• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

10762 Mac courses

Essential WiMax

5.0(3)

By Systems & Network Training

WiMax training course description Broadband wireless access is an emerging technology area. This course looks at WiMAX, where it can be used, how it works and the alternative technologies. What will you learn Describe WiMAX. Explain how WiMAX works. Compare and contrast WiMAX with alternative broadband wireless access technologies. WiMax training course details Who will benefit: Anyone wishing to know more about WiMAX. Prerequisites: None. Duration 2 days WiMax training course contents Introduction What is WiMAX? WiMAX applications, The Internet, Internet access choices, wireless broadband access, WiMAX benefits. WiMAX overview Spectrums, LOS vs. non-LOS, bit rates, modulation, mobility, channel bandwidth, cell radius. WiMAX standards The WiMAX forum, IEEE, ETSI, HIPERACCESS, HIPERMAN, 802.16, 802.16-2004, 802.16a, 802.16e, 802.16f. WiMAX architecture Subscriber Stations (SS), Indoors, outdoors, antennas, Radio Base Stations (BS), LOS, Non LOS BackHaul, Point to multipoint, mesh support. Physical layer 10 - 66GHz, TDMA, TDD, FDD, 2 -11 GHz, SC2, OFDM, OFDMA, QPSK, QAM, Radio Link Control (RLC), uplink, downlink. MAC layer Traffic types (continuous, bursty), QoS, service types. MAC operations, connection oriented, frame structure, addressing. Convergence sublayers, service specific, common part, profiles (IP, ATM). Bandwidth request-grant, ARQ, Management messages. Security MAC privacy sublayer, network access authentication, AAA, 802.1x, key exchange and privacy. WiMAX alternatives WiMAX vs. 3G, WiMAX vs. 802.20.

