Linux training course description A Linux foundation appropriate for all flavours of Linux, focussed on getting network engineers up and running with Linux. The command line is used throughout. The course progresses from the basics of Linux commands onto useful tools such as grep, then shell features such as piping and then onto shell scripting. Administration aspects covered are the tasks network engineers are most likely to encounter such as software installation. Hands on exercises concentrate on network related tasks such as installing net-snmp and using shell scripts to provide network automation. What will you learn Use Linux commands to perform a variety of tasks from manipulating files to handling processes. Create and edit files with vi. Work with permissions. Write simple shell scripts. Install software packages. Configure base networking. Linux training course details Who will benefit: Network engineers. Prerequisites: TCP/IP Foundation Duration 5 days Linux training course contents What is Linux? Linux distributions, open source software. Getting started Logging in, changing passwords, logging out. Hands on Basics and root access. Linux basics Command structure. The Linux manuals, basic commands (who, date, tty, uname, echo, banner...). Hands on Using the CLI. Connecting to a network IP configuration, DHCP, static addressing, routing, ifconfig, ping, netstat, traceroute, dig. Hands on Network configuration and testing. Managing Software Package Concepts, Comparison of package formats, RPM, rpm Commands, Yum, Debian Packages, dpkg, apt-cache, apt-get, dselect, aptitude, Converting Between Package Formats, Dependencies and Conflicts, Startup Script Problems, Shared Libraries, Library Management Hands on Installing network packages such as nmap and net-snmp. Processes and log files ps, kill, background processes, at, exec, priorities. Managing Linux log files. Syslogd. Setting the time. Cron and cronjobs. Managing Processes, the Kernel: The First Process. Hands on Controlling daemons and services. Setting up a TFTP server. Filesystem commands Home directories, manipulating files and directories, Filesystem layout, Pathnames, hard and symbolic links. Viewing files. Hands on Exploring the filesystem, working with network device configuration files. The Linux editors ed, vi, shell escapes, .exrc. Hands on Editing network device configuration files. Extracting data from files grep, find, cut, sort and paste⦠Hands on Working with syslog files. Permissions Theory, chmod, chown, newgrp. Hands on Handling permission problems. The shell Metacharacters, piping and redirection. Hands on Running SNMP commands and working with their output. Basic shell scripting What are shell scripts? Simple scripts, control structures. Variable. Setting variables, using variables, set, scope, export, sourcing, environmental variables, read. Positional parameters: $0 to $9, $#, $* and others. shift parameter substitution. Control statements: The test command, if , while loops, for loops, the case statement. Hands on Automating network tasks. Customising your environment Environmental variables, stty, .profile and other startup files. Hands on Customising Linux. Introduction to administration The root user, su. Managing users and groups. Hands on The power of root. Archiving files Backups, tar, cpio, dd, gzip. Hands on Working with tar files. Booting Linux and Editing Files Installing Boot Loaders, GRUB Legacy, GRUB 2, Alternative Boot Loaders, the Boot Process, Boot Messages, Runlevels and the Initialization Process, Runlevel Functions, Runlevel Services, Alternative Boot Systems , Upstart, system. Hands on Installing network services on Linux.
