Are you an EDI Officer, HR Specialist, Leader or Manager? Or the nominated EDI champion for your team? Maybe you've been given the EDI portfolio on behalf of your Board or department? Or if you're aiming to make a difference via your diverse staff network or union, all change-makers are welcome!
STP alternatives training course description The Spanning Tree Protocol (STP) dates from 1985. This course explores the technologies that can be used as an alternative to STP, including FabricPath, SPB and TRILL. What will you learn Explain how STP and RSTP work. Explain how TRILL works. Explain how SPB works. Explain how FabricPath works. STP alternatives training course details Who will benefit: Technical network staff. Prerequisites: Definitive Ethernet switching for engineers Duration 1 day STP alternatives training course contents Introduction Layer 2 versus Layer 3, STP problems: One path, convergence, MAC explosion, STP alternatives. STP 802.1D, how STP works, root bridge, convergence times, single path. RSTP 802.1w, Improvements, convergence times. Link aggregation 802.3ad, Multi system Link aggregation. IS-IS Concepts, Discovery, topology exchange, flooding. Changes for TRILL, FabricPath and SPB. FabricPath Overview, architecture, control plane protocols, DRAP, STP interactions, packet forwarding, configuration. TRILL Concepts, RBridge, TRILL frames, control plane, data plane, learning MAC addresses. SPB 802.1aq, Node ID, Backbone Edge Bridges, Backbone MAC address, customer MACs, I-SID, forwarding database.
Overview Networking has become a crucial factor in the modern workplace. It is the most effective method of developing your business or career and is a key component of your personal brand. This one day course will teach you how to be able to build strong business relationships, develop a level of personal credibility and increase your network of contacts in order to enhance your visibility and create opportunities for yourself and your organisation. Description This training course will help your participants build a professional reputation and develop a network of connections through the two key methods available to them; face-to-face and online. Attendees will discover how to effectively combine these two approaches and create a strategy for networking success that will generate their own community and actively grow their personal network. This will result in an improved performance in their approach to networking and consequently provide opportunities and prospects that will increase their business success. The training provides them with the tools and techniques to both plan a successful, strategic approach to networking and develop their personal communication skills, which will ensure they build effective business relationships. Topics covered: Why Network? – Establishing the importance of networking with some shocking statistics and an activity that defines the importance of networking to the individual. This is followed by some insight into the key aims of a networking strategy, what puts people off, as well as some personal revelations about networking. Increase Your Business Presence – Looking at the components of a strong business presence, including; credibility, personal brand, visibility and social capital. Developing a Networkers Attitude – An exercise that clarifies the perfect attitudes and behaviours of great networkers and comparing the participants against this. Thus identifying areas for development. Face to Face Networking – An overview and insight into the main types of face to face networking opportunities available with the benefits and pitfalls of each. Online Networking – An overview of the different social media and online networking tools and how to get the best out of them. Includes; LinkedIn, Twitter, Facebook and online forums. Communication Skills for Networking Success – Ensuring a good first impression, creating an opening sound bite and writing an online profile that promotes and engages. Developing a Conversation – Building on the opening sound bite and developing a conversation through good questioning techniques and following a selection of key networking rules. Including an activity to test and practice the skills. Working a Room – A fun activity that embeds and develops learning while encouraging practice and communication. This activity covers 10 of the main skills required to work a room. Breaking into a Group – Identifying body language to spot when a group or pair is open to new people entering the conversation or would rather not encourage participation. Knowing how to break into a group, what to say and how to remain professional. Exiting a Conversation – Developing some techniques to extricate oneself from a conversation without causing embarrassment or rudeness. The Follow-Up – Using a structure to identify the most important contacts created and establishing when and how to follow up with each group. Includes example follow-up email and a chance to develop their own. Creating a Network Plan – Participants are provided with a networking action plan to review and complete. This sets them on the journey of developing their networking skills and ensures they have a strategy and goals to target. Who should attend Anyone who is looking to improve their networking performance, or the networking performance of a management or sales team. Requirements for Attendees No pre-requisites required.
