• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1415 Network & Security courses in Dunfermline delivered Online

Audit Manager

By SkillWise

Overview Uplift Your Career & Skill Up to Your Dream Job - Learning Simplified From Home! Kickstart your career & boost your employability by helping you discover your skills, talents, and interests with our special Audit Manager Course. You'll create a pathway to your ideal job as this course is designed to uplift your career in the relevant industry. It provides the professional training that employers are looking for in today's workplaces. The Audit Manager Course is one of the most prestigious training offered at Skillwise and is highly valued by employers for good reason. This Audit Manager Course has been designed by industry experts to provide our learners with the best learning experience possible to increase their understanding of their chosen field. This Audit Manager Course, like every one of Study Hub's courses, is meticulously developed and well-researched. Every one of the topics is divided into elementary modules, allowing our students to grasp each lesson quickly. At Skillwise, we don't just offer courses; we also provide a valuable teaching process. When you buy a course from Skillwise, you get unlimited Lifetime access with 24/7 dedicated tutor support. Why buy this Audit Manager? Unlimited access to the course forever Digital Certificate, Transcript, and student ID are all included in the price Absolutely no hidden fees Directly receive CPD-accredited qualifications after course completion Receive one-to-one assistance every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the Audit Manager there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for free. Original Hard Copy certificates need to be ordered at an additional cost of £8. Who is this course for? This Audit Manager course is ideal for Students Recent graduates Job Seekers Anyone interested in this topic People already working in the relevant fields and want to polish their knowledge and skills. Prerequisites This Audit Manager does not require you to have any prior qualifications or experience. You can just enroll and start learning. This Audit Manager was made by professionals and it is compatible with all PCs, Macs, tablets, and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path As this course comes with multiple courses included as a bonus, you will be able to pursue multiple occupations. This Audit Manager is a great way for you to gain multiple skills from the comfort of your home. Module 01: Introduction to Accounting Introduction to Accounting 00:17:00 Module 02: The Role of an Accountant The Role of an Accountant 00:18:00 Module 03: Accounting Concepts and Standards Accounting Concepts and Standards 00:24:00 Module 04: Double-Entry Bookkeeping Double-Entry Bookkeeping 00:25:00 Module 05: Balance Sheet Balance Sheet 00:23:00 Module 06: Income statement Income Statement 00:21:00 Module 07: Financial statements Financial Statements 00:29:00 Module 08: Cash Flow Statements Cash Flow Statements 00:19:00 Module 09: Understanding Profit and Loss Statement Understanding Profit and Loss Statement 00:19:00 Module 10: Financial Budgeting and Planning Financial Budgeting and Planning 00:30:00 Module 11: Internal Audit Procedures Internal Audit Procedures 00:22:00 Module 12: Technology-based Internal Audit Technology-Based Internal Audit 00:25:00 Module 13: Internal Control and Control Risk Internal Control and Control Risk 00:38:00 Module 14: Audit Interviews Audit Interviews 00:20:00 Module 15: Reporting Audit Outcome Reporting Audit Outcome 00:25:00 Module 16: UK Internal Audit Standards UK Internal Audit Standards 00:26:00

Audit Manager
Delivered Online On Demand
£29

Risk Management wtih Cyber Security Management

By Wise Campus

Risk Management: Risk Management Course As we explore the dynamic world of Risk Management: Risk Management Course, get ready for an educational trip that will change your life. Are you eager to learn all there is to know about Risk Management: risk management and master it? You're in the proper place now. Refreshing your knowledge and abilities with our Risk Management: Risk Management Course is an excellent idea. You will gain a solid foundation in Risk Management: risk management and learn how to carry out a risk assessment with the help of this Risk Management: Level 5 Diploma in Risk Management course. Enrol now, You have the chance to set off on an exhilarating journey of discovery and adventure with the help of this amazing Risk Management: Risk Management Course. Main Course: Level 5 Diploma in Risk Management Free Courses are including with this Risk Management: Risk Management Course Along with The Risk Management: Risk Management Course, We Offer a free Cyber Security Course Along with The Risk Management: Risk Management Course, We Offer a free Security Management Course Special Offers Of this Risk Management: Risk Management Course This Risk Management: Risk Management Course includes a FREE PDF Certificate. Lifetime access to this Risk Management: Risk Management Course Instant access to this Risk Management: Risk Management Course Get FREE Tutor Support to this Risk Management: Risk Management Course Risk Management: Risk Management Course You will also learn about the different kinds of hazards that your business could encounter in our Certificate in Risk Management: Risk Management course. You will discover the advantages of Risk Management: risk management as well as the procedures involved in the risk assessment process with this Certificate in Risk Management: Risk Management course. During the course of 17 engaging courses, learners are guided through the essential responsibilities and functions of people working in professional Risk Management: risk management. Who is this course for? Risk Management: Risk Management Course New graduates, students, job seekers, and anybody else interested in risk management should take the Risk Management: Risk Management Course. Requirements Risk Management: Risk Management Course To enrol in this Risk Management: Risk Management Course, students must fulfil the following requirements. To join in our Risk Management: Risk Management course, you must have a strong command of the English language. To successfully complete our Risk Management: Risk Management course, you must be vivacious and self driven. To complete our Risk Management: Risk Management course, you must have a basic understanding of computers. A minimum age limit of 15 is required to enrol in this Risk Management: Risk Management course. Career path Risk Management: Risk Management Course Applicants who get our Risk Management: Risk Management Course will be able to advance in a wide range of professions including: Quality Manager Quality Assurance Manager Risk Management Manager.

