SS7 training course description An Introduction to Signalling System No 7. Covering the terminology, technology and topology of the Core Signalling System. What will you learn Describe the evolution of SS7. Identify the component parts of SS7. Describe the basic method of operation of SS7. Describe a basic call set-up and clear within SS7. SS7 training course details Who will benefit: Network/Systems engineers Operators/Planners. Prerequisites: Telecommunications Introduction Duration 2 days SS7 training course contents Introduction Digital Signalling, CAS, CAS Applications, CCS, Layer 1, Layer 2 (HDLC), Layer 3, Evolution of SS7, Common SS7 functions. Physical Functionality SS7 Topology, Service Switching Point (SSP), Signalling Transfer Point (STP), Service Control Point (SCP), Database Types, CMSDB, NP, LIDB, HLR, VLR, Signalling Modes, Link Types, Further Redundancy, Linksets, Signalling Routes. Addressing Addressing in SS7, E.164, ANSI PCs, ITU-T (CCITT) PCs, Connecting Networks (ISPs/NSPs). Message Transfer Part SS7 Protocol Stack, MTP Level 1, MTP Level 2, Signalling Units, Flow Control, Fill In Signalling Unit (FISU), Link Status Signalling Unit (LSSU), Message Signalling Unit (MSU), MTP Level 3. Application and User Parts Signalling Connection Control Part (SCCP), Transaction Capabilities Application Part (TCAP), Telephone User Part, BTUP, ISDN User Part (ISUP), ISUP - Supplementary Services, ISUP - Call, Call Set-up over SS7. The Intelligent Network Function of IN, Evolution of IN, Conceptual Model, Target Services and Service Features, Independent Building Blocks.
Oracle Database 12c Admin training course description This Oracle Database 12c Administration course is designed to give the Oracle database administrator practical experience in administering, monitoring, tuning and troubleshooting an Oracle 12c database. Database administrators will gain an understanding of the architecture and processes of the Oracle database server. They will be able to ensure the integrity and availability of a company's data within the Oracle environment. They will be able to monitor the performance of the database, allocate resources with the Resource Manager and Schedule jobs. What will you learn Administer an Oracle database instance. Monitor an Oracle database. Configure the Oracle network environment. Create and manage database storage structures. Manage users, profiles, privileges and roles. Manage undo data and temporary segments. Monitor and resolve lock conflicts. Maintain database security. Implement database auditing. Monitor the performance of the Database. Load and unload data. Use the job scheduler. Configure a database for backup and recovery. Oracle Database 12c Admin training course details Who will benefit: This Oracle Database 12c Administration course is for anyone who needs to administer, monitor and support an Oracle 12c database. Prerequisites: An understanding of relational database concepts and good operating system knowledge. They should have attended the Oracle SQL course or have a good working knowledge of Oracle SQL. Knowledge of the usage of PL/SQL packages is highly recommended. Duration 5 days Oracle Database 12c Admin training course contents Introduction to Oracle database 12c Overview of the Oracle database 12c, Overview of the Oracle Cloud, Relational database concepts, database administration tasks. Oracle Database 12c Architecture Overview of the Oracle database architecture, The Oracle database instance, Oracle Database memory structures, Process architecture and structures, Server and client processes, The Oracle database storage architecture, Connect to the Oracle database instance. Administer a database instance Administrative tools available to a DBA, Use SQL*Plus in Oracle to manage a database instance, Use SQL Developer to manage a database instance, Administer the database using Enterprise Manager (EM), Overview of the Enterprise Manager framework, Access Enterprise Manager Database Express, The Enterprise Manager Database Express Home Page, Enterprise Manager Cloud Control, Initialization parameter files. Configure the Oracle network environment Overview of network configuration, Oracle Net Listener configuration and management, Oracle Net naming methods, Tools for configuring and managing the Oracle network, Using the Net Configuration Assistant, Configure client connections with Net Manager, View listener configuration, Start and stop the Oracle listener, Use TNSPING to test Oracle Net connectivity, Connect to the database, Configure Net Services with Enterprise Manager. Storage Structures Overview of data storage, The database block, Overview of tablespaces and datafiles, Use Enterprise Manager to view the storage structure of the database, Create and alter tablespace commands, Temporary tablespaces, Create and manage datafiles, Use OMF, Drop tablespaces and datafiles. Manage users Predefined database administration accounts, User accounts, Create a user account, User authentication, Change a user's password, Manage a user account, Drop a user account, Monitor user information, Terminate user sessions. Manage profiles and resources Overview of user profiles, Profile resource parameters, Create profile command, Manage passwords with profiles, Control resource usage with profiles, Maintain profiles. Manage privileges Database access, Oracle supplied roles, System and object level privileges, The grant and revoke commands, Create, modify and drop roles, Use predefined roles. Database auditing Overview of database security, Overview of database auditing, Security compliance, Standard auditing, Unified audit trail, Separation of audit responsibilities with the