SAFe® Advanced Scrum Master: In-House Training Prepare to step into a SAFe® leadership role and learn how to facilitate Agile team, program, and enterprise success by becoming a SAFe® 5 Advanced Scrum Master (SASM). This course prepares current Scrum Masters for their leadership role in facilitating Agile team, program, and enterprise success in a SAFe® implementation. Explore facilitation of cross-team interactions in support of program execution and relentless improvement. Expand the Scrum paradigm with an introduction to scalable engineering and DevOps practices, the application of Kanban to facilitate the flow of value, and supporting interactions with architects, product management, and other critical stakeholders. Learn actionable tools for building high-performing teams and explore practical ways of addressing Agile and Scrum anti-patterns in the enterprise. What you will Learn To perform the role of a SAFe® Advanced Scrum Master, you should be able to: Apply SAFe® principles to facilitation, enablement, and coaching in a multi-team environment Build a high-performing team and foster relentless improvement at scale Address Agile and Scrum anti-patterns Support the adoption of engineering practices, DevOps, and Agile architecture Learn to apply Kanban and Extreme Programming (XP) frameworks to optimize flow and improve the team's work Facilitate program planning, execution, and delivery of end-to-end systems value Support learning through participation in communities of practice and innovation cycles Exploring the Scrum Master role in the SAFe® enterprise Applying SAFe® Principles: A Scrum Master's perspective Exploring Agile and Scrum anti-patterns Facilitating program execution Improving flow with Kanban and XP Building high-performing teams Improving program performance with Inspect and Adapt
SAFe® Advanced Scrum Master Prepare to step into a SAFe® leadership role and learn how to facilitate Agile team, program, and enterprise success by becoming a SAFe® 5 Advanced Scrum Master (SASM). This course prepares current Scrum Masters for their leadership role in facilitating Agile team, program, and enterprise success in a SAFe® implementation. Explore facilitation of cross-team interactions in support of program execution and relentless improvement. Expand the Scrum paradigm with an introduction to scalable engineering and DevOps practices, the application of Kanban to facilitate the flow of value, and supporting interactions with architects, product management, and other critical stakeholders. Learn actionable tools for building high-performing teams and explore practical ways of addressing Agile and Scrum anti-patterns in the enterprise. What you will Learn To perform the role of a SAFe® Advanced Scrum Master, you should be able to: Apply SAFe® principles to facilitation, enablement, and coaching in a multi-team environment Build a high-performing team and foster relentless improvement at scale Address Agile and Scrum anti-patterns Support the adoption of engineering practices, DevOps, and Agile architecture Learn to apply Kanban and Extreme Programming (XP) frameworks to optimize flow and improve the team's work Facilitate program planning, execution, and delivery of end-to-end systems value Support learning through participation in communities of practice and innovation cycles Exploring the Scrum Master role in the SAFe® enterprise Applying SAFe® Principles: A Scrum Master's perspective Exploring Agile and Scrum anti-patterns Facilitating program execution Improving flow with Kanban and XP Building high-performing teams Improving program performance with Inspect and Adapt
LTE Architecture and Protocols course description This course provides a comprehensive tour of the LTE architecture along with services provided and the protocols used. What will you learn Describe the overall architecture of LTE. Explain the information flows through LTE. Describe the LTE security. Describe LTE mobility management. Recognise the next steps for LTE. LTE Architecture and Protocols course details Who will benefit: Anyone working with LTE. Prerequisites: Mobile communications demystified Duration 3 days LTE Architecture and Protocols course contents Introduction History, LTE key features. The 4G ITU process. The LTE 3GPP specifications. Specifications. System Architecture LTE hardware architecture. UE architecture and capabilities. E-UTRAN and eNB. EPC, MME functions, SGW, PGW and PCRF. System interfaces and protocol stacks. Example information flows. Dedicated and default bearers. EMM, ECM, RRC state diagrams. Radio transmission and reception OFDMA, SC-FDMA, MIMO antennas. Air interface protocol stack. Logical, transport and physical channels. Frame and slot structure, the resource grid. Resource element mapping of the physical channels and signals. Cell acquisition, data transmission and random access. MAC, RLC, PDCP protocols. LTE spectrum allocation. Power-on procedures Network and cell selection. RRC connection establishment. Attach procedure, including IP address allocation and default bearer activation. LTE detach procedure. Security in LTE networks LTE security features, identity confidentiality, ciphering and integrity protection. Architecture of network access security in LTE. Secure key hierarchy. Authentication and key agreement procedure. Security mode command procedure. Network domain security architecture. Security associations using IKE and IPSec. Mobility management RRC_IDLE, RRC_CONNECTED. Cell reselection, tracking area updates. Measurement reporting. X2 and S1 based handovers. Interoperation with UMTS, GSM and non-3GPP technologies such as cdma2000. QoS, policy control and charging QoS in LTE, EPS bearers, service data flows and packet flows. The architecture and signalling procedures for policy and charging control. Data transport using GPRS, differentiated services and MPLS. Offline and online charging in LTE. Delivery of voice and text messages over LTE Difficulties and solutions for Voice over LTE. Architecture and call setup procedures for circuit switched fallback. Architecture, protocols and call setup procedures in IP multimedia subsystem. Enhancements in release 9 LTE location services. Multimedia broadcast / multicast service and MBSFN. Cell selection, commercial mobile alert service. LTE Advanced and release 10 Impact of carrier aggregation on LTE air interface. Enhanced MIMO processing on uplink and downlink. Relaying. Release 11 and beyond. OAM and self organising networks Operation, administration, maintenance and provisioning for LTE. Self-configuration of base station parameters. Fractional frequency re-use, inter-cell interference co-ordination. Self-optimisation of base station procedures. Self-healing to detect and recover from faults.
