• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1420 Network & Security courses in Dunstable delivered Online

BGP demystified

5.0(3)

By Systems & Network Training

BGP training course description A study of BGP for non engineers working in the Internet. The course starts with a review of the basics of routers and routing tables and then moves on to a simple overview of how BPG works with a focus on BGP metrics influencing the route traffic takes through the Internet. Hands on with routers follow the major sessions to reinforce the theory. Note these hands on sessions are more demonstrations by the trainer but some can be followed along and done by delegates (e.g. looking at Internet routing tables.) What will you learn Explain how routing tables influence Internet traffic. Describe how BGP works. Explain the methods BGP can use to influence Internet traffic. Use traceroute, peeringdb, route collectors and looking glasses to analyse traffic flows. Explain the difference between bi lateral and multilateral peering using a route server. BGP training course details Who will benefit: Non technical staff wishing to know more about BGP. Prerequisites: None. Duration 1 day BGP training course contents Networks, routers and routing tables What is a network, what is a router, routing tables, static routes, routing protocols. When an ISP uses static routes and when they use BGP. IP addresses, subnet masks, groups of IP addresses. IPv6. Hands on: Showing a full routing table. Seeing traceroute being used. Basic BGP What's BGP? BGP versus other routing protocols, ASs, AS numbers. RIPE database, peeringdb. Hands on: Finding AS numbers. Showing simple BGP configuration and routing tables in an EVENG example. How BGP works Simple walk through of BGP incremental updates and how routes change when links go down. Hands on: Showing packets and route changes when a link goes down/comes up. BGP path selection Transit, peering, routing policy and route filtering. Longest matching rule in routing tables, route selection order, Local preference, AS prepend, MEDs. Hands on: Seeing BGP influencing traffic. Looking at peering policies in RIPE and peeringdb. Route servers What are route servers? LINX route servers, route server policy control and communities, What are route collectors, Looking glasses. Hands on: Seeing the LINX route server details in peeringdb, using a looking glass.

BGP demystified
Delivered in Internationally or OnlineFlexible Dates
£797

VoIP & IP telephony demystified

5.0(3)

By Systems & Network Training

VoIP and IP Telephony training course description A concise overview course for management covering voice communications using IP networks. The course focuses on how VoIP works at a simplified level enabling delegates to recognise the key decisions to be made when implementing VoIP. What will you learn Describe the key buzzwords used in the VoIP arena. Explain how VoIP and IPT work (at a simplified level). Describe the issues of providing a converged architecture. Recognise the key decisions to be made when implementing VoIP VoIP and IP Telephony training course details Who will benefit: Anyone, although the course is particularly aimed at non-technical personnel needing some knowledge of VoIP. Prerequisites: Network fundamentals Duration 1 day VoIP and IP Telephony training course contents Introduction What is VoIP, brief review of IP, brief review of telephones, voice and signalling. VoIP issues Bandwidth, Delay, Jitter. Voice coding and compression, packetising voice, comparison of techniques, MOS.IP performance and QoS. The need for QoS, prioritising voice. Architectures Hard phones, soft phones, video phones, desktop, backbone, gateway, integrating analog phones and PCs, carriers, Softswitches. VoIP protocol stack RTP, RTCP. H.323 vs SIP, other signalling protocols. H.323 Architecture, Call setup, Gatekeepers. SIP Comparison with H.323, SIP proxy, proxy servers, redirect servers, location servers. MGCP and MegaCo Carrier networks, PSTN breakout, SS7 gateways, MGCP, Megaco. IP PBXs Integrating IP into 'normal' PBXs, IP PBXs, Asterisk. UM, other telephony applications.

