Linux engineer certification training course description LPIC-2 is the second certification in LPI's multi level professional certification program. This course teaches the skills necessary to pass the LPI 201 exam; the first of two LPIC-2 exams. Specifically, the course covers the administration of Linux systems in small to medium sized mixed networks. What will you learn Perform advanced administration tasks. Perform advanced file system administration. Linux engineer certification training course details Who will benefit: Linux administrators. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Linux engineer certification fundamentals training course contents Part I The LPI 201 Exam Starting a System The Linux Boot Process, Firmware Startup, BIOS Startup, UEFI Startup, Linux Bootloaders, GRUB Legacy, GRUB 2, Alternative Bootloaders, Secure Bootloaders, Process Initialization, SysV Method, systemd Method, Upstart Method, System Recovery, Kernel Failures, Root Drive Failure. Maintaining the System Fluid Messaging, Static Messaging, System backups, Backup Strategies, Performing Backups, Installing Programs from Source, Obtaining and unpacking Installation Files, Compiling Programs, Resource Usage: Managing, measuring, predicting and troubleshooting. Mastering the Kernel What Is the Kernel? Kernel Features, Parts of the Kernel, Kernel Versions, Obtaining Source Code, Creating the Configuration File, Compiling and Installing the Kernel, Compiling and Installing Modules, Creating an Initial RAM Disk, Booting the New Kernel, Creating a Kernel Package, Maintaining the Kernel, Working with Module Files, Module Commands, Working with Hardware, Automatically Detecting Hardware, Troubleshooting the Kernel. Managing the Filesystem The Linux Filesystem, Filesystem Structures, Filesystem Types, Making Filesystems, Attaching Filesystems, Memory-Based Linux Filesystems, the Btrfs Filesystem, Btrfs Subvolumes, Btrfs Snapshots, Optical Filesystems, Swap Filesystems, Network-Based Filesystems, Auto-Mounting, Encrypted Filesystems, Maintaining Linux Filesystems, Adjusting a Filesystem, Checking and Repairing a Filesystem, SMART. Administering Advanced Storage Devices Configuring RAID, Implementing RAID on Linux, Managing a RAID Array, Adjusting Storage Devices, Looking at Drive Interface Concepts, Testing and Tuning Drives, Implementing iSCSI, Managing Logical Volumes, LVM, Creating Logical Volumes, Supporting Logical Volumes, Understanding the Device Mapper. Navigating Network Services Networking Basics, The Physical Layer, The Network Layer, The Transport Layer, The Application Layer, Configuring Network Features, Network Configuration Files, Graphical Tools, Command-Line Tools, Basic Network Troubleshooting, Checking the Log Files, the ARP Cache, Sending Test Packets, Testing Network Routes, Testing Client/Server Connectivity, Finding Host Information, Network Security, Advanced Network Troubleshooting, Viewing Open Network Connections, Viewing Network Statistics, Scanning the Network, Capturing Network Traffic.
Course Overview Grasp the opportunity to learn Microsoft Excel from the ABCs to an advanced level within one course. The Microsoft Excel Masterclass in 2021 course will start with the basics with MS excel and gradually turn you into an expert user. The Microsoft Excel Masterclass in 2021 course will first focus on the tools and functions of excel. You will comprehend the skills to create basic formulas in excel. In this step by the step learning process, you will have the adequate knowledge and ability to make all sorts of adjustments to your worksheets. The course will teach you many strategies for cell formatting. From the easy to follow modules, you will grasp the techniques to insert shapes and images into your sheets. You will also understand how to visualize your data in charts. In the end, you will study the benefits of using excel templates. The Microsoft Excel Masterclass in 2021 course will provide you with first-hand training on excel. Enroll in the course and take your excel skills to the next level. Learning Outcomes Get an introduction to Microsoft Excel and its functions Understand the process of data validation and data visualization Learn how to adjust excel worksheets Know about the conditional functions Familiarize yourself with the process of inserting images and shapes Who is this course for? Those who want to learn Microsoft Excel. Entry Requirement This course is available to all