IS-IS training course description A hands on course on IS-IS link state routing protocol. The main focus of the course is the use of IS-IS in an IP only environment but can be tailored to concentrate on the use of IS-IS in CLNP networks. Hands on sessions use Cisco routers. What will you learn Configure and troubleshoot IS-IS. Explain how IS-IS works. Describe the use of Level 1 and Level 2. Design IS-IS networks. IS-IS training course details Who will benefit: Network administrators. Network operators. Prerequisites: TCP/IP Foundation for engineers Duration 2 days IS-IS training course contents Introduction The history of IS-IS, OSI background, terminology, addressing, how OSI networking works, ES-IS, ISIS, IS types, basic OSI configuration, other configuration parameters. Running IS-IS in an IP environment Integrated routing, Dual IS-IS, OSI only IS-IS, IP only IS-IS, packet formats and the use of CLNP, Basic configuration. How IS-IS works in detail Link state theory, tuneable parameters, IS-IS metrics, hellos, CSNP intervals, retransmissions, TLVs, Sub TLVs, Designated routers and pseudo nodes, authentication. Level 1 and level 2 in detail Router types, circuit types, Hot potato routing, route leaking, Area partitioning. Multiple addresses Redistribution and summarisation Tagging and filtering
IP addressing and subnetting course description A course focusing purely on IP addressing and subnetting. The course assumes that delegates already have some knowledge of IP addressing. In particular delegates will be able to calculate subnet numbers in seconds without using binary. What will you learn Download and install Wireshark. Calculate subnet numbers in seconds Design IP addressing schemes. Troubleshoot IP address problems. Calculate CIDR prefixes in seconds IP addressing and subnetting course details Who will benefit: Anyone working with TCP/IP. Prerequisites: TCP/IP Foundation for engineers Duration 2 days IP addressing and subnetting course contents IP addressing review What is an IP address? What is a subnet? Classless IP addressing. The rules of IP addressing. Ways IP addresses are used: On hosts, in packets, in routing tables. Hands on Byte boundary subnetting. Configuring IP addresses Interfaces, Static vs. dynamic configuration. DHCP: Scopes, leases, relays, using multiple DHCP servers. Multihoming. Subnetting Default subnet masks, subnet notations. How to subnet without binary. VLSMs. Hands on Bit boundary subnetting. Address ranges and routing Routing tables, IP address spoofing, host specific routing, subnets in routing tables, supernets in routing tables. CIDR. Impact of choice of routing protocol. Hands on IP addressing plans. Allocations and assignments IAB, IANA, RIRs, RIPE, LIRs and ISPs. PI vs. PA addressing. Hands on Querying the RIPE database. Private addressing and NAT NAT, NAPT, NAT terms, private addresses, NAT operation, NAT architecture, NAT and security, why use NAT? NAT-ALG, Types of NAT, RSIP. Special use addresses Unicasts, broadcasts, multicasts, anycasts. Directed broadcasts. Allowing broadcasts through routers.
Kubernetes for engineers training course description This course covers how Kubernetes addresses the challenges of distributed systems. Hands on sessions follow all the major theory chapters. What will you learn Explain what Kubernetes is and how it works. Create and run containers on Kubernetes using the Docker image format and container runtime. Kubernetes for engineers training course details Who will benefit: Anyone working with Docker or Kubernetes. Prerequisites: Definitive Docker for engineers. Duration 2 days Kubernetes for engineers training course contents Introduction Velocity, Scaling your service and your teams, Abstracting your infrastructure. Creating and running containers Container images, Building application images with Docker, Storing images in a remote registry, The Docker container runtime. Deploying a Kubernetes cluster Installing Kubernetes on a public cloud provider, Installing Kubernetes locally using minikube, Running Kubernetes on Raspberry Pi, The Kubernetes client, Cluster components. Common kubectl Commands Namespaces, Contexts, Viewing Kubernetes API objects, Creating, Updating, and Destroying Kubernetes objects, Labelling and annotating objects, Debugging commands. Pods Pods in Kubernetes, Thinking with pods, The pod manifest, Running pods, Accessing your pod, Health checks, Resource management, Persisting data with volumes, Putting It all together. Labels and Annotations Labels, Annotations. Service Discovery What Is Service discovery? The service object, Looking beyond the cluster, Cloud integration, Advanced details. ReplicaSets Reconciliation loops, Relating pods and ReplicaSets, Designing with ReplicaSets, ReplicaSet Spec, Creating a ReplicaSet, Inspecting a ReplicaSet, Scaling ReplicaSets, Deleting ReplicaSets. DaemonSets DaemonSet scheduler, Creating DaemonSets, Limiting DaemonSets to specific nodes, Updating a DaemonSet, Deleting a DaemonSet. Jobs The job object, Job patterns. ConfigMaps and secrets ConfigMaps, Secrets, Naming constraints, Managing ConfigMaps and secrets. Deployments Your first deployment, Creating deployments, Managing deployments, Updating deployments, Deployment strategies, Deleting a deployment. Integrating storage solutions and Kubernetes Importing external services, Running reliable singletons, Kubernetes-native storage with StatefulSets. Deploying real-world applications Parse, Ghost, Redis.