Risk Management wtih Cyber Security Management
Delivered Online On Demand5 hours 6 minutes
£12

Level 5 Diploma in Security Management

By Compliance Central

Security Mangement is provides businesses and organisations with a tested, dependable foundation for safeguarding their infrastructure against damage, theft, and interruption.Imagine a world where tactical execution and strategic planning come together to form a strong barrier against the threats posed by today's linked and modern society as we set out on our adventure of Security Management. With our Level 5 Diploma in Security Management, you may unlock the door to a future of strategic protecting. Dive deep into the intricacies of Security Management across eight comprehensive modules designed to fortify your understanding of the discipline. From mastering the fundamentals in Module 01, "Introduction to Security Management," to navigating the complex terrain of cyber threats and fraud prevention in Module 06, this course encapsulates the essence of security from organizational to digital realms. Elevate your expertise as you delve into the critical domains of security risk analysis, physical and information protection, business resilience, crisis management, security investigations, and legal regulations. Level 5 Diploma in Security Management Learning Outcomes: Analyse and assess security risks effectively. Implement strategies for organizational security management. Demonstrate a comprehensive understanding of physical and information security protection. Develop resilience and crisis management skills for business continuity. Navigate the realm of cyber security and implement fraud prevention measures. Interpret and apply laws and regulations governing security management. Level 5 Diploma in Security Management Module 01: Introduction to Security Management Module 02: Organisational Security Management Module 03: Security Risk Analysis and Risk Reduction Module 04: Physical and Information Security Protection Module 05: Business Resilience and Crisis Management Module 06: Cyber Security and Fraud Prevention in Security Management Module 07: Security Investigations and Threat Awareness Module 08: Laws and Regulations in Security Management Certificate of Achievement Endorsed Certificate of Achievement from the Quality Licence Scheme Learners will be able to achieve an endorsed certificate after completing the course as proof of their achievement. You can order the endorsed certificate for Free to be delivered to your home by post. For international students, there is an additional postage charge of £10. Endorsement The Quality Licence Scheme (QLS) has endorsed this course for its high-quality, non-regulated provision and training programmes. The QLS is a UK-based organisation that sets standards for non-regulated training and learning. This endorsement means that the course has been reviewed and approved by the QLS and meets the highest quality standards. Who is this course for? Level 5 Diploma in Security Management Security Manager Risk Analyst Crisis Management Specialist Cyber Security Consultant Information Protection Officer Fraud Prevention Analyst Requirements Level 5 Diploma in Security Management To enrol in this Level 5 Diploma in Security Management course, all you need is a basic understanding of the English Language and an internet connection. Career path Level 5 Diploma in Security Management Security Manager: £30,000 to £70,000 per year Information Security Analyst: £25,000 to £60,000 per year Security Consultant: £35,000 to £80,000 per year Risk Manager - Security: £40,000 to £80,000 per year Cyber Security Analyst: £25,000 to £55,000 per year Loss Prevention Manager: £25,000 to £45,000 per year Certificates CPD Accredited PDF Certificate Digital certificate - Included QLS Endorsed Hard Copy Certificate Hard copy certificate - Included CPD Accredited Hard Copy Certificate Hard copy certificate - £9.99 CPD Accredited Hard Copy Certificate Delivery Charge: Inside the UK: Free Outside of the UK: £9.99 each