learners, of all academic backgrounds. Learners should be aged 16 or over to undertake the qualification. Good understanding of English language, numeracy and ICT are required to attend this course. Certification After you have successfully completed the course, you will be able to obtain an Accredited Certificate of Achievement. You can however also obtain a Course Completion Certificate following the course completion without sitting for the test. Certificates can be obtained either in hardcopy at the cost of £39 or in PDF format at the cost of £24. PDF certificate's turnaround time is 24 hours, and for the hardcopy certificate, it is 3-9 working days. Why choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry-leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognized accredited qualification; Access to course content on mobile, tablet or desktop from anywhere anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path The Microsoft Excel Masterclass in 2021 course is a useful qualification to possess and would be beneficial for any related profession or industry such as: Business Professional Data Operator Administrative Officer Data Analyst Unit 01: Excel from A-Z Course Introduction Excel from A-Z Course Intro 00:03:00 Excel Job Opportunities 00:03:00 Excel Job Types 00:04:00 Microsoft Excel Marketplace 00:04:00 What is Microsoft Excel? 00:04:00 Who is This Course For? 00:04:00 Unit 02: Getting Started With Excel Finding & Opening Excel 00:01:00 Excel's Start Screen 00:03:00 Explaining the Excel Interface 00:03:00 Excel Interface Continued 00:01:00 Excel Workbook vs. Excel Worksheet 00:02:00 Saving an Excel Document 00:04:00 Customizing the Quick Access Toolbar 00:02:00 Customizing the Excel Ribbon 00:03:00 Excel Shortcut Keys 00:02:00 Unit 03: Values, Referencing and Formulas Creating Excel Labels 00:03:00 Entering Numeric Values in Excel 00:03:00 Formatting Date Values in Excel 00:05:00 Building Basic Formulas in Excel 00:05:00 Order of Operations 00:06:00 Relative vs. Absolute Cell References 00:07:00 Unit 04: Intro to Excel Functions Excel Functions Explained 00:03:00 The SUM() Function 00:08:00 The MIN() & MAX() Function 00:04:00 The AVERAGE() Function 00:02:00 COUNT() Functions 00:05:00 Unit 05: Adjusting Excel Worksheets Moving & Copying Data 00:07:00 Insert & Delete Rows and Columns 00:05:00 Adjusting the Width and Height of Cells 00:05:00 Hiding and Unhiding Excel Rows and Columns 00:04:00 Renaming, Moving & Deleting Excel Worksheets 00:05:00 Adding Protection to Specific Cells 00:04:00 Protecting the Structure of a Workbook 00:02:00 Adding a Workbook Password to Open File 00:02:00 Unit 06: Visually Pleasing Cell Formatting Formatting Fonts and Cell Background Color 00:05:00 Adding Cell Borders 00:05:00 Formatting Data Appropriately 00:05:00 The Magic behind Excel's Format Painter 00:04:00 Creating Styles for Formatting Efficiency 00:06:00 Merging Cells for a Cleaner Look 00:03:00 The Power of Conditional Formatting 00:06:00 Unit 07: How to Insert Images and Shapes! Grab User's Attention using Illustrations 00:09:00 Customizing Icons 00:05:00 Create Compelling Graphics with SmartArt 00:06:00 Unit 08: Visualize Data with Charts The Commonly Used Column Chart 00:03:00 Changing the Chart Design 00:02:00 Formatting Elements of a Chart 00:06:00 Modifying the Data, Type & Location of a Chart 00:06:00 Unit 09: Excel's Printing Options Print Preview Options 00:04:00 Excel's Page Layout View 00:07:00 Printing a Specific Range of Cells 00:03:00 Converting Spreadsheets to PDF Files 00:02:00 Unit 10: Benefits of Using Excel Templates Why Create an Excel Template 00:01:00 How to Create an Excel Template 00:05:00 Unit 11: Working with Excel Datasets How to Prepare Data for Analysis 00:04:00 How to Sort Data in Excel 00:03:00 Multi-Level Sorting 00:03:00 Custom Sorting Datasets in Excel 00:02:00 Applying Filters to Datasets 00:05:00 Creating Subtotals within a Dataset 00:06:00 Converting Datasets into Tables 00:06:00 Finding & Removing Duplicate Values 00:07:00 Unit 12: Excel Database Functions The SUMIF() Function 00:09:00 The DSUM() Function 00:08:00 The DSUM() Function Cont. 00:07:00 The SUBTOTAL() Function 00:06:00 Unit 13: Excel Data Validation What is Excel Data Validation? 