AUDIT_ADMIN and AUDIT_VIEWER roles, Configure the audit trail, Specify audit options. Data concurrency and lock conflicts Levels of locking in Oracle, Methods used to acquire locks, Data concurrency, Possible causes of contention, DML locks, Prevent locking problems, Detect lock contention, Resolve conflicts. Undo management Undo data overview, Monitor and administer undo, Configure undo retention, Switch undo tablespaces, Specify the retention period, Guarantee undo retention, Retention period for flashback queries, View undo space information, Use the undo advisor, Size the undo tablespace, Alter an undo tablespace to a fixed size. Proactive database management Database Maintenance, View the alert log, The Automatic Workload Repository, Statistic levels, The Automatic Database Diagnostic Monitoring, Monitor an Oracle database, Use the Advisors, Set up notification rules/ Performance management Tuning information sources, Performance monitoring, Tuning activities, Performance planning, Instance tuning, Performance tuning methodology, Performance tuning data, Monitoring performance, Managing memory. SQL tuning SQL tuning, The Oracle Optimizer, SQL Plan directives, Adaptive execution plans, SQL Advisors, Automatic SQL Tuning results, Implement automatic tuning recommendations , SQL Tuning Advisor. Moving data Create directory objects , Data Pump architecture, Data Pump data dictionary views, Data Pump interactive mode, Data Pump API, Use Data Pump to export and import data, Overview of SQL Loader, Command line parameters, Record filtering, Control file keywords, Datafiles, SQL Loader data paths, External Tables. Automate tasks with the scheduler Introduction to the Scheduler, Access Rights, Scheduler components and workflow, Create a Job, Job Classes, Use time based, event based schedules, Create an event based schedule. Managing resources with Resource Manager Overview of the Database Resource Manage, Use the Resource Manager, Create Resource Plans, The default maintenance resource manager plan, Create Resource Plan Directives, Allocate resources for Resource Plans. Manage space Overview of space management, Block space management within segments, Segment types, Allocate extents, Allocate space, Row chaining and migration, Create tables without segments. Backup and recovery configuration Oracle backup solutions, Oracle suggested backup strategy, Overview of database backup, restore and recover, Flashback technology, Types of failure ,Instance recovery, Tune instance recovery, The MTTR Advisor, Media failure, Configure a database for recoverability Oracle support The Enterprise Manager Support Workbench, Register for security updates, Work with Oracle Support, My Oracle Support integration, Log Service Requests, Manage patches, Apply a patch
CWDP training course description The CWDP course consists of instructor-led training applicable to the design of wireless LANs using the latest technologies including 802.11n and 802.11ac. The course goes in-depth into the design process and provides attendees with the knowledge needed to plan, deploy and test modern 802.11-based networks. It also prepares students for the CWDP examination. Students who complete the course will acquire the necessary skills for preparing, planning performing and documenting site surveys and wireless LAN design procedures. What will you learn Design enterprise WiFi networks. Select appropriate antennas and Access points. Perform site surveys. Describe the security requirements required for enterprise networks. Test, validate and troubleshoot installations. CWDP training course details Who will benefit: Anyone looking for the skills to analyze, troubleshoot, and optimize any enterprise level Wi-Fi network, no matter which brand of equipment your organization deploys. Anyone looking to become a CWNP. Prerequisites: CWNA Duration 5 days CWDP training course contents WLAN design overview Importance of good design, Impact of bad design, Design process, Design skills, Design toolkit. Requirements analysis Pre-planning, Customer interaction, Requirements gathering, Discovering existing systems, Documenting the environment, Defining constraints, Creating documentation. Designing for clients and applications Client Device types, Application types, Application-specific design, High density design issues. Designing for industry Standard corporate networks, Industry-specific designs, Government, Healthcare, Hospitality, Retail, Public hotspots, Transportation, Mobile offices, Outdoor and mesh, Remote networks and branch offices, Last-miles / ISP and bridging. Vendor selection processes Defining vendor issues, Operational planes, Design models, Understanding architectures. Radio Frequency (RF) planning RF spectrum, RF behaviors, Modulation and coding schemes, RF accessories, Throughput factors. WLAN hardware selection Antennas, 802.11n and antennas, Choosing Aps, Powering Aps. Site surveys Site survey tools, Site survey preparation, Predictive site surveys, Manual site surveys, Site survey principles and processes. Designing for Quality of Service (QoS) QoS overview, QoS application points, Roaming support. Designing for security Bad security, Authentication solutions, Encryption solutions, Security best practices, Intrusion prevention. Installation testing, validation and troubleshooting Network health status, Troubleshooting and validation process, Troubleshooting and validation tools, Common problems. Hands-on lab exercises Hands-on labs depend on the audience and can include use of: Spectrum analyzers, Protocol analyzers, Site Survey software, Diagramming software, Various wireless access points, Various wireless adapters and antennas.
