• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

166 Microsoft courses in London

Total SMTP and email for engineers

5.0(3)

By Systems & Network Training

SMTP training course description A hands on course focusing on the workings of email systems and the standard protocols that they use. The course is not specific to any particular implementation, but some vendor specifics are noted. Linux and Microsoft machines are used in hands on sessions to reinforce the theory of major sessions. The course concentrates on troubleshooting and interworking using network sniffing and protocol inspection rather than "which buttons to push". What will you learn Describe and explain SMTP MIME POP3 IMAP PGP, GPG, S/MIME SPF, DKIM, DMARC Configure mail routing Secure email systems SMTP training course details Who will benefit: Technical staff responsible for email systems. Prerequisites: TCP/IP foundation for engineers. Duration 3 days SMTP training course contents SMTP architecture What is SMTP, email before SMTP, SMTP history, the different protocols, clients, servers. Email composition, transmission, delivering emails, storing and reading emails. MUAs, MTAs, POP3, IMAP, SMTP, DNS, webmail. Hands on Setting up MTAs and MUAs and sending a simple email using telnet. The SMTP protocol SMTP protocol stack, SMTP headers, HELO, SMTP mail, MAIL FROM, RCPT TO, DATA, SMTPUTF8, 8BITMIME, TURN, EHLO, ETRN, 3 digit replies. Hands on Analysing SMTP packets on a network. DNS and SMTP SMTP forwarding, SMTP relays, interoperation, how SMTP uses DNS, MX records. Hands on Setting up mail relays. SMTP headers IMF data, From, to, cc, bcc, sender and recipient headers, message Ids, received trails, in-reply-to, received-SPF, mail list headers. Hands on Using clients to analyse details from mail headers, including true originators and path of emails. MIME Email attachments, MIME versions, content type headers, encoding, base 64, binary data, multi part headers, troubleshooting attachments. Hands on Analysing MIME headers and attachments. POP3 What is POP3, where to use POP3, authorisation, transactions, POP3 commands: USER, PASS, STAT, LIST, RETR, DELE. Hands on Setting up a POP3 server, analysing POP3 packets on a network. IMAP and IMAPS What is IMAP, where to use IMAP, authorisation, mailbox structure, IMAP commands: LOGIN, AUTHENTICATE, LIST, CREATE, Examine (message flags), SELECT, STORE. Hands on Setting up an IMAP server and analysing IMAP packets on a network. Interoperation Mail gateways, addressing, Exchange, sendmail. Email security Basics, Transport level: STARTTLS. Content: PGP/GPG, mail signing and encryption, S/MIME, digital certificates, secure email submission. Hands on Setting up and using a PGP key, configure MTAs to use TLS. Email authentication and spam prevention Mail relays, grey listing, block list & RBL, DNSBL (Real-time Black hole List), White list, SPF, Domain Keys Identified Mail (DKIM), Author Domain Signing Practices (ADSP), Abuse Report Format (ARF), Domain-based Message Authentication, Reporting and Conformance (DMARC). Hands on Relay spamming and the blocking spamming.

Total SMTP and email for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,367

Total IPsec for engineers

5.0(3)