00:02:00 Creating a Drop Down List with Data Validation 00:07:00 Different Types of Excel Data Validation 00:06:00 Adding Custom Alerts to Data Validation 00:07:00 Creating a Dynamic Drop Down List 00:03:00 Complex Validation: Dependent Drop Down List! 00:09:00 Unit 14: Excel PivotTables Creating an Excel Pivot Table 00:06:00 Modifying Excel PivotTables 00:06:00 Grouping & Filtering PivotTable Data 00:07:00 Drilling Down into PivotTable Data 00:02:00 Creating Pivot Charts & Utilizing Slicers 00:08:00 Unit 15: Excel's PowerPivot Add-In What is PowerPivot? 00:04:00 Activating the Excel PowerPivot Add-In 00:02:00 Creating Relationships between Data Tables 00:06:00 Using Data Models to Create PivotTables 00:05:00 How to Create PowerPivot KPI's 00:08:00 Unit 16: Excel's Conditional Functions Excel's IF() Function 00:05:00 IF() Function with AND() Criteria 00:05:00 IF() Function with OR() Criteria 00:05:00 Nesting Multiple IF() Functions 00:07:00 The COUNTIF() Function 00:04:00 Key Benefits of Named Ranges 00:04:00 Unit 17: Excel's Lookup Function VLOOKUP() Function 00:09:00 The Beauty of Excel's IFERROR() Function 00:04:00 HLOOKUP() Function 00:06:00 INDEX() Function 00:05:00 MATCH() Function 00:05:00 INDEX() and MATCH() Combined 00:05:00 Two-Way Lookup with INDEX() and MATCH() 00:04:00 Unit 18: Text Based Functions in Excel LEFT(), RIGHT() and MID() Function 00:07:00 Extracting Specific Text using LEN() & SEARCH() 00:13:00 Combining Text with CONCATENATE() 00:06:00 Quick Tips & Other Text Based Functions 00:06:00 Unit 19: Auditing Formulas and Views in Excel Tracing Precedents & Dependents in Formulas 00:04:00 Showing Formulas 00:02:00 Grouping Data 00:03:00 3D Referencing in Formulas 00:05:00 Utilizing the Watch Window in Excel 00:03:00 How to Freeze Panes in Excel 00:03:00 Unit 20: Excel's 'what If?' Tools Excel's Scenario Manager Tool 00:06:00 Goal Seek in Excel 00:06:00 Compare Results with Excel Data Tables 00:04:00 Solver Tool 00:11:00 Unit 21: Welcome to Excel VBA The Power Behind Excel VBA 00:03:00 A Look Inside the Visual Basic Editor (VBE) 00:04:00 Recording a Macro 00:09:00 Saving & Opening a Macro-Enabled Workbook 00:02:00 Unit 22: The VBA Language Modules and Procedures 00:07:00 Objects, Methods and Properties 00:06:00 Excel VBA Variables 00:05:00 Unit 23: Writing VBA Code Referencing a Range 00:14:00 InputBox & MsgBox 00:06:00 Using Variables in VBA Code 00:05:00 If Then Else Statement 00:10:00 Worksheet Functions inside VBA 00:08:00 Creating User Defined Functions 00:09:00 User Defined Functions within VBA Scripts 00:06:00 Unit 24: Important VBA Tools and Logic Find Last Row of Data 00:06:00 Find Last Column of Data 00:03:00 With Statement 00:05:00 Debugging & Error Handling 00:07:00 Debugging & Error Handling Cont. 00:07:00 Unit 25: Excel VBA Lopps For Next Loop 00:09:00 Do Until Loop 00:06:00 For Each Loop 00:04:00 Unit 26: Triggering Macros Assigning Macros to Shapes 00:04:00 Form Controls vs ActiveX Controls 00:08:00 Worksheet Events 00:04:00 Workbook Events 00:03:00 Fun with VBA Events! 00:07:00 Unit 27: Excel User Forms Creating an Excel UserForm 00:03:00 Adding Controls to UserForms 00:10:00 How to Show an UserForm 00:03:00 Passing TextBox Values to Desired Cells 00:07:00 Passing Option Buttons to Desired Cells 00:07:00 UserForm ComboBoxes 00:08:00 Clearing Values from UserForm Controls 00:03:00 How to Close an UserForm 00:02:00 UserForms and Protected Sheets 00:05:00 Unit 28: Starting a Career in Excel Creating an Excel Resume 00:05:00 Getting Started with Freelancing 00:06:00 How to Become an Excel Freelancer 00:05:00 Top Freelance Websites 00:05:00 How to Get Your First Client 00:08:00 Personal Branding 00:07:00 Networking Do's and Don'ts 00:04:00 Importance of Having a Website 00:04:00 Resources Resources - Microsoft Excel Masterclass in 2021 00:00:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00
Duration 5 Days 30 CPD hours This course is intended for This course is designed for IT professionals who want to develop penetration testing skills to enable them to identify information-system vulnerabilities and effective remediation techniques for those vulnerabilities. Target students who also need to offer practical recommendations for action to properly protect information systems and their contents will derive those skills from this course. This course is also designed for individuals who are preparing to take the CompTIA PenTest+ certification exam PT0-002, or who plan to use PenTest+ as the foundation for more advanced security certifications or career roles. Individuals seeking this certification should have three to four years of hands-on experience performing penetration tests, vulnerability