Level 5 Diploma in Security Management
Delivered Online On Demand4 hours
£109

Learn Ethical Hacking From Scratch

By iStudy UK

Course Overview Ethical hacking, (or penetration testing) involves exploiting computer networks and systems to detect vulnerabilities that could be exposed to dangerous hackers. Many organisations use ethical hackers to test the security of their website or web applications, which is where the role of the Penetration Tester comes in. If you're looking to become a certified Penetration Tester or Ethical Hacker, then this is the course for you. It covers everything you need to know about security testing, including how to use Linux operating systems and SQL programming language.  Learn how to reduce the risk of a cyber attack with this step-by-step training course, designed to equip you with the skills to detect weaknesses in computer systems quickly and easily. It will familiarise you with a range of cyber attacks and techniques for securing systems, from how to create a fake WiFi network and even spy on your clients. Learn ethical hacking from scratch and enrol in this introductory training course today! What You Will Learn In this Ethical Hacking training course, you will learn how to exploit IT systems to detect vulnerabilities that attackers could take advantage of. It will provide you with the fundamental skills to become a qualified Penetration Tester. How to Hack a Windows 10 Computer & Access Their Webcam Installing Kali 2019 As a Virtual Machine A Basic Overview of Kali Linux and Linux Commands An Introduction to Network Penetration Testing Network Hacking - Pre Connection Attacks Website Hacking and Information Gathering Tips & Tricks An Introduction to SQL and SQLmap What is XSS or Cross-Site Scripting? How to Scan a Target Website For Vulnerabilities Extracting Sensitive Data Such As Passwords Why You Should Choose This Course From iStudy Study at your own pace Full Tutor support on weekdays (Monday - Friday) Fully compatible with any device Free Printable PDF Certificate immediately after completion No prior qualifications are needed to take this course No hidden fees or exam charges CPD Qualification Standards and IAO accredited Efficient exam system, assessment, and instant results Our customer support team is always ready to help you Gain professional skills and better earning potential Certification After completing the course you'll receive a free printable CPD accredited PDF certificate. Hard Copy certificate is also available, and you can get one for just £9! Accreditation This course is accredited by Continuing Professional Development (CPD). It is a recognised independent accreditation service. Enrol today and learn something new with iStudy. You'll find a full breakdown of the course curriculum down below, take a look and see just how much this course offers. We're sure you'll be satisfied with this course.

Learn Ethical Hacking From Scratch
Delivered Online On Demand14 hours 24 minutes
£25

Certified Digital Forensics Examiner (CDFE) - Complete Video Training

4.3(43)

By John Academy

Digital forensics plays a significant role in gathering valuable information about crimes and criminals. It is now one of the most potent weapons for the law enforcement department. If you are looking for a secure and exciting career, then digital forensics can be your call. The Certified Digital Forensics Examiner (CDFE) - Complete Video Training course will teach you the essential skills required to join this sector.  The Certified Digital Forensics Examiner (CDFE) - Complete Video Training course is ideal for building a solid foundation in digital forensics. The course will introduce you to the steps of digital forensic investigation. The easy to follow modules will educate you on the digital evidence protocol and forensic examination protocol. You will be able to develop the skills required for digital analysis, digital forensic reporting, digital evidence presentation etc. The course curriculum also covers lessons on cell phone, USB and PDA forensics. Through this Certified Digital Forensics Examiner (CDFE) - Complete Video Training course, you will get a clear understanding of digital forensics. After completing the course, you will receive a valuable certificate that will elevate your employability in the digital forensic industry. Join now and start building your skills.   Learning Outcomes  Familiarise yourself with the digital forensic investigation process Develop the essential skills for digital acquisition and analysis Understand the principles of digital evidence protocol and forensic examination protocol Enrich your knowledge of CFI theory Learn how to create digital forensic reports Gain in-depth knowledge of cell phone, USB and PDA forensics Who is this Course for? This Certified Digital Forensics Examiner (CDFE) - Complete Video Training course is for interested individuals who are preparing to pursue a career in the digital forensic sector. Requirements Our Certified Digital Forensics Examiner (CDFE) - Complete Video Training is fully compatible with any kind of device. Whether you are using Windows computers, Mac, smartphones or tablets, you will get the same experience while learning. You will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Assessment  At the end of the course, you will be required to sit an online test. Your test will be assessed automatically and immediately so that you will instantly know whether you have been successful. Before sitting for your final exam, you will have the opportunity to test your proficiency with a mock exam.  Certification To achieve a formal qualification, you are required to book an official exam separately with the relevant awarding bodies. However, you will be able to order a course completion CPD Certificate by paying an additional fee. Hardcopy Certificate by post - £19 Soft copy PDF via email - £10 Why Choose us? Affordable, engaging & high-quality e-learning study materials; Tutorial videos/materials from the industry-leading experts; Study in a user-friendly, advanced online learning platform; Efficient exam systems for the assessment and instant result; The UK & internationally recognised accredited qualification; Access to course content on mobile, tablet, or desktop from anywhere, anytime; The benefit of career advancement opportunities; 24/7 student support via email. Career Path After completing this Certified Digital Forensics Examiner (CDFE) - Complete Video Training course, you will be able to build up accurate knowledge and skills to pursue a career in the following fields  Digital Forensic Examiner Security Analyst Security Consultant Cyber Security Engineer Forensic Computer Analyst Introduction FREE 00:13:00 Computer Forensic Incidents 00:28:00 Investigation Process 00:54:00 Disk Storage Concepts 00:30:00 Digital Acquisition & Analysis 00:24:00 Forensic Examination Protocols 00:25:00 Digital Evidence Protocols 00:21:00 CFI Theory 00:25:00 Digital Evidence Presentation 00:22:00 Computer Forensic Laboratory Protocols 00:33:00 Computer Forensic Processing 00:22:00 Digital Forensics Reporting 00:20:00 Specialized Artifact Recovery 00:46:00 Discovery and ESI 00:12:00 Cell Phone Forensics 00:21:00 USB Forensics 00:06:00 Incident Handling 00:36:00 PDA Forensics 00:23:00 Investigating Harassment 00:14:00 Mock Exam Mock Exam- Certified Digital Forensics Examiner (CDFE) - Complete Video Training 00:20:00 Final Exam Final Exam- Certified Digital Forensics Examiner (CDFE) - Complete Video Training 00:20:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Certified Digital Forensics Examiner (CDFE) - Complete Video Training
Delivered Online On Demand8 hours 35 minutes
£24

