• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

914 Courses in London

Securing Microsoft systems

5.0(3)

By Systems & Network Training

Microsoft security training course description A hands on training course focusing on security in the Microsoft environment. The course progresses from patch management onto the use of Microsoft security tools. Then server, desktop and network security are studied in the Microsoft environment. What will you learn Use Microsoft security tools. Secure Microsoft servers. Secure Microsoft desktops. Secure Microsoft networks. Microsoft security training course details Who will benefit: Technical server support staff. Technical desktop support staff. Technical network staff. Technical security staff. Prerequisites: Supporting Windows server 2016 Networking Microsoft systems. Duration 3 days Microsoft security training course contents Introduction Security threats, Microsoft defaults, admin accounts, security patches, patch management, patch tools. Hands on: Studying Microsoft defaults, applying security patches. Microsoft security tools Microsoft updates, WSUS, Inventory tool, baseline security analyser, URLscan, EventCombMT, Cipher security tool, Port reporter, PortQry. Tools hackers use. Hands on: Using Microsoft security tools. Server security Checklists, core server security, AD, Member server security, Domain controller security, Specific roles. Hands on Hardening Microsoft servers, security templates. Active Directory Admin authority in AD, group policy, trust and authentication. Desktop security Checklists, core client security, anti virus software, anti spyware software, firewalls, securing clients with AD, securing clients with group policy, software restriction policies. Hands on Securing Microsoft desktops. Network security Checklist, IP security, VPNs, PKI, certificate authorities, RAS, RRAS, IAS. Hands on: VPN configuration, IAS configuration. Monitoring Auditing, authorisation and logons, tracking, system monitoring, detecting attacks. Hands on: Monitoring Microsoft systems. Summary Microsoft security response centre, security advisories.

Securing Microsoft systems
Delivered in Internationally or OnlineFlexible Dates
£3,497

Definitive Salt for engineers

5.0(3)

By Systems & Network Training

Definitive Salt training course description Salt is a remote execution framework and configuration management system. This course covers Salt from the basics. After a quick first taste the course moves onto execution modules, salt states, minion and master data, jinja, Salt extensions and then topology and configuration options. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. What will you learn Install and use Salt. Describe the architecture of Salt. Manage configurations with Salt. Extend Salt. Definitive Salt training course details Who will benefit: Anyone working with Salt. Prerequisites: Linux fundamentals. Duration 2 days Definitive Salt training course contents Introduction What is Salt? High- level architecture, Some quick examples, system management, configuration management, A brief history, Topology options, Extending Salt. Quick start: First taste of Salt Single-master setup, from packages, bootstrap scripts, Starting up, Basic commands, salt: the main workhorse, salt-key: key management, salt-call: execution on the minion, salt-run: co-ordination of jobs on the master, summary of commands, Key management, viewing keys, accepting keys, rejecting keys, key files, Minion targeting, minion ID, list (-L), glob, regular expressions (-E), grains (-G), compound (-C), targeting summary, Additional remote execution details, Conclusion. Execution modules: The functional foundation sys: information and documentation about modules, sys.doc basic documentation, sys.list_modules, sys.list_functions: simple listings, cmd: execute via shell, cmd.run: run any command, pkg: manage packages, virtual modules, pkg.lists_pkgs: list all installed packages, pkg.available version: see what version will be installed, pkg.install: install packages, user: manage users, user.add: add users, user.list_users, user info: get user info, saltutil: access various Salt utilities, Summary. Configuration management: Salt states Salt files overview, SLS example: adding a user, working with the multi-layered state system, Highstate and the top file, the top file, State ordering, require: depend on another state, watch: run based on other changes, odds and ends, Summary. Minion data / master data Grains are minion data, performing basic grain operations, setting grains, targeting with grains in the top file, Pillars are data from the master, querying pillar data, querying other sources with external pillars, Renderers give data options. Extending Salt: part I Introduction to Jinja, Jinja basics, Templating with Jinja, filtering by grains, Custom execution module, Custom state modules, Custom grains, External pillars, Summary. More on the matter Runners, manage minions, manage jobs, The orchestrate runner, The event system, The reactor system, Summary. Extending Salt: part II Python client API, reading configuration data on a master and minion, using the master client (localclient) API, Using the caller client API, Custom runners, writing a custom runner, using the runnerclient API, Summary. Topology and configuration options Master configuration, directories and files, logging, access control, files server options, Topology variations, masterless minions, peer systems, syndication masters, multiple masters. Brief introduction to salt-cloud Overview, Setup AWS and salt-cloud, installing salt-cloud, cloud providers, cloud profiles, cloud maps, Introspection via salt cloud, Creating infrastructure, More information. Using vagrant to run Salt examples YAML.

