Duration 5 Days 30 CPD hours This course is intended for This course is intended for network or system administrators and network engineers seeking a more in-depth knowledge of Network Node Manager i Software 9.x Overview COURSE OBJECTIVESAt the end of the course, you should be able to:? Configure network discovery? Manipulate NNMi tables and device object records? Design topology maps? Configure incidents? Generate performance graphs? Generate performance reports? Perform core administration tasks This course is designed for those Network and/or System administrators tasked with the installation, configuration, and maintenance of the Network Node Manager i Software (NNMi) product. This course is designed for those Network and/or System administrators tasked with the installation, configuration, and maintenance of the Network Node Manager i Software (NNMi) product. Additional course details: Nexus Humans NNMI120 - Network Node Manager i Software 9.x Essentials training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the NNMI120 - Network Node Manager i Software 9.x Essentials course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Data Protection: Data Protection Course Online If you want to learn about Data Protection: Data Protection Course and become an expert in the field, you have arrived at the right place. The Data Protection: Data Protection Course contains all major GDPR topics in several lectures to help you learn more. Industry experts designed this Data Protection: Data Protection Course to enable you to learn quickly and efficiently and at your own pace and convenience. This Data Protection: Data Protection Course also covers the UK's implementation of the General Data Protection: Data Protection Course Regulation Act. Data Protection: Data Protection Course aims to equip people and businesses with knowledge of the GDPR's obligations and measures. They must take to follow the regulation. The Data Protection: Data Protection Course Training seeks to educate individuals on their data rights and the obligations of organizations when it comes to collecting, processing, and keeping personal data. The Data Protection: Data Protection Course also includes best data protection, privacy practices, and advice on addressing data breaches and other problems. Main Course: GDPR Training Course Free Courses: Course 01: Security Management Diploma Course 02: Level 5 Diploma in Cyber Security Course 03: IT Security [ Note: Free PDF certificate as soon as completing the Data Protection: Data Protection Course] Data Protection: Data Protection Course Online This Data Protection: Data Protection Course also covers the UK's implementation of the General Data Protection Regulation Act. Data Protection: Data Protection Course aims to equip people and businesses with knowledge of the GDPR's obligations and measures. They must take to follow the regulation. This Data Protection: Data Protection Course consists of 09 modules. Assessment Method of Data Protection: Data Protection Course After completing each module of the Data Protection: Data Protection Course, you will find automated MCQ quizzes. To unlock the next module, you need to complete the quiz task and get at least 60% marks. Certification of Data Protection: Data Protection Course After completing the MCQ/Assignment assessment for this Data Protection: Data Protection Course, you will be entitled to a Certificate of Completion from Training Tale which is completely free to download. Who is this course for? Data Protection: Data Protection Course Online This Data Protection: Data Protection Course is open to everyone, Requirements Data Protection: Data Protection Course Online To enrol in this Data Protection: Data Protection Course, students must fulfil the following requirements: Good Command over English language is mandatory to enrol in our Data Protection: Data Protection Course. Be energetic and self-motivated to complete our Data Protection: Data Protection Course. Basic computer Skill is required to complete our Data Protection: Data Protection Course. If you want to enrol in our Data Protection: Data Protection Course, you must be at least 15 years old. Career path Data Protection: Data Protection Course Online
Are you looking to enhance your Compliance & Risk Management skills? If yes, then you have come to the right place. Our comprehensive course on Compliance & Risk Management will assist you in producing the best possible outcome by mastering the Compliance & Risk Management skills. The Compliance & Risk Management course is for those who want to be successful. In the course, you will learn the essential knowledge needed to become well versed in Compliance & Risk Management. Our Compliance & Risk Management course starts with the basics of Compliance & Risk Management and gradually progresses towards advanced topics. Therefore, each lesson of this course is intuitive and easy to understand Exclusive Bonus Courses: Diploma in Compliance and Risk Management 5 Bonus Courses with 5 Free PDF Certificates Course 01: UK - GDPR Course Course 02: Employment Law Course Course 03: Human Rights Consultant Course Course 04: AML Compliance Manager Course Course 05: (HR) Human Resources Management Course Along with the Compliance & Risk Management courses, you also get: Lifetime Access. Unlimited Retake Exam & Tutor Support. Easy Accessibility to the Course Materials- Anytime, Anywhere - From Any Smart Device (Laptop, Tablet, Smartphone Etc.) 100% Learning Satisfaction Guarantee. Learn at your own pace from the comfort of your home, as the rich learning materials of this course are accessible from any place at any time. The curriculums are divided into tiny bite-sized modules by industry specialists. And you will get answers to all your queries from our experts. So, enrol and excel in your career with Compliance Central. Curriculum Breakdown of the Course:- Module 1: Introduction to Compliance Module 2: Five Basic Elements of Compliance Module 3: Compliance Management System (CMS) Module 4: Compliance Audit Module 5: Compliance and Ethics Module 6: Risk and Types of Risk Module 7: Introduction Module 8: Process CPD 60 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Anyone from any background can enrol in this bundle. Requirements To enrol in this course, all you need is a basic understanding of the English Language and an internet connection. Career path After completing this course, you can explore trendy and in-demand jobs. Certificates Certificate of completion Digital certificate - Included Free 6 CPD Accredited PDF Certificate. Certificate of completion Hard copy certificate - £9.99 Get 5 CPD accredited Hardcopy certificate for £9.99 each. The delivery charge for the hardcopy certificate inside the UK is £3.99 each and international students need to pay £9.99 each to get their hardcopy certificate.
The aim of this course is to provide a comprehensive understanding of E-commerce security fundamentals, business laws and regulations, ethical, social and political issues, basic ethical concepts, privacy and information rights, customer data collection methods, and the concept of E-Governance and its types. After the successful completion of this lecture, you will be able tolearn the following: Understand E-commerce Security Fundamentals and deal with issues arising. Understand and comply with E-commerce Business Laws and Regulations. Understand Ethics, Social and Political Issues. Learn about the Basic Ethical Concepts: Responsibility, Accountability and Liability. Understand Privacy and Information Rights. Understand What is Customer Data, the Importance of Collecting Customer Data, and Data Collection Methods. Understand the concept of E-Governance and its types. The aim of this course is to provide students with a comprehensive understanding of E-commerce Security Fundamentals and the ability to deal with the issues arising in this field. The course will also cover the E-commerce Business Laws and Regulations that apply to this field. Students will learn about the ethical, social, and political issues surrounding E-commerce, as well as the basic ethical concepts of responsibility, accountability, and liability. They will gain an understanding of privacy and information rights and learn about customer data, including its importance and methods for collecting it. Finally, the course will cover the concept of E-Governance and its various types, providing students with an understanding of how it applies to E-commerce. The aim of this course is to provide students with a comprehensive understanding of E-commerce Security Fundamentals and the ability to deal with the issues arising in this field. The course will also cover the E-commerce Business Laws and Regulations that apply to this field. Students will learn about the ethical, social, and political issues surrounding E-commerce, as well as the basic ethical concepts of responsibility, accountability, and liability. They will gain an understanding of privacy and information rights and learn about customer data, including its importance and methods for collecting it. Finally, the course will cover the concept of E-Governance and its various types, providing students with an understanding of how it applies to E-commerce. VIDEO - Course Structure and Assessment Guidelines Watch this video to gain further insight. Navigating the MSBM Study Portal Watch this video to gain further insight. Interacting with Lectures/Learning Components Watch this video to gain further insight. Recognizing the Legal and Security Framework of E-commerce Self-paced pre-recorded learning content on this topic. Recognizing The Legal And Security Framework Of E-Commerce Put your knowledge to the test with this quiz. Read each question carefully and choose the response that you feel is correct. All MSBM courses are accredited by the relevant partners and awarding bodies. Please refer to MSBM accreditation in about us for more details. There are no strict entry requirements for this course. Work experience will be added advantage to understanding the content of the course.The certificate is designed to enhance the learner's knowledge in the field. This certificate is for everyone eager to know more and get updated on current ideas in their respective field. We recommend this certificate for the following audience. E-commerce Legal and Security Consultant E-commerce Compliance Manager E-commerce Security Analyst E-commerce Legal Analyst E-commerce Privacy Officer E-commerce Compliance Analyst E-commerce Risk Management Specialist E-commerce Fraud Investigator E-commerce Contract Administrator E-commerce Data Protection Officer Average Completion Time 2 Weeks Accreditation 3 CPD Hours Level Advanced Start Time Anytime 100% Online Study online with ease. Unlimited Access 24/7 unlimited access with pre-recorded lectures. Low Fees Our fees are low and easy to pay online.