Definitive 802.1X training course description A hands-on training course concentrating solely on 802.1X. Hands on sessions follow major chapters to reinforce the theory. What will you learn Describe 802.1X. Explain how 802.1X works Configure 802.1X Troubleshoot 802.1X. Definitive 802.1X training course details Who will benefit: Technical network staff. Technical security staff. Prerequisites: SIP for engineers Duration 2 days Definitive 802.1X training course contents Introduction What is 802.1X? Authentication access, 802.3, 802.11. IEEE, 802, 802.1X-2001, 802.1X-2010. Architecture Supplicant, Authenticator, Authentication server, EAP, EAPOL, RADIUS, Diameter. Port configuration 802.1X in a switch environment. Hands on Configuring 802.1X. How it works Controlled ports, uncontrolled ports. Authentication flow chart, Initialisation, initiation, negotiation, authentication. Hands on 802.1X packet analysis. 802.1X and 802.11 WiFi, WiFi security. Hands on 802.1X WiFi port access. EAP Extensible Authentication Protocol, RFC 3748, RFC 5247. EAP methods: Weak, MD5, LEAP, Strong: TTLS, TLS, FAST. Encapsulation: 802.1X, PEAP, RADIUS, Diameter, PPP. 802.1X accounting RADIUS, accounting messages, 802.1X accounting AV pairs. 8021.X and VLANS VLANs, Guest VLAN, restricted VLAN, voice VLAN. Hands on VLAN assignments with 802.1X.
Wireshark 101 training course description Wireshark is a free network protocol analyser. This hands-on course focuses on troubleshooting networks using the Wireshark protocol analyser. The course concentrates on the product and students will gain from the most from this course only if they already have a sound knowledge of the TCP/IP protocols What will you learn Download and install Wireshark. Capture and analyse packets with Wireshark. Configure capture and display filters. Customise Wireshark. Troubleshoot networks using Wireshark. Wireshark 101 training course details Who will benefit: Technical staff looking after networks. Prerequisites: TCP/IP Foundation for engineers Duration 2 days Wireshark 101 training course contents What is Wireshark? Protocol analysers, Wireshark features, versions, troubleshooting techniques with Wireshark. Installing Wireshark Downloading Wireshark, UNIX issues, Microsoft issues, the role of winpcap, promiscuous mode, installing Wireshark. Wireshark documentation and help. Hands on Downloading and installing Wireshark. Capturing traffic Starting and stopping basic packet captures, the packet list pane, packet details pane, packet bytes pane, interfaces, using Wireshark in a switched architecture. Hands on Capturing packets with Wireshark. Troubleshooting networks with Wireshark Common packet flows. Hands on Analysing a variety of problems with Wireshark. Capture filters Capture filter expressions, capture filter examples (host, port, network, protocol), primitives, combining primitives, payload matching. Hands on Configuring capture filters. Working with captured packets Live packet capture, saving to a file, capture file formats, reading capture files from other analysers, merging capture files, finding packets, going to a specific packet, display filters, display filter expressions. Hands on Saving captured data, configuring display filters. Analysis and statistics with Wireshark Enabling/disabling protocols, user specified decodes, following TCP streams, protocol statistics, conversation lists, endpoint lists, I/O graphs, protocol specific statistics. Hands on Using the analysis and statistics menus. Command line tools Tshark, capinfos, editcap, mergecap, text2pcap, idl2eth. Hands on Using tshark. Advanced issues 802.11 issues, management frames, monitor mode, packet reassembling, name resolution, customising Wireshark. Hands on Customising name resolution.
Hardening Cisco devices training course description A hands on course focusing on how to lock down Cisco IOS routers and switches. What will you learn Harden Cisco devices. Hardening Cisco devices training course details Who will benefit: Technical network staff. Technical security staff. Prerequisites: TCP/IP foundation for engineers. Duration 5 days Hardening Cisco devices training course content Introduction Router security, Switch security, Cisco IOS, IOS versions, Cisco advisories, the management plane, control plane, data plane. Hands on Checking IOS versions and advisories. Access control Infrastructure ACLs, Transit ACLs. Hands on Restricting access to the device, Filtering data traffic. Management plane: Securing operations Passwords, privilege levels, AAA, TACACS+, RADIUS. Hands on Password management. Management plane: Other general hardening Logging best practices, secure protocols, encrypting management sessions, configuration management. Hands on Hardening the management plane. Control plane Disabling reception and transmission of certain messages, Limiting CPU impact of control plane traffic, securing routing protocols. Hands on Hardening the control plane. Data plane Transit ACLs, disabling unused services, disabling unnecessary protocols, anti spoofing, limiting CPU impact of data plane traffic, identifying and tracing traffic, Netflow, VLANs, port security. Hands on hardening the data plane.
