RFID training course description This training course focuses on the technologies used in Radio Frequency Identification (RFID). What will you learn Describe the RFID architecture. Design RFID systems. Evaluate tag types. Recognise common RFID problems. RFID training course details Who will benefit: RFID technologists and system engineers. Prerequisites: RF fundamentals. Duration 2 days RFID training course contents What is RFID? Review of RF basics, what is RFID, RFID history, RFID base system architecture, frequency bands used by RFID, comparison with barcodes. RFID applications Supply chain, asset tracking, theft reduction, retail, access control, tolls. Tags Tag features, types of tag, passive and active, chips, read only, read write, affixing tags, selecting location to affix a tag, tag orientation and location, tag stacking, impact of rate of movement, tag data formats. Interrogators/readers Interrogation zones, interrogator types, antennas, read distance tests, multiple interrogators, synchronisation, dense interrogator environment issues. RFID peripherals. Standards and regulations Global regulatory requirements, regional regulatory requirements, ISO, ETSI, FCC, EPC, safety regulations/issues. Testing and troubleshooting Read rate problems, improperly tagged items, tag failure. RFID system design Antenna types, interference, antenna location and spacing, how many antennas? How many interrogators? tag types, grounding considerations, cabling, site diagrams.
4G training course description This course is designed to give the delegate an understanding of the technologies used within a 3G UMTS mobile network. During the course we will investigate the UMTS air interface and the use of Wideband-Code Division Multiple Access (WCDMA) to facilitate high speed data access, together with HSPA to offer mobile broadband services. We will describe the use of soft handover rather than hard handover procedures and soft capacity sharing. The course includes a brief exploration of the UMTS protocol stack and the use of PDP Context and QoS support features. What will you learn Explain the 3G UMTS architecture. Describe the role of a Drifting & Serving RNC. Explain the use of ARQ & HARQ for mobile broadband. Describe how IMS integrates into the architecture. Describe the use of Media Gateway Controllers. Identify the temporary identities used within 3G UMTS. 4G training course details Who will benefit: Anyone working within the telecommunications area, especially within the mobile environment. Prerequisites: Mobile communications demystified Telecommunications Introduction Duration 2 days 4G training course contents LTE Introduction The path to LTE, 3GPP. LTE to LTE advanced. LTE Architecture The core, Access, roaming. Protocols: User plane, Control plane. Example information flows. Bearer management. Spectrum allocation. LTE technologies Transmission, reception, OFDMA, multiple antenna, MIMO. LTE Air interface Air interface protocol stack. Channels, Resource Grid, cell acquisition. Up and downlink controls. Layer 2 protocols. Cell acquisition Power on, selecting networks and cells. RRC connection. Attach procedure. Mobility management Roaming, RRC_IDLE, RRC_CONNECTED, cell reselection, handover, interoperation with UMTS and GSM networks. Voice and text IMS, QoS, policy and charging.
Advanced HP switches training course description A hands on course covering advanced features of HP switches. The focus of the course is on Layer 3 switching advanced features. Delegates will benefit the most from this course if they can supply us with their own configurations before the course. These configurations can then be used by the trainer in the course. What will you learn Configure and troubleshoot HP layer 3 switching. Configure and troubleshoot OSPF Harden HP switches. Explain the majority of their own configurations (if configurations are supplied to us before the course). Advanced HP switches training course details Who will benefit: Technical staff working with HP switches. Prerequisites: HP switches for engineers. Duration 2 days Advanced HP switches training course content Introduction VLAN review. Tagged and untagged ports. MSTP, PVST, UDLD, BPDU guard. Hands on VLANs, diagnostic tools debug, LLDP, remote port mirroring. L3 switching What are L3 switches? L3 lite, IPv4 and IPv6, routing protocols, routing tables. IP address on VLAN, no ip address on VLAN, connected interfaces, RIP. Hands on Routing between VLANs. Configuring and troubleshooting RIP. VRRP Default gateways, dead router detection, resilience. Hands on Configuring and troubleshooting VRRP. Static routes Why use static routes? Configuring static routes, default routes. OSPF Link state protocols, operation. Router types, LSA types, area 0. Hands on Configuring and troubleshooting OSPF. QoS Layer 2 QoS, 802.1Q, priorities, dscp mapping, rate limiting. Access lists Filtering traffic through the switch, controlling access to the switch, enabling and disabling ACLs, standard ACLs, extended ACLs Security DHCP snooping, ARP protection, STP guards, switch hardening. Summary Walkthrough of delegate configurations.