GPON and FTTx networks

5.0(3)

By Systems & Network Training

GPON and FTTx networks training course description Designed to benefit those requiring an in depth knowledge of the principles and applications of Ten Gigabit and Gigabit Passive Optical Networking and Fibre to the X in NG Networks applications and their associated equipment, its flexibility and function within a modern transmission network. Using an effective mix of 'hands on' equipment instruction and correlation to theory based learning the delegate will gain a complete understanding of the equipment and the tasks to be undertaken in a real life situation. What will you learn Compare PON/FTTx systems. Explain network elements and designs. Support applications and network interfaces. List circuit provisioning and bandwidth requirements. Understand upstream & downstream issues. Describe headend & network elements/OLT-ONT. Perform network testing with OTDR test sets. GPON and FTTx networks training course details Who will benefit: Anyone working with GPON and FTTx. Prerequisites: Introduction to data communications and networking. Duration 5 days GPON and FTTx training course contents FTTN, FTTC, FTTH SMF, MMF, Fibre safety and properties (dispersion/attenuation), Fibre reel cables and types, Fibre installation and air blown fibre, Transmitters and receivers - power budget/laser classes. Fibre to the home (FTTH), FTTC (Fibre to the Cabinet), FTTN (Fibre to the node) , FTTD (Fibre to the desk), FFTH topologies and wavelengths, Active or passive optical network. WDM equipment and GPON OSP design Wavelength considerations, WDM/DWDM/CWDM, EDFA optical amplification, AWG (Arrayed Waveguide Grating) splitters , Couplers (splitters) and losses, Optical splitters 1x2, 1x4, 1x8, 1x16, 1x32, 1x64, 2x64. PON variants Gigabit passive optical network (GPON), Gigabit Ethernet passive optical network (GEPON), Time division PON (TDM-PON), Wave Division Multiplexing PON (WDM-PON), 1Gbps, 10Gbps, 40Ggps, 100Gbps FSAN (Full Service Access Network) NGA (Next Generation Access), Strategies for TDM-PON to WDM-PON migration, Architecture of NG-PON (hybrid WDM/TDM PON), Additional services than triple play. GEPON design GPON OSP centralized and distributed design, GPON PON splitters x4 x8 x32, Fibre splice trays /cassette trays & enclosures, GPON field testing and installation verification, GPON physical layer testing, Optical time domain reflectometer (OTDR), Optical power source & meter, Optical return loss (ORL), APON/BPON/GPON/EPON comparisons. GPON ITU-T G.984.1 Reference model, terminology & architecture, Access network system management functions. ONT & OLT functional block examples. FTTx scenarios, 4 switching arrangements for external access network backup. GPON ITU-T G.984.2 Physical layer, Enhancement band, Bit rate and wavelengths, FEC and RAMAN. GPON ITU-T G.984.3 Frame structure, GPON encapsulation method (GEM), GTC adaptation and framing sublayer protocol stack, Status reporting & traffic monitoring DBA (SR-DBA & TM-DBA), Transmission container (T-CONT) types, Downstream & upstream multiplexing, GEM port identifier, Media access control and ONU registration, Extended bandwidth assignment model scheduling architecture, PLOAM & alarm messages, Downstream & Upstream FEC, Process order in a GTC transmit flow. GPON ITU-T G.984.4 and G.988 ONT management and control interface (OMCI) Management interface, Reference model, Typical ONT with SCTE 55-1 or SCTE 55-2 compliancy. GPON ITU-T G.984.5 enhancement band Band options, GPON NGA, Wavelength allocation. GPON ITU-T G.984.6 optical reach extension (G.984.re) Reach extension (RE), OA-based and OEO-based reach extenders, Protection, Reach extender with OTDR blocking filters (BF) and bypass (BYP) filters. GPON ITU-T G.984.7 long reach Quiet Window. 