• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

787 Courses in London

Essential IP addressing and subnetting

5.0(3)

By Systems & Network Training

IP addressing and subnetting course description A course focusing purely on IP addressing and subnetting. The course assumes that delegates already have some knowledge of IP addressing. In particular delegates will be able to calculate subnet numbers in seconds without using binary. What will you learn Download and install Wireshark. Calculate subnet numbers in seconds Design IP addressing schemes. Troubleshoot IP address problems. Calculate CIDR prefixes in seconds IP addressing and subnetting course details Who will benefit: Anyone working with TCP/IP. Prerequisites: TCP/IP Foundation for engineers Duration 2 days IP addressing and subnetting course contents IP addressing review What is an IP address? What is a subnet? Classless IP addressing. The rules of IP addressing. Ways IP addresses are used: On hosts, in packets, in routing tables. Hands on Byte boundary subnetting. Configuring IP addresses Interfaces, Static vs. dynamic configuration. DHCP: Scopes, leases, relays, using multiple DHCP servers. Multihoming. Subnetting Default subnet masks, subnet notations. How to subnet without binary. VLSMs. Hands on Bit boundary subnetting. Address ranges and routing Routing tables, IP address spoofing, host specific routing, subnets in routing tables, supernets in routing tables. CIDR. Impact of choice of routing protocol. Hands on IP addressing plans. Allocations and assignments IAB, IANA, RIRs, RIPE, LIRs and ISPs. PI vs. PA addressing. Hands on Querying the RIPE database. Private addressing and NAT NAT, NAPT, NAT terms, private addresses, NAT operation, NAT architecture, NAT and security, why use NAT? NAT-ALG, Types of NAT, RSIP. Special use addresses Unicasts, broadcasts, multicasts, anycasts. Directed broadcasts. Allowing broadcasts through routers.

Essential IP addressing and subnetting
Delivered in Internationally or OnlineFlexible Dates
£1,727

SIP security for engineers

5.0(3)

By Systems & Network Training

SIP security training course description A hands-on course covering SIP security. It is assumed that delegates already know SIP as this course focuses purely on the security issues in SIP IP telephony networks. Hands-on practicals follow each major theory session and include use of various SIP security tools such as vomit, sipp, sipsak and sivus amongst others. What will you learn Secure SIP networks Use various SIP security tools SIP security training course details Who will benefit: Technical staff working with SIP. Technical security staff. Prerequisites: SIP for engineers Duration 2 days SIP security training course contents SIP review SIP infrastructure and entities, example SIP session. Hands on Simple SIP network with and without authentication. SIP security attacks DOS attacks, infrastructure attacks, eavesdropping, spoofing, replay, message integrity. Hands on Basic SIP packet capture, infrastructure attacks. SIP tools SIP packet creation: Sivus, SIPsak, PROTOS, SFTF, SIP bomber, SIPp, Seagull, Nastysip. SIP packet generators: SIPNess, NetDude. Monitoring: Wireshark, Cain & Abel, Vomit, Oreka, VoiPong. Scripts and tools: SIP-Fun, Skora.net, kphone-ddos, sip-scan, sip-kill, sip-redirectrtp. Health of different tools. Hands on Generating SIP packets, rebuilding conversations from captured packets, password cracking. VPNs and SIP IPSec, AH, ESP, transport mode, tunnel mode, Pre Shared Keys, Public keys. Hands on SIP calls over IPSec. Secure SIP signaling SIP relationship with HTTP, Deprecated HTTP 1.0 basic authentication, HTTP 1.1 Digest authentication, S/MIME, SIPS, SIPS URI, TLS, DTLS, PKI infrastructures. Hands on SIP with TLS. Secure media streams SRTP, features, packet format, default encryption, default authentication, key distribution. S/MIME, MIKEY, SDP security descriptions. SIP security agreements. Hands on Analysing SRTP packets. Firewalls NAT traversal. Impact of firewall on infrastructure attacks. TLS and firewalls. SIP specific firewalls. Hands on SIP calls through a firewall.