BGP training course description A detailed study of BGP, from the basics of how it works through to advanced issues such as route reflectors, policy, filtering, route selection and routing registries. The course culminates with a study of an industrial strength BGP template illustrating important issues such as bogon filtering. Practical hands on with routers follow the major sessions to reinforce the theory. A multiple choice exam, leading to the LAIT III certification, is available after the course. The exam consists of 60 questions and lasts 2 hours. What will you learn Connect enterprises to the Internet, and ISPs to each other. Describe how BGP works. List, describe and configure the main BGP attributes. Implement and troubleshoot BGP. Work with route aggregation and calculate CIDR prefixes in seconds. Influence traffic paths with BGP. BGP training course details Who will benefit: Anyone who will be working with BGP. Prerequisites: TCP/IP Foundation for engineers Definitive IP routing for engineers. Duration 5 days BGP training course contents Basic BGP IGPs, EGPs, What's BGP? BGP RIB, in/out process, tables peers, adding routes. Hands on Simple configuration and troubleshooting. The Internet and peering ASs, AS numbers, Internet structure, ISP types, ISP network design, IXs, peering vs. transit, public/ private peering, bi/multi-lateral peering. Hands on AS information gathering. How BGP works Incremental updates, Path vector protocols, BGP protocol stack, the BGP header, message types, NLRI, withdrawn routes, route refresh, route dampening. Hands on More troubleshooting, packet analysis. MBGP and IPv6 Multiprotocol routing, AFI, SAFI, MBGP and multicasts, IPv6, MPLS VPNs. Hands on IPv6 BGPv4 aggregation CIDR, benefits, techniques, shortcuts, configuring BGP aggregation, leaking routes. Hands on Reducing routing table size. BGP path selection BGP attributes, attribute types, route selection order, Local preference, AS prepend, MEDs. Hands on Influencing traffic with BGP. BGP routing policies What is policy? Examples, route filtering, AS filtering, REs, applying preference selectively, peer groups. Hands on Sophisticated policies. RIPE and routing registries RIRs, Allocations, assignments, PI vs. PA. Objects, RPSL, routing registry, Hands on The RIPE database. Automating BGP configuration Automation tools, whois, IRRToolSet, Bogon lists, tracking bogon lists, HTTP, Peering, routing registries, DNS. Communities What is a community? Community names, communities for: peer types and geography. RFC 1998, default communities. Hands on Setting local preference on other routers. Route servers What are route servers? LINX route servers, route server policy control, What are route collectors, Looking glasses. Hands on Setting up and working with a route server. Peer relationships IBGP, EBGP, next hop self, advertising routes into/out of BGP, synchronisation. Hands on IBGP, troubleshooting a large BGP network. Route reflectors and confederations Full mesh IBGP, Route reflectors, RR configuration and design, confederations, migration issues. Hands on RR configuration. BGP architectures Stub vs. transit AS, when to use BGP, multihoming strategies and issues, default routes. Multihop EBGP, load balancing. Hands on Multihoming. BGP security RFC 7454, security steps, BGP TTL security, filters, RPKI, ROAs, rsync, rrdp, validators. A secure BGP template. Hands on RPKI prefix validation.
