical Networking and Fibre to the X in NG network applications and their associated equipment, its flexibility and function within a modern transmission network. Using an effective mix of instruction and correlation to theory based learning the delegate will gain a complete understanding of the equipment and the tasks to be undertaken in a real life situation. What will you learn Compare FTTx networks. Compare PON variants. Recognise the GEPON architecture. Explain how GEPON works. Recognise GEPON issues. Essential GEPON training course details Who will benefit: Anyone requiring GEPON knowledge. Prerequisites: Introduction to data communications and networking. Duration 2 days Essential GEPON training course contents FTTN, FTTC, FTTH Single Mode Fibre (SMF) and various types, Multimode Fibre (MMF), Fibre Safety and properties (Dispersion/attenuation), Fibre Reel cables and types, Fibre installation and air blown fibre, Transmitters and receivers - power budget/laser classes, Fibre to the home (FTTH), FTTC (Fibre to the Cabinet), FTTN (Fibre to the node), FTTD (Fibre to the Desk), FFTH Topologies and wavelengths, Active or Passive Optical Network (PON). WDM equipment and GPON OSP design Wavelength considerations, WDM/DWDM/CWDM EDFA optical amplification, AWG (Arrayed Waveguide Grating) splitters, Couplers (splitters) and losses, Optical splitters 1x2, 1x4, 1x8, 1x16, 1x32, 1x64, 2x64. IEEE PON variants Gigabit Ethernet Passive Optical Network (GEPON), Time Division PON (TDM-PON), Wave Division Multiplexing PON (WDM-PON), 1Gbps, 10Gbps, 40Ggps, 100Gbps, Strategies for TDM-PON to WDM-PON migration, Architecture of NG-PON (hybrid WDM/TDM PON), Additional services than triple play. GEPON design GEPON OSP centralized design, GEPON OSP distributed design, GEPON PON splitters x4 x8 x32, Fibre splice trays / fibre cassette trays / fibre enclosures, GEPON field testing /GEPON field installation verification, GEPON physical layer testing, Optical Time Domain Reflectometer (OTDR), Optical power source /Optical power meter, Optical Return Loss (ORL), APON/BPON/GPON/EPON/GEPON/10-GEPON comparison. IEEE 802.3ah GEPON: Ethernet in the first mile IEEE 802.3 options, Optical Ethernet options, Ethernet in the first mile, 1000BASE-LX, 1000BASE-SX, IEEE 802.1Q VLANs, Q-in-Q and MAC-in-MAC. QofS Ethernet TOS and priority methods PCP and DiffServe, Reference model / terminology / architecture, Example of ONT functional blocks, Example of OLT functional blocks, FTTx scenarios, The four switching arrangements for external access network backup. IEEE 802.3av 10-GEPON Physical layer, 10GBASE-SR, 10GBASE-LX4, 10GBASE-ER, 10GBASE-LR, 10GBASESW, 10GBASE-LW, 10GBASE-EW, Enhancement band, Bit rate and wavelengths, Compatibility, Forward error correction. IEEE 802.3ca 25G, 50G and 100G NG-EPON MAC frame structure, Downstream multiplexing / Upstream multiplexing, Media access control and ONU registration, Alarm messages. IEEE 802.3bk extended EPON Laser Types PRX40 and PR40, Reference model. GEPON issues and standards GEPON components OLT / GEPON ONT and examples GEPON management, RG (Residential Gateway), HPNA (Home Phone Network Alliance), Power Line Carrier (PLC), GPON DLNI, G.hn or G.9960 MOCA, FTTH Council certification, Standard for network certification, Qualify for use of the fibre-connected home badge, GEPON frame synchronization to network timing, Direct clock synchronization interface (BITS), Multiservice Access Platform (MSAP), Software planning tool. Superconnected cities / voucher scheme. Ethernet OAM Link monitoring, remote failure indication, Remote loopback.