10-GPON ITU-T G.987.1 (XG-PON) Scenarios, reference access network architecture, XG-PON with G-PON through WDM1r, G-PON and XG-PON wavelength allocation, G-PON and XG-PON co-existence with video overlay option, RE migration scenarios. G.989 40Gbps XG-PON2 Functional reference architecture, NG-PON2 system coexistence with legacy systems, Definitions of legacy compatibility terminology. GPON issues and standards GPON components GPON OLT / GPON ONT, GPON management, Operational support systems (OSS), Network management systems (NMS), OMCI (ONT Management control interface), RG (Residential gateway), Data and prioritised voice channel product, GPON broadband-forum standards, Broadband-forum , TR-069 and TR-156, HPNA (home phone network alliance), Powerline carrier (PLC), GPON DLNI G.hn or G.9960, MOCA, FTTH council certification standard for network certification. Fibre-connected home badge, Ethernet in the first mile (EFM), GPON frame synchronization to network timing, Direct clock synchronization interface (BITS), Multiservice access platform (MSAP), Software planning tool, Superconnected cities / voucher scheme. Hands on practical assignments Single and multimode fibre recognition, Fibre Cleaning methods, Checking cleaning with an optical microscope, Optical light source and optical power meter referencing, PON splitter and fibre drum testing with an optical power meter, 6km classroom passive optical network testing with an OTDR at 1310/1550nm, Using decibels (dB's) and decibel milliwats (dBm's), Designing networks up to 20km long using vendor specifications (power budget), Fault finding with a visible fault locator.

GPON and FTTx networks
Delivered in Internationally or OnlineFlexible Dates
£3,697

Advanced TCP/IP

5.0(3)

By Systems & Network Training

Advanced TCP/IP training course description An intensive advanced TCP/IP course focusing on the details of the protocols according to the RFCs. This course is designed to go into the technical details of the protocols and is not for those that are new to TCP/IP. A particular focus is on TCP and performance. Those more interested in routing protocols should see our Definitive IP routing for engineers course. It is expected that delegates are totally familiar with configuration addressing. Hands on sessions consist of protocol analysis using Wireshark. What will you learn Analyse packets and protocols in detail. Troubleshoot networks using Wireshark. Find performance problems using Wireshark. Perform network forensics. Advanced TCP/IP training course details Who will benefit: Advanced technical staff. Prerequisites: TCP/IP Foundation for engineers Duration 5 days Advanced TCP/IP training course contents IP Fragmentation and MTU issues, Path MTU discovery, Geolocation, unusual IP addresses, forwarding broadcasts, DiffServ, DSCP, ECN, assured and expedited forwarding. TTL usage in traceroute, Protocol field. Sanitising IP addresses in trace files. Wireshark and checksum errors. IPv6 The header. Extension headers. Traffic class and flow labels. Tunnelling. IPv6 and fragmentation. ARP Requests, responses, gratuitous ARP, Proxy ARP, ARP poisoning. ICMP ping, Round Trip Times, ICMP redirect, ICMP router advertisement and solicitation, Time Exceeded, Destination unreachable. ICMPv6: Similarity to ICMPv4, Neighbor discovery and the replacement of ARP. MLD. First hop redundancy ICMP discovery, HSRP, VRRP, GLBP. IGMP Multicast overview, multicast architecture, multicast addresses, IGMP v1, IGMPv2, IGMPv3. UDP Use in broadcasts and multicasts. Port numbers. TCP Connections, RST, FIN, sequence numbering, packet loss recovery, Fast recovery, RTO timeout, SACK, TCP flow control, receive window, congestion window, van Jacobsen, nagle, delayed ACKs, PSH, URG, TCP options, MSS, Window scaling, TCP timestamps. Congestion notification. Hands on Troubleshooting with sequence numbers, Wireshark IO and TCP graphs to analyse performance. Window size issues. DHCP DHCP header. Relationship to BOOTP. Discover, offer, request, decline, ACK, release. Lease, renewal and rebind times. Relay agents. DHCPv6 DNS Names and addresses, Resource Records, queries, responses, problems. MDNS. HTTP Requests, methods, request modifiers, response codes. HTTPS. SSL, TLS. Proxies. Hands on Redirects, recreating pages from packets. FTP Commands, responses, passive/active mode. Email SMTP, POP3, IMAP, commands responses. Voice and Video RTP, RTCP, SIP. IP PBXs. Traffic flows. Hands on Voice playback. SNMP MIBs, GET, TRAP, polling. Performance Baselining, high latency, Wireshark and timings, packet loss, redirections, small packets, congestion, name resolution. Security Network forensics, scanning and discovery, suspect traffic. IPsec, SSH.