Frame Relay training course description A comprehensive look at Frame Relay, particularly with reference to a IP routed environment. Note this course is run as a workshop and therefore the contents are flexible. What will you learn Recognise the issues of using Frame Relay Describe Frame Relay. Configure a Cisco router to use Frame relay. Frame Relay training course details Who will benefit: Anyone working with Frame Relay. Prerequisites: Intro to data communications & networking Duration 1 day Frame Relay training course contents Introduction Packet switched networks, PVCs, SVCs. Topologies, Full mesh, partial mesh, Hub and spoke. Basics DLCI, CIR, LMI, the local loop. Configuring routers for Frame Relay Inverse ARP, static mappings, subinterfaces More Frame Relay Burst rates, FECN, BECN, the DE bit, Traffic shaping. Voice Over Frame Relay
CCNA training course description The Implementing and Administering Cisco Solutions (CCNA) course gives you a broad range of fundamental knowledge for all IT careers. Through a combination of lecture, hands-on labs, and self-study, you will learn how to install, operate, configure, and verify basic IPv4 and IPv6 networks. The course covers configuring network components such as switches, routers, and wireless LAN controllers; managing network devices; and identifying basic security threats. It also gives a foundation in network programmability, and software-defined networking What will you learn Install, configure, and operate a small to medium sized network Gain a foundation in the essentials of networking, security, and automation Prepare for the 200-301 CCNA exam, which earns CCNA certification CCNA training course details Who will benefit: Network support help desk technicians involved in the basic installation, operation, and verification of Cisco networks. Anyone seeking CCNA certification. Prerequisites: Introduction to Data communications & networking Duration 5 days CCNA training course content After taking this course, you should be able to: Identify the components of a computer network and describe their basic characteristics. Understand the model of host-to-host communication. Describe the Cisco IOS software. Describe LANs and the role of switches within LANs. Describe Ethernet and describe the operation of switches. Install a switch and perform the initial configuration. Describe the TCP/IP Internet layer, IPv4, its addressing scheme, and subnetting. Describe the TCP/IP Transport and Application layers Explore functions of routing. Implement basic configuration on a Cisco router. Explain host-to-host comms across switches and routers. Identify and resolve common switched network issues and common problems associated with IPv4 addressing. Describe IPv6 main features and addresses, and configure and verify basic IPv6 connectivity. Describe static routing. Describe, implement, and verify VLANs and trunks. Describe inter VLAN routing. Explain the basics of dynamic routing protocols and describe components and terms of OSPF. Explain how STP and RSTP work. Configure link aggregation using EtherChannel. Describe the purpose of Layer 3 redundancy protocols. Describe basic WAN and VPN concepts. Describe the operation of access control lists (ACLs) and their applications in the network. Configure Internet access using DHCP clients and explain and configure NAT on Cisco routers. Describe basic QoS concepts. Describe the concepts of wireless networks, which types of wireless networks can be built, and how to use Wireless LAN Controllers (WLCs). Describe network and device architectures, introduce virtualization, network programmability and SDN and describe smart network management solutions such as Cisco DNA Centerâ¢, SD-Access, and SD-WAN. Configure basic IOS system monitoring tools. Describe the management of Cisco devices. Describe the current security threat landscape. Describe threat defence technologies. Implement a basic security configuration of the device management plane. Implement basic steps to harden network devices. Detailed course outline Exploring the Functions of Networking. The Host-to-Host Communications Model. Operating Cisco IOS Software. Introducing LANs. Exploring the TCP/IP Link Layer. Starting a Switch. The TCP/IP IP layer, IPv4 Addressing, and Subnets. The TCP/IP Transport Layer and Application Layer. Exploring the Functions of Routing. Configuring a Cisco Router. Exploring the Packet Delivery Process. Troubleshooting a Simple Network. Introducing Basic IPv6. Configuring Static Routing. Implementing VLANs and Trunks. Routing Between VLANs. Introducing OSPF. Redundant Switched Topologies with EtherChannel. Explaining Basics of ACL. Enabling Internet Connectivity. Explaining the Evolution of Intelligent Networks. Introducing System Monitoring. Managing Cisco Devices. Securing Administrative Access. Implementing Device Hardening. Self-Study: Building Redundant Switched Topologies. Exploring Layer 3 Redundancy. Introducing WAN Technologies. Introducing QoS. Explaining Wireless Fundamentals. Introducing Architectures and Virtualization. Examining the Security Threat Landscape. Threat Defense Technologies.