Fibre Optic cabling training course description A hands on course covering installation, splicing and testing of fibre optic cabling. What will you learn Describe different types of fibre cable and where to use them Install fibre optic cable. Splice fibre optic cable. Test fibre optic cable. Fibre Optic cabling training course details Who will benefit: Cable installation professionals. Prerequisites: None Duration 3 days Fibre Optic cabling training course contents Fibre optic transmission Physics of light, optical modes, light propagation, light guiding, dispersion, light spectrum, fibre versus copper comparison, fibre cable types and their uses, WDM and DWDM. Fibre optic cable Single mode, Multi mode, diameters, step-index fibre, graded index fibre, loose tube, tight buffered, cable jackets, distance limitations, indoor versus outdoors. Fibre optic network components ST, SC, FC and other connectors, termination methods, joint enclosures, transmitters, light sources, laser, LED, receivers, detectors. Installation BS.7718. Safe working practices, site surveys, recommended installation procedures, cable handling issues, bending radius, techniques and tools, documentation. Splicing Joining fibres, splicers, fusion splicing, mechanical splicing, splicing procedure, cleaving, splicing parameters, splicing vs. connectors. Measurement parameters and applications Power measurement, loss measurement, return loss measurement, receiver sensitivity measurement, budget calculations. Testing Optical power meter, optical light source, optical attenuator, return loss meter, continuity testing, insertion loss testing, OTDR features and principles, OTDR capabilities and limitations, using an OTDR, troubleshooting.
This course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify and remediate them in your own projects.
Java training course description A comprehensive introduction of the Java language and environment. It is important to note that the course will assume that the delegates are already familiar with the C language as this enables more advanced features of the Java language to be covered in the course. The course will also give an overview of areas related to programming in Java. What will you learn Describe the Java architecture. Write Java applets and applications. Debug Java programs. Examine existing code and determine its function. Use multimedia extensions, the awt, multithreading, exceptions within Java Java training course details Who will benefit: Those wishing to program in Java. Prerequisites: Complete C programming Duration 5 days Java training course contents Review of UNIX fundamentals What is Java? What Java is, history of Java, reasons for success. The Java Virtual Machine, Bytecodes, getting up and running with Java, Java resources. Simple Java applications. C features in Java Java data structures, Java flow control, differences from C, arrays, strings and packages. OO features in Java Java classes and objects, inheritance, overloading, packages. Differences from C++. Java applets Applications vs. applets, HTML, the applet tag, applet methods, life cycle, testing and debugging. Multimedia applets Images, sounds, fonts, colours and animation. Java products The JDK in detail, other development environments. Javabeans and JDBC overviews. Abstract Window Toolkit JFC and Swing versus AWT. Event handling (JDK 1.1), GUIs, panels, buttons, lists, scrollbars, text areas, frames⦠Exception handling and multithreading Handling exceptions. Starting, pausing, stopping threads, producers, consumers, monitoring. More standard classes Java file I/O, Streams, The system class. The networking model, java.net classes. Security and Java Types of attack, the security manager, craplets, securing the network. Integrating legacy code with Java
WiMax training course description Broadband wireless access is an emerging technology area. This course looks at WiMAX, where it can be used, how it works and the alternative technologies. What will you learn Describe WiMAX. Explain how WiMAX works. Compare and contrast WiMAX with alternative broadband wireless access technologies. WiMax training course details Who will benefit: Anyone wishing to know more about WiMAX. Prerequisites: None. Duration 2 days WiMax training course contents Introduction What is WiMAX? WiMAX applications, The Internet, Internet access choices, wireless broadband access, WiMAX benefits. WiMAX overview Spectrums, LOS vs. non-LOS, bit rates, modulation, mobility, channel bandwidth, cell radius. WiMAX standards The WiMAX forum, IEEE, ETSI, HIPERACCESS, HIPERMAN, 802.16, 802.16-2004, 802.16a, 802.16e, 802.16f. WiMAX architecture Subscriber Stations (SS), Indoors, outdoors, antennas, Radio Base Stations (BS), LOS, Non LOS BackHaul, Point to multipoint, mesh support. Physical layer 10 - 66GHz, TDMA, TDD, FDD, 2 -11 GHz, SC2, OFDM, OFDMA, QPSK, QAM, Radio Link Control (RLC), uplink, downlink. MAC layer Traffic types (continuous, bursty), QoS, service types. MAC operations, connection oriented, frame structure, addressing. Convergence sublayers, service specific, common part, profiles (IP, ATM). Bandwidth request-grant, ARQ, Management messages. Security MAC privacy sublayer, network access authentication, AAA, 802.1x, key exchange and privacy. WiMAX alternatives WiMAX vs. 3G, WiMAX vs. 802.20.