• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

380 Network courses in Manchester

Analysing Financial Statement and Annual Reports

5.0(10)

By GBA Corporate

Overview The most significant network between the organisation and their investors is Financial Statements and annual reports. It is very important to understand the role of these factors to have better communication channels. This course will give you intense knowledge to prepare financial statements according to International Financial Reporting Standards. IFRS regulates financial reporting standards and according to it the company's financial reporting should be transparent. Thus, if it is as per IFRS rules, its credibility can be trusted. It will also help to analyse the financial statement and annual reports. It will enable you to evaluate corporate accounts and make strong decisions and judgements about the company's status.

Analysing Financial Statement and Annual Reports
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Integrating UNIX and Microsoft

5.0(3)

By Systems & Network Training

Integrating UNIX and Microsoft course description This course is designed for the enterprise-level UNIX professional and represents the highest level of professional, distribution-neutral UNIX certification within the industry. It covers administering UNIX enterprise-wide with an emphasis on mixed environments. What will you learn Configure and troubleshoot OpenLDAP. Use OpenLDAP as an authentication backend. Manage software packages. Use Samba - Share configuration - User and group management - Domain integration - Name services - with Linux and Windows clients Integrating UNIX and Microsoft course details Who will benefit: Enterprise-level UNIX professionals. Prerequisites: UNIX network administration. Duration 5 days Integrating UNIX and Microsoft course contents OPENLDAP CONFIGURATION OpenLDAP replication Replication concepts, OpenLDAP replication, replication log files, replica hubs, LDAP referrals, LDAP sync replication. Securing the Directory Securing the directory with SSL and TLS, Firewall considerations, Unauthenticated access methods, User/password authentication methods, Maintanence of SASL user DB, certificates. OpenLDAP Server Performance Tuning Measure OpenLDAP performance, Tune software configuration to increase performance, indexes. OPENLDAP AS AN AUTHENTICATION BACKEND LDAP Integration with PAM and NSS Configure PAM to use LDAP for authentication, NSS to retrieve information from LDAP and PAM modules in UNIX. Integrating LDAP with Active Directory and Kerberos Kerberos integration with LDAP, Cross platform authentication, Single sign-on concepts, Integration and compatibility limitations between OpenLDAP and Active Directory. SAMBA BASICS Samba Concepts and Architecture Samba daemons and components, key issues regarding heterogeneous network, Identify key TCP/UDP ports used with SMB/CIFS, Knowledge of Samba3 and Samba4 differences. Configure Samba Samba server configuration file structure, variables and configuration parameters, Troubleshoot and debug configuration problems. Regular Samba Maintenance Monitor and interact with running Samba daemons, Perform regular backups of Samba configuration and state data. Troubleshooting Samba Samba logging, Backup TDB files, Restore TDB files, Identify TDB file corruption, Edit / list TDB file content. Internationalization Internationalization character codes and code pages, differences in the name space between Windows and Linux/Unix with respect to share, names, user/group/computer naming in a non-English environment. SAMBA SHARE CONFIGURATION Linux File System and Share/Service Permissions File / directory permission control, Samba interaction with Linux file system permissions and ACLs, Use Samba VFS to store Windows ACLs. Print Services Printer sharing, integration between Samba and CUPS, Manage Windows print drivers and configure downloading of print drivers, security concerns with printer sharing. SAMBA USER AND GROUP MANAGEMENT Managing User Accounts and Groups User and group accounts, mappings, user account management tools, smbpasswd, file/directory ownership of objects. Authentication, Authorization and Winbind Local password database, password synchronization, passdb backends, Convert between passdb backends, Integrate Samba with LDAP, Winbind service, PAM and NSS. SAMBA DOMAIN INTEGRATION Samba as a PDC and BDC Domain membership and trust relationships, Create and maintain a PDC and BDC with Samba3/4, Add computers to an existing domain, logon scripts, roaming profiles, system policies. Samba4 as an AD compatible Domain Samba 4 as an AD DC, smbclient, how Samba integrates with AD services: DNS, Kerberos, NTP, LDAP. Configure Samba as a Domain Member Server Joining Samba to NT4 and AD domains, obtain a TGT from a KDC. SAMBA NAME SERVICES NetBIOS and WINS WINS concepts, NetBIOS concepts, local master browser, domain master browser, Samba as a WINS server, name resolution, WINS replication, NetBIOS browsing and browser elections, NETBIOS name types. Active Directory Name Resolution DNS for Samba4 as an AD Domain Controller, DNS forwarding with the internal DNS server of Samba4. WORKING WITH LINUX AND WINDOWS CLIENTS CIFS Integration SMB/CIFS concepts, remote CIFS shares from a Linux client, securely storing CIFS credentials, features and benefits of CIFS, permissions and file ownership of remote CIFS shares. Working with Windows Clients browse lists and SMB clients from Windows, Share file/print resources from Windows, the smbclient program, the Windows net utility.