Cloud deployment training course description This course covers the important topics every cloud professional needs, including, configuration and deployment, security, maintenance, management, and troubleshooting. It covers all aspects of cloud computing infrastructure and administration, with a practical focus on real-world skills. It will help you to master the fundamental concepts, terminology, and characteristics of cloud computing. Deploy and implement cloud solutions, manage the infrastructure, and monitor performance. You will also be able to install, configure, and manage virtual machines. What will you learn Cloud services, models, and characteristics. Virtualization components, installation, and configuration. Infrastructure configurations and optimization. Resource management and specific allocations. IT security concepts, tools, and best practices. Recovery, availability and continuity in the cloud. Cloud deployment training course details Who will benefit: IT professionals looking to deploy and implement cloud solutions, manage the infrastructure, and monitor performance, Install, configure, and manage virtual machines. Prerequisites: Introduction to virtualization. Duration 5 days Cloud deployment training course contents Preparing to Deploy Cloud Solutions Deploying a Pilot Project Testing Pilot Project Deployments Designing a Secure and Compliant Cloud Infrastructure Designing and Implementing a Secure Cloud Environment Planning Identity and Access Management for Cloud Deployments Determining CPU and Memory Sizing for Cloud Deployments Determining Storage Requirements for Cloud Deployments Analysing Workload Characteristics to Ensure Successful Migration Maintaining Cloud Systems Implementing Backup, Restore, Disaster Recovery, and Business Continuity Measures Analysing Cloud Systems for Performance Analysing Cloud Systems for Anomalies and Growth Forecasting Troubleshooting Deployment, Capacity, Automation, and Orchestration Issues Troubleshooting Connectivity Issues Troubleshooting Security Issues
Linux training course description A Linux foundation appropriate for all flavours of Linux, focussed on getting network engineers up and running with Linux. The command line is used throughout. The course progresses from the basics of Linux commands onto useful tools such as grep, then shell features such as piping and then onto shell scripting. Administration aspects covered are the tasks network engineers are most likely to encounter such as software installation. Hands on exercises concentrate on network related tasks such as installing net-snmp and using shell scripts to provide network automation. What will you learn Use Linux commands to perform a variety of tasks from manipulating files to handling processes. Create and edit files with vi. Work with permissions. Write simple shell scripts. Install software packages. Configure base networking. Linux training course details Who will benefit: Network engineers. Prerequisites: TCP/IP Foundation Duration 5 days Linux training course contents What is Linux? Linux distributions, open source software. Getting started Logging in, changing passwords, logging out. Hands on Basics and root access. Linux basics Command structure. The Linux manuals, basic commands (who, date, tty, uname, echo, banner...). Hands on Using the CLI. Connecting to a network IP configuration, DHCP, static addressing, routing, ifconfig, ping, netstat, traceroute, dig. Hands on Network configuration and testing. Managing Software Package Concepts, Comparison of package formats, RPM, rpm Commands, Yum, Debian Packages, dpkg, apt-cache, apt-get, dselect, aptitude, Converting Between Package Formats, Dependencies and Conflicts, Startup Script Problems, Shared Libraries, Library Management Hands on Installing network packages such as nmap and net-snmp. Processes and log files ps, kill, background processes, at, exec, priorities. Managing Linux log files. Syslogd. Setting the time. Cron and cronjobs. Managing Processes, the Kernel: The First Process. Hands on Controlling daemons and services. Setting up a TFTP server. Filesystem commands Home directories, manipulating files and directories, Filesystem layout, Pathnames, hard and symbolic links. Viewing files. Hands on Exploring the filesystem, working with network device configuration files. The Linux editors ed, vi, shell escapes, .exrc. Hands on Editing network device configuration files. Extracting data from files grep, find, cut, sort and paste⦠Hands on Working with syslog files. Permissions Theory, chmod, chown, newgrp. Hands on Handling permission problems. The shell Metacharacters, piping and redirection. Hands on Running SNMP commands and working with their output. Basic shell scripting What are shell scripts? Simple scripts, control structures. Variable. Setting variables, using variables, set, scope, export, sourcing, environmental variables, read. Positional parameters: $0 to $9, $#, $* and others. shift parameter substitution. Control statements: The test command, if , while loops, for loops, the case statement. Hands on Automating network tasks. Customising your environment Environmental variables, stty, .profile and other startup files. Hands on Customising Linux. Introduction to administration The root user, su. Managing users and groups. Hands on The power of root. Archiving files Backups, tar, cpio, dd, gzip. Hands on Working with tar files. Booting Linux and Editing Files Installing Boot Loaders, GRUB Legacy, GRUB 2, Alternative Boot Loaders, the Boot Process, Boot Messages, Runlevels and the Initialization Process, Runlevel Functions, Runlevel Services, Alternative Boot Systems , Upstart, system. Hands on Installing network services on Linux.