By Systems & Network Training

IPsec training course description This hands on course focuses on IPsec VPNs. Rather than focusing on one implementation this course concentrates on the technologies and protocols of IPsec. Starting with an overview of the complete IPsec architecture the course then moves onto ESP packet analysis along with encryption and authentication provided. IKEv1 and IKEv2 are both covered in detail. Having covered IPsec with pre shared keys the course then moves onto IPsec with certificates followed by IPsec issues. The course is vendor neutral with hands on with both Cisco and Microsoft implementations. What will you learn Explain how IPsec works. Explain the role of AH, ESP and IKE. Configure IPsec. Troubleshoot IPsec. IPsec training course details Who will benefit: Technical staff working with IPsec. Prerequisites: Definitive IP VPNs for engineers. Duration 3 days IPsec training course contents What is IPsec? How to spell IPsec, IPsec is IP security, confidentiality, integrity, authenticity, replay protection, what is a VPN? Network layer security, IPsec and IPv4, IPsec and IPv6, the suite of protocols, the standard, IPsec RFCs, IPsec history. Hands on Analysis of 'normal' IP packets. IPsec architecture The IPsec protocols, AH vs ESP, Why two headers? transport mode, tunnel mode, Remote access VPNs, site to site VPNs, security associations, SA database, Security Parameters Index, implementations: Host tack, Bump in the Stack, Bump in the Wire. Hands on Configuring IPsec. AH What AH does, the stack, The AH header, What is authenticated? Device authentication. AH in transport mode, AH in tunnel mode. Hands on AH packet analysis. ESP What ESP does, the ESP header, ESP in transport mode, ESP in tunnel mode, ESP and SA, ESP and SPI. Hands on ESP packet analysis, policy configuration. IPsec encryption IPsec is a framework, standard algorithms, ESP keys, the role of IKE, key lifetimes, how IKE generates the keys, DES, 3DES, AES, cipher block chaining, counter mode, other encryption. Hands on Encryption configuration. IPsec authentication Authentication types, IPsec authentication, Authentication algorithms: MD5, keyed SHA-1, HMAC-MD5, HMAC-SHA-1, HMAC-RIPEMD, other authentication algorithms. Hands on Authentication configuration. IKE Internet Key Exchange, IKE and the SAD, the two phase negotiation, ISAKMP, ISAKMP header, pre shared keys, digital signatures, public key encryption, Diffie Hellman, proposals, counter proposals, nonces, identities, phase 1 negotiation: main mode, aggressive mode, base mode. Phase 2 negotiation: quick mode, new group mode. Hands on IKE packet analysis. More IKE PFS, IKE and dynamic addresses, XAUTH, hybrid authentication, CRACK, ULA, PIC. User level authentication. IKE renegotiation, heartbeats. Hands on Troubleshooting IPsec. IKEv2 The IKEv2 exchange, IKE_SA_INIT, IKE_AUTH, CREATE_CHILD_SA, IKEv2 packets, the informational exchange. Comparing IKev1 vs IKE v2. Hands on IKEv2 configuration and analysis. PKI What is PKI?, Digital certificates, Certificate authorities, CA servers, RA, VA, certificates, CA hierarchy, CRLs, certificate formats. Hands on installing and configuring certificate servers. IPsec issues NAT, IPsec overhead and fragmentation. Summary IPsec strengths and weaknesses. Where to get further information.

Total IPsec for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,367

Excel Advanced

4.9(75)

By Acuity Training London

Learn to use Excel’s most powerful features on this 2-day advanced Excel training course. This course is hands-on. It includes plenty of time to experiment with what you are being taught and ask questions. By the time you finish, you’ll be an expert Excel user.  ✔ A complete course that covers all of Excel’s most advanced functions.  ✔ Friendly expert trainers, small groups and a comfortable place to learn.  ✔ Ongoing support & help with any issues you may have after the course. Our courses are delivered in Guildford, London, Online, or even on-site at your offices!

Excel Advanced
Delivered In-PersonFlexible Dates
£495

MS Access Intermediate Course

4.6(12)

By PCWorkshops

This Access Course concentrates on using creative queries, to extract data from large data sets to get insight from your data and report it. Learn and explore various query techniques from where clauses, to aggregation, joins and more. This private style tuition helps to maximise the value you get from the day.

MS Access Intermediate  Course
Delivered Online & In-PersonFlexible Dates
FREE

Power BI Advanced

4.9(75)

By Acuity Training London

Master Power BI’s most powerful functions on this 2 day Advanced Power BI training course.  This is a hands-on course. You get lots of time to practise creating and editing reports and data visualisations. This ensures that you really get to grips with what you are being taught. By the time you finish, you’ll be an expert Power BI user.  ✔ A course covering all of Power BI’s most advanced functions.  ✔ Plenty of one-to-one attention and time to ask questions.  ✔ Friendly expert trainers, small groups and a comfortable place to learn.  ✔ All the materials and extras that you’ll ever need.  ✔ Ongoing support and help with issues you have after the course. Our courses are delivered in Guildford, London, Online, or even on-site at your offices!