Integrating UNIX and Microsoft
Delivered in Internationally or OnlineFlexible Dates
£3,697

Voice over LTE

5.0(3)

By Systems & Network Training

Voice over LTE training course description This course provides a basic understanding of the 3G LTE Air Interface, SAE, as well as Voice over LTE options and LTE Advanced features. Investigating the standards for the EPS , formulated by the 3GPP standards body, the course will set out to examine and explain the 4G environment from user equipment to border gateway and beyond. This course will ensure the delegate has a grasp of all aspects of the current global deployments, the next steps in upgrades and the promise of things to come. What will you learn Describe the complete EPC architecture. Explain the use of QoS within the air interface & core network. Explore the features of LTE advanced. Describe the various methods of supporting voice services with 3G LTE. Describe IMS structure and control entities. Explain an IMS session. Voice over LTE training course details Who will benefit: Any engineers who are assisting in the deployment of voice services within their LTE networks. Prerequisites: Intro to Data comms & networking Telecommunications Introduction Duration 3 days Voice over LTE training course contents 3GPP standards body Release 8 - Release 12, Supported and expected features. The EPC revisited EPC revisited 3G LTE & EPC Architecture, NB, MME, SGW, PDNGW, PCRF, Interworking capabilities, Protocol stack explored, NAS signalling, Default EPS bearer, Slot allocation algorithms, Scheduling algorithms, Quality of Service requirements, Dedicated EPS bearers. VoLTE deployment strategies Common networks everywhere, GSM/WCDMA view, CDMA view. VoLTE system architecture LTE radio, LTE Radio background, LTE radio architecture, Evolved packet core, EPC entities & functions, EPS mobility management, MS entities, Home subscriber server, Policy & charging rules function. VoLTE functionality Radio functionality, Bearers & schedulers, Mobility, Circuit switched fall back handover, Mobility from 2G/3G back to LTE, Power Saving Features, Positioning services, UE radio access capabilities for VoLTE users. EPC functionalities, LTE subscriber identification, PDN connectivity establishment, EPS dedicated bearer setup, IMS identification, IP multimedia identification module, Public user identity, Private user identity, Relationship between public & private identity, identification of users device, identification of network entities, identification of services, identification without ISIM. IMS service provisioning, Enforcement of allowed services, Service triggering information, Selection of the AS, AS behaviour, Service provisioning in action. VoLTE end-to-end & signalling VoLTE subscription & device configuration. EPS attach for CSFB/IMS VoIP & default bearer. IMS registration, Constructing the REGISTER request, From UE to P-CSCF, From P-CSCF to I-CSCF, From I-CSCF to S-CSCF, S-CSCF challenges the UE, UE's response to the challenge, Registration at the S-CSCF, The 200 OK response, Third-party registration to application servers, Subscription to registration event package, Re-registration & re-authentication, De-registration, Related standards. IMS VoIP session, Constructing the INVITE request, Routing, Media negotiation, Media resource reservation & policy control, Charging, Session release. Voice continuity, PS - PS intersystem handover, Single radio voice call continuity. IMS emergency session, PDN Connection setup for emergency session, Emergency registration, Emergency session. CS fallback for EPS call case, Architecture of CS fallback in EPS, Description of SGs interface, Idle mode signalling reduction, Idle mode vs active mode, CS fallback attachment, Mobile originating call using CSFB, Mobile terminating call using CSFB, Call unrelated CSFB procedures, Mobile terminating roaming retry & forwarding. VoLTE Messaging, Native IMS messages, SMS interworking, Multimedia messaging service. Unstructured supplementary services data simulation in IMS. IMS services VoLTE radio performance Coverage, Latency, Capacity. LTE advanced features Carrier aggregation, Coordinated mMulti-point Operation (CoMP), ICIC & eICIC, Relay node deployment & donor eNBs, Improved cell edge coverage, Reduced control plane latency, Heterogeneous networks, HeNB, security gateways, HeNB gateways.

Voice over LTE
Delivered in Internationally or OnlineFlexible Dates
£2,367

Are you an EDI Officer, HR Specialist, Leader or Manager? Or the nominated EDI champion for your team? Maybe you've been given the EDI portfolio on behalf of your Board or department? Or if you're aiming to make a difference via your diverse staff network or union, all change-makers are welcome!