Definitive Salt for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,727

SDH foundation

5.0(3)

By Systems & Network Training

SDH training course description Our SDH training course is designed for those with a basic knowledge of the principles of telecommunication digital transmission techniques. An overview of the existing transmission hierarchies and their limitations is provided with an introduction to the Synchronous Digital Hierarchy (SDH). The advantages of SDH are explained fully. What will you learn Identify the major limitations of the PDH network. Outline the advantages of using the SDH. Illustrate the various SDH equipment and network topologies. Describe the principles of the SDH multiplexing structure. SDH training course details Who will benefit: Anyone working with SDH. Prerequisites: It should be noted that this course will assume some basic telecommunication transmission knowledge from the delegates attending. This may be accomplished by attending the Introduction to Telecommunications course. Duration 2 days SDH training course contents Introduction to SDH Timing and synchronisation of digital signals, the plesiochronous digital hierarchy (PDH), the synchronous digital hierarchy (SDH), service protection with SDH SDH Multiplexing Techniques The multiplexing principles of SDH, mapping and aligning a 2Mbit/s tributary into a TU-12, aligning the VC-12 in a TU-12, multiplexing TU-12's into a TUG-2, multiplexing TUG-2's into a TUG-3, multiplexing TUG-3's into a VC-4, the VC-4 path overhead, the STM-1 frame, the AU-4 pointer, the STM-1 section overheads, multiplexer section protection, transmission at rates higher than STM-1, concatenation line transmission functions in SDH SONET Multiplexing Techniques Mapping a DS1 tributary into a virtual tributary, aligning the VT-SPE into a VT frame, mapping the VTGs into a STS-1 SPE, the STS-1 synchronous payload envelope, the STS-1 frame SONET network sections and lines transmissions at higher rates than STS-1 SDH Functions and Facilities SDH network topologies, structure of SDH equipment, synchronisation of SDH networks, protection switching in SDH networks, SDH alarm structure, SDH performance monitoring, testing of SDH, equipment and systems, network management and SDH, asynchronous transfer mode (ATM), future services and technologies OSI Telecommunications Network Management Definition of network management, managing telecom equipment, the managed object library, the management information base, the telecommunications management network (TMN), the Q3 protocol.

