Carrier Ethernet training course description Ethernet is now the interface of choice for nearly all networking. This comprehensive course looks at the ways carriers can provide this Ethernet interface for their WANs and MANs. The course assumes delegates already have a solid foundation in Ethernet switching and so concentrates on just the Ethernet technologies for Carrier Ethernet. What will you learn Describe the main Carrier Ethernet services. Evaluate transports for Carrier Ethernet. Explain how Ethernet can work over MPLS and SDH. Explain the Ethernet technologies used to enable Carrier Ethernet. Carrier Ethernet training course details Who will benefit: Network engineers. Staff working for carriers. Prerequisites: Definitive Ethernet switching for engineers. Duration 2 days Carrier Ethernet training course contents Introduction What is Ethernet? LANs, MANs, WANs, Ethernet and switches in the LAN. Traditional LAN/WAN integration, routers. The Ethernet interface for the WAN. Standards: IEEE, MEF, OIF, Ethernet Alliance. Carrier Ethernet Services E-line: EPL, EVPL. E-LAN: EP-LAN, EVP-LAN. E-Tree: EP-Tree, EVP-Tree. Ethernet Services attributes. Applications: Carrier Ethernet for businesses, Mobile backhaul. Multicasting. Service attributes Bandwidth profiles, bandwidth parameters, Class of Service, QoS, MTU, Protection mechanisms: STP, RSTP, MSTP, Link aggregation, G.8031, G.8032. Transporting Carrier Ethernet The main options. 'Pure' Ethernet, Ethernet over SDH, Ethernet over WDM, Ethernet over MPLS. Ethernet switching, addresses and MAC address tables. Carrier Ethernet access technologies. EFM. Ethernet over MPLS What is MPLS, MPLS-TE, MPLS-VPN, L2 VPNs, VPLS, VPWS. MPLS Fast Reroute. CET 'Pure' Ethernet, Provider bridging 802.1d, Provider Backbone Bridges 802.1ah. Traffic engineering 802.1Qay. Carrier Ethernet technologies 802.1ad VLAN stacking, 802.1AX Link aggregation. 802.1Q QoS. OAM Standards, layers, interworking
Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.
CompTIA A+ bootcamp training course description This course includes A+ Certification: Systems Hardware and Networking Support Skills and A+ Certification: Operating Systems and Security Support Skills. The course will provide IT "super users" or new support professionals with the fastest route to A+ Certification. Full practical sessions will prepare students for the two A+ Certification exams. Note: Some self-study each evening will be required. What will you learn Install, configure, and troubleshoot peripheral devices, system components, print devices, wired and wireless LAN links and internet access devices. Install, configure, and troubleshoot the Microsoft Windows, Linux, and Mac OS PC operating systems plus iOS, Android, and Windows mobile devices. Perform basic PC maintenance. Configure access control measures. Perform basic PC maintenance. CompTIA A+ bootcamp training course details Who will benefit: Students wishing to take both CompTIA A+ exams. Prerequisites: PC fundamentals Duration 5 days Networking Microsoft Systems course contents Peripherals and Adapters Motherboard Components, Connection Interfaces, Display Devices, Audio and Multimedia Devices, Removable Storage Devices. System Components Mass Storage Devices, System Memory, Processors, BIOS and UEFI, Power Supplies. Troubleshooting and Mobile Devices Troubleshooting System Components, Laptops, Mobile Devices, Troubleshooting Mobile Devices. Printer and Network Hardware Printers, Configuring Printers, Troubleshooting Printers, Network Architectures, Ethernet Networks. Networks Wireless Networks, Internet Connections, Internet Protocol, Routers and Firewalls, Troubleshooting Networks. Supporting Windows (1) Windows Operating System, Administration Tools, Managing Storage, Managing Files, Managing Applications. Supporting Windows (2) Managing Devices, Managing Performance, Troubleshooting Windows, Installing Windows. Supporting Windows Troubleshooting Boot Problems, Maintenance and Backup, Threats and Vulnerabilities, Viruses and Malware, Securing Workstations, Securing Data. Supporting Windows Networks Configuring Network Connections, Securing Network Connections, Configuring Shared Resources, Virtualization and Services. Linux, OS X, and Mobile OS Linux Operating System, OS X, Mobile Operating Systems, Mobile OS Security and Troubleshooting, Safety and Environmental Procedures, Professionalism and Communication.