Essential WiMax
Delivered in Internationally or OnlineFlexible Dates
£1,727

AZ-801T00 Configuring Windows Server Hybrid Advanced Services

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This four-day course is intended for Windows Server Hybrid Administrators who have experience working with Windows Server and want to extend the capabilities of their on-premises environments by combining on-premises and hybrid technologies. Windows Server Hybrid Administrators who already implement and manage on-premises core technologies want to secure and protect their environments, migrate virtual and physical workloads to Azure Iaas, enable a highly available, fully redundant environment, and perform monitoring and troubleshooting. This course teaches IT Professionals to configure advanced Windows Server services using on-premises, hybrid, and cloud technologies. The course teaches IT Professionals how to leverage the hybrid capabilities of Azure, how to migrate virtual and physical server workloads to Azure IaaS, and how to secure Azure VMs running Windows Server. The course also teaches IT Professionals how to perform tasks related to high availability, troubleshooting, and disaster recovery. The course highlights administrative tools and technologies including Windows Admin Center, PowerShell, Azure Arc, Azure Automation Update Management, Microsoft Defender for Identity, Azure Security Center, Azure Migrate, and Azure Monitor. Prerequisites An understanding of the following concepts as related to Windows Server technologies: High availability and disaster recovery Automation Monitoring Troubleshooting 1 - Secure Windows Server user accounts Configure user account rights Protect user accounts with the Protected Users group Describe Windows Defender Credential Guard Block NTLM authentication Locate problematic accounts 2 - Hardening Windows Server Describe Local Password Administrator Solution Configure Privileged Access Workstations Secure domain controllers Analyze security configuration with Security Compliance Toolkit Secure SMB traffic 3 - Windows Server update management Explore Windows Update Outline Windows Server Update Services server deployment options Define Windows Server Update Services update management process Describe the process of Update Management 4 - Secure Windows Server DNS Implement split-horizon DNS Create DNS policies Implement DNS policies Secure Windows Server DNS Implement DNSSEC 5 - Implement Windows Server IaaS VM network security Implement network security groups and Windows IaaS VMs Implement adaptive network hardening Implement Azure Firewall and Windows IaaS VMs Implement Windows firewall with Windows Server IaaS VMs Choose the appropriate filtering solution Deploy and configure Azure firewall using the Azure portal Capture network traffic with network watcher Log network traffic to and from a VM using the Azure portal 6 - Audit the security of Windows Server IaaS Virtual Machines Describe Azure Security Center Enable Azure Security Center in hybrid environments Implement and assess security policies Protect your resources with Azure Security Center Implement Azure Sentinel 7 - Manage Azure updates Describe update management Enable update management Deploy updates View update assessments Manage updates for your Azure Virtual Machines 8 - Create and implement application allowlists with adaptive application control Describe adaptive application control Implement adaptive application control policies 9 - Configure BitLocker disk encryption for Windows IaaS Virtual Machines Describe Azure Disk Encryption and server-side encryption Configure Key Vault for Azure Disk Encryption Encrypt Azure IaaS Virtual Machine hard disks Back up and recover data from encrypted disks Create and encrypt a Windows Virtual Machine 10 - Implement change tracking and file integrity monitoring for Windows IaaS VMs Implement Change Tracking and Inventory Manage Change Tracking and Inventory Manage tracked files Implement File Integrity Monitoring Select and monitor entities Use File Integrity Monitoring 11 - Introduction to Cluster Shared Volumes Determine the functionality of Cluster Shared Volumes Explore the architecture and components of Cluster Shared Volumes Implement Cluster Shared Volumes 12 - Implement Windows Server failover clustering Define Windows Server failover clustering Plan Windows Server failover clustering Implement Windows Server failover clustering Manage Windows Server failover clustering Implement stretch clusters Define cluster sets 13 - Implement high availability of Windows Server VMs Select high-availability options for Hyper-V Consider network load balancing for Hyper-V VMs Implement Hyper-V VM live migration Implement Hyper-V VMs storage migration 14 - Implement Windows Server File Server high availability Explore the Windows Server File Server high-availability options Define Cluster Shared Volumes Implement Scale-Out File Server Implement Storage Replica 15 - Implement scale and high availability with Windows Server VM Describe virtual machine scale sets Implement scaling Implement load-balancing VMs Create a virtual machine scale set in the Azure portal Describe Azure Site Recovery Implement Azure Site Recovery 16 - Implement Hyper-V Replica Define Hyper-V Replica Plan for Hyper-V Replica Configure and implement Hyper-V Replica Define extended replication Define Azure Site Recovery Implement Site Recovery from on-premises site to Azure Implement Site Recovery from on-premises site to on-premises site 17 - Protect your on-premises infrastructure from disasters with Azure Site Recovery Azure Site Recovery overview Workloads supported for protection with Azure Site Recovery Run a disaster recovery drill Failover and failback 18 - Implement hybrid backup and recovery with Windows Server IaaS Describe Azure Backup Implement recovery vaults Implement Azure Backup policies Recover Windows IaaS Virtual Machines Perform file and folder recovery Perform backup and restore of on-premises workloads Manage Azure Virtual Machine backups with Azure Backup service 19 - Protect your Azure infrastructure with Azure Site Recovery What is Azure Site Recovery Prepare for disaster recovery with Azure Site Recovery Run a disaster recovery drill Failover and failback using Azure Site Recovery 20 - Protect your virtual machines by using Azure Backup Azure Backup features and scenarios Back up an Azure virtual machine by using Azure Backup Restore virtual machine data 21 - Active Directory Domain Services migration Examine upgrade vs. migration Upgrade a previous version of Active Directory Domain Services to Windows Server 2022 Migrate to Active Directory Domain Services in Windows Server 2022 from a previous version Explore the Active Directory Migration Tool 22 - Migrate file server workloads using Storage Migration Service Storage Migration Service overview and usage scenarios Storage migration requirements Migrate a server with Storage migration Evaluate storage migration considerations 23 - Migrate Windows Server roles Describe the Windows Server Migration Tools Install the Migration Tools Migrate roles using the Migration Tools 24 - Migrate on-premises Windows Server instances to Azure IaaS virtual machines Plan your migration Describe Azure Migrate Perform server assessment Assess physical servers with Azure Migrate Migrate Windows Server workloads by using Azure Migrate 25 - Upgrade and migrate Windows Server IaaS virtual machines Describe Azure Migrate Migrate Windows Server workloads by using Azure Migrate Describe storage migration Migrate file servers by using Storage Migration Service 26 - Containerize and migrate ASP.NET applications to Azure App Service Azure Migrate App Containerization overview 27 - Monitor Windows Server performance Use Performance Monitor to identify performance problems Use Resource Monitor to review current resource usage Review reliability with Reliability Monitor Implement a performance monitoring methodology Use Data Collector Sets to analyze server performance Monitor network infrastructure services Monitor virtual machines running Windows Server Monitor performance with Windows Admin Center Use System Insights to help predict future capacity issues Optimize the performance of Windows Server 28 - Manage and monitor Windows Server event logs Describe Windows Server event logs Use Windows Admin Center to review logs Use Server Manager to review logs Use custom views Implement event log subscriptions 29 - Implement Windows Server auditing and diagnostics Describe basic auditing categories Describe advanced categories Log user access Enable setup and boot event collection 30 - Troubleshoot Active Directory Recover objects from the AD recycle bin Recover the AD DS database Recover SYSVOL Troubleshoot AD DS replication Troubleshoot hybrid authentication issues 31 - Monitor Windows Server IaaS Virtual Machines and hybrid instances Enable Azure Monitor for Virtual Machines Monitor an Azure Virtual Machine with Azure Monitor Enable Azure Monitor in hybrid scenarios Collect data from a Windows computer in a hybrid environment Integrate Azure Monitor with Microsoft Operations Manager 32 - Monitor your Azure virtual machines with Azure Monitor Monitoring for Azure VMs Monitor VM host data Use Metrics Explorer to view detailed host metrics Collect client performance counters by using VM insights Collect VM client event logs 33 - Troubleshoot on-premises and hybrid networking Diagnose DHCP proble

