Microsoft security training course description A hands on training course focusing on security in the Microsoft environment. The course progresses from patch management onto the use of Microsoft security tools. Then server, desktop and network security are studied in the Microsoft environment. What will you learn Use Microsoft security tools. Secure Microsoft servers. Secure Microsoft desktops. Secure Microsoft networks. Microsoft security training course details Who will benefit: Technical server support staff. Technical desktop support staff. Technical network staff. Technical security staff. Prerequisites: Supporting Windows server 2016 Networking Microsoft systems. Duration 3 days Microsoft security training course contents Introduction Security threats, Microsoft defaults, admin accounts, security patches, patch management, patch tools. Hands on: Studying Microsoft defaults, applying security patches. Microsoft security tools Microsoft updates, WSUS, Inventory tool, baseline security analyser, URLscan, EventCombMT, Cipher security tool, Port reporter, PortQry. Tools hackers use. Hands on: Using Microsoft security tools. Server security Checklists, core server security, AD, Member server security, Domain controller security, Specific roles. Hands on Hardening Microsoft servers, security templates. Active Directory Admin authority in AD, group policy, trust and authentication. Desktop security Checklists, core client security, anti virus software, anti spyware software, firewalls, securing clients with AD, securing clients with group policy, software restriction policies. Hands on Securing Microsoft desktops. Network security Checklist, IP security, VPNs, PKI, certificate authorities, RAS, RRAS, IAS. Hands on: VPN configuration, IAS configuration. Monitoring Auditing, authorisation and logons, tracking, system monitoring, detecting attacks. Hands on: Monitoring Microsoft systems. Summary Microsoft security response centre, security advisories.
SAFe® Agile Software Engineering: In-House Training The introduction of Lean-Agile and DevOps principles and practices into software engineering has sparked new skills and approaches that help organizations deliver higher-quality, software-centric solutions faster and more predictably. This workshop-oriented course explores foundational principles and practices and how continuous flow of value delivery and built-in quality are enabled by XP technical practices, Behavioral-Driven Development (BDD), and Test-Driven Development (TDD). Attendees will learn proven practices to detail, model, design, implement, verify, and validate stories in the SAFe® Continuous Delivery Pipeline, as well as the practices that build quality into code and designs. Attendees will also explore how software engineering fits into the larger solution context and understand their role in collaborating on intentional architecture and DevOps. What you will Learn To perform the role of a SAFe® Agile Software Engineer, you should be able to: Define Agile Software Engineering and the underlying values, principles, and practices Apply the Test-First principle to create alignment between tests and requirements Create shared understanding with Behavior-Driven Development (BDD) Communicate with Agile modeling Design from context for testability Build applications with code and design quality Utilize the test infrastructure for automated testing Collaborate on intentional architecture and emergent design Apply Lean-Agile principles to optimize the flow of value Create an Agile Software Engineering plan Introduction to Agile Software Engineering Connecting Principles and Practices to Built-in Quality Accelerating Flow Applying Intentional Architecture Thinking Test-First Discovering Story Details Creating a Shared Understanding with Behavior-Driven Development (BDD) Communicating with Models Building Systems with Code Quality Building Systems with Design Quality Implementing with Quality
Definitive Salt training course description Salt is a remote execution framework and configuration management system. This course covers Salt from the basics. After a quick first taste the course moves onto execution modules, salt states, minion and master data, jinja, Salt extensions and then topology and configuration options. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. What will you learn Install and use Salt. Describe the architecture of Salt. Manage configurations with Salt. Extend Salt. Definitive Salt training course details Who will benefit: Anyone working with Salt. Prerequisites: Linux fundamentals. Duration 2 days Definitive Salt training course contents Introduction What is Salt? High- level architecture, Some quick examples, system management, configuration management, A brief history, Topology options, Extending Salt. Quick start: First taste of Salt Single-master setup, from packages, bootstrap scripts, Starting up, Basic commands, salt: the main workhorse, salt-key: key management, salt-call: execution on the minion, salt-run: co-ordination of jobs on the master, summary of commands, Key management, viewing keys, accepting keys, rejecting keys, key files, Minion targeting, minion ID, list (-L), glob, regular expressions (-E), grains (-G), compound (-C), targeting summary, Additional remote execution details, Conclusion. Execution modules: The functional foundation sys: information and documentation about modules, sys.doc basic documentation, sys.list_modules, sys.list_functions: simple