LINX 3 training course description A detailed study of BGP, from the basics of how it works through to advanced issues such as route reflectors, policy, filtering, route selection and routing registries. The course culminates with a study of an industrial strength BGP template illustrating important issues such as bogon filtering. Practical hands on with routers follow the major sessions to reinforce the theory. A multiple choice exam, leading to the LAIT III certification, is available after the course. The exam consists of 60 questions and lasts 2 hours. What will you learn Connect enterprises to the Internet, and ISPs to each other. Describe how BGP works. List, describe and configure the main BGP attributes. Implement and troubleshoot BGP. Work with route aggregation and calculate CIDR prefixes in seconds. Influence traffic paths with BGP. LINX 3 training course details Who will benefit: Network engineers. Prerequisites: LAIT I and II OR CCNP and take LAIT I and LAIT II exams whilst on this course. Duration 5 days LINX 3 training course contents Basic BGP IGPs, EGPs, What's BGP? BGP RIB, in/out process, tables peers, adding routes. Hands on Simple configuration and troubleshooting. The Internet and peering ASs, AS numbers, Internet structure, ISP types, ISP network design, IXs, peering vs. transit, public/ private peering, bi/multi-lateral peering. Hands on AS information gathering. How BGP works Incremental updates, Path vector protocols, BGP protocol stack, the BGP header, message types, NLRI, withdrawn routes, route refresh, route dampening. Hands on More troubleshooting, packet analysis. MBGP and IPv6 Multiprotocol routing, AFI, SAFI, MBGP and multicasts, IPv6, MPLS VPNs. Hands on IPv6 BGPv4 aggregation CIDR, benefits, techniques, shortcuts, configuring BGP aggregation, leaking routes. Hands on Reducing routing table size. BGP path selection BGP attributes, attribute types, route selection order, Local preference, AS prepend, MEDs. Hands on Influencing traffic with BGP. BGP routing policies What is policy? Examples, route filtering, AS filtering, REs, applying preference selectively, peer groups. Hands on Sophisticated policies. RIPE and routing registries RIRs, Allocations, assignments, PI vs. PA. Objects, RPSL, routing registry, Hands on The RIPE database. Automating BGP configuration Automation tools, whois, IRRToolSet, Bogon lists, tracking bogon lists, HTTP, Peering, routing registries, DNS. Communities What is a community? Community names, communities for: peer types and geography. RFC 1998, default communities. Hands on Setting local preference on other routers. Route servers What are route servers? LINX route servers, route server policy control, What are route collectors, Looking glasses. Hands on Setting up and working with a route server. Peer relationships IBGP, EBGP, next hop self, advertising routes into/out of BGP, synchronisation. Hands on IBGP, troubleshooting a large BGP network. Route reflectors and confederations Full mesh IBGP, Route reflectors, RR configuration and design, confederations, migration issues. Hands on RR configuration. BGP architectures Stub vs. transit AS, when to use BGP, multihoming strategies and issues, default routes. Multihop EBGP, load balancing. Hands on Multihoming. BGP security RFC 7454, security steps, BGP TTL security, filters, RPKI, ROAs, rsync, rrdp, validators. A secure BGP template. Hands on RPKI prefix validation.