Advanced TCP/IP
Delivered in Internationally or OnlineFlexible Dates
£3,697

Python for network engineers

5.0(3)

By Systems & Network Training

Python training course description This Python course focusses on teaching Python for use in network automation and network DevOps. We focus on getting delegates up and running with Python and network automation as quickly as possible rather than making them great programmers. In other words we concentrate on enabling delegates to use network automation libraries such as netmiko, NAPALM and Nornir, and APIs such as NETCONF and RESTCONF rather than enabling delegates to produce object oriented programs. Hands on sessions use Cisco and Juniper devices. What will you learn Run Python programs. Read Python programs. Write Python programs. Debug Python programs. Automate network tasks with Python programs. Configure network devices with Python. Collect data from network devices with Python. Python training course details Who will benefit: Network engineers. Prerequisites: TCP/IP Foundation Duration 5 days Python training course contents What is Python? Programming languages, Why Python? Python in interactive mode, Python scripts, ipython, Python version 2 versus version 3. A simple Python script. Comments. Hands on Installing Python, Hello world. A network example On box vs off box Python. telnet, ssh, NETCONF, HTTP, APIs, manufacturers and API support, analysis of a simple telnetlib program. Hands on Using Python to retrieve the configuration from a network device. Using wireshark to analyse the actions. Python basics I/O, operators, variables and assignment, types, indentation, loops and conditionals. Hands on Modifying the telnet program, changing configurations on a network devices. Functions, classes and methods What are functions, calling functions, builtin functions, useful builtin functions, file handling, classes, objects, creating instances. Hands on Storing configurations in files, configuring devices from files, using an inventory file to work on multiple devices. Libraries and modules Modules, files and packages, import, from-import, Python standard library, other packages, pip install, executing other programs. Managing python libraries. Hands on Using pip, installing and using ipaddress, subprocess to access netsnmp. For the more advanced, using the sockets library. Paramiko and netmiko SSH, enabling SSH on devices, keys. Paramiko versus netmiko, example scripts. pexpect. Hands on Configuring VLANs from Python. pySNMP Gathering facts using previous methods, SNMP review, pySNMP GET, pySNMP and SNMPv3. easySNMP library. Hands on Walking a MIB from Python. NETCONF What is NETCONF? Enabling NETCONF on devices, A first ncclient script, device handlers, get_config, edit_config, copy_config, delete_config, commit, validate, pyEZ, utils_config, utils.sw. Hands on Configuration using ncclient and PyEZ. This session is expanded for those interesting in JunOS automation. Manipulating configuration files Builtin functions, string handling. Unicode. Sequences, strings, lists, tuples. Dictionaries. TextFSM. Regular expressions. JSON, YAML, XML, YANG, Jinja2, templates. Hands on Jinja2 templating with Python to configure network devices. NAPALM Getters, configuration operations, supported devices, NAPALM transport, Config-replace, Config-merge, Compare config, Atomic changes, rollback. Example NAPLAM scripts. Hands on Using NAPALM to gather facts, Using NAPALM for configuration management REST and RESTCONF What is REST, HTTP methods, GET, POST, cURL, Postman, Python requests library. RESTCONF, a RESTCONF example. Hands on Modifying a configuration using RESTCONF. Scapy What is scapy, Scapy in interactive mode, Scapy as a module. Hands on Packet crafting from Python. Warning Errors and exceptions, Exception handling, try, except. Memory management. Garbage collection. Context management, With. Hands on Improving Python code. Nornir What is Nornir? A network automation framework, inventories, connection management and parallelization. Nornir architecture and other libraires. Hands on Setting up nornir, nornir fact gathering, nornir tasks. Optional Writing your own functions, Writing your own classes. pyntc. Hands on Writing reusable code.