AZ-801T00 Configuring Windows Server Hybrid Advanced Services
Delivered Online
£2,380

SC-300T00 Microsoft Identity and Access Administrator

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for the Identity and Access Administrators who are planning to take the associated certification exam, or who are performing identity and access administration tasks in their day-to-day job. This course would also be helpful to an administrator or engineer that wants to specialize in providing identity solutions and access management systems for Azure-based solutions; playing an integral role in protecting an organization. The Microsoft Identity and Access Administrator course explores how to design, implement, and operate an organization?s identity and access management systems by using Microsoft Entra ID. Learn to manage tasks such as providing secure authentication and authorization access to enterprise applications. You will also learn to provide seamless experiences and self-service management capabilities for all users. Finally, learn to create adaptive access and governance of your identity and access management solutions ensuring you can troubleshoot, monitor, and report on your environment. The Identity and Access Administrator may be a single individual or a member of a larger team. Learn how this role collaborates with many other roles in the organization to drive strategic identity projects. The end goal is to provide you knowledge to modernize identity solutions, to implement hybrid identity solutions, and to implement identity governance. Prerequisites SC-900T00: Microsoft Security, Compliance, and Identity Fundamentals AZ-104T00 - Microsoft Azure Administrator 1 - Explore identity in Microsoft Entra ID Explain the identity landscape Explore zero trust with identity Discuss identity as a control plane Explore why we have identity Define identity administration Contrast decentralized identity with central identity systems Discuss identity management solutions Explain Microsoft Entra Business to Business Compare Microsoft identity providers Define identity licensing Explore authentication Discuss authorization Explain auditing in identity 2 - Implement initial configuration of Microsoft Entra ID Configure company brand Configure and manage Microsoft Entra roles Configure delegation by using administrative units Analyze Microsoft Entra role permissions Configure and manage custom domains Configure tenant-wide setting 3 - Create, configure, and manage identities Create, configure, and manage users Create, configure, and manage groups Configure and manage device registration Manage licenses Create custom security attributes Explore automatic user creation 4 - Implement and manage external identities Describe guest access and Business to Business accounts Manage external collaboration Invite external users - individually and in bulk Demo - manage guest users in Microsoft Entra ID Manage external user accounts in Microsoft Entra ID Manage external users in Microsoft 365 workloads Implement and manage Microsoft Entra Verified ID Configure identity providers Implement cross-tenant access controls 5 - Implement and manage hybrid identity Plan, design, and implement Microsoft Entra Connect Implement manage password hash synchronization (PHS) Implement manage pass-through authentication (PTA) Demo - Manage pass-through authentication and seamless single sign-on (SSO) Implement and manage federation Trouble-shoot synchronization errors Implement Microsoft Entra Connect Health Manage Microsoft Entra Health 6 - Secure Microsoft Entra users with multifactor authentication What is Microsoft Entra multifactor authentication? Plan your multifactor authentication deployment Configure multi-factor authentication methods 7 - Manage user authentication Administer FIDO2 and passwordless authentication methods Explore Authenticator app and OATH tokens Implement an authentication solution based on Windows Hello for Business Deploy and manage password protection Configure smart lockout thresholds Implement Kerberos and certificate-based authentication in Microsoft Entra ID Configure Microsoft Entra user authentication for virtual machines 8 - Plan, implement, and administer Conditional Access Plan security defaults Plan Conditional Access policies Implement Conditional Access policy controls and assignments Test and troubleshoot Conditional Access policies Implement application controls Implement session management Implement continuous access evaluation 9 - Manage Microsoft Entra Identity Protection Review identity protection basics Implement and manage user risk policy Monitor, investigate, and remediate elevated risky users Implement security for workload identities Explore Microsoft Defender for Identity 10 - Implement access management for Azure resources Assign Azure roles Configure custom Azure roles Create and configure managed identities Access Azure resources with managed identities Analyze Azure role permissions Configure Azure Key Vault RBAC policies Retrieve objects from Azure Key Vault Explore Microsoft Entra Permissions Management 11 - Plan and design the integration of enterprise apps for SSO Discover apps by using Microsoft Defender for Cloud Apps and Active Directory Federation Services app report Configure connectors to apps Design and implement app management roles Configure preintegrated gallery SaaS apps Implement and manage policies for OAuth apps 12 - Implement and monitor the integration of enterprise apps for SSO Implement token customizations Implement and configure consent settings Integrate on-premises apps with Microsoft Entra application proxy Integrate custom SaaS apps for single sign-on Implement application-based user provisioning Monitor and audit access to Microsoft Entra integrated enterprise applications Create and manage application collections 13 - Implement app registration Plan your line of business application registration strategy Implement application registration Register an application Configure permission for an application Grant tenant-wide admin consent to applications Implement application authorization Manage and monitor application by using app governance 14 - Plan and implement entitlement management Define access packages Configure entitlement management Configure and manage connected organizations Review per-user entitlements 15 - Plan, implement, and manage access review Plan for access reviews Create access reviews for groups and apps Create and configure access review programs Monitor access review findings Automate access review management tasks Configure recurring access reviews 16 - Plan and implement privileged access Define a privileged access strategy for administrative users Configure Privileged Identity Management for Azure resources Plan and configure Privileged Access Groups Analyze Privileged Identity Management audit history and reports Create and manage emergency access accounts 17 - Monitor and maintain Microsoft Entra ID Analyze and investigate sign-in logs to troubleshoot access issues Review and monitor Microsoft Entra audit logs Export logs to third-party security information and event management system Analyze Microsoft Entra workbooks and reporting Monitor security posture with Identity Secure Score