Firewalls training course description A technical hands on training course covering firewall technologies. This focuses on the whys and hows of firewall technology rather than looking at manufacturer specific issues. What will you learn Design secure firewall protected networks. Test firewalls. Evaluate firewalls Configure firewalls Firewalls training course details Who will benefit: Technical staff wanting to learn about Filrewalls including: Technical network staff. Technical security staff. Prerequisites: IP security foundation for engineers Duration 2 days Firewalls training course contents Firewall introduction Security review, what is a firewall? What do firewalls do? Firewall benefits, concepts. Hands on Configuring the network to be used in later labs, launching various attacks on a target. Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls, blade based firewalls, personal firewalls, which firewall should you use? Firewall products. Hands on Configuring a simple firewall. Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on Stateful packet inspection firewalls. Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall advantages and disadvantages. Hands on Proxy firewalls. Personal firewalls The role of personal firewalls, Windows XP, Zonealarm. Hands on Configuring a personal firewall. Firewall architectures Home based, small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. Securing communications VPNs, IPsec. Firewall configuration of VPNs, integration of dedicated VPN devices and firewalls. Hands on IPSec VPN configuration. Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls.
Oracle SQL Advanced training course description The Oracle SQL Advanced course is designed to give delegates practical experience in using some of the more advanced features of Oracle SQL. Additional datatypes and the use of advanced SQL functions and expressions are covered together with enhanced table handling features. What will you learn Retrieve data using correlated subqueries, in-line views and multi-column subqueries. Use the WITH Clause. Inserting and Updating Rows Using Complex Subqueries Create Hierarchical Queries. Use ROLLUP, CUBE and GROUPING SETS group by enhancements. Implement the GROUPING and GROUPING_ID functions. Manage large data sets. Insert data conditionally and unconditionally. Merge Rows in a Table. Create TIMESTAMP and INTERVAL Datatypes. Use TIMESTAMP, TIMEZONE and INTERVAL functions and literals. Use regular expressions and implement related functions. Manage objects with the data dictionary. Manage schema objects. Perform flashback operations. Create and using external tables. Control user access to database objects. Oracle SQL Advanced training course details Who will benefit: Anyone who needs to use the more advanced features of SQL to improve their productivity in querying and updating an Oracle database. Prerequisites: Delegates should have attended the Oracle SQL course or have a similar level of experience. Duration 2 days Oracle SQL Advanced training course contents Retrieve data using subqueries ANY, ALL or SOME operators, Correlated subqueries, In-Line views, The Exists operator, The WITH clause, Multi-Column subqueries, Insert and update using a query, Correlated update and delete. Hierarchical queries Hierarchical data, The START WITH and CONNECT BY clauses, The LEVEL pseudo-column, Sequencing the output, Eliminating nodes and branches. Enhanced grouping features Review of basic grouping concepts, The ROLLUP and CUBE extensions, The GROUPING SETS extension, Using the GROUPING and GROUPING_ID functions. Manage large data sets Multi-table Inserts, Conditional and unconditional Inserts, Merging data into a table, Table and view based merge, A sub query based merge. Flashback technology Flashback query, The AS clause, Flashback table, Flashback drop. Date, time and time zone support Date, Timestamp and Interval datatypes, Handling dates and times, Handling intervals, Date, timestamp and interval functions and literals, Related NLS parameters. Regular expression support Regular expression notation, Character matching, Repetition operators, Sub expression grouping, Regular expression functions. Manage objects with the Data Dictionary The Data Dictionary, Useful Data Dictionary tables, Using the Data Dictionary. Manage schema objects Column operations, Constraint operations, Creating and dropping Indexes, B-Tree indexes, Function based indexes, Descending indexes, Creating and using external tables. Access control System privileges and roles, Create users, Alter user details, Grant and revoke object privileges.