Database design training course description Although this course mentions Microsoft Access the same course can be run with a variety of different databases. The duration of the course is dependent on the experience of the delegates. What will you learn Name and give 3 types of database structure. Explain the difference between standard SQL and different flavours. Use SQL statements to query databases. Use SQL statements to query and define databases. Describe the principles of relational database design and 3 types of relational joins. Normalise a given flat file table into relational tables. Database design training course details Who will benefit: Anyone who needs to be able to design an efficient, watertight database following the best practice of the principles of Relational Database design. Prerequisites: None. Duration 3 days Database design training course contents Database structure and terminology. Principles of Relational Database Design. Types of relationship. Normal Forms. Practical examples of relational database design. Hands-on creation of a database. On paper design a relational database applicable to the delegates work.
Python training course description This Python course focusses on teaching Python for use in network automation and network DevOps. We focus on getting delegates up and running with Python and network automation as quickly as possible rather than making them great programmers. In other words we concentrate on enabling delegates to use network automation libraries such as netmiko, NAPALM and Nornir, and APIs such as NETCONF and RESTCONF rather than enabling delegates to produce object oriented programs. Hands on sessions use Cisco and Juniper devices. What will you learn Run Python programs. Read Python programs. Write Python programs. Debug Python programs. Automate network tasks with Python programs. Configure network devices with Python. Collect data from network devices with Python. Python training course details Who will benefit: Network engineers. Prerequisites: TCP/IP Foundation Duration 5 days Python training course contents What is Python? Programming languages, Why Python? Python in interactive mode, Python scripts, ipython, Python version 2 versus version 3. A simple Python script. Comments. Hands on Installing Python, Hello world. A network example On box vs off box Python. telnet, ssh, NETCONF, HTTP, APIs, manufacturers and API support, analysis of a simple telnetlib program. Hands on Using Python to retrieve the configuration from a network device. Using wireshark to analyse the actions. Python basics I/O, operators, variables and assignment, types, indentation, loops and conditionals. Hands on Modifying the telnet program, changing configurations on a network devices. Functions, classes and methods What are functions, calling functions, builtin functions, useful builtin functions, file handling, classes, objects, creating instances. Hands on Storing configurations in files, configuring devices from files, using an inventory file to work on multiple devices. Libraries and modules Modules, files and packages, import, from-import, Python standard library, other packages, pip install, executing other programs. Managing python libraries. Hands on Using pip, installing and using ipaddress, subprocess to access netsnmp. For the more advanced, using the sockets library. Paramiko and netmiko SSH, enabling SSH on devices, keys. Paramiko versus netmiko, example scripts. pexpect. Hands on Configuring VLANs from Python. pySNMP Gathering facts using previous methods, SNMP review, pySNMP GET, pySNMP and SNMPv3. easySNMP library. Hands on Walking a MIB from Python. NETCONF What is NETCONF? Enabling NETCONF on devices, A first ncclient script, device handlers, get_config, edit_config, copy_config, delete_config, commit, validate, pyEZ, utils_config, utils.sw. Hands on Configuration using ncclient and PyEZ. This session is expanded for those interesting in JunOS automation. Manipulating configuration files Builtin functions, string handling. Unicode. Sequences, strings, lists, tuples. Dictionaries. TextFSM. Regular expressions. JSON, YAML, XML, YANG, Jinja2, templates. Hands on Jinja2 templating with Python to configure network devices. NAPALM Getters, configuration operations, supported devices, NAPALM transport, Config-replace, Config-merge, Compare config, Atomic changes, rollback. Example NAPLAM scripts. Hands on Using NAPALM to gather facts, Using NAPALM for configuration management REST and RESTCONF What is REST, HTTP methods, GET, POST, cURL, Postman, Python requests library. RESTCONF, a RESTCONF example. Hands on Modifying a configuration using RESTCONF. Scapy What is scapy, Scapy in interactive mode, Scapy as a module. Hands on Packet crafting from Python. Warning Errors and exceptions, Exception handling, try, except. Memory management. Garbage collection. Context management, With. Hands on Improving Python code. Nornir What is Nornir? A network automation framework, inventories, connection management and parallelization. Nornir architecture and other libraires. Hands on Setting up nornir, nornir fact gathering, nornir tasks. Optional Writing your own functions, Writing your own classes. pyntc. Hands on Writing reusable code.