SIP security for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,727

Layer 3 switching for engineers

5.0(3)

By Systems & Network Training

Layer 3 switching training course description A hands on switching course for those already familiar with the basics of Ethernet switching. The course focuses on L3 switching along with the QoS and security features that layer 3 switches can add to the network. What will you learn Explain how layer 3 switches work. Troubleshoot layer 3 switching. Implement QoS on switches. Secure networks with L3 switches. Layer 3 switching training course details Who will benefit: Technical staff working with Ethernet switches. Prerequisites: Definitive Ethernet switching for engineers Duration 2 days Layer 3 switching training course contents Switches Switch review, VLANs, inter VLAN routing. Hands on VLANs and tagging, separating networks with routers. VLANs and IP addressing IP addresses, subnet masks, default gateways. Hands on L3 switches and VLANs What are layer 3 switches Routers in switches, configuring a switch to route, switch ports, router ports, when to switch, when to route. What is the difference between a router and a L3 switch? Hands on Analysing packet flows through a L3 switch. L3 switches and static routes Why use static routes? Default routes. Hands on Configuring static routes. L3 switches and routing protocols RIP, OSPF. Hands on RIP, OSPF. First hop redundancy Default gateways, VRRP/HSRP/GBLP. Load sharing, critical IP addresses. Interaction between STP and L3 redundancy Hands on VRRP. Multicasting and L3 switches IGMP, IGMP snooping, multicasts and routers, PIM. Hands on Multicasts between VLANs. IPv6 IPv6 and L2 switches, IPv6 and L3 switches. Hands on Adding IPv6 into the network. QoS DSCP, 802.1Q, 802.1p, mapping, classification, policy, Ingress queues, Egress queues. Dropping frames, limiting bandwidth. Hands on Voice through switches. Security Layer 2 security, filtering at layer 3. Hands on Controlling inter VLAN traffic.

Layer 3 switching for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,727

Definitive Firewalls for engineers

5.0(3)

By Systems & Network Training

Firewalls training course description A technical hands on training course covering firewall technologies. This focuses on the whys and hows of firewall technology rather than looking at manufacturer specific issues. What will you learn Design secure firewall protected networks. Test firewalls. Evaluate firewalls Configure firewalls Firewalls training course details Who will benefit: Technical staff wanting to learn about Filrewalls including: Technical network staff. Technical security staff. Prerequisites: IP security foundation for engineers Duration 2 days Firewalls training course contents Firewall introduction Security review, what is a firewall? What do firewalls do? Firewall benefits, concepts. Hands on Configuring the network to be used in later labs, launching various attacks on a target. Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls, blade based firewalls, personal firewalls, which firewall should you use? Firewall products. Hands on Configuring a simple firewall. Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on Stateful packet inspection firewalls. Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall advantages and disadvantages. Hands on Proxy firewalls. Personal firewalls The role of personal firewalls, Windows XP, Zonealarm. Hands on Configuring a personal firewall. Firewall architectures Home based, small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. Securing communications VPNs, IPsec. Firewall configuration of VPNs, integration of dedicated VPN devices and firewalls. Hands on IPSec VPN configuration. Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls.

Definitive Firewalls for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,727