Power BI Advanced
Delivered In-PersonFlexible Dates
£995

Supporting Windows 10

5.0(3)

By Systems & Network Training

Supporting Windows 10 course description This course is designed to provide students with the knowledge and skills required to support and troubleshoot Windows 10 PCs and devices in a Windows Server domain environment. These skills include understanding of Windows 10 features, how they can be used in an Active Directory environment and how to troubleshoot them. What will you learn Troubleshoot startup issues and operating system services on a Windows 10 PC. Troubleshoot issues related to network connectivity. Troubleshoot client configuration failures and GPO application issues. Troubleshoot issues related to application installation and operation. Recover a PC running Windows 10. Supporting Windows 10 course details Who will benefit: Anyone supporting users running Windows 10 personal computers within a medium to large enterprise. Prerequisites: None. Duration 5 days Supporting Windows 10 course contents Implementing a Troubleshooting Methodology Overview of Windows 10, Introduction to the EDST Job Role, Overview of the Troubleshooting Steps & Tools. Hands on Implementing a Troubleshooting Methodology. Hands on Using Troubleshooting Tools for Windows 10. Troubleshooting Startup Issues Overview of the Windows 10 Startup Recovery Environment, Troubleshooting Startup Settings & Operating System Services Issues, Recovering BitLocker-Protected Drives. Hands on Troubleshooting Startup Issues. Hands on Recovering BitLocker-Encrypted Drives, Creating a New BitLocker Password. Troubleshooting Hardware and Device Drivers Troubleshooting Device Driver Failures & Physical Failures, Overview of Hardware Troubleshooting, Monitoring Reliability, Configuring the Registry. Hands on Troubleshooting Device Driver Issues, Resolving Hardware Issues, Adding a Missing Device Driver to a Driver Store, Reverting a Problematic Device Driver. Hands on Troubleshooting Hardware Issues, Diagnosing Memory, Troubleshooting and Repairing Failed Disk Redundancy Synchronizing Settings, Accessing Data on a Foreign Volume. Troubleshooting Remote Computers Using Remote Desktop and Remote Assistance, Remoting with Windows PowerShell Hands on Troubleshooting Remote Computer by using Remote Desktop and Remote Assistance. Hands on Troubleshooting Remote Computer by using Windows PowerShell. Resolving Network Connectivity Issues Determining Network Settings, Troubleshooting Network Connectivity Issues, Troubleshooting Name Resolution. Hands on Resolving Network Connectivity Issues. Hands onResolving Name Resolution Issues. Troubleshooting Group Policy Overview of Group Policy Application, Resolving Client Configuration Failures and GPO Application Issues. Hands on Troubleshooting Group Policy Application Issues. Hands on Resolving Group Policy Issues. Hands on Installing and Sharing a Printer. Troubleshooting User Settings Troubleshooting Sign In Issues, Troubleshooting the Application of User Settings. Hands on Troubleshooting Sign in Problems. Hands on Troubleshooting the Application of User Settings, Resolving Folder Redirection Problem, Resolving Roaming User Profile Problem. Troubleshooting Remote Connectivity Troubleshooting VPN Connectivity Issues & DirectAccess. Hands on Troubleshooting VPN Connectivity Lab : Configuring and Troubleshooting DirectAccess Configuring and Verifying, DirectAccess Client-Side Settings, Troubleshooting DirectAccess. Troubleshooting Resource Access Within a Domain & File Permissions Issues, Recovering Files Encrypted by EFS, Troubleshooting Printer Access Issues. Lab : Troubleshooting File Access Issues Lab : Troubleshooting Access to Encrypted Files. Hands on Troubleshooting Printer Access Issues Troubleshooting Resource Access for Non Domain Member Clients Configuring and Troubleshooting Device Registration, Configuring and Troubleshooting Work Folders, Configuring and Troubleshooting OneDrive Access. Hands on Troubleshooting Resource Access for Clients that are not Domain Members. Troubleshooting Device Registration, Work Folders and OneDrive for Business. Troubleshooting Applications Troubleshooting Desktop App Installation Issues, Desktop Apps, Managing Windows Store Apps, Troubleshooting Access to Company Web Applications. Hands on Troubleshooting Desktop Apps, AppLocker Policy Application & Application Compatibility issue. Hands on Troubleshooting Access to Company Web Applications, Internet Explorer Issue & Microsoft Edge. Maintaining Windows 10 Managing & Troubleshooting Windows Activation, Troubleshooting Performance, Applying Applications. Hands on Monitoring and Troubleshooting Performance. Recovering Data and Operating System File Recovery in Windows 10, Recovering an OS. Hands on Recovering Data, Recovering Data from Azure Backup, Recovering Deleted File by Using File History. Hands on Provisioning Computer to Comply with Company Standards, Provision Computer to Comply with Company Standards.