DDOS demystified training course description This course covers DDOS attacks and how to defend against them. The course starts by studying DOS attacks and then DDOS attack. Reflectors, booters and stressers are followed by reflection and amplification. Once the various DDOS attacks have been covered we then study the ways to defend against DDOS attacks. What will you learn Describe DDOS. Explain how DDOS attacks work. Recognise DDOS attack types. Describe how to defend DDOS attacks. DDOS demystified training course details Who will benefit: Anyone involved in network security. Prerequisites: Network fundamentals Duration 1 day DDOS demystified training course contents What is DOS? Denial Of Service, outages, Attackers, Command and control, Bots. Why DOS? What is DDOS? Distributed, reflectors, botnets, botnet topologies, amplification, attack bandwidth, attack vectors, booters, stressers, backscatter, DirtJumper, XOR. RUDY. High and Low orbit Ion Cannon. Attack types Application layer attacks, HTTP flood, protocol attacks, SYN floods, teardrop, volumetric attacks, slowloris, DNS cachebusting, fraggle, smurf. IP address spoofing. Reflectors Reflector attacks, amplification attacks, quotients, embedded devices, DNS, NTP, SSDP. DDOS defence Protecting devices from becoming bots. Onsite, outsourced scrubbing, Defending self, defending the Internet, Black hole routing, rate limiting, intelligent application firewalls, anycast, IPS, upstream filtering, BCP38, BCP 140. uRPF.
Total STP training course description The Spanning Tree Protocol (STP) dates from 1985. This course explores in depth how the protocol works and the implications this has on network performance. We also study STP variants including 802.1w (RSTP) and 802.1s (MSTP). What will you learn Explain how STP works. Explain how RSTP works. Explain how MSTP works. Troubleshoot STP and variants. Total STP training course details Who will benefit: Technical network staff. Prerequisites: Definitive Ethernet switching for engineers Duration 1 day Total STP training course contents STP What is 802.1D, what is STP, resilience, broadcast storms, forwarding and blocking, single path. Hands on Impact of broadcast storms, enabling disabling STP. Operation STP frames, BPDUs, root bridge election, blocked ports, root ports, designated ports. STP path costs. Hands on Analysing STP, troubleshooting implications. Topology changes Hello timer, Forward delay timer, max age timer, Topology Change Notification (TCN) BPDU. Hands on STP convergence. STP enhancements and tuning Bridge ID, Bridge priority, port priority, 30 second delay, Edge ports, PortFast, root guard, loop guard, BPDU guard. Hands on Root bridge positioning, improving STP convergence. RSTP 802.1w, Improvements, convergence times. RSTP bridge port roles, RSTP switch port states. Edge ports, link ports. Hands on RSTP configuration and convergence. VLANs and STP Access/untagged ports, trunk/tagged ports, PVST, PVST+, RPVST, MISTP, MSTP and 802.1s. MSTP BPDUs. Instances, Load balancing, impact on CPU. Hands on MSTP load balancing. Interoperability Regions, Virtual bridges, domains. Hands on STP, RSTP and MSTP interoperation.
Book our accredited Prevention and Management of Violence and Aggression (PMVA) in Healthcare course, meeting Restraint Reduction Network (RRN) training standards and BILD Act Certification. Equip yourself with essential skills to prevent and manage violence in healthcare settings effectively.