SC-300T00 Microsoft Identity and Access Administrator
Delivered Online
£2,380

Definitive Ethernet switching for engineers

5.0(3)

By Systems & Network Training

Definitive Ethernet switching course description A hands on comprehensive look at Ethernet switches with extensive coverage of VLANs. The course focuses on the technology and not any one manufacturers product enabling delegates to configure switches from any manufacturer. What will you learn Configure and troubleshoot switches using: Console port telnet HTTP TFTP Configure and troubleshoot switch features such as: Duplex/speed Port based MAC security Spanning Tree Link aggregation Tagged ports Configure and troubleshoot VLANs. Definitive Ethernet switching course details Who will benefit: Technical staff. Prerequisites: Intro to data communications & networking. Duration 3 days Definitive Ethernet switching course contents What is Ethernet? LANs, network cards and cables, CSMA/CD, Ethernet frames, Ethernet evolution, 802.3. Hands on: ping, Ethernet speeds, CSMA/CD. Ethernet layer 2 Layer 2 functions, NICs, MAC addresses, unicasts, multicasts and broadcasts, frame formats. Hands on: Configuring NICs, Analysing MAC addresses with Wireshark IP and Ethernet Relationship Hands on: ARP. What is a switch? Switches connect multiple devices, switches versus hubs, simultaneous conversations, switches work at layer 2, the forwarding database, how the forwarding database is built, broadcast and collision domains Hands on: Difference between hubs and switches. Switch configuration Switch configuration Managed/unmanaged switches, configuration methods, reasons to configure switches. Console ports, HyperTerminal (and alternatives). Hands on: Using the console port to troubleshoot and configure switches. Switches in more detail Latency, forwarding mechanisms, switch fabrics. Hands on: Using telnet and HTTP to switches. Ethernet extensions Auto negotiation, Power over Ethernet. Hands on:Configuring and troubleshooting switch ports: Speed, duplex and security. Redundant links Loops, broadcast storms, STP, BPDU format, STP convergence. Hands on: Tracking blocked ports. STP convergence. Backbone links Architectures, link aggregation, LACP, load sharing, resilience. Hands on: fail over times. VLANs Virtual versus physical LANs, Why have VLANs? Broadcast domains, Creating VLANs, Assigning ports to VLANs. Hands on: Analysing the effect of VLANs on traffic. Enterprise VLANs VLANS are internal, multiple VLANs, Load balancing, Default VLAN, VLAN registration protocols: VTP, GVRP, MVRP. Hands on: VLANs on multiple switches. Tagging/Trunking Reason for tagging, terminology, tagging process, 802.1Q, Tag format, VLAN stacking. Hands on: Configuring and troubleshooting tags. STP variants RSTP, Common STP, Multiple STP, PVST, ring alternatives. Hands on: RSTP. Inter VLANs Layer 3 switching, IP addressing rules, Interconnecting VLANs. Hands on: Routing between VLANs. Troubleshooting Ethernet Methods, tools, locating faults, layer 1 issues, layer 2 issues Hands on: Fixing the network.