Definitive Salt training course description Salt is a remote execution framework and configuration management system. This course covers Salt from the basics. After a quick first taste the course moves onto execution modules, salt states, minion and master data, jinja, Salt extensions and then topology and configuration options. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. What will you learn Install and use Salt. Describe the architecture of Salt. Manage configurations with Salt. Extend Salt. Definitive Salt training course details Who will benefit: Anyone working with Salt. Prerequisites: Linux fundamentals. Duration 2 days Definitive Salt training course contents Introduction What is Salt? High- level architecture, Some quick examples, system management, configuration management, A brief history, Topology options, Extending Salt. Quick start: First taste of Salt Single-master setup, from packages, bootstrap scripts, Starting up, Basic commands, salt: the main workhorse, salt-key: key management, salt-call: execution on the minion, salt-run: co-ordination of jobs on the master, summary of commands, Key management, viewing keys, accepting keys, rejecting keys, key files, Minion targeting, minion ID, list (-L), glob, regular expressions (-E), grains (-G), compound (-C), targeting summary, Additional remote execution details, Conclusion. Execution modules: The functional foundation sys: information and documentation about modules, sys.doc basic documentation, sys.list_modules, sys.list_functions: simple listings, cmd: execute via shell, cmd.run: run any command, pkg: manage packages, virtual modules, pkg.lists_pkgs: list all installed packages, pkg.available version: see what version will be installed, pkg.install: install packages, user: manage users, user.add: add users, user.list_users, user info: get user info, saltutil: access various Salt utilities, Summary. Configuration management: Salt states Salt files overview, SLS example: adding a user, working with the multi-layered state system, Highstate and the top file, the top file, State ordering, require: depend on another state, watch: run based on other changes, odds and ends, Summary. Minion data / master data Grains are minion data, performing basic grain operations, setting grains, targeting with grains in the top file, Pillars are data from the master, querying pillar data, querying other sources with external pillars, Renderers give data options. Extending Salt: part I Introduction to Jinja, Jinja basics, Templating with Jinja, filtering by grains, Custom execution module, Custom state modules, Custom grains, External pillars, Summary. More on the matter Runners, manage minions, manage jobs, The orchestrate runner, The event system, The reactor system, Summary. Extending Salt: part II Python client API, reading configuration data on a master and minion, using the master client (localclient) API, Using the caller client API, Custom runners, writing a custom runner, using the runnerclient API, Summary. Topology and configuration options Master configuration, directories and files, logging, access control, files server options, Topology variations, masterless minions, peer systems, syndication masters, multiple masters. Brief introduction to salt-cloud Overview, Setup AWS and salt-cloud, installing salt-cloud, cloud providers, cloud profiles, cloud maps, Introspection via salt cloud, Creating infrastructure, More information. Using vagrant to run Salt examples YAML.
