Microsoft Project Orange Belt® 2013: In-House Training This workshop gives participants a full insight into creating effective schedules using Microsoft® Project 2013, allowing you to estimate, coordinate, budget, staff, and control projects and support other users. This workshop gives participants a full insight into creating effective schedules using Microsoft® Project 2013, allowing you to estimate, coordinate, budget, staff, and control projects and support other users. This workshop provides the eBook Dynamic Scheduling with Microsoft® Project 2013, and is kept up to date with the framework of knowledge outlined by the Project Management Institute's PMBOK® Guide and the Practice Standard for Scheduling. What you Will Learn You'll learn how to: Understand what's new in Project 2013 Explain where Project 2013 fits in the Microsoft® EPM solution Initialize Project 2013 to start project planning Create a well-formed project schedule Understand task types and the schedule formula Assign resources and costs to tasks Analyze resource utilization and optimize the schedule Set a baseline and track progress Create and manage project reports Customize views and fields Apply Earned Value Management Understand the basics of managing multiple projects Getting Started Introductions Course structure Course goals and objectives Enterprise Project Management Concepts and Framework Getting Started with Project 2013 Project 2013: What's New and General Overview Setting Up a New Project Schedule (templates, options, save, etc.) Setting the Project Calendar Entering Tasks The Planning Processes Importing Tasks (Word, Excel, SharePoint) Synchronizing with SharePoint Tasks List Creating and managing the WBS (include tasks, manually scheduled tasks, summary tasks and milestones, as well as custom WBS coding) Entering Estimates Tendencies in Estimating The Rolling Wave Approach Entering Duration and Work Estimates Types of Tasks Entering Dependencies The Principle of Dynamic Scheduling Choosing the Right Type of Dependency Entering Dependencies in Project 2013 Different Applications of Dependencies Entering Deadlines, Constraints, and Task Calendars Use of Deadlines and Constraints Entering Deadlines and Constraints in Project 2013 Entering Resources and Costs Types of Resources Entering Resources in Project 2013 Calendars and Resources Entering Costs in Project 2013 Entering Assignments Assignments in a Schedule Assignments and Task Types Entering Assignments in Project 2013 Assignments, Budgets, and Costs Optimizing the Schedule The Critical Path Method and the Resource Critical Path Resource Leveling Optimizing Time, Cost, and Resources in Project 2013 Updating the Schedule The Baseline Updating Strategies and Situations Prepare the Status and Forecast Report in Project 2013 Reporting Using Reports Using Visual Reports Formatting and Printing in Project 2013 Customizing Fields in Project 2013 Earned Value Management (EVM) Overview of EVM Applying EVM with Project 2013 Evaluating the Project Evaluating the Project Performance Project Benefits and Results Templates for Future Projects Summary Tools and Checklist Best Practices Checklist Consolidated Schedules Creating Consolidated Schedules Using a Resource Pool Links across Projects Solving common problems Analyzing the Critical Path across Projects
Build a property sourcing business, negotiation property deals as a sourcing agent or buyer's agent. Be legal and compliant, learning industry best practice as a deal packager.
Apache training course description A hands on training course covering installation, configuration and management of the Apache web server. What will you learn Install Apache. Configure Apache. Manage Apache. Build static and dynamic web sites with Apache. Secure Apache. Apache training course details Who will benefit: Technical staff working with Apache. Prerequisites: TCP/IP foundation for engineers. UNIX fundamentals Duration 3 days Apache training course contents Installing Apache What is Apache? Apache versions, history, downloading Apache, source distribution, compilation, binary distribution, installation, platform considerations. Hands on Downloading and installing Apache. Controlling the Apache server Running Apache, automatic Apache start, starting, stopping, restarting Apache. Checking Apache status. Hands on Server control. Configuration Serving webpages, setting the document root, applying configuration changes, Configuration files, httpd.conf, syntax, directives, modules, utilities, turning features on/off. Hands on basic Apache configuration. More configuration MIME, URL mapping, content negotiation, indexing, performance tuning. Logging log file content, configuration, log file locations, error logging, browser errors, error page configuration, forbidden index pages. Hands on Log files. Security File permissions, .htaccess, protecting files with passwords, password files, authentication, restricting access by IP address. Secure HTTP HTTPS, installing mod_ssl, certificates, configuring mod_ssl, http and https coexistence Virtual hosts Multiple sites on one server, separate configuration files, IP based, name based, port based, virtual host names, enabling, defining, configuring, aliases, testing, https virtual hosts. Hands on Virtual hosts. Dynamic sites Dynamic sites, CGI, PHP, PERL, CGI programs, example CGI scripts, Apache and CGI, CGI parameters, CGI issues, PHP, mod_php, Perl and Apache, mod_perl, installing mod_perl. Hands on CGI, PHP and Perl with Apache. Modules What are modules, standard modules, loading modules, mod_speling, mod_rewrite, other special purpose modules, URL rewriting, redirection, URL transformation, browser dependent pages. Hands on Working with modules.