Definitive Ethernet switching for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,367

Bleeding And Catastrophic Bleeding

5.0(50)

By Pochat Training

CPD Accredited, Interactive Short Course 1½ hr session Learn to deal with bleeding, from minor bleeds to catastrophic bleeds Become a life-saving hero if ever someone is seriously injured Course Contents: How to treat minor bleeding How to treat major bleeding Types of bleeding How to treat catastrophic bleeding Tourniquets Why to use a tourniquet How to use a tourniquet How to make an improvised tourniquet How to use a Tourni-Key Wound packing How to use Celox Z-Gauze How to improvise packing a wound How to treat gunshot wounds Practical elements: There is an option of learning how to deal with catastrophic bleeding in person, so you get to practice these skills (and play about with fake blood 😀). For that, see our Catastrophic Bleeding course module. Benefits of this Short Course: We all have regular injuries which cause us to bleed If not properly cared for, even a small cut can turn septic and kill or maim Serious car accidents, machinery accidents at work, weapon wounds, terrorist attacks and more can also lead to catastrophic bleeding Did you know that a person could bleed out in just five minutes..? You're got to act quick, decisive and correctly Please don't do what you see in the movies - you will kill the person even quicker...

Bleeding And Catastrophic Bleeding
Delivered Online + more
£20

Definitive Ethernet LANS for engineers

5.0(3)

By Systems & Network Training

Ethernet LANS training course description This course has been replaced as part of our continuous curriculum development. Please see our Definitive Ethernet switching course What will you learn Describe what Ethernet is and how it works. Install Ethernet networks Troubleshoot Ethernet networks Analyse Ethernet packets Design Ethernet networks Recognise the uses of Hubs, Bridges, switches and routers. Ethernet LANS training course details Who will benefit: Those wishing to find out more about how their LAN works. Prerequisites: Intro to Data comms & networking. Duration 3 days Ethernet LANS training course contents What is Ethernet? LANS, What is Ethernet?, history, standards, the OSI reference model, how Ethernet works, CSMA/CD. Ethernet Cabling UTP, cat 3,4,5, Cat 5e, Cat 6, Cat 7, fibre optic cable, MMF, SMF. Hands on Making a cable. 802.3 physical specifications Distance limitations, hubs and repeaters, 5-4-3-2-1 rule, 10BaseT, 10BaseF, 100BaseTX, 100BaseFX, 1000BaseSX, 1000BaseT, 10gbe. Hands on Working with hubs. Ethernet layer 2 Overview, NICS, device drivers, MAC addresses, broadcasts, multicasts, frame formats, Ether II, 802.3, 802.2, SNAP, compatibility, Ethernet type numbers, Ethernet multicast addresses, Ethernet vendor codes. Hands on Installing Ethernet components, analysing MAC headers. IP and Ethernet ARP Hands on Analysing ARP packets. Ethernet extensions Full/half duplex, auto negotiation, flow control methods, 802.3ad, 802.3af, 802.3ah. Hands on Configuration of full/half duplex. Ethernet speed enhancements Encoding, Carrier extension, packet bursting, jumbo frames. Prioritisation 802.1P, 802.1Q, TOS, WRR, QOS, VLANs. Hands on 802.1p testing Interconnecting LANS Broadcast domains, Collision domains, What are bridges, transparent bridging, What are switches? STP, VLANS, What are routers? Layer 3 switches, Connecting Ethernet to the WAN. Hands on STP, Analysing Ethernet frames in a routed architecture. Troubleshooting and maintaining Ethernet Utilisation, performance, TDR and other testers, bottlenecks, statistics, RMON. Hands on Monitoring performance, troubleshooting tools.