EDI Changemakers Support Network
Delivered in Loughborough or UK Wide or OnlineFlexible Dates
FREE

Coaching at Work

By Inovra Group

Overview Networking has become a crucial factor in the modern workplace. It is the most effective method of developing your business or career and is a key component of your personal brand. This one day course will teach you how to be able to build strong business relationships, develop a level of personal credibility and increase your network of contacts in order to enhance your visibility and create opportunities for yourself and your organisation. Description This training course will help your participants build a professional reputation and develop a network of connections through the two key methods available to them; face-to-face and online. Attendees will discover how to effectively combine these two approaches and create a strategy for networking success that will generate their own community and actively grow their personal network. This will result in an improved performance in their approach to networking and consequently provide opportunities and prospects that will increase their business success. The training provides them with the tools and techniques to both plan a successful, strategic approach to networking and develop their personal communication skills, which will ensure they build effective business relationships. Topics covered: Why Network? – Establishing the importance of networking with some shocking statistics and an activity that defines the importance of networking to the individual. This is followed by some insight into the key aims of a networking strategy, what puts people off, as well as some personal revelations about networking. Increase Your Business Presence – Looking at the components of a strong business presence, including; credibility, personal brand, visibility and social capital. Developing a Networkers Attitude – An exercise that clarifies the perfect attitudes and behaviours of great networkers and comparing the participants against this. Thus identifying areas for development. Face to Face Networking – An overview and insight into the main types of face to face networking opportunities available with the benefits and pitfalls of each. Online Networking – An overview of the different social media and online networking tools and how to get the best out of them. Includes; LinkedIn, Twitter, Facebook and online forums. Communication Skills for Networking Success – Ensuring a good first impression, creating an opening sound bite and writing an online profile that promotes and engages. Developing a Conversation – Building on the opening sound bite and developing a conversation through good questioning techniques and following a selection of key networking rules. Including an activity to test and practice the skills. Working a Room – A fun activity that embeds and develops learning while encouraging practice and communication. This activity covers 10 of the main skills required to work a room. Breaking into a Group – Identifying body language to spot when a group or pair is open to new people entering the conversation or would rather not encourage participation. Knowing how to break into a group, what to say and how to remain professional. Exiting a Conversation – Developing some techniques to extricate oneself from a conversation without causing embarrassment or rudeness. The Follow-Up – Using a structure to identify the most important contacts created and establishing when and how to follow up with each group. Includes example follow-up email and a chance to develop their own. Creating a Network Plan – Participants are provided with a networking action plan to review and complete. This sets them on the journey of developing their networking skills and ensures they have a strategy and goals to target. Who should attend Anyone who is looking to improve their networking performance, or the networking performance of a management or sales team. Requirements for Attendees No pre-requisites required.

Coaching at Work
Delivered In-Person in Wakefield or UK WideFlexible Dates
£800

STP alternatives

5.0(3)

By Systems & Network Training

STP alternatives training course description The Spanning Tree Protocol (STP) dates from 1985. This course explores the technologies that can be used as an alternative to STP, including FabricPath, SPB and TRILL. What will you learn Explain how STP and RSTP work. Explain how TRILL works. Explain how SPB works. Explain how FabricPath works. STP alternatives training course details Who will benefit: Technical network staff. Prerequisites: Definitive Ethernet switching for engineers Duration 1 day STP alternatives training course contents Introduction Layer 2 versus Layer 3, STP problems: One path, convergence, MAC explosion, STP alternatives. STP 802.1D, how STP works, root bridge, convergence times, single path. RSTP 802.1w, Improvements, convergence times. Link aggregation 802.3ad, Multi system Link aggregation. IS-IS Concepts, Discovery, topology exchange, flooding. Changes for TRILL, FabricPath and SPB. FabricPath Overview, architecture, control plane protocols, DRAP, STP interactions, packet forwarding, configuration. TRILL Concepts, RBridge, TRILL frames, control plane, data plane, learning MAC addresses. SPB 802.1aq, Node ID, Backbone Edge Bridges, Backbone MAC address, customer MACs, I-SID, forwarding database.

STP alternatives
Delivered in Internationally or OnlineFlexible Dates
£2,477

Definitive 802.1X for engineers

5.0(3)