Network+ training course description This network+ course covers the TCP/IP side of the exam. For delegates to pass the exam it is important that they meet the prerequisites, self study is also required. An intensive hands on IP foundation. The course focuses on all parts of TCP/IP including layers 4 to 7 on end stations as well as layer 3 on routers. The TCP/IP protocols are also studied to enable delegates to be able to troubleshoot TCP/IP using Wireshark. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. What will you learn Use ping, traceroute and other tools to diagnose faults on a network. Configure IP on PCs and routers. Plan IP addresses and subnets. Analyse IP and TCP packets using an analyser. Troubleshoot TCP/IP. Network+ training course details Who will benefit: Those wishing to pass the Network+ exam. Prerequisites: Introduction to data communications & networking Duration 5 days Network+ training course contents What is TCP/IP? TCP and IP are protocols, 7 layer model, network layers, hardware/software layers, internetworking, protocols, What is IP? What is TCP? The internet, The IAB, RFCs. Ping and Wireshark Host configuration, IP addresses, subnet masks, default gateways, ping. Hands on Base configuration. Testing with ping. Analysing packets with Wireshark. Switches and Wireshark Switches versus hubs, layer 2 forwarding table, flooding, broadcasts. Hands on Building a switched based network. Configuring network devices Configuration options, console port, putty, telnet. Hands on Configuring switches, telnet. IP IP packet format, protocol field, TTL, DiffServ, fragments, ICMP. Hands on IP packet analysis. IP addressing 32 bits, dotted decimal, rules, networks, role of subnet masks, simple subnetting, prefix notation. Broadcasts, special use addresses. Hands on Planning and implementing addressing. IP and the lower layers ARP, media not supporting ARP. Hands on ARP. Routing What are routers? What routers do, default gateways, routing and addressing, routing tables, ways to update routing tables. Hands on Building a routed network, traceroute. Routing protocols IGPs and EGPs, RIP, RIPv2, Why not to use RIP, OSPF, OSPF metrics, convergence, distance vector protocols, link state protocols. Hands on OSPF, analysing routing tables, loopbacks. Network simulators Network simulators, EVE-NG, GNS3, CML. Hands on Using EVE-NG. Subnetting Subnetting to the bit level, ranges, how prefixes are used. Hands on Subnetting. VLANS and IP addressing What are VLANs, tagging, 802.1Q, Inter VLAN routing. Hands on Inter VLAN routing. TCP and UDP Layer 4, port numbers, client ports, broadcasts multicasts and layer 4, UDP header, TCP header, connections, ACK, sliding windows, options, connection states. Sockets. Hands on Analysing TCP packets. IPv4 address configuration Private addresses, NAT, NAPT, dynamic addressing, DHCP, link local addresses. Hands on DHCP, NAT. IPv6 What is IPv6, 128 bit addresses, address formats, IPv6 address allocation, header format, migration, dual stack, tunnelling, NAT64, DNS64. Hands on IPv6 setup troubleshooting. IPv6 address configuration Static addressing, EUI-64 addresses, IPv6 address order, SLAAC, DHCPv6. Hands on SLAAC. Applications Clients, servers, HTTP, Email, resource sharing, VoIP, video, terminal emulation, remote desktop. Network management and SNMP. Hands on Servers, TFTP, VoIP packet analysis. DNS Names and addresses, hosts file, how DNS works. FQDNs, DNS client configuration. Hands on Troubleshooting DNS. Security Firewalls, firewall architectures, DMZ, how firewalls work, proxy servers, filtering, ACLs, IDS, VPNs, authentication, encryption, tunnels, secure protocols. Hands on Firewalls, SSH Troubleshooting Methods, tools. Using the 7 layer model. Troubleshooting toolkits. Hands on Fixing the network.