VoIP & IP telephony demystified
Delivered in Internationally or OnlineFlexible Dates
£797

WANs demystified

5.0(3)

By Systems & Network Training

WANs training course description A concise overview course covering Wide Area Networks with particular emphasis on the WAN options available including the use of the Internet. What will you learn Choose and evaluate WAN technologies. Recognise the role of service providers. Describe the benefits of VPNs. Describe how the Internet can be used as a WAN. Describe the equipment needed to connect LANS to WANS. List the speeds of various WAN technologies. WANs training course details Who will benefit: Anyone, although the course is particularly aimed at non-technical personnel needing some knowledge of WANS. Prerequisites: Network fundamentals Duration 1 day WANs training course contents WANS WAN architecture, Common WAN terms, Core vs access, service providers, relationship with 7 layer model, WAN equipment, how to choose a WAN. Layer 1 Copper, phone lines, fibre, coaxial, satellite, wireless. Cabling to the building, CPE cabling, interfaces. Layer 2 Dial up vs. Dedicated vs. packet switched networks and when to use them. Packet switching vs. circuit switching. Point to point and point to multipoint. Dialup access technologies Modems, ISDN, BRI, PRI. Access with dedicated lines XDSL, leased lines. WAN services X.25, SMDS, Frame Relay, CIR, ATM, Internet, MANS, dark fibre and other services. Case study: Selecting WAN technologies. Service provider technologies MPLS, SDH, WDM, DWDM. Routers Network addressing, default gateways, routing tables, routing protocols. Internet architecture Service providers, ISPs, private peering, public peering, core WANs in the Internet. VPNs Private networks, public networks, What are VPNs?, benefits of VPNs, tunnelling, encryption, IPSec. Case study: Specifying WAN connectivity.

WANs demystified
Delivered in Internationally or OnlineFlexible Dates
£797

IPv6 demystified

5.0(3)

By Systems & Network Training

IPv6 demystified training course description IPv6 is the next generation Internet Protocol. This course looks at the benefits and features of the new protocol along with an assessment of the likely impact of the protocol and migration strategies. What will you learn Explain the benefits and disadvantages of IPv6 Recognise the impact of IPv6 on existing networks. Plan migration strategies for IPv6 Integrate IPv6 and IPv4 networks IPv6 demystified training course details Who will benefit: Sales staff, managers and other non technical staff. Prerequisites: None. Duration 1 day IPv6 demystified training course contents What's wrong with IPv4 IPv4 works, NAT, carrier grade NAT, addresses running out. Current state of IPv4 addressing. Why IPv6 Reasons for IPv6, what is IPv6? the origins of IPv6. IPv6 addressing IPv6 address allocation, address format, prefixes, address categories, scope zones, global unicast, link local. Plug and play. Migration techniques A migration plan, Dual stack, DNS, tunnelling, tunnel establishment, tunnel brokers, Tunnel types. IPv6 steps How IPv6 can affect the following: Firewalls, routers, switches!, DNS, Web services, Email. Current state of IPv6 IPv6 release 1996, 3G, World IPv6 day 2011, World IPv6 launch 2012.

IPv6 demystified
Delivered in Internationally or OnlineFlexible Dates
£797

Peering demystified

5.0(3)

By Systems & Network Training

Peering demystified training course description A concise overview course covering The Internet and peering. Particular emphasis is placed on the structure of the Internet, how IXs benefit the Internet, IX architectures, peering and the technical buzzwords behind the IX services. What will you learn Describe the structure of the Internet Explain the role of RIPE, ARIN and IXs in the Internet Explain how IXs connect ISPs and the benefits of using IXs. Describe peering from a technical perspective including the role of BGP and AS's. Peering demystified training course details Who will benefit: Non technical staff working for Internet companies. Prerequisites: None. Duration 1 day Peering demystified training course contents IP and routers IP as glue. What is a router? How routers join networks, benefits and disadvantages of routers, default gateways, routing tables, routing protocols. Addressing IP address format, rules of IP addressing, where to get IP addresses. Subnetting and groups of IP addresses. The Internet What is the Internet? The big picture, IP basics, registering IP addresses, DNS and registering domain names, whois, The IAB, IANA, ICANN, RIPE and other Internet organisations. ISPs Top ISPs, Tier 1, Tier 2 and Tier 3 ISPs, backbone providers, circuit providers, content providers, virtual ISPs, the internal network of ISPs. Customer connections to ISPs (DSL, Leased lines, MPLS…) ISP to ISP connections: Peering points Public peering versus private peering, NAPs, Internet Exchanges, Metropolitan Area Exchanges, LINX, other major peering points, the geography of the Internet. BGP and ASNs. How to peer. IRRs. IX architecture Ethernet switching.