assessments, and vulnerability management. Overview After completing this course, you will be able to plan, conduct, analyze, and report on penetration tests, including the ability to: Plan and scope penetration tests. Conduct passive reconnaissance. Perform non-technical tests to gather information. Conductive active reconnaissance. Analyze vulnerabilities. Penetrate networks. Exploit host-based vulnerabilities. Test applications. Complete post-exploit tasks. Analyze and report pen test results. Security remains one of the hottest topics in IT and other industries. It seems that each week brings news of some new breach of privacy or security. As organizations scramble to protect themselves and their customers, the ability to conduct penetration testing is an emerging skill set that is becoming ever more valuable to the organizations seeking protection, and ever more lucrative for those who possess these skills. In this course, you will be introduced to some general concepts and methodologies related to pen testing, and you will work your way through a simulated pen test for a fictitious company. 1 - Outline Lesson 1: Scoping Organization/Customer Requirements Lesson 2: Defining the Rules of Engagement Lesson 3: Footprinting and Gathering Intelligence Lesson 4: Evaluating Human and Physical Vulnerabilities Lesson 5: Preparing the Vulnerability Scan Lesson 6: Scanning Logical Vulnerabilities Lesson 7: Analyzing Scanning Results Lesson 8: Avoiding Detection and Covering Tracks Lesson 9: Exploiting the LAN and Cloud Lesson 10: Testing Wireless Networks Lesson 11: Targeting Mobile Devices Lesson 12: Attacking Specialized Systems Lesson 13: Web Application-Based Attacks Lesson 14: Performing System Hacking Lesson 15: Scripting and Software Development Lesson 16: Leveraging the Attack: Pivot and Penetrate Lesson 17: Communicating During the PenTesting Process Lesson 18: Summarizing Report Components Lesson 19: Recommending Remediation Lesson 20: Performing Post-Report Delivery Activities Additional course details: Nexus Humans CompTIA Penetration Testing Certification (PenTest Plus) - (Exam PT0-002) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Penetration Testing Certification (PenTest Plus) - (Exam PT0-002) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 5 Days 30 CPD hours This course is intended for The intended audience for this course is information systems security professionals, internal review auditors, and other individuals who have an interest in aspects of information systems audit, controls, and security. Overview Upon successful completion of this course, students will be able to: - implement information systems audit services in accordance with information systems audit standards, guidelines, and best practices. - evaluate an organizations structure, policies, accountability, mechanisms, and monitoring practices. - evaluate information systems acquisition, development, and implementation. - evaluate the information systems operations, maintenance, and support of an organization; and evaluate the business continuity and disaster recovery processes used to provide assurance that in the event of a disruption, IT services are maintained. - define the protection policies used to promote the confidentiality, integrity, and availability of information assets. In this course, students will evaluate organizational policies, procedures, and processes to ensure that an organizations information systems align with its overall business goals and objectives. 1 - The Process of Auditing Information Systems ISACA Information Systems Auditing Standards and Guidelines Fundamental Business Processes Develop and Implement an Information Systems Audit Strategy Plan an Audit Conduct an Audit The Evidence Life Cycle Communicate Issues, Risks, and Audit Results Support the Implementation of Risk Management and Control Practices 2 - IT Governance and Management Evaluate the Effectiveness of IT Governance Evaluate the IT Organizational Structure and HR Management Evaluate the IT Strategy and Direction Evaluate IT Policies, Standards, and Procedures Evaluate the Effectiveness of Quality Management Systems Evaluate IT Management and Monitoring of Controls IT Resource Investment, Use, and Allocation Practices Evaluate IT Contracting Strategies and Policies Evaluate Risk Management Practices Performance Monitoring and Assurance Practices Evaluate the Organizations Business Continuity Plan 3 - Information