By Systems & Network Training

Definitive 802.1X training course description A hands-on training course concentrating solely on 802.1X. Hands on sessions follow major chapters to reinforce the theory. What will you learn Describe 802.1X. Explain how 802.1X works Configure 802.1X Troubleshoot 802.1X. Definitive 802.1X training course details Who will benefit: Technical network staff. Technical security staff. Prerequisites: SIP for engineers Duration 2 days Definitive 802.1X training course contents Introduction What is 802.1X? Authentication access, 802.3, 802.11. IEEE, 802, 802.1X-2001, 802.1X-2010. Architecture Supplicant, Authenticator, Authentication server, EAP, EAPOL, RADIUS, Diameter. Port configuration 802.1X in a switch environment. Hands on Configuring 802.1X. How it works Controlled ports, uncontrolled ports. Authentication flow chart, Initialisation, initiation, negotiation, authentication. Hands on 802.1X packet analysis. 802.1X and 802.11 WiFi, WiFi security. Hands on 802.1X WiFi port access. EAP Extensible Authentication Protocol, RFC 3748, RFC 5247. EAP methods: Weak, MD5, LEAP, Strong: TTLS, TLS, FAST. Encapsulation: 802.1X, PEAP, RADIUS, Diameter, PPP. 802.1X accounting RADIUS, accounting messages, 802.1X accounting AV pairs. 8021.X and VLANS VLANs, Guest VLAN, restricted VLAN, voice VLAN. Hands on VLAN assignments with 802.1X.

Definitive 802.1X for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

Wireshark 101 for engineers

5.0(3)

By Systems & Network Training

Wireshark 101 training course description Wireshark is a free network protocol analyser. This hands-on course focuses on troubleshooting networks using the Wireshark protocol analyser. The course concentrates on the product and students will gain from the most from this course only if they already have a sound knowledge of the TCP/IP protocols What will you learn Download and install Wireshark. Capture and analyse packets with Wireshark. Configure capture and display filters. Customise Wireshark. Troubleshoot networks using Wireshark. Wireshark 101 training course details Who will benefit: Technical staff looking after networks. Prerequisites: TCP/IP Foundation for engineers Duration 2 days Wireshark 101 training course contents What is Wireshark? Protocol analysers, Wireshark features, versions, troubleshooting techniques with Wireshark. Installing Wireshark Downloading Wireshark, UNIX issues, Microsoft issues, the role of winpcap, promiscuous mode, installing Wireshark. Wireshark documentation and help. Hands on Downloading and installing Wireshark. Capturing traffic Starting and stopping basic packet captures, the packet list pane, packet details pane, packet bytes pane, interfaces, using Wireshark in a switched architecture. Hands on Capturing packets with Wireshark. Troubleshooting networks with Wireshark Common packet flows. Hands on Analysing a variety of problems with Wireshark. Capture filters Capture filter expressions, capture filter examples (host, port, network, protocol), primitives, combining primitives, payload matching. Hands on Configuring capture filters. Working with captured packets Live packet capture, saving to a file, capture file formats, reading capture files from other analysers, merging capture files, finding packets, going to a specific packet, display filters, display filter expressions. Hands on Saving captured data, configuring display filters. Analysis and statistics with Wireshark Enabling/disabling protocols, user specified decodes, following TCP streams, protocol statistics, conversation lists, endpoint lists, I/O graphs, protocol specific statistics. Hands on Using the analysis and statistics menus. Command line tools Tshark, capinfos, editcap, mergecap, text2pcap, idl2eth. Hands on Using tshark. Advanced issues 802.11 issues, management frames, monitor mode, packet reassembling, name resolution, customising Wireshark. Hands on Customising name resolution.

Wireshark 101 for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,497

Hardening Cisco Devices

5.0(3)

By Systems & Network Training

Hardening Cisco devices training course description A hands on course focusing on how to lock down Cisco IOS routers and switches. What will you learn Harden Cisco devices. Hardening Cisco devices training course details Who will benefit: Technical network staff. Technical security staff. Prerequisites: TCP/IP foundation for engineers. Duration 5 days Hardening Cisco devices training course content Introduction Router security, Switch security, Cisco IOS, IOS versions, Cisco advisories, the management plane, control plane, data plane. Hands on Checking IOS versions and advisories. Access control Infrastructure ACLs, Transit ACLs. Hands on Restricting access to the device, Filtering data traffic. Management plane: Securing operations Passwords, privilege levels, AAA, TACACS+, RADIUS. Hands on Password management. Management plane: Other general hardening Logging best practices, secure protocols, encrypting management sessions, configuration management. Hands on Hardening the management plane. Control plane Disabling reception and transmission of certain messages, Limiting CPU impact of control plane traffic, securing routing protocols. Hands on Hardening the control plane. Data plane Transit ACLs, disabling unused services, disabling unnecessary protocols, anti spoofing, limiting CPU impact of data plane traffic, identifying and tracing traffic, Netflow, VLANs, port security. Hands on hardening the data plane.

Hardening Cisco Devices
Delivered in Internationally or OnlineFlexible Dates
£2,477

This course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify and remediate them in your own projects.

Cyber Secure Coder
Delivered in Loughborough or UK Wide or OnlineFlexible Dates
£350