LINX II training course description An intensive hands on IP routing course leading to LINX Accredited Internet Technician stage 2 focusing on routing in an IP environment. The course concentrates on OSPF and IS-IS but also covers BGP and MPLS. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. A multiple choice exam, leading to the LAIT II certification, is available after the course. The exam consists of 60 questions and lasts 2.0 hours. What will you learn Calculate subnet numbers in seconds. Configure and troubleshoot static routes Explain how OSPF works. Build resilient networks with VRRP and OSPF. Implement and troubleshoot OSPF, IS-IS, simple BGP and simple MPLS. Evaluate and choose appropriate routing protocols for particular scenarios. LINX II training course details Who will benefit: Network engineers. Prerequisites: LAIT I attendance and 55%+ exam score OR LAIT I exam only and pass (70%+) OR CCNA and take LAIT I exam on this course. Duration 5 days LINX II training course contents Basic routing Review of LAIT I routing, reading routing tables. Hands on Setting up a routed network. Static routes Why use static routes? Default routes. Hands on Configuring static routes. First hop redundancy Default gateways, VRRP/HSRP/GLBP. Load sharing, critical IP addresses. Hands on VRRP. Basic OSPF What is OSPF? Process IDs, passive interfaces. Hands on Simple OSPF. Subnetting Bit boundary subnetting, calculating network numbers. Exercise: Subnetting. OSPF overview Metrics, convergence, DV vs. Link state, IGPs, classless, OSPF features, load sharing, OSPF authentication. Hands on OSPF features. OSPF within an area How OSPF works, LSAs, LSDB, router IDs, hellos, configuring hellos, exchange protocol. Hands on Investigating OSPF structures. OSPF areas Scalability, why areas? Area IDs, area 0, ABRs, ABR resilience, areas & LSDBs & LSAs, virtual links. Hands on Multi area OSPF. Redistribution Multiple routing protocols, common scenarios, routing distance, External LSAs, E1 and E2. Type 4 LSAs. OSPF and default routes. Hands on Configuring static route redistribution. Route aggregation Route summarisation. How to aggregate, CIDR, ASBR summarisation. Hands on OSPF address summarisation. OSPF packet formats OSPF packets, protocol stack, packet flows, OSPF headers, neighbours, neighbour states, DRs, adjacencies, BDRs, DR election. Hands on Analysing OSPF packets, troubleshooting. OSPF OSPF stub areas LSA types, area types, area architecture, stub areas, default routes, benefits & disadvantages of stub areas, TSSAs, NSSAs, Type 7 LSAs. Hands on Stub and TSSA configuration. IS-IS End systems, Intermediate systems, how IS-IS works, IS-IS router ID, Level 1, Level 2, IS-IS hierarchy. Hands on Configuring IS-IS, troubleshooting IS-IS. The Internet Autonomous systems, Peering, transit, looking glasses. Hands on Internet routing tables. Basic BGP IGPs, EGPs, What's BGP? BGP RIB, in/out process, tables peers, adding routes. Hands on Simple configuration and troubleshooting. Routing IPv6 Multi protocol routing, IPv6 addressing, IPv6 routing tables, IPv6 static routes, OSPFv3, IS-IS and IPv6. Hands on Routing IPv6. STP and L2 routing STP, RSTP, L2 IS-IS, Multi system link aggregation. Hands on RSTP. MPLS Core MPLS, MPLS and the 7 layer model, MPLS protocol, MPLS standard, MPLS runs on routers, MPLS history, Why MPLS?, LSRs, PE and P router roles, FEC, swapping labels, MPLS packet format. Hands on Enabling MPLS. Testing and troubleshooting of MPLS. Appendix EIGRP: How EIGRP works, DUAL.