Systems Acquisition, Development, and Implementation Evaluate the Business Case for Change Evaluate Project Management Frameworks and Governance Practices Development Life Cycle Management Perform Periodic Project Reviews Evaluate Control Mechanisms for Systems Evaluate Development and Testing Processes Evaluate Implementation Readiness Evaluate a System Migration Perform a Post-Implementation System Review 4 - Information Systems Operations, Maintenance, and Support Perform Periodic System Reviews Evaluate Service Level Management Practices Evaluate Third-Party Management Practices Evaluate Operations and End User Management Practices Evaluate the Maintenance Process Evaluate Data Administration Practices Evaluate the Use of Capacity and Performance Monitoring Methods Evaluate Change, Configuration, and Release Management Practices Evaluate Problem and Incident Management Practices Evaluate the Adequacy of Backup and Restore Provisions 5 - Protection of Information Assets Information Security Design Encryption Basics Evaluate the Functionality of the IT Infrastructure Evaluate Network Infrastructure Security Evaluate the Design, Implementation, and Monitoring of Logical Access Controls Risks and Controls of Virtualization Evaluate the Design, Implementation, and Monitoring of Data Classification Process Evaluate the Design, Implementation, and Monitoring of Physical Access Controls Evaluate the Design, Implementation, and Monitoring of Environmental Controls
Our extremely popular Criminology and Profiling Course will train you in the abilities needed to examine a crime scene and understand the motivation for illegal activity. You will be coached with the information provided by field experts and empowered to use science and psychology to protect the general public. This learning package provides a full learning curve for crime investigation and interpreting illicit behaviour. Beyond the basics of crime classification, it will provide invaluable pointers for dealing with violent crime and understanding the criminal psyche. A fascinating overview of forensic science is presented along with the principles of offender profiling and victimology. Each learning module is designed to provide you with crucial elements of UK laws and illicit offences until you are thoroughly familiarised with it. By enrolling in this Criminology and Profiling Course, you will quickly gain a full appreciation of the Criminal Justice System in England and Wales. The whole learning package provides an innovative set of engaging study tools and interactive assessment exercises. The user-friendly lessons can be taken at your own pace and will enable you to acquire the skills necessary to take part in official investigations and police procedures. Sign up today and stop crime in its tracks. Why choose this Criminology and Profiling Course? Earn a digital Certificate upon successful completion. Accessible, informative modules taught by expert instructors Study in your own time, at your own pace, through your computer tablet or mobile device Benefit from instant feedback through mock exams and multiple-choice assessments Get 24/7 help or advice from our email and live chat teams Full tutor support on weekdays Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Mock exams Multiple-choice assessment Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate. Print copy by post is also available at an additional charge of 9.99 and PDF Certificate at 4.99. Who is this course for? This course is designed for those individuals who work in the UK's police force or an associated role in the Criminal Justice System. It may also prove interesting to those who study real-life crime outside of official circles. Career path The training delivered by the Criminology and Profiling Course will be of benefit to those that work with the Police Force or hope to attain a similar role in the Criminal Justice System. As such, it will significantly strengthen careers or positions such as: Criminologist Criminology Graduate Criminal Investigator Criminology Lecturer Criminal Profiler Amateur True-Crime Enthusiast
This course explains how huge chunks of data can be analyzed and visualized using the power of the data analyst toolbox. You will learn Python programming, advanced pivot tables' concepts, the magic of Power BI, perform analysis with Alteryx, master Qlik Sense, R Programming using R and R Studio, and create stunning visualizations in Tableau Desktop.