Peering demystified
Delivered in Internationally or OnlineFlexible Dates
£797

Network automation demystified

5.0(3)

By Systems & Network Training

Network automation training course description This course concentrates on the technical side of tools and languages for network DevOps rather than the soft skills. These tools include Python, Ansible, Git and NAPALM By the end of the course delegates should be able to recognise the tools that they can use to automate their networks and be able to use the knowledge gained to feel confident approaching network automation. What will you learn Describe network DevOps. Choose network automation tools. Explain the role of various network automation technologies including: Python Ansible Git NAPALM Network automation training course details Who will benefit: Those wishing to learn about the tools of network automation. Prerequisites: Introduction to data communications. Duration 1 day Network automation training course contents What is DevOps and network automation Programming and automating networks, networks and clouds, AWS, OpenStack, SDN, DevOps for network operations. Unit testing. Hype vs reality. Benefits and features. Network monitoring and troubleshooting Traditional methods, SNMP. Netflow and xflow. Traditional automation. Streaming telemetry. Event driven automation. gRPC, Protocol buffers. Configuration management Catch 22 and initial configuration. ZTP, POAP. Traditional automation. TFTP. Ansible vs the rest (chef, salt, puppet). Jinja2 and templating. How ansible works. Network programmability Programming languages. Linux, shell scripting. Python vs the rest. Off box vs on box automation. Python network libraries Sockets pysnmp, ncclient, paramiko, netmiko, pyez, NAPALM. APIs Proprietary APIs, CLI, NETCONF, RETCONF. YANG, XML, YAML, JSON. Other tools Git, GitHub, Jenkins, JIRA and others.

Network automation demystified
Delivered in Internationally or OnlineFlexible Dates
£797

Git and GitHub for engineers

5.0(3)

By Systems & Network Training

Git and GitHub course description This course covers version control using Git but also using GUI frontends such as GitHub. The course starts with a tour of using GitHub but then quickly moves onto using git from the command line. All elements of git version control are covered including creation of repositories, adding and editing files, branches and merging, rewriting history and handling merge conflicts. Hands on sessions are used throughout the course. What will you learn Install git. Add and edit files in a repository. Create branches and perform merges. Handle merge conflicts. Git and GitHub course details Who will benefit: Anyone requiring version control. Prerequisites: None. Duration 1 day Git and GitHub course contents Introduction Version control for software, configuration management. Other uses. Version control systems. What is git? What is GitHub? Distributed version control. Comparison of git to other systems. GitHub Getting started, creating an account, account types, repositories, access control, bug tracking, feature requests. Alternatives to GitHub. Hands on Using GitHub. Installing git Linux install, Windows install, git config, levels, user.name, user.email. Hands on Installing and configuring git. Creating repositories git clone, github, git remote, git init. Hands on Creating a repository. Adding and editing files Staging and adding, git add, git commit, git push, git pull, git status, git log. Two stage process. File states: Working, staging, history, untracked. git mv, git rm, .gitignore, git diff, git difftool. Undoing changes. Hands on Adding and editing files in git. Branching and merging What is a branch, HEAD label, master branch, git branch, git checkout. Feature branches, bux fix branches, integration branches, production branches, fast forward merges, 3 way merges, git merge, git status, git log, tags. Hands on Making branches, merging. Rewriting history git reset, git rebase, advantages. Hands on Reset commits, rebase a branch. Merge conflicts What is a conflict, conflict resolution process, resolving merges, rebasing, git log, merge tools, configuring merge tools, avoiding conflicts. Hands on Merge resolution.