SDH foundation
Delivered in Internationally or OnlineFlexible Dates
£1,497

PRINCE2 Foundation: In-House Training

By IIL Europe Ltd

PRINCE2® Foundation: In-House Training Projects fail for a variety of reasons including poor planning, lack of defined quality criteria, poor understanding of the business drivers, inadequate control, and lack of senior management involvement in other words, lack of a structured best practice approach to project delivery. PRINCE2® (6th Edition is the current version) is a structured, process-based approach to project management providing a methodology which can be easily tailored and scaled to suit all types of projects. It is the de facto standard for project management in the UK Government and is used extensively in more than 150 countries worldwide with in excess of 20,000 organizations already benefiting from its powerful approach. It can be used easily in combination with PMI®'s PMBOK® Guideto provide a robust project management methodology, or to augment an existing PMBOK®-based methodology with additional rigor around areas such as Quality, Organization, and Benefits Realization. The goals of this course are to provide participants with a thorough grounding in PRINCE2® and its benefits and to prepare them to sit the Foundation exam. What you will Learn You'll learn how to: Identify the benefits and principles underlying a structured approach to project management Define the PRINCE2® method in depth, including the principles, themes, and processes Prepare and practice for the Foundation exam Getting Started Introductions Course structure Course goals and objectives Overview of the PRINCE2® Foundation exam PRINCE2® Introduction Introducing PRINCE2® The structure of PRINCE2® What PRINCE2® does not provide What makes a project a 'PRINCE2® project'? Project Management with PRINCE2® Defining a project Managing a project Controlling the variables The Project Manager's work PRINCE2 Principles PRINCE2® Principles The Seven Principles Tailoring and Adopting PRINCE2® Defining tailoring Defining embedding What can be tailored? Who is responsible for tailoring? Introduction to the PRINCE2® Themes What is a PRINCE2® Theme? What are the PRINCE2® Themes? Tailoring the themes Format of the theme chapters Business Case Need for a business case Elements of a business case How a business case is developed Managing Benefits Organization Need for a special type of organization PRINCE2® organization structure Roles in a PRINCE2® project Combining roles Quality Relevance of quality to project work Quality, quality control, and quality assurance Quality management approach and the quality register Who is responsible for quality? Plans Need for plans and their hierarchy Approach to planning Content of a PRINCE2® plan Product-based planning Risk The need to manage risks What is a risk? Risk and continued business justification A risk management option Change Change is inevitable Different types of change Baselines and configuration management Issue and change control in PRINCE2® Progress Controlling a PRINCE2® project The application of tolerance Types of control Raising exceptions Introduction to Processes Processes and the project lifecycle The PRINCE2® journey Structure of the process chapters Tailoring the processes Starting up a Project Appointing people to the PRINCE2® roles Establishing some baselines Should we go further with this work? Planning for initiation Directing a Project Should we start / continue the project? Responding to internal / external influences Should we close this project? Initiating a Project Establishing the project's approaches Creating the project plan Refining the business case Assembling the PID Controlling a Stage Authorizing and reviewing work Monitoring and reporting Handling non-planned situations Triggering the next process Managing Product Delivery Accepting work from the Project Manager Getting the work done by the team Routine and non-routine reporting Handing back the completed work Managing a Stage Boundary Taking stock of what we have done Updating the PID Consider the options for continuing / stopping Producing exception plans Closing a Project PRINCE2® at the end of a project Transition of product to operational use How well did we do? Tying up all the loose ends