listings, cmd: execute via shell, cmd.run: run any command, pkg: manage packages, virtual modules, pkg.lists_pkgs: list all installed packages, pkg.available version: see what version will be installed, pkg.install: install packages, user: manage users, user.add: add users, user.list_users, user info: get user info, saltutil: access various Salt utilities, Summary. Configuration management: Salt states Salt files overview, SLS example: adding a user, working with the multi-layered state system, Highstate and the top file, the top file, State ordering, require: depend on another state, watch: run based on other changes, odds and ends, Summary. Minion data / master data Grains are minion data, performing basic grain operations, setting grains, targeting with grains in the top file, Pillars are data from the master, querying pillar data, querying other sources with external pillars, Renderers give data options. Extending Salt: part I Introduction to Jinja, Jinja basics, Templating with Jinja, filtering by grains, Custom execution module, Custom state modules, Custom grains, External pillars, Summary. More on the matter Runners, manage minions, manage jobs, The orchestrate runner, The event system, The reactor system, Summary. Extending Salt: part II Python client API, reading configuration data on a master and minion, using the master client (localclient) API, Using the caller client API, Custom runners, writing a custom runner, using the runnerclient API, Summary. Topology and configuration options Master configuration, directories and files, logging, access control, files server options, Topology variations, masterless minions, peer systems, syndication masters, multiple masters. Brief introduction to salt-cloud Overview, Setup AWS and salt-cloud, installing salt-cloud, cloud providers, cloud profiles, cloud maps, Introspection via salt cloud, Creating infrastructure, More information. Using vagrant to run Salt examples YAML.
This course is designed to provide a basic introduction to dog grooming, it is the building blocks for an excellent career in dog grooming providing both the practical skills and the theory behind dog grooming Dog Grooming Assistants course gives you the basic skills you need to start working in a dog grooming environment under supervision. THE COURSE WILL COVER Correct handling and lifting of dogs Health checking of a dog Basic first aid Preparing and grooming dogs prior to bathing Bathing and cleaning dogs Drying dogs and preparing their coats for styling De-shedding techniques Introduction to basic styling Scissoring foot shapes Nail and ear care Cleaning and maintaining equipment used for grooming Maintain the cleanliness and bio security of the animal care working environment in-line with health and safety Guidance in client relations and salon management Students will receive all course materials and it is recommended that students bring along a camera for before and after photographs as well as pens, high-lighters and notepads. It is highly recommended that upon completion of this course, you continue onto completing the 20 Day Commercial Stylist Course. As you will have already completed 8 days of training, we can offer you a fantastic discount on the remaining 12 days of training and it includes a Pet First Aid course and certificate. See below for full details.
Ansible for engineers training course description An introduction to automation using ansible. Ansible is a general purpose IT automation platform that can be use for a number of purposes. The course covers configuration management, cloud provisioning and application deployment with ansible. Hands on sessions follow all major sections. What will you learn Install ansible. Automate tasks with ansible. Write ansible playbooks. Ansible for engineers training course details Who will benefit: Administrators and developers automating tasks. Prerequisites: Linux administration skills Duration 3 days Ansible for engineers training course contents What is ansible? The language, the engine, the framework. Uses of ansible, orchestration. Hands on Installing ansible. Ansible architecture ible architecture Controlling machines, nodes, Agentless, SSH, modules, JSON protocol. Configuration management, inventories, playbooks, modules, roles. Hands on Getting started, running ad hoc commands. Ansible and Vagrant Prototyping and testing. Hands on Using ansible with Vagrant. Ad hoc commands Parallelism, shell commands, managing files and directories, file transfer, package management, manage user and groups, deploying applications, service management, background jobs, checking log files, managing cron jobs. Hands on Using ansible with Vagrant. Playbooks ansible-playbook, users, sudo, YAML, plays, tasks, handlers, modules. Hands on Running playbooks. More playbooks Handlers, variables, environmental variables, playbook variables, inventory variables, variable scope and precedence, accessing variables, facts, ansible vault. Conditionals, wait_for. Hands on Using variables and conditions in playbooks. Roles and includes Dynamic includes, Handler includes, playbook includes. Roles, role parts: handlers, files, templates, cross platform roles, ansible galaxy. Hands on includes example, building roles. Inventories /etc/ansible/hosts, inventory variables, static inventories, dynamic inventories. Hands on Inventories and variables. Miscellanea Individual server cookbooks, Main playbook for configuring all servers. Hands onPlaybooks.