PHOTOSHOP ONE DAY COURSE ONE TO ONE LIFETIME EMAIL SUPPORT.
DevOps demystified training course description This course is an introduction to DevOps. The course emphasizes communication, collaboration , integration, and automation to improve the workflow between developers and IT operations professionals. Improved workflows lead to more opportunities to design software and services in a more agile fashion. This course is a basis for discovering the most important DevOps concepts and to understand the principles and methods behind this. The course will leave you with the inspiration to be the advocate of change. What will you learn Explain DevOps principles. Describe the relationship between Agile , Lean and IT Service Management ( ITSM). Describe methods for automation and technology factors. Describe considerations when changing. Describe challenges, risks and critical success factors. DevOps demystifieds training course details Who will benefit: Non-technical staff involved with DevOps. Prerequisites: None. Duration 1 day DevOps demystified training course contents Why DevOps? From a business perspective From an IT perspective Stereotypes of Dev and Ops: perception and reality What is DevOps? Introduction DevOps Goals DevOps Added value of DevOps Proven Results DevOps for businesses DevOps principles (The Three Ways) DevOps and other frameworks DevOps and Agile DevOps and Lean DevOps and IT Service Management DevOps culture Characteristics of a DevOps culture Organizational Considerations DevOps DevOps stakeholders DevOps roles DevOps teams DevOps organizational structures DevOps methods Continuous Integration Continuous delivery Continuous deployment Value stream mapping Kanban Theory of Constraints Improvement Kata Deming's quality circle ITSM processes DevOps and Automation Methods for DevOps automation Longevity and tools categories DevOps applications Transitioning to a DevOps culture Implementation Challenges, risks and critical success factors Measuring DevOps successes
LTE Backhaul training course description This course provides a concise insight into the LTE backhaul. Key parts of the course are detailed looks at the transport of messages and the S1 and X2 protocols. What will you learn Describe the overall architecture of LTE. Explain how data and signalling messages are transported in LTE. Describe the S1 protocol. Describe the X2 protocol. LTE Backhaul training course details Who will benefit: Anyone working with LTE. Prerequisites: Mobile communications demystified Duration 2 days LTE Backhaul training course contents Introduction In the first section of the course, we review LTE and its hardware and software architecture. Requirements and key features of LTE. LTE Architecture and capabilities of the UE. Architecture of the E-UTRAN, functions of the eNB. EPC architecture, and functions of the MME, SGW, PGW and PCRF. System interfaces and protocol stacks. Example information flows. Dedicated and default bearers. EMM, ECM and RRC state diagrams. Architecture of the radio access network In this section, we look in more detail at the architecture of the evolved UMTS terrestrial radio access network (E-UTRAN). Logical and physical architecture of the E-UTRAN. Numbering, addressing and identification. E-UTRAN functions. E-UTRAN protocol stacks. Timing and frequency synchronisation in LTE. Transport of data and signalling in LTE Here, we look in more detail at the techniques and protocols that are used to transport data and signalling messages across the evolved UMTS terrestrial radio access network and the evolved packet core. Quality of service in LTE. The GPRS tunnelling protocol. Differentiated services Multi-protocol label switching (MPLS). The stream control transmission protocol (SCTP). The S1 application protocol This section gives a detailed account of the signalling procedures in the S1 application protocol, which the MME uses to control the operation of the eNB. The material looks at the procedures, messages and information elements, and relates them to the system-level procedures in which they are used. S1 setup procedure. UE context management procedures. Non access stratum information transport. Procedures for managing the evolved radio access bearer (E-RAB). Paging procedures. Mobility management procedures for S1-based handovers. Procedures in support of self-optimising networks. The X2 application protocol This section gives a detailed account of the signalling procedures in the X2 application protocol, which is used for peer-to-peer communication between eNBs. The material looks at the procedures, messages and information elements, and relates them to the system-level procedures in which they are used. X2 setup procedure. Mobility management procedures for X2-based handovers Procedures in support of self-optimising networks. High level system operation In the final section, we bring our discussions of the S1 and X2 application protocols together by reviewing the system-level operation of LTE. Attach procedure. Transitions between the states of RRC Idle and RRC Connected. Tracking area updates in RRC Idle. Handover procedures in RRC Connected.