Scrum Master and Product Owner Workshop: In-House Training

By IIL Europe Ltd

Scrum Master and Product Owner Workshop This workshop builds on the specific roles and responsibilities of the Product Owner and Scrum Master in a Scrum environment, and how they need to work together as part of the Scrum methodology. During these sessions, you will explore who does what before, during, and after the Scrum Sprint cycles, as well as how to make the process work best in your specific Agile environment. You will come away from this workshop with a much deeper understanding of the roles and responsibilities so that individual performance improves on the job. Improved target results include providing focused leadership, making effective decisions, guiding Agile teams, and delivering business value. Foundation Concepts Agile History, Values, and Mindset Introduction to Scrum Scrum Events Scrum Artifacts Scrum Roles and Responsibilities Scrum Roles Product Owner Responsibilities Scrum Master Responsibilities The Scrum Team Responsibilities Cross-functional Teams Product Ownership Product Ownership Vision Understand Your Customers and Market Stakeholder Management and Engagement Product Backlog What is a User Story? Epics and User Stories Acceptance Criteria Preparing User Stories for a Sprint Definition of Ready (DoR) and Definition of Done (DoD) User Story Estimation Using Planning Poker Backlog Grooming Roadmaps, Story Maps, Impact Mapping Product Backlog Prioritization, MoSCoW, Kano Analysis Technical Debt The Sprint Team Capacity and Velocity Planning Sprint Planning Meeting and Sprint Plan The Sprint: Learning to Become Self-managing, Self-organizing, Self-improving Sprint Review Meeting Retrospectives Project Progress and Completion The Daily Scrum The Task Board and The Burndown Chart Information Radiators Closing a Scrum Project Summary and Next Steps Review of course goals, objectives, and content

Scrum Master and Product Owner Workshop: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,695

Scrum Master and Product Owner Workshop

By IIL Europe Ltd

Scrum Master and Product Owner Workshop This workshop builds on the specific roles and responsibilities of the Product Owner and Scrum Master in a Scrum environment, and how they need to work together as part of the Scrum methodology. During these sessions, you will explore who does what before, during, and after the Scrum Sprint cycles, as well as how to make the process work best in your specific Agile environment. You will come away from this workshop with a much deeper understanding of the roles and responsibilities so that individual performance improves on the job. Improved target results include providing focused leadership, making effective decisions, guiding Agile teams, and delivering business value. Foundation Concepts Agile History, Values, and Mindset Introduction to Scrum Scrum Events Scrum Artifacts Scrum Roles and Responsibilities Scrum Roles Product Owner Responsibilities Scrum Master Responsibilities The Scrum Team Responsibilities Cross-functional Teams Product Ownership Product Ownership Vision Understand Your Customers and Market Stakeholder Management and Engagement Product Backlog What is a User Story? Epics and User Stories Acceptance Criteria Preparing User Stories for a Sprint Definition of Ready (DoR) and Definition of Done (DoD) User Story Estimation Using Planning Poker Backlog Grooming Roadmaps, Story Maps, Impact Mapping Product Backlog Prioritization, MoSCoW, Kano Analysis Technical Debt The Sprint Team Capacity and Velocity Planning Sprint Planning Meeting and Sprint Plan The Sprint: Learning to Become Self-managing, Self-organizing, Self-improving Sprint Review Meeting Retrospectives Project Progress and Completion The Daily Scrum The Task Board and The Burndown Chart Information Radiators Closing a Scrum Project Summary and Next Steps Review of course goals, objectives, and content

Scrum Master and Product Owner Workshop
Delivered In-Person in LondonFlexible Dates
£1,695