Git and GitHub for engineers
Delivered in Internationally or OnlineFlexible Dates
£797

Learning Computer and Internet Level 2

4.9(27)

By Apex Learning

Course Overview: About 87% of global consumers use at least one computer or device to access the internet daily. Mastering the essentials of computer and the internet is crucial in today’s digital age. The Learning Computer and Internet Level 2 course provides an in-depth exploration of computer systems, internet functionalities, and software applications, offering you the knowledge to navigate the digital world with ease. This course covers a wide range of computer-related topics, from fundamental operating systems and hardware to advanced concepts like cybersecurity and data protection. With engaging, interactive content, you’ll gain practical skills and insights that enhance your computer proficiency and digital competence. Embark on an enlightening journey through the digital landscape. Enrol in Learning Computer and Internet Level 2 today and elevate your computer skills to thrive in a connected world! Key Features of the Course: FREE Learning Computer and Internet Level 2 CPD-accredited certificate Get a free student ID card with Learning Computer and Internet Level 2 training (£10 applicable for international delivery) Lifetime access to the Learning Computer and Internet Level 2 course materials The Learning Computer and Internet Level 2 program comes with 24/7 tutor support Get instant access to this Learning Computer and Internet Level 2 course Learn Learning Computer and Internet Level 2 training from anywhere in the world The Learning Computer and Internet Level 2 training is affordable and simple to understand The Learning Computer and Internet Level 2 training is entirely online Who is This Course For? This course is designed for individuals seeking to build upon foundational knowledge of computer and the internet. Whether a student, professional, or enthusiast, this course will elevate your proficiency. Learning Outcome Grasp the intricacies of various operating systems and their configurations. Understand the diverse range of applications and their functionalities. Navigate through storage solutions, network components, and software tools. Comprehend the concept of licensing and its implications. Become adept in word processing, spreadsheets, and creating presentations. Learn the terminologies of networking, ensuring smooth connectivity. Safeguard yourself online and understand the fundamentals of digital security. Acquire skills to use browsers, e-mails, and collaborative platforms effectively. Why Enrol in This Course: Enrolling in "Learning Computer and Internet Level 2" is your gateway to a world of opportunities and possibilities. You will develop essential skills in high demand across various industries, making you a valuable asset in the job market. Our course is top-reviewed, recently updated to reflect the latest trends, and aligns with the evolving digital landscape, ensuring you stay ahead in the digital race. Requirements: Enrolling in this Learning Computer and Internet Level 2 course requires a basic understanding of computer usage. No prior technical knowledge is needed, making it accessible to beginners and those looking to refresh their skills. Career Path: Upon completing this Learning Computer and Internet Level 2 course, you'll be well-equipped to pursue various professions in the digital domain. Here are seven course-related professions in the