SDH training course description Our SDH training course is designed for those with a basic knowledge of the principles of telecommunication digital transmission techniques. An overview of the existing transmission hierarchies and their limitations is provided with an introduction to the Synchronous Digital Hierarchy (SDH). The advantages of SDH are explained fully. What will you learn Identify the major limitations of the PDH network. Outline the advantages of using the SDH. Illustrate the various SDH equipment and network topologies. Describe the principles of the SDH multiplexing structure. SDH training course details Who will benefit: Anyone working with SDH. Prerequisites: It should be noted that this course will assume some basic telecommunication transmission knowledge from the delegates attending. This may be accomplished by attending the Introduction to Telecommunications course. Duration 2 days SDH training course contents Introduction to SDH Timing and synchronisation of digital signals, the plesiochronous digital hierarchy (PDH), the synchronous digital hierarchy (SDH), service protection with SDH SDH Multiplexing Techniques The multiplexing principles of SDH, mapping and aligning a 2Mbit/s tributary into a TU-12, aligning the VC-12 in a TU-12, multiplexing TU-12's into a TUG-2, multiplexing TUG-2's into a TUG-3, multiplexing TUG-3's into a VC-4, the VC-4 path overhead, the STM-1 frame, the AU-4 pointer, the STM-1 section overheads, multiplexer section protection, transmission at rates higher than STM-1, concatenation line transmission functions in SDH SONET Multiplexing Techniques Mapping a DS1 tributary into a virtual tributary, aligning the VT-SPE into a VT frame, mapping the VTGs into a STS-1 SPE, the STS-1 synchronous payload envelope, the STS-1 frame SONET network sections and lines transmissions at higher rates than STS-1 SDH Functions and Facilities SDH network topologies, structure of SDH equipment, synchronisation of SDH networks, protection switching in SDH networks, SDH alarm structure, SDH performance monitoring, testing of SDH, equipment and systems, network management and SDH, asynchronous transfer mode (ATM), future services and technologies OSI Telecommunications Network Management Definition of network management, managing telecom equipment, the managed object library, the management information base, the telecommunications management network (TMN), the Q3 protocol.
REXX training course description A hands on training course covering the Restructured EXtended eXecutor (REXX) language. A large number of exercises are used to reinforce and emphasise lecture sessions. What will you learn Write REXX programs. Debug REXX programs. Examine existing code and determine its function. REXX training course details Who will benefit: Anyone wishing to learn REXX. Prerequisites: None although experience in another high level language would be useful. Duration 3 days REXX training course contents Introduction to REXX What is REXX? REXX environments, invoking a REXX exec, a sample REXX exec, REXX clause types. REXX variables and data Literal data, variable data, assignment, simple variables, compound variables, stem variables, constant data, numeric data, arithmetic operations, character manipulation, hexadecimal data. The parse instruction Parse format, Parse examples, Parse arg, Parse pull, Parse value, special templates, place holders, literal templates, numeric templates, variable templates. Control structures Relational conditions, logical operators, simple selection, looping: uncontrolled and controlled loops, infinite loops, conditional loops, controlling loops, leave, iterate, multiple selection, instructions for subroutines, exit. Sub routines and functions Internal and external subroutines, call, ARG(), ARG(n)return, exit, scope of variables, procedure, functions, built in functions, overriding built in functions. Performing I/O Command conventions, preparing to read a file, execio, limitations, execio for reading, DISKR, DISKRU, DISKW, return codes. External functions listdsi, msg, outtrap, prompt, sysdsn, sysvar, storage Tracing Immediate commands, the trace facility, signal and call statements. Built in functions Text handling functions, string handling, word handling, arithmetic, data conversion, bit manipulation, environment. The data stack Data stack structure, REXX instructions for the data stack, REXX functions for the data stack, TSO/E commands for the data stack. REXX in batch TSO/E foreground. TSO/E background.