Total TRILL training course description A comprehensive look at Transparent Interconnection of Lots of Links (TRILL). This TRILL course starts with the problems in traditional switched networks then moves onto to how TRILL solves these problems. As IS -IS is key to loop free topologies in TRILL networks, this protocol is also studied. What will you learn Explain the benefits of TRILL. Explain how TRILL works. Explain the role of IS-IS in TRILL. Integrate TRILL into existing networks. Total TRILL training course details Who will benefit: Technical staff working with Ethernet. Prerequisites: Definitive Ethernet switching for engineers Duration 1 day Total TRILL training course contents What is TRILL? Layer 2 versus Layer 3, STP problems: One path, convergence, MAC explosion. TRILL switches, RBridges, TRILL campus. TRILL standards TRILL components RBridges, mixing Rbridges with bridges, appointed forwarders. IS-IS Link layer IS-IS, SPF trees, traffic management. IS-IS extensions for TRILL. ISIS TLV. How TRILL works TRILL IS-IS hello discovery, Designated bridge, IS-IS flooding, Appointed forwarder, unicast versus multi-destination frames. TRILL nicknames. TRILL packet headers Local link header, TRILL header. TRILL over Ethernet, TRILL over PPP. VLANs. Fine grained labelling. TRILL BFD. TRILL OAM. Frame overheads. TRILL comparisons MPLS, IP, 802.1aq.
Total MPLS VPN for engineers training course description A hands on course concentrating solely on MPLS VPNs. The course begins with a review of VPN basics before moving onto L3VPNs and MBGP, followed by L2VPNs. What will you learn Compare, contrast and evaluate MPLS L2VPNs versus L3VPNs. Describe, configure and troubleshoot MPLS L3VPNs. Configure and troubleshoot MBGP. Describe, configure and troubleshoot MPLS L2VPNs. Total MPLS VPN for engineers training course details Who will benefit: Anyone working with MPLS VPNs. Prerequisites: Concise MPLS for engineers Duration 2 days Total MPLS VPN for engineers training course contents MPLS VPN basics LSR, PE and P router roles. What is a VPN? MPLS VPN types, MPLS VPN comparison, MPLS L3VPN, L2VPN. VPN architectures. Hands on: Building the base network. L3VPN Separate routing tables, The Virtual Routing Table, VRFs, Route Distinguisher (RD), VNPv4 addresses. Hands on: Minimal VRF configuration, routing between customer and provider (PE-CE). MBGP MP-BGP, IPv4 routing, IPv6 routing, VPNv4 addresses, VPNv6 addresses. Exchanging labels. Exchanging routes. Route targets, communities. Route reflectors. Hands on: MBGP setup. MPLS L3VPN troubleshooting. L2VPN Why L2 not L3? Services: TDM, ATM, Frame Relay, Ethernet. Pseudowires. Hands on: Simple L2VPN configuration. Pseudowires VPWS, AToM, Attachment Circuit, Traffic encapsulation, Ethernet over MPLS. Ethernet MTU considerations. VC types. Hands on: PW configuration and troubleshooting. VPLS Ethernet multipoint connectivity. Virtual Forwarding Instance (VFI), Virtual Switching Instance. Flooding, MAC address management, split horizons. Hierarchical VPLS. Signalling: LDP based. BGP based. Auto discovery. Hands on: VPLS configuration and troubleshooting. Next generation L2VPN E-VPN, PBB-EVPN.
Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.