UK, along with their average salaries: IT Support Specialist: £25,000 - £40,000 per year Data Entry Clerk: £18,000 - £25,000 per year Digital Marketing Assistant: £20,000 - £30,000 per year Office Administrator: £18,000 - £25,000 per year Cybersecurity Analyst: £30,000 - £50,000 per year Web Developer: £25,000 - £45,000 per year Database Administrator: £30,000 - £50,000 per year Certification: Upon completing the Learning Computer and Internet Level 2 course, learners will be awarded a CPD certificate, validating their enhanced knowledge of computer and the Internet. Course Curriculum 6 sections • 81 lectures • 22:23:00 total length •What is an Operating System: 00:48:00 •Configuring the Operating System: 00:06:00 •What is an Application: 00:10:00 •Using Control Panel: 00:18:00 •Hardware and Peripherals: 00:07:00 •Storage: 00:12:00 •Connectivity Devices: 00:05:00 •Network Components: 00:09:00 •Software and Concepts: 00:11:00 •Licensing: 00:06:00 •Using Software: 00:07:00 •Software Tools: 00:10:00 •Software: 00:14:00 •Hardware, Devices, and Peripherals: 00:05:00 •Backup and Restore: 00:03:00 •Application Features: 01:21:00 •Working with Word Processing: 00:44:00 •Working with Spreadsheets: 00:49:00 •Making a Presentation: 01:08:00 •Databases: 00:34:00 •Collaboration: 00:03:00 •Course Introduction: 00:02:00 •Web Browsers: 00:46:00 •Networking Terminology: 00:35:00 •E-mail: 00:38:00 •Communicating in the Modern World: 00:14:00 •Protecting Yourself: 00:15:00 •Web Searching: 00:31:00 •Protecting Yourself: 00:31:00 •Identify Components of a Personal Computer IPU: 00:08:00 •Sign In to Windows 8: 00:07:00 •Signing In to Windows 8 and Managing Tiles: 00:08:00 •Navigate the Start Screen: 00:18:00 •Using the Account ID Menu: 00:02:00 •Access and Identify the Charms: 00:03:00 •Viewing the Charms: 00:02:00 •Modern Apps and Common Navigation Features: 00:03:00 •Navigating a Modern App: 00:07:00 •Multitasking with Apps: 00:05:00 •Working with Multiple Apps: 00:05:00 •Navigate the Desktop IPU: 00:07:00 •Navigating The desktop: 00:07:00 •Manage Files and Folders with File Explorer IPU: 00:09:00 •Managing Files and Folders: 00:15:00 •Elements of a Desktop Window: 00:12:00 •Working with the Elements of a Desktop Window: 00:10:00 •Creating and Modifying Files with Wordpad: 00:14:00 •Printing a Document: 00:05:00 •Navigate Internet Explorer 10: 00:08:00 •Navigating Internet Explorer 10: 00:09:00 •Browse the Web: 00:12:00 •Using Internet Explorer and Share: 00:08:00 •Customize the Start Screen: 00:07:00 •Creating Groups on the Start Screen: 00:03:00 •Changing PC Setting: 00:07:00 •Customize the Desktop IPU: 00:09:00 •Personalizing the Desktop: 00:11:00 •Set Privacy Levels and Passwords: 00:05:00 •Changing Your Password: 00:05:00 •Use Windows Defender IPU: 00:05:00 •Changing Windows Defender Settings: 00:06:00 •Store and Share Files with SkyDrive: 00:03:00 •What Makes Windows 10 Different?: 00:14:00 •Primary Feature Overview: 00:14:00 •Navigating and Using Windows 10: 00:36:00 •Course Overview: 00:13:00 •Types of Security Threats: 00:29:00 •Social Engineering: 00:30:00 •Identity Theft: 00:29:00 •Data Classification: 00:28:00 •Types of Classifications: 00:18:00 •Protecting Your Digital Information: 00:45:00 •Password Management: 00:13:00 •Malware: 00:17:00 •Software Detection: 00:28:00 •Security from End-to-End: 00:26:00 •Secure E-mail Use: 00:21:00 •Secure Web Browsing: 00:29:00 •Piracy: 00:16:00 •Security Policies: 00:18:00 •Moving Forward: 00:12:00