PRINCE2 Foundation: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,995

PRINCE2 Foundation

By IIL Europe Ltd

PRINCE2® Foundation Projects fail for a variety of reasons including poor planning, lack of defined quality criteria, poor understanding of the business drivers, inadequate control, and lack of senior management involvement in other words, lack of a structured best practice approach to project delivery. PRINCE2® (6th Edition is the current version) is a structured, process-based approach to project management providing a methodology which can be easily tailored and scaled to suit all types of projects. It is the de facto standard for project management in the UK Government and is used extensively in more than 150 countries worldwide with in excess of 20,000 organizations already benefiting from its powerful approach. It can be used easily in combination with PMI®'s PMBOK® Guideto provide a robust project management methodology, or to augment an existing PMBOK®-based methodology with additional rigor around areas such as Quality, Organization, and Benefits Realization. The goals of this course are to provide participants with a thorough grounding in PRINCE2® and its benefits and to prepare them to sit the Foundation exam. What you will Learn You'll learn how to: Identify the benefits and principles underlying a structured approach to project management Define the PRINCE2® method in depth, including the principles, themes, and processes Prepare and practice for the Foundation exam Getting Started Introductions Course structure Course goals and objectives Overview of the PRINCE2® Foundation exam PRINCE2® Introduction Introducing PRINCE2® The structure of PRINCE2® What PRINCE2® does not provide What makes a project a 'PRINCE2® project'? Project Management with PRINCE2® Defining a project Managing a project Controlling the variables The Project Manager's work PRINCE2 Principles PRINCE2® Principles The Seven Principles Tailoring and Adopting PRINCE2® Defining tailoring Defining embedding What can be tailored? Who is responsible for tailoring? Introduction to the PRINCE2® Themes What is a PRINCE2® Theme? What are the PRINCE2® Themes? Tailoring the themes Format of the theme chapters Business Case Need for a business case Elements of a business case How a business case is developed Managing Benefits Organization Need for a special type of organization PRINCE2® organization structure Roles in a PRINCE2® project Combining roles Quality Relevance of quality to project work Quality, quality control, and quality assurance Quality management approach and the quality register Who is responsible for quality? Plans Need for plans and their hierarchy Approach to planning Content of a PRINCE2® plan Product-based planning Risk The need to manage risks What is a risk? Risk and continued business justification A risk management option Change Change is inevitable Different types of change Baselines and configuration management Issue and change control in PRINCE2® Progress Controlling a PRINCE2® project The application of tolerance Types of control Raising exceptions Introduction to Processes Processes and the project lifecycle The PRINCE2® journey Structure of the process chapters Tailoring the processes Starting up a Project Appointing people to the PRINCE2® roles Establishing some baselines Should we go further with this work? Planning for initiation Directing a Project Should we start / continue the project? Responding to internal / external influences Should we close this project? Initiating a Project Establishing the project's approaches Creating the project plan Refining the business case Assembling the PID Controlling a Stage Authorizing and reviewing work Monitoring and reporting Handling non-planned situations Triggering the next process Managing Product Delivery Accepting work from the Project Manager Getting the work done by the team Routine and non-routine reporting Handing back the completed work Managing a Stage Boundary Taking stock of what we have done Updating the PID Consider the options for continuing / stopping Producing exception plans Closing a Project PRINCE2® at the end of a project Transition of product to operational use How well did we do? Tying up all the loose ends

PRINCE2 Foundation
Delivered In-Person in LondonFlexible Dates
£1,995

Ansible for engineers

5.0(3)

By Systems & Network Training

Ansible for engineers training course description An introduction to automation using ansible. Ansible is a general purpose IT automation platform that can be use for a number of purposes. The course covers configuration management, cloud provisioning and application deployment with ansible. Hands on sessions follow all major sections. What will you learn Install ansible. Automate tasks with ansible. Write ansible playbooks. Ansible for engineers training course details Who will benefit: Administrators and developers automating tasks. Prerequisites: Linux administration skills Duration 3 days Ansible for engineers training course contents What is ansible? The language, the engine, the framework. Uses of ansible, orchestration. Hands on Installing ansible. Ansible architecture ible architecture Controlling machines, nodes, Agentless, SSH, modules, JSON protocol. Configuration management, inventories, playbooks, modules, roles. Hands on Getting started, running ad hoc commands. Ansible and Vagrant Prototyping and testing. Hands on Using ansible with Vagrant. Ad hoc commands Parallelism, shell commands, managing files and directories, file transfer, package management, manage user and groups, deploying applications, service management, background jobs, checking log files, managing cron jobs. Hands on Using ansible with Vagrant. Playbooks ansible-playbook, users, sudo, YAML, plays, tasks, handlers, modules. Hands on Running playbooks. More playbooks Handlers, variables, environmental variables, playbook variables, inventory variables, variable scope and precedence, accessing variables, facts, ansible vault. Conditionals, wait_for. Hands on Using variables and conditions in playbooks. Roles and includes Dynamic includes, Handler includes, playbook includes. Roles, role parts: handlers, files, templates, cross platform roles, ansible galaxy. Hands on includes example, building roles. Inventories /etc/ansible/hosts, inventory variables, static inventories, dynamic inventories. Hands on Inventories and variables. Miscellanea Individual server cookbooks, Main playbook for configuring all servers. Hands onPlaybooks.