Supporting Windows 10
Delivered in Internationally or OnlineFlexible Dates
£3,697

Network management technologies

5.0(3)

By Systems & Network Training

Network management technologies course description A comprehensive tour of the available network management technologies available for todays networks. The course starts with basic tools such as syslog along with Python network automation. SNMP is then covered with the *flow technologies and streaming telemetry. Configuration management with ansible, Python, NETCONF and RESTCONF is then studied. The final part of the course looks at SDN. Hands on sessions are used throughout to reinforce the theory rather than teach specific manufacturer equipment. Note that sections are available as individual courses. What will you learn Evaluate network management technologies. Evaluate network management technologies. Recognise the weaknesses of SNMP versus NETCONF and streaming telemetry. Explain the role of NETCONF and RESTCONF. Compare & contrast *flow and streaming telemetry. Explain the role of SDN in network management. Automate network configuration with ansible and Python. Network management technologies course details Who will benefit: Those wishing to manage networks. (Previous Python experience is NOT needed) Prerequisites: Intro to data comms Duration 5 days Network management technologies course content Basic network management Network management What is network management? Benefits, issues. FCAPS model. Fault management, Configuration management, accounting, performance, security. What to manage, what not to manage. Managing network devices, managing servers. Monitoring networks Traditional network tools Ping..., SSH, syslog, TFTP for configurations. nmap. Wireshark. CLI. Web based management. Splunk. Nessus, snort, Kali. Hands on syslog, network inventories. Network automation using the CLI Programming and automating networks, netOps. Python, Git. Python network modules, SSH, paramiko, netmiko. EVE-NG. Hands onPython network modules. Structured versus unstructured data Problems with automation and unstructured data. XML, JSON, YAML. The role of YANG. Hands on Parsing data. SNMP SNMP architecture, SNMP MIBs, SMI, the SNMP protocol, polling security. Configuring SNMP. SNMPv1, v2, v3, SNMP security. Which version should you use? MIBs and MIB structure. mib-2, extra parts of mib-2, Private enterprise MIBs. Summary: What SNMP is good/bad at. Hands on Configuring agents and a NMS. MIB browsing. Server management Microsoft, Linux, application polling. WMI vs SNMP. Hands on: Application polling. Performance management *flow Polling, push vs pull, netflow, sflow, IPFIX, *flow. Flows. Where to monitor traffic. Comparing *flow with SNMP. Architecture: Generators and collectors. When flows are exported. NetFlow reporting products. SolarWinds. Hands on Netflow configuration. Collectors. Streaming telemetry Model driven telemetry, periodic/on change. Structured data. Telemetry protocol stack. gRPC and gNMI. Protobuf. gNMI operations. Telemetry architecture. Telegraf, databases, Grafana. Hands on Telemetry example. Configuration management Configuration management tools Chef, puppet, ansible, saltstack. Ansible architecture, controlling machines, nodes, agentless, SSH, modules. Inventories, playbooks, modules, network modules, jinja2 templates. Hands on Network configuration with ansible. NETCONF What is NETCONF? Protocol stack, Data stores, traffic flows, validating configurations, rollback. YANG data models and how YANG is used by NETCONF. XML. Explorers and other tools. Hands on anx, Python and NETCONF. RESTCONF The REST API, HTTP, What is RESTCONF? Tools including Postman. Comparison with NETCONF. Hands on Configuration with RESTCONF. Python network automation: configuration SSH issues. Using structured data. Jinja2. ncclient, requests, NAPALM, Nornir. Automated testing. Hands on Python network device configuration with nornir. Software Defined Networks and orchestration Classic SDN What is SDN? benefits. SDN architecture. SDN applications, SDN switches, SDN controllers, Network Operating Systems. Control plane, data plane. Northbound interfaces. SDN components. Southbound interfaces. OpenFlow. ONF, OpenFlow ports, Flow tables. Network virtualization Virtual networks, virtual switches, NfV. Service chaining. NfV and SDN. SDN implementations Classic SDN, Hybrid SDN, SDN via APIs, SDN via overlays. Data centre SDN, VXLAN, Service Provider SDN, SD WAN, Enterprise SDN, WiFi. SDN and open source OpenDaylight, OpenVSwitch, Open Networking Forum, Open Network Operating System. Hands onOpenStack. SD-WAN What is SD-WAN? Architecture: Edge, gateway, orchestrator, controller. Overlay and underlay. Use of MPLS, 4G/5G. Benefits and features. Secure Access Service Edge (SASE).