Python for network engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697

CCNP ENARSI

5.0(3)

By Systems & Network Training

CCNP (ENARSI) training course description The Implementing Cisco Enterprise Advanced Routing and Services (ENARSI) v1.0 gives you the knowledge you need to install, configure, operate, and troubleshoot an enterprise network. This course covers advanced routing and infrastructure technologies, expanding on the topics covered in the Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.0 course. This course helps prepare for the exam, Implementing Cisco Enterprise Advanced Routing and Services (300- 410 ENARSI), which leads to the new CCNP What will you learn Gain the knowledge you need to install, configure, operate, and troubleshoot an enterprise network. Qualify for professional-level job roles in advance routing and services Prepare for the Implementing Cisco Enterprise Advanced Routing and Services Exam (300-410 ENARSI). CCNP (ENARSI) training course details Who will benefit: Enterprise network engineers, System engineers, System administrators, Network administrators. Prerequisites: CCNP core Duration 5 days CCNP (ENARSI) training course content Course Objectives Configure classic Enhanced Interior Gateway Routing Protocol (EIGRP) and named EIGRP for IPv4 and IPv6 Optimize classic EIGRP and named EIGRP for IPv4 and IPv6 Troubleshoot classic EIGRP and named EIGRP for IPv4 and IPv6 Configure Open Shortest Path First (OSPF)v2 and OSPFv3 in IPv4 and IPv6 environments Optimize OSPFv2 and OSPFv3 behaviour Troubleshoot OSPFv2 for IPv4 and OSPFv3 for IPv4 and IPv6 Implement route redistribution using filtering mechanisms Troubleshoot redistribution Implement path control using Policy-Based Routing (PBR) and IP Service Level Agreement (SLA) Configure Multiprotocol-Border Gateway Protocol (MPBGP) in IPv4 and IPv6 environments Optimize MPBGP in IPv4 and IPv6 environments Troubleshoot MPBGP for IPv4 and IPv6 Describe the features of Multiprotocol Label Switching (MPLS) Describe the major architectural components of an MPLS VPN Identify the routing and packet forwarding functionalities for MPLS VPNs Explain how packets are forwarded in an MPLS VPN environment Implement Cisco Internetwork Operating System (IOS) Dynamic Multipoint VPNs (DMVPNs) Implement Dynamic Host Configuration Protocol (DHCP) Describe the tools available to secure the IPV6 first hop Troubleshoot Cisco router security features Troubleshoot infrastructure security and services Course Outline Implementing EIGRP Optimizing EIGRP Troubleshooting EIGRP Implementing OSPF Optimizing OSPF Troubleshooting OSPF Configuring Redistribution Troubleshooting Redistribution Implementing Path Control Implementing Internal Border Gateway Protocol (IBGP) Optimizing BGP Implementing MP-BGP Troubleshooting BGP Exploring MPLS Introducing MPLS L3 VPN Architecture Introducing MPLS L3 VPN Routing Configuring Virtual Routing and Forwarding (VRF)-Lite Implementing DMVPN Implementing DHCP Introducing IPv6 First Hop Security Securing Cisco Routers Troubleshooting Infrastructure Security and Services Troubleshooting with DNA Center Assurance. Lab outline Configure EIGRP Using Classic Mode and Named Mode for IPv4 and IPv6 Verify the EIGRP Topology Table Configure EIGRP Stub Routing, Summarization, and Default Routing Configure EIGRP Load Balancing and Authentication Troubleshoot EIGRP Issues Configure OSPFv3 for IPv4 and IPv6 Verify the LinkState Database Configure OSPF Stub Areas and Summarization Configure OSPF Authentication Troubleshoot OSPF Issues Implement Routing Protocol Redistribution Manipulate Redistribution Manipulate Redistribution Using Route Maps Troubleshoot Redistribution Issues Implement PBR Configure IBGP and External Border Gateway Protocol (EBGP) Implement BGP Path Selection Configure BGP Advanced Features Configure BGP Route Reflectors Configure MP-BGP for IPv4 and IPv6 Troubleshoot BGP Issues Configure Routing with VRF -Lite Implement Cisco IOS DMVPN Obtain IPv6 Addresses Dynamically Troubleshoot DHCPv4 and DHCPv6 Issues Troubleshoot IPv4 and IPv6 Access Control List (ACL) Issues Configure and Verify Unicast Reverse Path Forwarding (uRPF) Troubleshoot Network Management Protocol Issues: Lab 1 and 2