Complete C programming training course description A hands-on introduction to programming in the ANSI C programming language. The course initially moves at a fast pace in order to spend as much time as possible on the subject of pointers - the area which cause the most bugs in C programs. What will you learn Write ANSI C programs Use the C libraries Debug C programs Examine existing code and determine its function. Complete C programming training course details Who will benefit: Programmers wishing to learn C. Programmers wishing to learn C++ or Java. Prerequisites: None, although experience in another high level language would be useful. Duration 5 days Complete C programming training course contents Getting started The compilation process, comments, main(), statement blocks, printf(). C data types and operators char, int, float and double, qualifiers, arithmetic and assignment operators, precedence, Associativity. Basic I/O C libraries, stdin and stdout, getchar(), putchar(), printf() formatting. Flow control if else, dangling elses, else if, while and for loops. switch statements, the null statement, break, continue and gotos. Functions Function calls, arguments and return types, function declarations (prototypes), function definitions, scope of variables. The preprocessor Preprocessor actions, macros, #include. Libraries and their relationship with header files. Conditional compilation. More data types and operators Logical, bitwise and other operators, type conversion, casting, typedefs and access modifiers. Arrays Declaring and handling arrays, common gotchas, multidimensional arrays. Pointers What are pointers? Why they are so important, declaring and using pointers,The three uses of the *,pointer example - scanf, pointers as arguments. More pointers Golden rules of pointers and arrays, pointers to arrays, pointer arithmetic, arrays of pointers, multiple indirection. Character/string manipulation Arrays of characters, string definition, working with strings, String library. Program arguments argc and argv, example uses,char *argv[] versus char ** argv. Program structure and storage classes Globals (externals), multi source programs, the look of a C program. Structures Declaration, the . and - operators, unions and bitfields. Library functions File handling, fopen and fclose, reading from and writing to files, fseek().calloc() and malloc()
OpenStack for NFV and SDN course description OpenStack is predominately a cloud management technology. This course looks at how OpenStack can be used in a NFV and SDN environment. What will you learn Describe the architecture of NFV. Explain the relationship between NFV and SDN. Implement NFV VIM using OpenStack. Explain how OpenStack as VNFM and orchestrator works. OpenStack for NFV and SDN course details Who will benefit: Anyone wishing to implement NFV using OpenStack. Prerequisites: Introduction to Virtualization Duration 3 day OpenStack for NFV and SDN course content What is NFV? What is NFV? What are network Functions? NFV benefits, NFV market drivers. ETSI NFV framework. ETSI documents, Architecture overview, compute domain, hypervisor domain, infrastructure network domain. What is OpenStack? Virtual machines, clouds, management. OpenStack architecture, OpenStack modules. Why OpenStack for NFV? Hands on OpenStack installation. OpenStack Virtualization and NFV Server, storage and network virtualization and NFV. Where OpenStack fits in the ETSI framework. Virtual machines, containers and docker. Data centres, clouds, SaaS, IaaS, PaaS. Hands on OpenStack Iaas, OpenStack Nova. The virtualization layer VM centric model, containers versus hypervisors, FD.io. Hands on OpenStack as the VIM. OpenStack Neutron VXLAN, Networks, subnets, ports. Security groups. Routers. Service and component hierarchy. Hands on Implementing a virtual network with OpenStack Neutron. Virtualization of Network Functions Network virtualization versus Network Function virtualization. NFV MANO Management and Orchestration. Where OpenStack fits. MANO descriptors, Open orchestration. OpenStack Tacker, Open MANO, OpenBaton, other orchestrators. OpenStack Tacker Installation, getting started, configuration. SFC and OpenStack. Hands on Deploying a VNF. OPNFV What is OPNFV, Where OpenStack fits into OPNFV. SDN What is SDN? Control and data planes. SDN controllers. Classic SDN versus real SDN. Hybrid SDN, network automation, SDN with overlays. Northbound, southbound, SDN protocols, OpenFlow, OpenDaylight, ONOS, SDN with NFV. SDN and OpenStack. Summary Deploying NFV, performance, testing. Futures