3G training course description This course is designed to give the delegate an understanding of the technologies used within a 3G UMTS mobile network. During the course we will investigate the UMTS air interface and the use of Wideband-Code Division Multiple Access (WCDMA) to facilitate high speed data access, together with HSPA to offer mobile broadband services. We will describe the use of soft handover rather than hard handover procedures and soft capacity sharing. The course includes a brief exploration of the UMTS protocol stack and the use of PDP Context and QoS support features. What will you learn Explain the 3G UMTS architecture. Describe the role of a Drifting & Serving RNC. Explain the use of ARQ & HARQ for mobile broadband. Describe how IMS integrates into the architecture. Describe the use of Media Gateway Controllers. Identify the temporary identities used within 3G UMTS. 3G training course details Who will benefit: Anyone working within the telecommunications area, especially within the mobile environment. Prerequisites: Mobile communications demystified Telecommunications Introduction Duration 2 days 3G training course contents D3GPP specifications 3GPP standards body, Evolution path, Frequency and bandwidth, Conceptual model, UMTS general architecture, UTRAN architecture & radio access bearer. CDMA principles CDMA principle, Code characteristics, Code requirements. CDMA requirements Synchronization, Power control, Soft handover, Rake receiver, Antenna consideration, Multi-user detection. Radio interface protocol architecture Access stratum & non-access stratum, Overall protocol structure, Logical and transport channels, Physical channels, Protocol termination. Layer 2 Protocols Medium Access Control (MAC) Protocol, Radio Link Control (RLC) Protocol, Packet Data Convergence Protocol (PDCP) protocol, Radio Interface for Broadcast/Multicast Services. Radio Resource Control (RRC) Protocol RRC Architecture, RRC Protocol State, Broadcast of information, RRC connection management, Radio bearer management, RRC connection mobility functions, Power control, Ciphering and Integrity. Mobile procedures Mobility management states and transitions, UMTS identities, Procedures in Idle mode (location updates, cell selection/ re-selection), Circuit-switched call set-up, Packet-switched context activation and context preservation, Data transfer initialization, Soft-handover procedure. Introduction to HSPA The need for high speed data, Fast HARQ, Improved scheduling, Additional channels, Soft combining, HS-DSCH codes, Uplink HSPA vs downlink HSPA, Full HSPA, Use of MIMO, Enhanced CELL_FACH.
Why Learn Autodesk Maya Basics to Advanced Level Course? Course info. Autodesk Maya is one of the best tools for 3D animation and visual effects. Learn Maya with our training courses covering sectors like Architecture, Games & Films, Animation, and Media. London Design Training Courses empower you to master Maya, transforming your 3d skills.  Duration: 40 hrs Method: 1-on-1. Schedule: Tailor your own schedule by pre-booking a convenient hour of your choice, available from Mon to Sat 9 am and 7 pm. Experience advanced-level Maya training covering essential aspects such as modeling, UV mapping, texturing, lighting, camera movement, and rigging. The course is tailored to your specific requirements and work preferences. You can discuss your learning goals with our trainer, and we will suggest a syllabus that meets your needs. Flexible Training Options: Choose in-class training at one of our UK center or attend live online sessions. Certified Tutors and Authoritative: London Design Training Course has all Autodesk Authorized Trainers. Hands-on Learning Approach: The training is practical and hands-on, combining theory and step-by-step demonstrations. You'll have ample time to practice techniques on your computer with Maya, and you can keep all the files you create. Compatible with Windows and Mac: Maya training is available for both Windows and Mac users, with options to suit any recent version of Maya. Maya Basic to Advanced Course Duration: 40 hours Course Description: In this course, you will learn the fundamental and advanced skills to create complex 3D models and animations using Autodesk Maya software. You will gain knowledge of the Maya interface, tools, and workflow. You will learn the essentials of modeling, texturing, rigging, animating, and rendering 3D models. You will also learn how to create advanced special effects and understand advanced modeling techniques. I. Introduction to Maya (3 hours) Overview of Maya and its Uses Maya interface and basic tools Navigation and viewport controls Creating and saving projects II. Basic Polygon Modeling (6 hours) Polygon modeling basics Creating basic shapes and objects Editing and modifying objects Creating complex objects with extrusions and bevels Creating organic shapes with NURBS III. Intermediate Modeling (6 hours) Advanced polygon modeling techniques Creating complex models with Booleans and deformers Creating and modifying curves and surfaces Creating organic shapes with sculpting tools Creating architectural models IV. Texturing and Materials (6 hours) Introduction to texturing Creating and applying materials Texture mapping and UV unwrapping Creating realistic materials with shaders Painting textures with the 3D paint tool V. Lighting and Rendering (6 hours) Basic lighting techniques Advanced lighting techniques Creating realistic lighting environments Setting up a camera and creating a composition Rendering still images and animations Output options and file formats VI. Animation (9 hours) Introduction to animation Keyframe animation and animation curves Creating and editing animation clips Rigging and animating a simple character Creating and