SIP security training course description A hands-on course covering SIP security. It is assumed that delegates already know SIP as this course focuses purely on the security issues in SIP IP telephony networks. Hands-on practicals follow each major theory session and include use of various SIP security tools such as vomit, sipp, sipsak and sivus amongst others. What will you learn Secure SIP networks Use various SIP security tools SIP security training course details Who will benefit: Technical staff working with SIP. Technical security staff. Prerequisites: SIP for engineers Duration 2 days SIP security training course contents SIP review SIP infrastructure and entities, example SIP session. Hands on Simple SIP network with and without authentication. SIP security attacks DOS attacks, infrastructure attacks, eavesdropping, spoofing, replay, message integrity. Hands on Basic SIP packet capture, infrastructure attacks. SIP tools SIP packet creation: Sivus, SIPsak, PROTOS, SFTF, SIP bomber, SIPp, Seagull, Nastysip. SIP packet generators: SIPNess, NetDude. Monitoring: Wireshark, Cain & Abel, Vomit, Oreka, VoiPong. Scripts and tools: SIP-Fun, Skora.net, kphone-ddos, sip-scan, sip-kill, sip-redirectrtp. Health of different tools. Hands on Generating SIP packets, rebuilding conversations from captured packets, password cracking. VPNs and SIP IPSec, AH, ESP, transport mode, tunnel mode, Pre Shared Keys, Public keys. Hands on SIP calls over IPSec. Secure SIP signaling SIP relationship with HTTP, Deprecated HTTP 1.0 basic authentication, HTTP 1.1 Digest authentication, S/MIME, SIPS, SIPS URI, TLS, DTLS, PKI infrastructures. Hands on SIP with TLS. Secure media streams SRTP, features, packet format, default encryption, default authentication, key distribution. S/MIME, MIKEY, SDP security descriptions. SIP security agreements. Hands on Analysing SRTP packets. Firewalls NAT traversal. Impact of firewall on infrastructure attacks. TLS and firewalls. SIP specific firewalls. Hands on SIP calls through a firewall.
Plasma pen fibroblast training for the face and body including soft surgery. Train one to one or very small groups. International accreditation. Lifelong support. Train with Carol May LMA Skin Clinic. On completion you will be able to offer your clients: Wrinkle rejuvenation & face lifting Hooded eyes & eye bags Glabella lines Nasal labia Marionette lines Neck lines Stretch marks & scar repair Mole removal Skin tags Cherry angioma Thread veins Xanthelasma Seborrheic keratosis plus many more soft surgery options You will benefit from online pre study plus in-clinic training and ongoing support Models can be provided if required You will receive a genuine medical grade plasma device (not electrical arcing) Total price is £2400 Your training fee can be paid in installments with Klarna We welcome national and International students
ITIL® 4 Specialist: High Velocity IT: In-House Training The ITIL® 4 Specialist: High-Velocity IT module is part of the Managing Professional stream for ITIL® 4. Candidates need to pass the related certification exam for working towards the Managing Professional (MP) designation. This course is based on the ITIL® 4 Specialist: High-Velocity IT exam specifications from AXELOS. With the help of ITIL® 4 concepts and terminology, exercises, and examples included in the course, candidates acquire the relevant knowledge required to pass the certification exam. This module addresses the specifics of digital transformation and helps organizations to evolve towards a convergence of business and technology, or to establish a new digital organization. It was designed to enable practitioners to explore the ways in which digital organizations and digital operating models function in high-velocity environments. Working practices such as Agile and Lean, and technical practices and technologies such as Cloud, Automation, and Automatic Testing are included. What You Will Learn At the end of this course, participants will be able to: Understand concepts regarding the high-velocity nature of the digital enterprise, including the demand it places on IT. Understand the digital product lifecycle in terms of the ITIL operating model. Understand the importance of the ITIL guiding principles and other fundamental concepts for delivering high-velocity IT. Know how to contribute to achieving value with digital products. Course Introduction Let's Get to Know Each Other Course Learning Objectives Target Audience Characteristics ITIL® 4 Certification Scheme Course Components Course Agenda Module-End Exercises Exam Details Introduction to High-Velocity IT High-Velocity IT Digital Technology Digital Organizations Digital Transformation High-Velocity IT Approaches Relevance of High-Velocity IT Approaches High-Velocity