Ansible for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,497

Complete REXX programming

5.0(3)

By Systems & Network Training

REXX training course description A hands on training course covering the Restructured EXtended eXecutor (REXX) language. A large number of exercises are used to reinforce and emphasise lecture sessions. What will you learn Write REXX programs. Debug REXX programs. Examine existing code and determine its function. REXX training course details Who will benefit: Anyone wishing to learn REXX. Prerequisites: None although experience in another high level language would be useful. Duration 3 days REXX training course contents Introduction to REXX What is REXX? REXX environments, invoking a REXX exec, a sample REXX exec, REXX clause types. REXX variables and data Literal data, variable data, assignment, simple variables, compound variables, stem variables, constant data, numeric data, arithmetic operations, character manipulation, hexadecimal data. The parse instruction Parse format, Parse examples, Parse arg, Parse pull, Parse value, special templates, place holders, literal templates, numeric templates, variable templates. Control structures Relational conditions, logical operators, simple selection, looping: uncontrolled and controlled loops, infinite loops, conditional loops, controlling loops, leave, iterate, multiple selection, instructions for subroutines, exit. Sub routines and functions Internal and external subroutines, call, ARG(), ARG(n)return, exit, scope of variables, procedure, functions, built in functions, overriding built in functions. Performing I/O Command conventions, preparing to read a file, execio, limitations, execio for reading, DISKR, DISKRU, DISKW, return codes. External functions listdsi, msg, outtrap, prompt, sysdsn, sysvar, storage Tracing Immediate commands, the trace facility, signal and call statements. Built in functions Text handling functions, string handling, word handling, arithmetic, data conversion, bit manipulation, environment. The data stack Data stack structure, REXX instructions for the data stack, REXX functions for the data stack, TSO/E commands for the data stack. REXX in batch TSO/E foreground. TSO/E background.

Complete REXX programming
Delivered in Internationally or OnlineFlexible Dates
£3,497

Introduction to Adobe After Effects Online

By Platform Training

Live online course with study materials and certificate of completion included Adobe After Effects is recognised as an essential tool for motion graphics and visual effects. Our introductory Adobe After Effects course is designed for those new to post-production techniques, and would like to get the most from this immensely powerful application. Whether you are a motion graphics designer, a web designer, rich media artist or broadcast video editor, this course covers all the techniques you need to successfully start using, or significantly improve your command over, Adobe After Effects. Description Completing this course will enable you to do the following and more: Become familiar with the After Effects workspace Create animations using keyframes Understand keyframe interpolation and velocity Work with the graph editor to fine tune animations Work with Solid, Text and Null layers Work with masks, mattes and track mattes Create Compositions Incorporate video with Photoshop and Illustrator. Use video layering with transfer and blending modes Use Motion Tracker and 3D Camera Tracker Apply and animate Effects Use Colour Correction / Glows + Curves Use filters for special effects Render your final project For the full course content please download the course information pdf listed above. Who is this course for? This workshop is suitable for anyone who wishes to learn Adobe Afer Effects from scratch or wants to improve their existing knowledge of the program. Requirements Attendees should have basic PC or Mac skills. You will need a broadband internet connection to participate in this live online course. Certificates Certificate of completion Digital certificate - Included

Introduction to Adobe After Effects Online
Delivered OnlineFlexible Dates
£192

Complete C programming

5.0(3)