Linux virtualization and HA training course description The LPIC-3 certification is the culmination of LPI's multi -level professional certification program. LPIC-3 is designed for the enterprise-level Linux professional and represents the highest level of professional, distribution neutral Linux certification within the industry. LPIC-3 304 covers administering Linux enterprise-wide with an emphasis on virtualization and high availability. At SNT we have enhanced the contents of the course by covering containers. What will you learn Manage Virtual Machines. Manage containers. Manage HA clusters. Manage HA cluster storage. Linux virtualization and HA training course details Who will benefit: Linux professionals working with virtualization and/or High availability. Prerequisites: Linux network administration 2 (LPIC-2) Duration 5 days Linux virtualization and HA training course contents VIRTUALIZATION Virtualization concepts and theory Terminology, Pros and Cons of virtualization, variations of Virtual Machine monitors, migration of physical to VMs, migration of VMs between host systems, cloud computing. Xen Xen architecture, networking and storage, Xen configuration, Xen utilities, troubleshooting Xen installations, XAPI, XenStore, Xen Boot Parameters, the xm utility. KVM KVM architecture, networking and storage, KVM configuration, KVM utilities, troubleshooting KVM installations. Other virtualization solutions OpenVZ and LXC, other virtualization technologies, virtualization provisioning tools. Libvirt and Related Tools libvirt architecture, networking and storage, basic technical knowledge of libvirt and virsh, oVirt. Cloud Management Tools Basic feature knowledge of OpenStack and CloudStack, awareness of Eucalyptus and OpenNebula. Containers Containers versus VMs, Docker, Kubernetes. Load balanced clusters of LVS/IPVS, VRRP, configuration of keepalived, configuration of ldirectord, backend server network configuration. HAProxy, configuration of HAProxy. Failover clusters Pacemaker architecture and components (CIB, CRMd, PEngine, LRMd, DC, STONITHd), Pacemaker cluster configuration, Resource classes (OCF, LSB, Systemd, Upstart, Service, STONITH, Nagios), Resource rules and constraints (location, order, colocation), Advanced resource features (templates, groups, clone resources, multi-state resources), Pacemaker management using pcs, Pacemaker management using crmsh, configuration and management of corosync in conjunction with Pacemaker, other cluster engines (OpenAIS, Heartbeat, CMAN). HIGH AVAILABILITY CLUSTER STORAGE DRBD/cLVM DRBD resources, states and replication modes, configuration of DRBD resources, networking, disks and devices, configuration of DRBD automatic recovery and error handling, management of DRBD using drbdadm. drbdsetup and drbdmeta, Integration of DRBD with Pacemaker, cLVM, integration of cLVM with Pacemaker. Clustered File Systems Principles of cluster file systems. Create, maintain and troubleshoot GFS2 file systems in a cluster, create, maintain and troubleshoot OCFS2 file systems in a cluster, Integration of GFS2 and OCFS2 with Pacemaker, the O2CB cluster stack, other commonly used clustered file systems.
RF fundamentals training course description Radio Frequency engineering is an important yet often overlooked area in today's wireless world. This course provides a grounding in RF theory and practice for wireless, cellular and microwave systems. What will you learn Explain the basics of RF. Describe RF propagation and antenna principles. Calculate propagation losses and link budgets. Test RF systems. RF fundamentals training course details Who will benefit: Those working with wireless, cellular and microwave systems. Prerequisites: None. Duration 2 days RF fundamentals training course contents What is RF? Definition of RF, RF wave characteristics: Frequency, wavelength, power, phase, impedance, RF history, radio signals, frequency bands, safety issues, legal issues. RF systems Microwaves, cellular/mobile RF, WLANs, other fixed wireless networks, basic RF components. Hands on Building a basic WLAN network. RF system components Transmitters: Antennas: Isotropic, Dipole, how antennas achieve gain. Modulation Schemes, bandwidth, AM, FM, FSK, PSK, QAM, QPSK, interference, performance. Hands on Interference and performance. Multiple access schemes FDMA, CDMA, TDMA, CSMA/CA. Wireless systems Cellular (GSM, UMTS), Wifi, WiMax, others: GPS, DBS, RFID, radar, Bluetooth. Hands on cellular. Spread Spectrum technologies Spread spectrum benefits and disadvantages, how it works, Direct Sequence, Frequency Hopping, hybrids. RF propagation Models, link budget, Smith chart, RF matching with the Smith chart. cell capacity, tradeoffs: power vs. bandwidth, free space, reflection, diffraction, multipath cancellation, propagation prediction and measurement tools. Hands on Smith charts. RF testing Why power rather than voltage/current, units of power, dB and dBm power conversions. Test equipment: signal generators, power meters, network analysers, spectrum analysers. RF test setups: return loss, insertion loss. Hands on RF testing.