The CAIA Association is a global professional body dedicated to creating greater alignment, transparency, and knowledge for all investors, with a specific emphasis on alternative investments. Course Overview The CAIA Association is a global professional body dedicated to creating greater alignment, transparency, and knowledge for all investors, with a specific emphasis on alternative investments. A Member-driven organization representing professionals in more than 100 countries, CAIA Association advocates for the highest ethical standards. Whether you need a deep, practical understanding of the world of alternative investments, a solid introduction, or data science skills for the future in finance, the CAIA Association offers a program for you. Why CAIA? Distinguish yourself with knowledge, expertise, and a clear career advantage – become a CAIA Charterholder. CAIA® is the globally recognized credential for professionals allocating, managing, analyzing, distributing, or regulating alternative investments. The Level II curriculum takes a top-down approach and provides Candidates with the skills and tools to conduct due diligence, monitor investments, and appropriately construct an investment portfolio. In addition, the Level II curriculum contains Emerging Topic readings; articles written by academics and practitioners designed to further inform and provoke the Candidate’s investment management process. After passing the Level II exam you are eligible, with relevant professional experience, to join the CAIA Association as a Member and receive the CAIA Charter. You will be part of an elite group of more than 13,000 professionals worldwide. Only after joining the Association, you are eligible to add the CAIA designation to your professional profiles. Who will benefit from enrolling in the CAIA program? Professionals who want to develop a deep level of knowledge and demonstrated expertise in alternative investments and their contribution to the diversified portfolio should pursue the CAIA Charter including: • Asset Allocators • Risk managers • Analysts • Portfolio managers • Traders • Consultants • Business development/marketing • Operations • Advisors Curriculum Topics: Topic 1: Emerging Topics • Decentralized Finance: On Blockchain- and Smart Contract-Based Financial Markets • Technical Guide for Limited Partners: Responsible Investing in Private Equity • Channels for Exposure to Bitcoin • Assessing Long-Term Investor Performance: Principles, Policies and Metrics • Demystifying Illiquid Assets: Expected Returns for Private Equity • An Introduction to Portfolio Rebalancing Strategies • Longevity and Liabilities: Bridging the Gap • A Short Introduction to the World of Cryptocurrencies Topic 2: Ethics, Regulation and ESG • Asset Manager Code • Recommendations and Guidance • Global Regulation • ESG and Alternative Investments • ESG Analysis and Application Topic 3: Models • Modeling Overview and Interest Rate Models • Credit Risk Models • Multi-Factor Equity Pricing Models • Asset Allocation Processes and the Mean-Variance Model • Other Asset Allocation Approaches Topic 4: Institutional Asset Owners and Investment Policies • Types of Asset Owners and the Investment Policy Statement • Foundations and the Endowment Model • Pension Fund Portfolio Management • Sovereign Wealth Funds • Family Offices and the family office Model Topic 5: Risk and Risk Management • Cases in Tail Risk • Benchmarking and Performance Attribution • Liquidity and Funding Risks • Hedging, Rebalancing, and Monitoring • Risk Measurement, Risk Management, and Risk Systems Topic 6: Methods for Alternative Investing • Valuation and Hedging Using Binomial Trees • Directional Strategies and Methods • Multivariate Empirical Methods and Performance Persistence • Relative Value Methods • Valuation Methods for Private Assets: The Case of Real Estate Topic 7: Accessing Alternative Investments • Hedge Fund Replication • Diversified Access to Hedge Funds • Access to Real Estate and Commodities • Access through Private Structures • The Risk and Performance of Private and Listed Assets Topic 8: Due Diligence and Selecting Managers • Active Management and New Investments • Selection of a Fund Manager • Investment Process Due Diligence • Operational Due Diligence • Due Diligence of Terms and Business Activities Topic 9: Volatility and Complex Strategies • Volatility as a Factor Exposure • Volatility, Correlation, and Dispersion Products and Strategies • Complexity and Structured Products • Insurance-Linked and Hybrid Securities • Complexity and the Case of Cross-Border Real Estate Investing DURATION 200 Hours WHATS INCLUDED Course Material Case Study Experienced Lecturer Refreshments Certificate