Assessing and Managing Cyber Security Risks for Essential Services Operators

By EnergyEdge - Training for a Sustainable Energy Future

About this Virtual Instructor Led Training (VILT) This 3 half-day Virtual Instructor Led Training (VILT) course will help participants grasp the idea of real-world risk management and how this relates to the cyber world. The VILT course will cover topics surrounding identifying cyber risks and vulnerabilities, guidance on applying administrative actions, and comprehensive solutions to ensure your organization is adequately secure and protected. The VILT course will guide participants on how to conduct a security risk assessment for their organization, and equip them with the skills to develop a risk compliance assessment plan as well as methods to develop risk management strategies which can improve their organization's security posture. The VILT course has at least a 30% hands-on approach through the use of Table Top Exercises. The VILT course will cover the following modules: Introduction to Risk Assessments (RA) Threat Actors and Their Motivations Threat and Risk Assessment Critical Controls Identification Maturity Assessment Treated Cyber Risk Profile Target Cyber Risk Profile and Strategy Target Audience The VILT course is intended for professionals responsible for organizational information and security system and those involved in operating and maintenance of critical information and IT network & sotware systems. Professionals who are designated as the Single Point of Accountability (SPoA) as well as system auditors will find this course useful. Course Level Basic or Foundation Training Methods The VILT course will be delivered online in 3 half-day sessions comprising 4 hours per day, with 2 x 10 minutes break per day, including time for lectures, discussion, quizzes and short classroom exercises. Course Duration: 3 half-day sessions, 4 hours per session (12 hours in total). This VILT course is delivered in partnership with ENGIE Laborelec. Trainer Your expert course leader is a is specialized in cybersecurity risk management. Before joining ENGIE, she worked for The National Cybersecurity Agency of France (ANSSI) based in Paris (France) and for Deloitte Belgium located in Zaventem (Belgium). She has been involved in cybersecurity projects focusing on the principle of protecting critical infrastructures. Her different experiences in Cyber Security, Anti-Money Laundering and Global Trade Compliance (including Export Control and Customs) gave her the opportunity to use methodologies tackling strategic, operational and financial control issues at all levels of an organization: people, business processes, IT applications and infrastructure, legal and regulatory compliance. She was an EBIOS Risk Manager (RM) trainer while she worked for the French government; EBIOS RM is the French method for assessing and treating digital risks. She also had the opportunity to represent France towards European institutions and other relevant stakeholders for topics related to cybersecurity risk management. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Assessing and Managing Cyber Security Risks for Essential Services Operators
Delivered in Internationally or OnlineFlexible Dates
£1,324 to £2,499

UNIX fundamentals

5.0(3)

By Systems & Network Training

UNIX fundamentals training course description An introduction to using the UNIX operating system focussing on the command line. Appropriate for all versions of UNIX. The starting point for all UNIX work, we concentrate on the technical aspects rather than issues such as using browsers. The course is heavily practical in nature. What will you learn Describe UNIX. Log in and use UNIX commands to perform a variety of tasks from manipulating and printing files to looking at and killing processes. Create and edit files with vi. Recognise the role of the administrator. Write simple shell scripts. Customise the user environment. UNIX fundamentals training course details Who will benefit: Anybody who needs to use a UNIX system. Prerequisites: None. Duration 3 days UNIX fundamentals training course contents What is UNIX? Operating systems, UNIX flavours, UNIX features. Getting started Logging in, changing passwords, logging out. UNIX basics Command structure. The UNIX manuals, basic commands (who, date, tty, uname, echo, banner...) Filesystem commands Home directories, manipulating files and directories, Filesystem layout, Pathnames, hard and symbolic links. The UNIX Editors ed, vi, shell escapes, .exrc Extracting data from files grep, find, cut, sort and paste Permissions Theory, chmod, chown, newgrp.. Processes ps, kill, background processes, at, exec, priorities. The Shell Metacharacters, piping and redirection. Basic shell scripting What are shell scripts? Simple scripts, control structures. Variables. Arguments. Customising your environment Environmental variables, stty, .profile and other startup files More shell features Bash and other shells, the history facility, command line editing, aliases, job control, miscellaneous features. Introduction to administration The root user, su and tar Archiving files Backups, tar, cpio, dd, gzip. Unix and hardware Main hardware components, Unix device drivers. Connecting to a network IP configuration, ifconfig, ping, netstat, traceroute, dig.

UNIX fundamentals
Delivered in Internationally or OnlineFlexible Dates
£1,697

IFRS Accounting for the Oil and Gas Sector

By EnergyEdge - Training for a Sustainable Energy Future

Gain expertise in IFRS accounting for the oil and gas sector with our industry-focused training course. Enroll today with EnergyEdge.