Advanced TCP/IP training course description An intensive advanced TCP/IP course focusing on the details of the protocols according to the RFCs. This course is designed to go into the technical details of the protocols and is not for those that are new to TCP/IP. A particular focus is on TCP and performance. Those more interested in routing protocols should see our Definitive IP routing for engineers course. It is expected that delegates are totally familiar with configuration addressing. Hands on sessions consist of protocol analysis using Wireshark. What will you learn Analyse packets and protocols in detail. Troubleshoot networks using Wireshark. Find performance problems using Wireshark. Perform network forensics. Advanced TCP/IP training course details Who will benefit: Advanced technical staff. Prerequisites: TCP/IP Foundation for engineers Duration 5 days Advanced TCP/IP training course contents IP Fragmentation and MTU issues, Path MTU discovery, Geolocation, unusual IP addresses, forwarding broadcasts, DiffServ, DSCP, ECN, assured and expedited forwarding. TTL usage in traceroute, Protocol field. Sanitising IP addresses in trace files. Wireshark and checksum errors. IPv6 The header. Extension headers. Traffic class and flow labels. Tunnelling. IPv6 and fragmentation. ARP Requests, responses, gratuitous ARP, Proxy ARP, ARP poisoning. ICMP ping, Round Trip Times, ICMP redirect, ICMP router advertisement and solicitation, Time Exceeded, Destination unreachable. ICMPv6: Similarity to ICMPv4, Neighbor discovery and the replacement of ARP. MLD. First hop redundancy ICMP discovery, HSRP, VRRP, GLBP. IGMP Multicast overview, multicast architecture, multicast addresses, IGMP v1, IGMPv2, IGMPv3. UDP Use in broadcasts and multicasts. Port numbers. TCP Connections, RST, FIN, sequence numbering, packet loss recovery, Fast recovery, RTO timeout, SACK, TCP flow control, receive window, congestion window, van Jacobsen, nagle, delayed ACKs, PSH, URG, TCP options, MSS, Window scaling, TCP timestamps. Congestion notification. Hands on Troubleshooting with sequence numbers, Wireshark IO and TCP graphs to analyse performance. Window size issues. DHCP DHCP header. Relationship to BOOTP. Discover, offer, request, decline, ACK, release. Lease, renewal and rebind times. Relay agents. DHCPv6 DNS Names and addresses, Resource Records, queries, responses, problems. MDNS. HTTP Requests, methods, request modifiers, response codes. HTTPS. SSL, TLS. Proxies. Hands on Redirects, recreating pages from packets. FTP Commands, responses, passive/active mode. Email SMTP, POP3, IMAP, commands responses. Voice and Video RTP, RTCP, SIP. IP PBXs. Traffic flows. Hands on Voice playback. SNMP MIBs, GET, TRAP, polling. Performance Baselining, high latency, Wireshark and timings, packet loss, redirections, small packets, congestion, name resolution. Security Network forensics, scanning and discovery, suspect traffic. IPsec, SSH.
Mobile comms training course description A complete overview of mobile communications covering all the major technologies in a 2-day format. What will you learn GSM GPRS UMTS LTE Alternative mobile strategies Mobile comms training course details Who will benefit: Anyone involved in mobile communications. Prerequisites: None. Duration 2 days Mobile comms training course contents Introduction Telephony, RF, mobile and wireless technologies, distances, mobile phone generations, base stations, cells, frequencies, cell types, MSC, handoffs, channels, internetworking, the Internet, wireless Internet access. UK operators, worldwide operators. GSM What is it? Timeline, digitising voice, channels, GSM architecture, Abis, A, Um, MS, BTS, BSC, MSC, HLR, VLR, EIR, AuC. Radio link aspects, GSM signalling overview, signalling protocols, roaming, GSM call flows, authentication. IMEI. SIM cards. GPRS What it is, 2G to 3G, GPRS user features, GPRS network features, GPRS elements, GPRS architecture, overlay, SGSN, GGSN, GPRS ATTACH, GPRS protocol stack, GPRS timeslots, EDGE, GPRS classes, GPRS routing, GPRS packet format. UMTS and 3G What is 3G? IMT-2000, 3G proposals, what is UMTS? Speed comparison, evolution to 3G, CDMA, CDMA 2000, W-CDMA, UMTS components, UMTS infrastructure, RNC, Node B, network architecture, packet switched attach, mobility in 3G, HSDPA. LTE and 4G LTE architecture and principles, Physical layer, Air interface, E-UTRAN, Evolved packet core, service provision. Other wireless solutions Integration of services, Bluetooth, Blackberry, VoIP, Mobile IP, 802.11, WiFi, 802.16, WiMax, What is 5G?