editing motion paths and animation layers Creating complex character rigs Creating lip sync and facial animation Creating realistic animation with dynamics and simulations Cloth Animation Ncloth VII. Rigging (4 hours) Introduction to rigging Creating joints and skeletons Binding skin to joints and creating weight maps Creating simple rigging systems and rigging a character Creating complex rigging systems VIII. Special Effects (4 hours) Particle systems and dynamics Creating and manipulating fluids and fire effects Creating and editing special effects like explosions and smoke Creating advanced simulations with nCloth and nParticles Paint effects Mash Networks and Mash Animation IX. Advanced Rendering Techniques (2 hours) Render layers and passes Global illumination and ambient occlusion Mental Ray rendering and settings X. Conclusion and Next Steps (1 hour) Review of course content Tips for further learning and resources Q&A; and feedback Note: The above course outline is just a suggestion, and the course content and duration can be adjusted according to the needs and level of the learners. Proficiency in Advanced Maya Techniques: Participants will gain advanced skills in various aspects of Maya, including modeling, UV mapping, texturing, lighting, camera movement, and rigging. Tailored Training: The course is customized to meet the specific requirements of participants, focusing on their preferred techniques and work type. Hands-On and Practical Experience: The training is practical and hands-on, allowing participants to practice techniques on their own computers with Maya. Versatility in Operating Systems: Participants will be equipped to use Maya on both Windows and Mac systems. Accredited Certification: Upon successful completion, participants will receive an e-certificate, accredited by Autodesk Certified instructor, confirming their achievement in the Maya training course. Post-Course Support: After the training, participants are entitled to 30 days of email support from their Maya trainer, ensuring assistance with any post-course questions or issues. Up-to-Date and Relevant Learning: The training can be based on any recent version of Maya, providing participants with up-to-date knowledge and skills.
Learn to use 3D printing software to design and create your own pendants, earrings, rings and bracelets. The course is on a one-to-one basis. If you want to be in the jewellery trade as a designer and seller of modern jewellery or you simply want to create designs for yourself and your family then you should be learning how to create your own designs using apps such as Fluid Designer for 3D Printing.
LTE Architecture and Protocols course description This course provides a comprehensive tour of the LTE architecture along with services provided and the protocols used. What will you learn Describe the overall architecture of LTE. Explain the information flows through LTE. Describe the LTE security. Describe LTE mobility management. Recognise the next steps for LTE. LTE Architecture and Protocols course details Who will benefit: Anyone working with LTE. Prerequisites: Mobile communications demystified Duration 3 days LTE Architecture and Protocols course contents Introduction History, LTE key features. The 4G ITU process. The LTE 3GPP specifications. Specifications. System Architecture LTE hardware architecture. UE architecture and capabilities. E-UTRAN and eNB. EPC, MME functions, SGW, PGW and PCRF. System interfaces and protocol stacks. Example information flows. Dedicated and default bearers. EMM, ECM, RRC state diagrams. Radio transmission and reception OFDMA, SC-FDMA, MIMO antennas. Air interface protocol stack. Logical, transport and physical channels. Frame and slot structure, the resource grid. Resource element mapping of the physical channels and signals. Cell acquisition, data transmission and random access. MAC, RLC, PDCP protocols. LTE spectrum allocation. Power-on procedures Network and cell selection. RRC connection establishment. Attach procedure, including IP address allocation and default bearer activation. LTE detach procedure. Security in LTE networks LTE security features, identity confidentiality, ciphering and integrity protection. Architecture of network access security in LTE. Secure key hierarchy. Authentication and key agreement procedure. Security mode command procedure. Network domain security architecture. Security associations using IKE and IPSec. Mobility management RRC_IDLE, RRC_CONNECTED. Cell reselection, tracking area updates. Measurement reporting. X2 and S1 based handovers. Interoperation with UMTS, GSM and non-3GPP technologies such as cdma2000. QoS, policy control and charging QoS in LTE, EPS bearers, service data flows and packet flows. The architecture and signalling procedures for policy and charging control. Data transport using GPRS, differentiated services and MPLS. Offline and online charging in LTE. Delivery of voice and text messages over LTE Difficulties and solutions for Voice over LTE. Architecture and call setup procedures for circuit switched fallback. Architecture, protocols and call setup procedures in IP multimedia subsystem. Enhancements in release 9 LTE location services. Multimedia broadcast / multicast service and MBSFN. Cell selection, commercial mobile alert service. LTE Advanced and release 10 Impact of carrier aggregation on LTE air interface. Enhanced MIMO processing on uplink and downlink. Relaying. Release 11 and beyond. OAM and self organising networks Operation, administration, maintenance and provisioning for LTE. Self-configuration of base station parameters. Fractional frequency re-use, inter-cell interference co-ordination. Self-optimisation of base station procedures. Self-healing to detect and recover from faults.