Microsoft Lync training course description This course teaches IT staff how to plan, design, deploy, configure, and administer a Microsoft Lync Server solution. The course emphasizes Lync Server Enterprise Unified Communications features focussing particularly on coexisting with and migrating from legacy communication services. The labs in this course create a solution that includes IM and Presence, Conferencing, and Persistent Chat. This course helps prepare for Exam 70-336. What will you learn Describe the Lync Server architecture. Install and deploy Lync Server. Use Lync Server management interfaces. Deploy and manage clients. Manage and administer dial-in conferencing. Design audio and video for web conferencing. Plan for instant message and presence Federation. Deploy and configure persistent chat in Lync. Configure archiving and monitoring services. Troubleshoot Lync Server. Describe the required daily, weekly, and monthly maintenance tasks. Use SIP commands and analyze SIP logs. Configure high availability features in Lync. Design load balancing in Lync Server. Backup and restore Lync Server data. Microsoft Lync training course details Who will benefit: Technical staff working with Microsoft Lync. Prerequisites: Supporting Windows 2008 or 2012. Duration 5 days Microsoft Lync training course contents Microsoft Lync Server architecture Lync Server architecture, Lync core capabilities, Lync design process, assessing infrastructure requirements and updating the design, planning for all Microsoft solutions framework phases. Designing a Lync Server topology Infrastructure requirements for Lync Server, using the planning tool, using topology builder, server infrastructure, documentation. Hands on Environment preparation and Lync Server pools. Users and rights in Microsoft Lync Server Managing Lync Server, role based access control. Hands on Using the management shell, configuring role-based access control. Client/device deployment and management Deploy and manage clients, prepare for device deployment, IP phones. Hands on Clients. Conferencing in Lync Server Introduction to conferencing in Lync Server, designing for audio\video and web conferencing, dial-in conferencing in Lync Server, managing and administering conferencing. Hands on Conferencing in Microsoft Lync. Designing and deploying external access Conferencing and external capabilities of Lync Server, planning for IM and presence federation, designing edge services. Hands on Deploying Edge Server and Configuring Remote Access, Validating the Edge Server. Deploying Lync Server persistent chat Overview of persistent chat architecture in Lync Server, designing persistent chat, deploying and persistent chat. Hands on persistent chat server. Monitoring and archiving The archiving service, the monitoring service, configuring archiving and monitoring. Hands on Archiving and monitoring in Lync Server. Administration and maintenance of Lync Lync Server troubleshooting tools, Lync Server operational tasks, Lync Server troubleshooting techniques. Hands on Lync administration tools, centralized logging service, analysing Lync Server logs and traces. High Availability in Lync Server High availability in Lync Server, configuring high availability in Lync Server, planning for load balancing, designing load balancing. Hands on Configuring database mirroring, experiencing a scheduled SQL Server outage, experiencing an unscheduled SQL Server outage. Disaster recovery in Lync Server Disaster recovery in Lync Server, tools for backing up and restoring Lync Server, critical Lync Server data to back up and restore, critical data to export and import, designing branch site resiliency. Hands on Configure pool pairing, experiencing a pool failure or outage. Planning a migration to Lync Server Coexistence and migration, migration steps, planning for clients and devices. Designing a client migration and device migration strategy. Hands on Creating a migration plan, documenting the migration phases.