By Systems & Network Training

Complete C programming training course description A hands-on introduction to programming in the ANSI C programming language. The course initially moves at a fast pace in order to spend as much time as possible on the subject of pointers - the area which cause the most bugs in C programs. What will you learn Write ANSI C programs Use the C libraries Debug C programs Examine existing code and determine its function. Complete C programming training course details Who will benefit: Programmers wishing to learn C. Programmers wishing to learn C++ or Java. Prerequisites: None, although experience in another high level language would be useful. Duration 5 days Complete C programming training course contents Getting started The compilation process, comments, main(), statement blocks, printf(). C data types and operators char, int, float and double, qualifiers, arithmetic and assignment operators, precedence, Associativity. Basic I/O C libraries, stdin and stdout, getchar(), putchar(), printf() formatting. Flow control if else, dangling elses, else if, while and for loops. switch statements, the null statement, break, continue and gotos. Functions Function calls, arguments and return types, function declarations (prototypes), function definitions, scope of variables. The preprocessor Preprocessor actions, macros, #include. Libraries and their relationship with header files. Conditional compilation. More data types and operators Logical, bitwise and other operators, type conversion, casting, typedefs and access modifiers. Arrays Declaring and handling arrays, common gotchas, multidimensional arrays. Pointers What are pointers? Why they are so important, declaring and using pointers,The three uses of the *,pointer example - scanf, pointers as arguments. More pointers Golden rules of pointers and arrays, pointers to arrays, pointer arithmetic, arrays of pointers, multiple indirection. Character/string manipulation Arrays of characters, string definition, working with strings, String library. Program arguments argc and argv, example uses,char *argv[] versus char ** argv. Program structure and storage classes Globals (externals), multi source programs, the look of a C program. Structures Declaration, the . and - operators, unions and bitfields. Library functions File handling, fopen and fclose, reading from and writing to files, fseek().calloc() and malloc()

Complete C programming
Delivered in Internationally or OnlineFlexible Dates
£3,697

OpenStack for NFV and SDN

5.0(3)

By Systems & Network Training

OpenStack for NFV and SDN course description OpenStack is predominately a cloud management technology. This course looks at how OpenStack can be used in a NFV and SDN environment. What will you learn Describe the architecture of NFV. Explain the relationship between NFV and SDN. Implement NFV VIM using OpenStack. Explain how OpenStack as VNFM and orchestrator works. OpenStack for NFV and SDN course details Who will benefit: Anyone wishing to implement NFV using OpenStack. Prerequisites: Introduction to Virtualization Duration 3 day OpenStack for NFV and SDN course content What is NFV? What is NFV? What are network Functions? NFV benefits, NFV market drivers. ETSI NFV framework. ETSI documents, Architecture overview, compute domain, hypervisor domain, infrastructure network domain. What is OpenStack? Virtual machines, clouds, management. OpenStack architecture, OpenStack modules. Why OpenStack for NFV? Hands on OpenStack installation. OpenStack Virtualization and NFV Server, storage and network virtualization and NFV. Where OpenStack fits in the ETSI framework. Virtual machines, containers and docker. Data centres, clouds, SaaS, IaaS, PaaS. Hands on OpenStack Iaas, OpenStack Nova. The virtualization layer VM centric model, containers versus hypervisors, FD.io. Hands on OpenStack as the VIM. OpenStack Neutron VXLAN, Networks, subnets, ports. Security groups. Routers. Service and component hierarchy. Hands on Implementing a virtual network with OpenStack Neutron. Virtualization of Network Functions Network virtualization versus Network Function virtualization. NFV MANO Management and Orchestration. Where OpenStack fits. MANO descriptors, Open orchestration. OpenStack Tacker, Open MANO, OpenBaton, other orchestrators. OpenStack Tacker Installation, getting started, configuration. SFC and OpenStack. Hands on Deploying a VNF. OPNFV What is OPNFV, Where OpenStack fits into OPNFV. SDN What is SDN? Control and data planes. SDN controllers. Classic SDN versus real SDN. Hybrid SDN, network automation, SDN with overlays. Northbound, southbound, SDN protocols, OpenFlow, OpenDaylight, ONOS, SDN with NFV. SDN and OpenStack. Summary Deploying NFV, performance, testing. Futures

OpenStack for NFV and SDN
Delivered in Internationally or OnlineFlexible Dates
£3,497