Advanced Asterisk training course description This 2 day hands-on Asterisk training course covers advanced Asterisk configuration including fault tolerant clusters, upgrading and patching Asterisk servers, firewall and NAT transversal, using databases to store Asterisk data. Practical sessions follow each major section to reinforce the theory. What will you learn Configure advanced Asterisk features. Utilise databases from Asterisk Integrate Asterisk with SIP servers. Build High Availability Asterisk clusters. Maintain and secure Asterisk servers. Advanced Asterisk training course details Who will benefit: Technical staff working with or evaluating Asterisk. Prerequisites: Definitive Asterisk for engineers Duration 2 days Advanced Asterisk training course contents Best Practice Review of basics, Channel best practice, dial plan best practise. Call Centre Features GUI, Asterisk Manager Interface, billing, CDR, advanced IVR, ACD, Vici Dial. Hands on Install Vici-Dial Asterisk and Databases MySQL, LDAP, ODBC, dial plan from a Database, storing CDR in a Database, Hands on Dial plan in MySQL, CDR in MySQL. TDM over Ethernet What is TDMoE, Asterisk to Asterisk TDMoE, Phone Bridge. Hands on * 2 * via TDMoE. High Availability Asterisk HA Linux - Virtual Servers, Fail-over steps, setting up HA Linux, configuring Asterisk for fail-over on HA Linux, Hands on Configure Asterisk HA. Advanced Dial plans Asterisk Gateway Interface, AGI IVR applications, Multiple switches sharing Dial plans, ENUM, DUNDI. Hands on Configure DUNDI. Integration Legacy PBX, SIP Proxys, OpenSER. Hands on Configure SER to work with Asterisk. Asterisk Maintenance Asterisk upgrades, implementing patches, advanced debugging, Security Firewalls, NAT, Asterisk security issues. Hands on Configure Asterisk to work through a Firewall and NAT.
Broadband access training course description ADSL is a broadband technology providing fast Internet access (amongst other applications) over existing telephone lines. This course covers an overview of the DSL family, what ADSL is through to how ADSL works. What will you learn Describe what ADSL is. Describe how ADSL works. Describe the ADSL architecture. Recognise the limitations of ADSL. List the elements required for an ADSL installation. Broadband access training course details Who will benefit: Network engineers and anyone who will be working with ADSL. Prerequisites: Intro to data communications & networking Duration 2 days Broadband access training course contents What is ADSL? Broadband definitions, OSI layer 1, ADSL services, WANS. ADSL features: always on, point to point, Asymmetric, speeds. ADSL benefits, xDSL family, standards, history, example DSL forum documents. ADSL architecture The big picture, The PSTN and telephones, Digital and analogue, PSTN and modems, ADSL vs. modem speeds, Block 1: Customer premises, Block 2: The last mile, Block 3: The exchange, Block 4: the core network. Customer premises Splitters, micro filters, splitter architectures, Splitterless ADSL, ADSL modems, USB, ADSL routers. The local loop ADSL PHY, Some basics, ADSL margins, speed implications, distances, RADSL, Line testing, whoosh tests, line coding, multiple channels, FDM, echo cancellation, Modulation: AM, FM, PM, QAM, QAM constellations, DMT, CAP, Framing, Superframes, fast data mode, interleaved mode, RADSL revisited. The exchange Local exchange ADSL items, DSLAMs, ADSL racks, Contention. The core network The role of the core network, ATM, ATM VPI/VCI, ATM cells, ATM layers, AAL5, RAS, Home gateways. ADSL and the higher layers Layer 2 choices, PPPoA, PPP, CHAP, Layer 4 and above, ADSL and ATM. Installing and configuring ADSL Choosing providers, line activation, hardware requirements, Configuring layer 1 and layer 2, Configuring IP. Summary ITU ADSL standards
TETRA training course description This 2 day training course covers the network architecture required for TETRA. It also looks at the Air Interface, TETRA Functions and Procedures. What will you learn Describe the TETRA Architecture Describe the Air Interface Explain the TETRA Functions Explain the TETRA Procedures TETRA training course details Who will benefit: Anyone working with TETRA. Prerequisites: None. Duration 2 days TETRA training course contents Introduction History of PMR, ETSI development, Tetra function, Tetra markets, Tetra standards, Tetra supplier base, Tetra Release 1, Tetra Release 2. Network Architecture Mobile network Identity, Mobile stations, Base station, Switching & Management, Addresses & Identitie. Air Interface Modulation, TDMA Format, FD, Framin, Burst format, Traffic Channel TCH, Dedicated Channel DCC, Common Control Channel CCC, Signalling Channel SCH, Logical Control mapping LCM, Protocol stack, Voice coded. TETRA Functions Trunked mode operation, User hierarchies, Individual calling, Group calling, Supplementary services, Voice and Data, Data services, Direct mode operation, Tetra WAP, Circuit mode priorities, Circuit mode data, Packet mode data, Discrete and Ambient listening. Automatic vehicle locator. TETRA Procedures MS operational modes, Mobility management, Cell selection, Security & Authentication, Decryption options, Cell setup, Channel assignment, Network management - internal, Network management -external, PSTN Gateway, ISDN Gateway, Control Room Gateway.