IFRS Accounting for the Oil and Gas Sector
Delivered in Internationally or OnlineFlexible Dates
£2,299 to £2,399

Technoeconomic Modelling of Carbon Capture, Utilization & Storage (CCUS) Projects

By EnergyEdge - Training for a Sustainable Energy Future

About this Virtual Instructor Led Training (VILT) This 2 half-day Virtual Instructor-Led Training (VILT) course will guide participants on the technoeconomic aspects of capture, utilization and geological storage of carbon dioxide. The VILT course will address the methods and techniques used in the technoeconomic assessment of Carbon Capture, Utilization & Storage (CCUS) projects. It will explore in detail the factors that affect the cost-effectiveness of current and emerging technologies for CO2 capture, transport and geological storage, including monitoring and verification. Given that the successful deployment of CCUS may require economic incentives, technical and economic drivers such as technological innovation, optimization, source sink matching and emerging opportunities will also be discussed. In addition, using several worked examples and case studies, this VILT course will explain the principles behind the analysis of the costs and opportunities of a CCS / CCUS project from source to sink and examines the possibilities of using carbon dioxide from an economic perspective. Training Objectives Upon completion of this VILT course, participants will be able to: Describe the economic considerations for CCS / CCUS projects Measure and calculate the cost-effectiveness of CCS / CCUS Identify the economic drivers for CCS / CCUS Understand the value of source to sink matching Outline the economic and environmental opportunities as well as challenges with using carbon dioxide injection in a range of applications Recognize niche opportunities for CO2 storage (coal seams, basalts, salt and others)   Target Audience This VILT course is ideally suited for a technical audience such as geoscientists, petroleum and chemical engineers as well as professionals such as economists, regulators, legal staff and managers wishing to learn more about the details of economic aspects and the basis for techno-economic analysis of Carbon Capture, Utilization and Storage projects. The VILT course is presented in an interactive workshop format, allowing for discussions. Participants should have: Basic background knowledge of CCUS technologies Experience with oil and gas, coal or other energy projects Basic understanding of the energy industry Course Level Basic or Foundation Training Methods The VILT course will be delivered online in 2 half-day sessions comprising 4 hours per day, with 2 breaks of 15 minutes per day. The VILT course is presented in an interactive workshop format that allows discussion. Course Duration: 2 half-day sessions, 4 hours per session (8 hours in total). Trainer Your expert course leader received his B.Eng. in Chemical and Environmental Systems in 2002 from Tecnológico de Monterrey, Mexico, and his Ph.D. in Chemical Engineering in 2008 from the University of New South Wales (UNSW), in Sydney, Australia, at the UNESCO Centre for Membrane Science and Technology. His doctoral used computational fluid dynamics (CFD) to analyse the flows within membrane modules used for water treatment and desalination. He also worked on a desalination linkage project between the UNSW and the European Union, as part of Framework Programme 6. From 2009 to 2014, he worked for the Cooperative Research Centre for Greenhouse Gas Technologies (CO2CRC), where he led the research into CO2 Transport Networks, co-led the development of a techno-economic model for the analysis of Carbon Capture and Storage (CCS) projects, and collaborated on several consultancy and feasibility studies conducted by CO2CRC for both Government and Industry. From 2014 to 2019, he held a CONACYT Research Fellowship at the Instituto Tecnológico de Sonora (ITSON) in Mexico, where he led collaborative research projects dealing with RO membrane biofouling (IHE-Delft), membrane modifications, solar energy use for desalination (CSIR-CSMCRI India) and CFD modelling of the hydrodynamics in membrane modules (UMP Malaysia). Since July 2019, he is a Research Fellow in the School of Chemical and Biomolecular Engineering at the University of Sydney, where his research focuses on finding ways to reduce the cost, energy use and environmental impact of technologies for providing clean energy and water. From 2015 to 2020, he was a Member of the Board of Directors of the Mexican Society of Membrane Science and Technology. He guest edited a special edition on CCS for the Journal 'Technologies' and is currently an Editorial Board member for the journal, 'Energies', a peer-reviewed open-access scientific journal. His research interests include improving the efficiency of osmotic membrane separation processes, modelling complex processes involving heat and mass transfer, and exploring the economic drivers of low emission technologies such as the Carbon Capture and Storage (CCS) chain. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Technoeconomic Modelling of Carbon Capture, Utilization & Storage (CCUS) Projects
Delivered in Internationally or OnlineFlexible Dates
£1,271 to £2,399