CCNP ENARSI
Delivered in Internationally or OnlineFlexible Dates
£3,697

Advanced Python for network engineers

5.0(3)

By Systems & Network Training

Advanced Python training course description This course caters to network engineers aiming to enhance both their Python proficiency and network automation skills. Delving deeper into key areas such as netmiko, Nornir, and ncclient, we also focus on automating network testing and validation. Participants gain greater confidence working with Python functions, classes, objects, and error handling. The course additionally introduces more libraries like Scrapli, TTP, pyATS, Genie, pybatfish, and Suzieq, which cover parsing strategies, automation testing, validation, network analysis, observability, and telemetry. The curriculum also encompasses concurrency techniques. What will you learn Write Python modules and functions. Evaluate techniques to parse unstructured data. Use NETCONF filters. Handle Python errors effectively (try, assert…). Use postman. Automate testing and validation of the network. Use scrapli, Genie, batfish and Suzieq. Advanced Python training course details Who will benefit: Network engineers. Prerequisites: Python for network engineers Duration 5 days Advanced Python training course contents Review CLI, NETCONF, RESTCONF, structured versus unstructured data, gNMI and when to use which. PEP 8. Naming conventions. Packages, modules, Classes and methods. The scrapli library. Netmiko versus scrapli. Hands on: scrapli, Dictionaries versus Regular Expressions. Modules and Functions Writing your own modules, containers versus packages, virtual environments. Best practices, calling functions, writing your own functions. Parameters, arguments. Named arguments, dictionaries as arguments. Builtins. Docstrings. Main. __name__, __main__ . Program arguments. Hands on: Getting interfaces, showing interface status using Netmiko and functions. Using dictionaries as arguments. Writing your own modules. Parsing strategies Turning unstructured data into structured data. textfsm, PyATS Genie parser, NAPALM getters, Template Text Parser. Hands on: Genie parser, TTP. Accessing structured data with lists and dictionaries. Classes, objects and Python Python classes in Genie, PyEZ and others . Hands on: studying network automation classes, objects, methods and attributes. Configuration management - more nornir, ncclient, requests Nornir tasks. Nornir results, Nornir functions, Nornir plugins. Nornir processors. YANG, YANG models, pyang. NETCONF hello. Capabilities. Schemas. Filters. Subtrees. XPATH. Exploring available YANG data models. NETCONF and network wide transactions. Asserting NETCONF capabilities. Configuration types. Locking configurations, commits. NETCONF data stores. Netconf-console. RESTCONF differences from NETCONF. URI construction. Postman. More XML and JSON. Git and configuration versions. Hands on: Nornir and Jinja2. Exploring available models, NETCONF filters. Using postman. Python error handling and debugging Context handlers, try, assert, logging, pdb, pytest, unit testing, chatgpt. Hands on: Writing code with each of the error handling methods, investigating what happens on an error. Use chatgpt to debug your code. Python Automation Testing Testing and validation. pyATS, Genie. Testbed file. Genie parse, genie learn, genie diff. Genie conf, Genie ops, Genie SDK, Genie harness. Xpresso. Hands on: Using Genie for state comparisons of the network. Network analysis Batfish, pybatfish, configuration analysis, analysing routing, analysing ACLs. Pandas. Pandas dataframe. Filtering and selecting values of interest. Hands on: Use Batfish to analyse network snapshots, find network adjacencies, flow path analysis. Network observability Suzieq, using docker, using as a package. Sqpoller, suzieq-gui, suzieq-cli, sq-rest-server. Namespaces and seeing devices, network state and Asserts. Time based analysis, snapshots and changes. Hands on: Suzieq: Gathering data from the network, analysing data from the network. Network state assertion. Telemetry gRPC, gNMI. CAP, GET, SET. Subscriptions. Model Driven telemetry. Hands on: Analysing telemetry data with Python. Concurrency asyncio, threads, processes. Nornir concurrency. Scrapli and netmiko concurrency. Hands on: Multiple SSH connections to devices at same time. Scarpli asyncio.

Advanced Python for network engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697