Learning Computer and Internet Level 2
Delivered Online On Demand23 hours
£9.99

ITIL Foundation

4.8(9)

By Skill Up

Want to learn how to deliver high-quality IT services that meet the needs of your business and customers? Then take the ITIL Foundation course.

ITIL Foundation
Delivered Online On Demand8 hours 29 minutes
£25

VMware NSX: Install, Configure, Manage [V4.x]

By Nexus Human

Duration 5 Days 30 CPD hours Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture and main components of NSX Explain the features and benefits of NSX Deploy the NSX Management cluster and VMware NSX Edge™ nodes Prepare VMware ESXi™ hosts to participate in NSX networking Create and configure segments for layer 2 forwarding Create and configure Tier-0 and Tier-1 gateways for logical routing Use distributed and gateway firewall policies to filter east-west and north-south traffic in NSX Configure Advanced Threat Prevention features Configure network services on NSX Edge nodes Use VMware Identity Manager™ and LDAP to manage users and access Explain the use cases, importance, and architecture of Federation This five-day, fast-paced course provides comprehensive training to install, configure, and manage a VMware NSX© environment. This course covers key features and functionality offered in the NSX 4.0.0.1 and NSX 4.0.1 releases, including the overall infrastructure, logical switching, logical routing, networking and security services, firewalls and advanced threat prevention, and more. Course Introduction Introductions and course logistics Course objectives VMware Virtual Cloud Network and VMware NSX Introduce the VMware Virtual Cloud Network vision Describe the NSX product portfolio Discuss NSX features, use cases, and benefits Explain NSX architecture and components Explain the management, control, data, and consumption planes and their functions. Preparing the NSX Infrastructure Deploy VMware NSX© ManagerTM nodes on ESXi hypervisors Navigate through the NSX UI Explain data plane components such as N-VDS/VDS, transport nodes, transport zones, profiles, and more Perform transport node preparation and configure the data plane infrastructure Verify transport node status and connectivity Explain DPU-based acceleration in NSX Install NSX using DPUs NSX Logical Switching Introduce key components and terminology in logical switching Describe the function and types of L2 segments Explain tunneling and the Geneve encapsulation Configure logical segments and attach hosts using NSX UI Describe the function and types of segment profiles Create segment profiles and apply them to segments and ports Explain the function of MAC, ARP, and TEP tables used in packet forwarding Demonstrate L2 unicast packet flow Explain ARP suppression and BUM traffic handling NSX Logical Routing Describe the logical routing function and use cases Introduce the two-tier routing architecture, topologies, and components Explain the Tier-0 and Tier-1 gateway functions Describe the logical router components: Service Router and Distributed Router Discuss the architecture and function of NSX Edge nodes Discuss deployment options of NSX Edge nodes Configure NSX Edge nodes and create NSX Edge clusters Configure Tier-0 and Tier-1 gateways Examine single-tier and multitier packet flows Configure static routing and dynamic routing, including BGP and OSPF Enable ECMP on a Tier-0 gateway Describe NSX Edge HA, failure detection, and failback modes Configure VRF Lite NSX Bridging Describe the function of logical bridging Discuss the logical bridging use cases Compare routing and bridging solutions Explain the components of logical bridging Create bridge clusters and bridge profiles NSX Firewalls Describe NSX segmentation Identify the steps to enforce Zero-Trust with NSX segmentation Describe the Distributed Firewall architecture, components, and function Configure Distributed Firewall sections and rules Configure the Distributed Firewall on VDS Describe the Gateway Firewall architecture, components, and function Configure Gateway Firewall sections and rules NSX Advanced Threat Prevention Explain NSX IDS/IPS and its use cases Configure NSX IDS/IPS Deploy NSX Application Platform Identify the components and architecture of NSX Malware Prevention Configure NSX Malware Prevention for east-west and north-south traffic Describe the use cases and architecture of VMware NSX© Intelligence? Identify the components and architecture of VMware NSX© Network Detection and Response? Use NSX Network Detection and Response to analyze network traffic events. NSX Services Explain and configure Network Address Translation (NAT) Explain and configure DNS and DHCP services Describe VMware NSX© Advanced Load Balancer? architecture, components, topologies, and use cases. Configure NSX Advanced Load Balancer Discuss the IPSec VPN and L2 VPN function and use cases Configure IPSec VPN and L2 VPN using the NSX UI NSX User and Role Management Describe the function and benefits of VMware Identity Manager? in NSX Integrate VMware Identity Manager with NSX Integrate LDAP with NSX Identify the various types of users, authentication policies, and permissions Use role-based access control to restrict user access Explain object-based access control in NSX NSX Federation Introduce the NSX Federation key concepts, terminology, and use cases. Explain the onboarding process of NSX Federation Describe the NSX Federation switching and routing functions. Describe the NSX Federation security concepts.

VMware NSX: Install, Configure, Manage [V4.x]
Delivered OnlineFlexible Dates
Price on Enquiry