Definitive Ethernet LANS for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,497

Certified Wireless Security Professional

5.0(3)

By Systems & Network Training

CWSP training course description A hands-on training course concentrating solely on WiFi security with an emphasis on the delegates learning the necessary knowledge and skills to pass the CWSP exam. The course progresses from simple authentication, encryption and key management onto in depth coverage of 802.X and EAP along with many other security solutions such as access control, intrusion prevention and secure roaming. What will you learn Demonstrate the threats to WiFi networks. Secure WiFi networks. Configure: WPA2 RADIUS 802.1x EAP Pass the CWSP exam. CWSP training course details Who will benefit: Technical network staff. Technical security staff. Prerequisites: Certified Wireless Network Associate. Duration 5 days CWSP training course contents WLAN Security overview Standards, security basics, AAA, 802.11 security history. Hands on WLAN connectivity. Legacy 802.11 security Authentication: Open system, shared key. WEP. VPNs. MAC filters. SSID segmentation, SSID cloaking. Hands on Analysing 802.11 frame exchanges, viewing hidden SSIDs. Encryption Basics, AES, TKIP, CCMP, WPA, WPA2. Hands on Decrypting 802.11 data frames. 802.11 layer 2 authentication 802.1X: Supplicant, Authenticator, Authentication server. Credentials. Legacy authentication. EAP, Weak EAP protocols, Strong EAP protocols: EAP -PEAP, EAP-TTLS, EAP-TLS, EAP-FAST. Hands on Analysing 802.1X/EAP frames. 802.11 layer 2 dynamic key generation Robust Security Network. Hands on Authentication and key management. SOHO 802.11 security WPA/WPA2 personal, Preshared Keys, WiFi Protected Setup (WPS). Hands on PSK mapping. WLAN security infrastructure DS, Autonomous APs, WLAN controllers, split MAC, mesh, bridging, location based access control. Resilience. Wireless network management system. RADIUS/LDAP servers, PKI, RBAC. Hands on 802.1X/EAP configuration. RADIUS configuration. 802.11 Fast secure roaming History, RSNA, OKC, Fast BSS transition, 802.11k. Hands on Roaming. Wireless security risks Rogue devices, rogue prevention. Eavesdropping, DOS attacks. Public access and hotspots. Hands on Backtrack. WiFi security auditing Layer 1 audit, layer 2 audit, pen testing. WLAN security auditing tools. WiFi security monitoring Wireless Intrusion Detection and Prevention Systems. Device classification, WIDS/WIPS analysis. Monitoring. 802.11w. Hands on Laptop spectrum analysers. VPNs, remote access, guest access Role of VPNs in 802.11, remote access, hotspots, captive portal. Wireless security policies General policy, functional policy, recommendations.

Certified Wireless Security Professional
Delivered in Internationally or OnlineFlexible Dates
£3,697

Total FabricPath for engineers

5.0(3)

By Systems & Network Training

Total FabricPath training course description A comprehensive look at Cisco's FabricPath. This course starts with the problems in traditional switched networks then moves onto to how FabricPath solves these problems. As IS-IS is key to loop free topologies in FabricPath networks, this protocol is also studied. What will you learn Explain the benefits of FabricPath. Explain how FabricPath works Explain the role of IS-IS in FabricPath. Integrate FabricPath into existing networks. Total FabricPath training course details Who will benefit: Technical staff working with FabricPath. Prerequisites: Definitive Ethernet switching for engineers Duration 1 day Total FabricPath training course contents What is FabricPath? Layer 2 versus Layer 3, STP problems: One path, convergence, MAC explosion. Frame routing. Shortest path. Comparison with TRILL. FabricPath architecture Core and edge, VLANs, vPC+. IS-IS Link layer IS-IS, SPF trees, traffic management. IS -IS extensions for FabricPath. ISIS TLV. FabricPath forwarding Routing table, Switch IDs, multi destination trees, IGMP snooping. Roots. MAC versus switch tables. FabricPath Dynamic Resource Allocation Protocol (DRAP). FabricPath frames Encapsulation, frame format, Switch ID, Forwarding tag. Miscellaneous Basic configuration, interoperation with STP, TCN forwarding

Total FabricPath for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,397

Jamf 370 Course

By Influential Training

Jamf training course, Jamf 370

Jamf 370 Course
Delivered OnlineFlexible Dates
£1,900

Indian Block Printing Workshop

5.0(46)

By Stitching Kitchen

During this two-hour session you will learn how to get the best possible print from the extensive collection of hand carved Indian Blocks I have in my workshop. 

Indian Block Printing Workshop
Delivered In-Person in Brackley
£30