XSLT training course description This course has been designed as a follow on course for the XML primer course. The course looks at the use of XSLT in the transforming and styling XML documents. What will you learn Transform and style XML documents using XSLT. XSLT training course details Who will benefit: Anyone working with XSLT. Prerequisites: XML primer Duration 2 days XSLT training course contents Introduction Extensible Stylesheet Language (XSL), transforming and formatting XML. XML refresher The basic rules for building an XML document. An introduction to XSLT The basic concepts of XSLT, xsl:output, xsl:template, xsl:value-of. XML documents as trees How the original XML is transformed into a set of nodes, the general terms for manipulating node trees. Paths (XPath) Use of path matching to select required nodes for transformation. Using templates xsl:apply-templates, xsl:template match, nested templates, xsl:copy , <comment> and <element> , default templates, parameters. Control xsl:if, xsl:choose, xsl:for-each, xsl:sort. Constructing the result tree xsl:output, xsl:attribute, xsl:attribute-set, xsl:comment, xsl:processing-instruction, xsl:text, xsl:value-of, xsl:variable. Combining templates xsl:include, xsl:import, xsl:apply-imports. Transforming to text
ADO.NET training course description This ADO.net training course is designed to enable developers to use the toolset provided with.NET for data access including ADO.net objects, data controls, designers and interoperability with earlier ADO objects. The course is applicable for those using C# or VB.NET with ADO.NET What will you learn Retrieve and manipulate data using Microsoft's ADO.NET library. Work with the ADO.NET object model. Update data, including handling stored procedures, parameters, and return value. Search, sort and filter data. Leverage the power of XML. ADO.NET training course details Who will benefit: Programmers working with ADO.Net. Prerequisites: Effective programming with VB.NET or Concise introduction to C# Duration 2 days ADO.NET training course contents Introducing ADO.Net Traditional Data Access Architecture. ADO.Net Disconnected Data Access Architecture. Different components of ADO.Net. A review of basic SQL queries SQL SELECT Statement. SQL INSERT Statement. SQL UPDATE Statement. SQL DELETE Statement. Common data access tasks with ADO.Net Accessing Data using ADO.Net. Defining the connection string. Defining a Connection. Defining the command or command string. Defining the Data Adapter. Creating and filling the DataSet. A Demonstration Application The Interface. Loading the table. Filling the controls on the Form. Navigating through the records. Updating Data Steps for updating the table. Building the Application. Loading the table and displaying data in the form's controls. Initialising Commands. Adding Parameters to the commands. The ToggleControls() method of our application. Editing (or Updating) Records. Event Handler for the Save Button. Event Handler for the Cancel Button. Inserting Records. Deleting a Record. Using Stored Procedures Sample Stored Procedures. UPDATE Stored Procedure. INSERT Stored Procedure. DELETE Stored Procedure. SELECT Stored Procedure. Using Stored Procedures with ADO.Net.
Description: Hacking becomes very common nowadays. If it comes about the company information, it is one of the most dangerous problems. An ethical hacker helps an organisation to protect their data and increases the security of a computer system. Therefore, the demand for a certified ethical hacker is increasing day by day. The Certified Ethical Hacking - Complete Video Training course will help to meet your need if you want to build a stable career in ethical hacking. The course is taught in two parts. One part deals with the basic knowledge of ethical hacking and helps you to be an ethical hacker while the second section prepares you for the Certified Professional Ethical Hacker (CPEH). The bundle video course teaches the fundamental concepts of ethical hacking including access controls, protocols, cryptography, vulnerability assessments, vulnerability tools of the trade, reconnaissance, covering tracks, malware, buffer overflows, and password cracking, etc. You will also learn to implement the counter-response to protecting your information. In short, the Certified Ethical Hacking - Complete Video Training provides a complete guide to ethical hacking. Assessment: At the end of the course, you will be required to sit for an online MCQ test. Your test will be assessed automatically and immediately. You will instantly know whether you have been successful or not. Before sitting for your final exam you will have the opportunity to test your proficiency with a mock exam. Certification: After completing and passing the course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates can be obtained either in hard copy at a cost of £39 or in PDF