IT Approaches in Detail High-Velocity IT Operating Models Introduction ITIL® Perspective High-Velocity IT Aspects High-Velocity IT Applications ITIL® Building Blocks for High-Velocity IT Digital Product Lifecycle Service Value Streams Four Dimensions of Service Management ITIL® Management Practices High-Velocity IT Culture Key Behavior Patterns ITIL® Guiding Principles Supporting Models and Concepts for Purpose Ethics Design Thinking Supporting Models and Concepts for People Reconstructing for Service Agility Safety Culture Stress Prevention Supporting Models and Concepts for Progress Working in Complex Environments Lean Culture ITIL® Continual Improvement Model High-Velocity IT Objectives and Techniques High-Velocity IT Objectives High-Velocity IT Techniques Techniques for Valuable Investments Prioritization Techniques Minimum Viable Products and Services Product / Service Ownership A/B Testing Techniques for Fast Developments Basic Concepts Related to Fast Development Infrastructure as Code Reviews Continual Business Analysis Continuous Integration / Continuous Delivery (CI/CD) Continuous Testing Kanban Techniques for Resilient Operations Introduction to Resilient Operations Technical Debt Chaos Engineering Definition of Done Version Control Algorithmic IT Operations ChatOps Site Reliability Engineering (SRE) Techniques for Co-created Value Basic Concepts of Co-created Value Service Experience Techniques for Assured Conformance DevOps Audit Defense Toolkit DevSecOpsPeer Review
ITIL® 4 Specialist: Drive Stakeholder Value: In-House Training The ITIL® 4 Specialist: Drive Stakeholder Value module is part of the Managing Professional stream for ITIL 4. Candidates need to pass the related certification exam for working towards the Managing Professional (MP) designation. This course is based on the ITIL® 4 Specialist: Drive Stakeholder Value exam specifications from AXELOS. With the help of ITIL® 4 concepts and terminology, exercises, and examples included in the course, candidates acquire the relevant knowledge required to pass the certification exam. What You Will Learn The learning objectives of the course are based on the following learning outcomes of the ITIL® 4 Specialist: Drive Stakeholder Value exam specification: Understand how customer journeys are designed Know how to target markets and stakeholders Know how to foster stakeholder relationships Know how to shape demand and define service offerings Know how to align expectations and agree on details of services Know how to onboard and offboard customers and users Know how to act together to ensure continual value co-creation (service consumption / provisioning) Know how to realize and validate service value Customer Journey Purpose of the Module Purpose of Mastering the Customer Journey Touchpoints and Service Interactions Module Topics Mapping the Customer Journey Designing the Customer Journey Measuring and Improving the Customer Journey Customer Journey Step 1: Explore Purpose of the Module Purpose of the Explore Step Module Topics Understanding Service Consumers Understanding Service Providers Understanding and Targeting Markets Customer Journey Step 2: Engage Purpose of the Module Purpose of the Engage Step Aspects of Service Value Module Topics Service Relationship Types Building Service Relationships Building and Sustaining Trust and Relationships Analyzing Customer Needs Managing Suppliers and Partners Customer Journey Step 3: Offer Purpose of the Module Purpose of Shaping Demand and Service Offerings Module Topics Managing Demand and Opportunities Specifying and Managing Customer Requirements Designing Service Offerings and User Experience Selling and Obtaining Service Offerings Customer Journey Step 4: Agree Purpose of the Module Purpose of Aligning Expectations and Agreeing on Services Module Topics Agreeing on and Planning Value Co-Creation Negotiating and Agreeing on a Service Customer Journey Step 5: Onboard Purpose of the Module Purpose of Onboarding and Offboarding ITIL® Management Practices Module Topics Planning Onboarding Fostering Relationships with Users Providing User Engagement and Delivery Channels Enabling Users for Service Elevating Mutual Capabilities Offboarding Customer Journey Step 6: Co-create Purpose of the Module Purpose of Service Provision and Consumption Module Topics Service Mindset Ongoing Service Interactions Nurturing User Communities Customer Journey Step 7: Realize Purpose of the Module Measuring Service Value Purpose of Value Capturing and Customer Journey Improvement Realizing Service Value in Different Settings Module Topics Tracking Value Realization Assessing and Reporting Value Realization Evaluating Value Realization and Improving Customer Journeys Realizing Value for the Service Provider