Unleash the potential of cloud solutions with the AZ-204 Developing Solutions for Microsoft Azure course. Discover in-depth training on Azure Virtual Machines, App Services, Containers, and more to innovate and scale with Microsoft Azure's dynamic cloud platform.
TETRA training course description This 2 day training course covers the network architecture required for TETRA. It also looks at the Air Interface, TETRA Functions and Procedures. What will you learn Describe the TETRA Architecture Describe the Air Interface Explain the TETRA Functions Explain the TETRA Procedures TETRA training course details Who will benefit: Anyone working with TETRA. Prerequisites: None. Duration 2 days TETRA training course contents Introduction History of PMR, ETSI development, Tetra function, Tetra markets, Tetra standards, Tetra supplier base, Tetra Release 1, Tetra Release 2. Network Architecture Mobile network Identity, Mobile stations, Base station, Switching & Management, Addresses & Identitie. Air Interface Modulation, TDMA Format, FD, Framin, Burst format, Traffic Channel TCH, Dedicated Channel DCC, Common Control Channel CCC, Signalling Channel SCH, Logical Control mapping LCM, Protocol stack, Voice coded. TETRA Functions Trunked mode operation, User hierarchies, Individual calling, Group calling, Supplementary services, Voice and Data, Data services, Direct mode operation, Tetra WAP, Circuit mode priorities, Circuit mode data, Packet mode data, Discrete and Ambient listening. Automatic vehicle locator. TETRA Procedures MS operational modes, Mobility management, Cell selection, Security & Authentication, Decryption options, Cell setup, Channel assignment, Network management - internal, Network management -external, PSTN Gateway, ISDN Gateway, Control Room Gateway.
HSPA and HSPA+ training course description HSDPA (High Speed Downlink Packet Access) and HSUPA (High Speed Uplink Packet Access) provide speeds of upto 14Mbps downlink and 5Mbps uplink. This theory-based course provides an overview of the 3GPP R5 and R6 HSDPA/HSUPA standards and the technologies which are involved. The HSPA+ R7 enhancements are also covered. What will you learn Explain the relationship between HSPA and UMTS. Describe the benefits of HSPA/HSPA+ Explain the HSPA/HSPA+ technical enhancements. Explain packet flows in HSPA/HSPA+. Recognise the migration issues involved with HSPA/HSPA+ HSPA and HSPA+ training course details Who will benefit: Anyone working with HSPA. Prerequisites: Essential UMTS Duration 2 days HSPA and HSPA+ training course contents UMTS review UMTS architecture, components, interfaces, protocols, W-CDMA, standards, 3GPPr5, 3GPPr6, evolution to HSDPA and HSPA. HSPA basics What is HSDPA, what is HSUPA, key features, system capacities, data rates, delays. Key concepts: Adaptive modulation and coding (AMC), QPSK, 16QAM, HARQ, MAC-hs, multiplexing, subframes. HSPA channels Logical, transport, physical channels, dedicated vs. shared channels, HS-PDSCH, HS-SCCH, HS-DPCCH, code multiplexing, E-DCH, Enhanced DPCCH. MAC-architecture Controlling HS-DSCH, flow control, buffering, priority queues, packet scheduling, fast packet scheduling, Selecting modulation and coding. HARQ: Packet retransmissions, Incremental redundancy, comparison with ARQ, TFRC. MAC-d, MAC-c/sh, MAC-hs, MAC-es, MAC-e. HSPA migration HSDPA in the Radio Access Network (RAN), reuse of existing UMTS components, changes required, Impact on Iub/Iur interfaces, new and modified NBAP procedures, backwards compatibility. Packet flows Packet data session setup, simultaneous voice and data, QoS, TCP flow control, WCDMA packet scheduler, mobility procedures. HSPA phase 2 (3GPP r6) What is evolved HSPA? Speeds. Multiple Input Multiple Output (MIMO). Optional all IP architecture. R8 and LTE.