format at a cost of £24. Who is this Course for? Certified Ethical Hacking - Complete Video Training is certified by CPD Qualifications Standards and CiQ. This makes it perfect for anyone trying to learn potential professional skills. As there is no experience and qualification required for this course, it is available for all students from any academic background. Requirements Our Certified Ethical Hacking - Complete Video Training is fully compatible with any kind of device. Whether you are using Windows computer, Mac, smartphones or tablets, you will get the same experience while learning. Besides that, you will be able to access the course with any kind of internet connection from anywhere at any time without any kind of limitation. Career Path After completing this course you will be able to build up accurate knowledge and skills with proper confidence to enrich yourself and brighten up your career in the relevant job market. Overview Overview FREE 00:35:00 Reconnaissance Reconnaissance 00:25:00 Protocols Protocols 01:25:00 Windows Hacking Windows Hacking 01:19:00 Attacking Web Technologies Attacking Web Technologies 00:56:00 Pen Testing Wireless Networks Pen Testing Wireless Networks 01:34:00 Security Fundamentals Security Fundamentals FREE 00:51:00 Access Controls Access Controls 00:33:00 Protocols Protocols 00:36:00 Cryptography Cryptography 00:52:00 Why Vulnerability Assessments? Why Vulnerability Assessments? 00:36:00 Vulnerability Tools of the Trade Vulnerability Tools of the Trade 00:10:00 Output Analysis and Reports Output Analysis and Reports 00:13:00 Reconnaisance, Enumeration and Scanning Reconnaisance, Enumeration and Scanning 00:51:00 Gaining Access Gaining Access 00:31:00 Maintaining Access Maintaining Access 00:17:00 Covering Tracks Covering Tracks 00:18:00 Malware Malware 00:28:00 Buffer Overflows Buffer Overflows 00:22:00 Password Cracking Password Cracking 00:33:00 Mock Exam Mock Exam - Certified Ethical Hacking - Complete Video Training 00:20:00 Final Exam Final Exam - Certified Ethical Hacking - Complete Video Training 00:20:00 Order Your Certificates and TranscriptsOrder Your Certificates and Transcripts Order Your Certificates and Transcripts 00:00:00
Overview This comprehensive course on Digital Forensics for Cyber Professionals will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Digital Forensics for Cyber Professionals comes with accredited certification, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? You may have to take a quiz or a written test online during or after the course. After successfully completing the course, you will be eligible for the certificate. Who is This course for? There is no experience or previous qualifications required for enrolment on this Digital Forensics for Cyber Professionals. It is available to all students, of all academic backgrounds. Requirements Our Digital Forensics for Cyber Professionals is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 11 sections • 35 lectures • 05:37:00 total length •Course Overview: 00:06:00 •Lab - Installing CSI Linux: 00:13:00 •Lab - Creating a Kali Live (Forensic Mode) VM Using VirtualBox: 00:06:00 •Lab - Create a Virtual Install Kali Image Using VirtualBox: 00:07:00 •Lab - Create Virtual Install of Windows 10 Using VirtualBox: 00:08:00 •Install Additional Tool Using Katoolin3: 00:10:00 •Lab - Simulate Creating a Disk Image for a Forensic Analysis: 00:11:00 •Lab - Examining a forensic Disk Image Using Autopsy: 00:12:00 •Lab -Digital Forensics Using Autopsy Part I: 00:11:00 •Lab - Digital Forensics Using Autopsy Part II: 00:07:00 •Lab - Installing the WebMap-Nmap Dashboard: 00:12:00 •Lab - Conducting OSINT Using CSI Linux Investigator: 00:08:00 •Lab - Find Social Media Accounts Using Sherlock: 00:07:00 •Attaching an External USB Device in Kali: 00:07:00 •Lab - Memory Forensics Using the Volatility Framework: 00:18:00 •Lab - Acquiring a Forensic Copy of the Windows Registry: 00:15:00 •Lab - Analyzing the Windows Registry for Evidence: 00:14:00 •Lab - Preparing CSI Investigator to Use Shodan: 00:05:00 •Lab - Using Shodan to Find Vulnerable Devices: 00:14:00 •Lab - Using Shodan to Search for Vulnerable Databases: 00:08:00 •Lab - Using the EXIFtool to Read and Write EXIF Tags: 00:11:00 •Using the EXIFtool to Read and Write EXIF Tags: 00:10:00 •Overview of Wireshark 3.2: 00:11:00 •Wireshark Capture Options: 00:07:00 •Wireshark Toolbar Icons: 00:04:00 •Lab - Capturing a 3-way TCP Handshake Using Wireshark: 00:05:00 •Lab - Installing a Wireless Adapter in Kali: 00:09:00 •Lab - Hacking a Wireless Network Using Kali Linux: 00:14:00 •Capturing Wireless Traffic Using Wireshark: 00:05:00 •Lab - CTF Lab Build for HA: Forensics: 00:11:00 •Lab - Capture flag #1: 00:12:00 •Lab - Capture flag #2: 00:10:00 •Lab - Capture flag #3: 00:20:00 •Lab - Capture flag #4: 00:09:00 •Assignment - Digital Forensics for Cyber Professionals: 00:00:00