Cyber security training course description This cyber security course focusses on the network side of security. Technologies rather than specific products are studied focussing around the protection of networks using firewalls and VPNs. What will you learn Describe: - Basic security attacks - RADIUS - SSL - VPNs Deploy firewalls and secure networks Explain how the various technologies involved in an IP VPN work. Describe and implement: - L2TP - IPsec - SSL - MPLS, L3, VPNs. Cyber security training course details Who will benefit: Anyone working in the security field. Prerequisites: TCP/IP foundation for engineers Duration 5 days Cyber security training course contents Security review Denial of service, DDOS, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits IP spoofing, SYN attacks, hijacking, reflectors and amplification, keeping up to date with new threats. Hands on port scanning, use a 'hacking' tool. Client and Server security Windows, Linux, Log files, syslogd, accounts, data security. Hands on Server hardening. Firewall introduction What is a firewall? Firewall benefits, concepts. HAnds on launching various attacks on a target. Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls. Firewall products. Hands on Simple personal firewall configuration. Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on SPI firewalls. Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall plusses and minuses. Hands on Proxy firewalls. Firewall architectures Small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Password cracking. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, RADIUS. Hands on Using certificates. VPN overview What is a VPN? What is an IP VPN? VPNs vs. Private Data Networks, Internet VPNs, Intranet VPNs, Remote access VPNs, Site to site VPNs, VPN benefits and disadvantages. VPN Tunnelling VPN components, VPN tunnels, tunnel sources, tunnel end points, tunnelling topologies, tunnelling protocols, which tunnelling protocol? Requirements of tunnels. L2TP Overview, components, how it works, security, packet authentication, L2TP/IPsec, L2TP/PPP, L2 vs L3 tunnelling. Hands on Implementing a L2TP tunnel. IPsec AH, HMAC, ESP, transport and tunnel modes, Security Association, encryption and authentication algorithms, manual vs automated key exchange, NAT and other issues. Hands on Implementing an IPsec VPN. SSL VPNs Layer 4 VPNs, advantages, disadvantages. SSL. TLS. TLS negotiation, TLS authentication. TLS and certificates. Hands on Implementing a SSL VPN. MPLS VPNs Introduction to MPLS, why use MPLS, Headers, architecture, label switching, LDP, MPLS VPNs, L2 versus L3 VPNs. Point to point versus multipoint MPLS VPNs. MBGP and VRFs and their use in MPLS VPNs. Hands on Implementing a MPLS L3 VPN. Penetration testing Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology. Hands on Hacking tools and countermeasures.
Netgear switches training course description A hands on course covering the product specifics of Netgear switches. Installation, configuration, maintenance and troubleshooting are all covered in a practical oriented way. What will you learn Install Netgear switches. Use the command line interface and the web based interface to manage Netgear switches. Configure and troubleshoot Netgear switches. Perform software upgrades. Netgear switches training course details Who will benefit: Anyone working with Netgear switches. Particularly aimed at engineers and technicians supporting Netgear switches. Prerequisites: None. Duration 2 days Netgear switches training course content Introduction How Ethernet works with hubs, How Ethernet works with switches. Installing Netgear switches. Hands on Building a network with a hub, building a network with a Netgear switch. Basic troubleshooting The Netgear switch range, LEDs, cabling issues, factory resets, default settings. Hands on Building a network with multiple Netgear switches. Configuration methods Managed vs. unmanaged switches, Console port access, telnet, web based access, SNMP, saving configurations, NVRAM, switch stacks, stacking ports. Hands on Accessing the switch using the console, IP address configuration, telnet. Console interface Password protection, the menus, menu options. Hands on Setting a password, displaying the switch configuration. Web based interface Getting started, basic format. Hands on Configuring the switch using the web interface. Port configuration Common port configuration tasks, port trunking. Hands on Configuring ports. STP configuration What is STP? Configuring STP. Hands on Enabling and disabling STP, configuring STP VLAN configuration What are VLANS? 802.1Q, tagged/untagged, creating VLANS, applying VLANS. Hands on Setting up VLANS, setting up 802.1Q, Inter VLAN traffic. Housekeeping TFTP, upgrades Hands on Boot from net. SNMP SNMP configuration, NMS's. Hands on Using SNMP to manage a Netgear switch, putting it all together: troubleshooting.