Network management technologies
Delivered in Internationally or OnlineFlexible Dates
£3,697

PowerPoint Course

4.6(12)

By PCWorkshops

MS PowerPoint is really easy, but in this PowerPoint Training Courses, we cover most aspects in a fast-paced day, and attend the to more tricky aspects. This course is one-to-one to attend to specific aspects per delegate. Group training could be organised on request.

PowerPoint Course
Delivered Online & In-PersonFlexible Dates
FREE

Wireshark 101 for engineers

5.0(3)

By Systems & Network Training

Wireshark 101 training course description Wireshark is a free network protocol analyser. This hands-on course focuses on troubleshooting networks using the Wireshark protocol analyser. The course concentrates on the product and students will gain from the most from this course only if they already have a sound knowledge of the TCP/IP protocols What will you learn Download and install Wireshark. Capture and analyse packets with Wireshark. Configure capture and display filters. Customise Wireshark. Troubleshoot networks using Wireshark. Wireshark 101 training course details Who will benefit: Technical staff looking after networks. Prerequisites: TCP/IP Foundation for engineers Duration 2 days Wireshark 101 training course contents What is Wireshark? Protocol analysers, Wireshark features, versions, troubleshooting techniques with Wireshark. Installing Wireshark Downloading Wireshark, UNIX issues, Microsoft issues, the role of winpcap, promiscuous mode, installing Wireshark. Wireshark documentation and help. Hands on Downloading and installing Wireshark. Capturing traffic Starting and stopping basic packet captures, the packet list pane, packet details pane, packet bytes pane, interfaces, using Wireshark in a switched architecture. Hands on Capturing packets with Wireshark. Troubleshooting networks with Wireshark Common packet flows. Hands on Analysing a variety of problems with Wireshark. Capture filters Capture filter expressions, capture filter examples (host, port, network, protocol), primitives, combining primitives, payload matching. Hands on Configuring capture filters. Working with captured packets Live packet capture, saving to a file, capture file formats, reading capture files from other analysers, merging capture files, finding packets, going to a specific packet, display filters, display filter expressions. Hands on Saving captured data, configuring display filters. Analysis and statistics with Wireshark Enabling/disabling protocols, user specified decodes, following TCP streams, protocol statistics, conversation lists, endpoint lists, I/O graphs, protocol specific statistics. Hands on Using the analysis and statistics menus. Command line tools Tshark, capinfos, editcap, mergecap, text2pcap, idl2eth. Hands on Using tshark. Advanced issues 802.11 issues, management frames, monitor mode, packet reassembling, name resolution, customising Wireshark. Hands on Customising name resolution.

Wireshark 101 for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,497

Excel Intermediate

4.9(75)

By Acuity Training London

Expand your Excel skills on this 1-Day Intermediate Excel training course. Learn to use some of Excel’s more powerful features like sorting and filtering data and creating charts. This is a hands-on course and includes plenty of chances to try out what you are being taught and ask questions.  ✔ An intermediate Excel course that will build on your existing Excel skills.  ✔ Plenty of one to one attention and time to ask questions.  ✔ Friendly expert trainers, small groups and a comfortable place to learn.  ✔ All the materials and extras that you’ll ever need.  ✔ Ongoing support and help with issues you have after the course. Our courses are delivered in Guildford, London, Online, or even on-site at your offices!

Excel Intermediate
Delivered In-PersonFlexible Dates
£275