RQF level 1 Awareness of Safeguarding The RQF Level 1 Awareness of Safeguarding course is designed to provide individuals with a basic understanding of safeguarding principles and practices. It aims to raise awareness about the importance of safeguarding and promote the well-being and protection of vulnerable individuals, such as children, young people, and adults at risk. The course covers the following topics: Introduction to Safeguarding: Definition and importance of safeguarding. Key legislation, policies, and guidance related to safeguarding. Roles and responsibilities of individuals and organizations in safeguarding. Types of Abuse and Neglect: Overview of different types of abuse, including physical, emotional, sexual, and financial abuse. Recognizing signs and indicators of abuse and neglect. Understanding the impact of abuse on individuals' well-being. Vulnerable Groups: Identifying vulnerable groups, such as children, young people, older adults, and individuals with disabilities or mental health issues. Understanding the specific safeguarding concerns and considerations for each group. Reporting and Responding to Safeguarding Concerns: Procedures for reporting safeguarding concerns or disclosures. Understanding the importance of maintaining confidentiality and handling sensitive information appropriately. Responding to safeguarding concerns in a timely and appropriate manner. Promoting Safeguarding and Preventing Abuse: Strategies for promoting a safe and inclusive environment. Recognizing potential risk factors and implementing preventative measures. Understanding the importance of creating a culture of safeguarding within organizations. Multi-Agency Collaboration: Collaboration between different agencies and organizations involved in safeguarding, such as social services, law enforcement, and healthcare. Sharing information and working together to ensure effective safeguarding practices. Case Studies and Scenarios: Reviewing case studies and scenarios to apply safeguarding principles and practices. Analysing potential safeguarding dilemmas and decision-making processes. Personal Responsibilities: Recognizing personal boundaries and limitations when working with vulnerable individuals. Understanding the importance of self-care and managing emotional well-being when dealing with safeguarding issues. It is important to ensure that the course meets local safeguarding guidelines and requirements. Suitability - Who should attend? The RQF Level 1 Awareness of Safeguarding course is suitable for a wide range of individuals who may come into contact with vulnerable individuals or have a general interest in understanding safeguarding principles. Here are some key groups of people who should attend the course: Employees and Staff: The course is relevant for employees and staff members across various sectors and industries, including but not limited to education, healthcare, social services, hospitality, sports and recreation, and community organizations. It helps them develop a basic understanding of safeguarding principles and their responsibilities in ensuring the well-being and protection of vulnerable individuals they may encounter in their work. Volunteers: Individuals who volunteer their time and services in organizations that work with vulnerable individuals should attend the course. It equips them with essential knowledge and awareness of safeguarding issues, helping them provide appropriate support and maintain the safety and dignity of those they interact with. Parents and Caregivers: The course can benefit parents, guardians, and caregivers by providing them with a foundation in safeguarding principles. It helps them recognize potential risks and signs of abuse or neglect, enabling them to create safer environments for the children or vulnerable individuals under their care. Community and Youth Workers: Individuals involved in community work, youth organizations, or youth clubs should attend the course to enhance their understanding of safeguarding. It enables them to promote the well-being and safety of young people and recognize signs of potential abuse or exploitation. Volunteers or Trustees of Charitable Organizations: Individuals serving as volunteers or trustees in charitable organizations that work with vulnerable populations can benefit from the course. It helps them fulfill their responsibilities in safeguarding the individuals the organization serves and ensures they are aware of their legal and ethical obligations. General Public: The course is open to the general public as it provides valuable knowledge and awareness of safeguarding principles. It can benefit individuals who have an interest in understanding the rights and protection of vulnerable individuals in society. It's important to note that the RQF Level 1 Awareness of Safeguarding course provides foundational knowledge and awareness. For individuals who require more in-depth training or who have specific safeguarding roles or responsibilities, higher-level courses may be more suitable. Outcome / Qualification etc. Certification The qualification does not have an expiry date but refresher training and keeping up to date with changes to policies, procedures and new legislation through ongoing CPD is vital. Training Course Content Module 1 Introductions Module 2 Safeguarding legislation and guidance Module 3 Roles and responsibilities Module 4 Abuse and neglect Module 5 Identifying concerns and disclosure Module 6 Making judgements Module 7 Reporting concerns Module 8 Course closure and assessment MODULE 1 INTRODUCTIONS Session content Trainer/Assessor introduction Learner introductions Course syllabus Learning outcomes and assessment criteria Session duration 20 minutes MODULE 2 SAFEGUARDING LEGISLATION AND GUIDANCE Session content Introduction to safeguarding Definitions Assessment framework Safeguarding statistics Safeguarding legislation and guidance Rights of a child/adult at risk Session duration 40 minutes MODULE 3 ROLES AND RESPONSIBILITIES Session content Safeguarding partnerships Local authority safeguarding officer Social care services Multi-agency safeguarding hubs Organisational safeguarding policies Safeguarding lead Session duration 30 minutes MODULE 4 ABUSE AND NEGLECT Session content Definitions Types of abuse and neglect Physical abuse Emotional abuse Sexual abuse Neglect Signs and indicators Parent/carer abuse Radicalisation FGM Forced marriage Modern slavery County line gangs Electronic media abuse - Internet and social networking dangers Session duration 50 minutes MODULE 5 IDENTIFYING CONCERNS AND DISCLOSURE Session content Identifying concerns Being a point of disclosure Recording disclosure information Session duration 20 minutes MODULE 6 MAKING JUDGEMENTS Session content Child development needs Identifying a safeguarding concern Group activity making judgements Session duration 30 minutes MODULE 7 REPORTING CONCERNS Session content Silencing factors Barriers to raising concerns Reporting concerns Importance of sharing concerns Session duration 20 minutes MODULE 8 COURSE CLOSURE AND ASSESSMENT Session content Course summary Assessment paper Course evaluation Course closure Session duration 30 minutes Course delivery details Qualification delivery The qualification has 4 assigned guided learning hours (GLH) and 5 hours total qualification time (TQT). GLH indicates the number of classroom contact hours that the learner will undertake. TQT includes GLH but also takes into account any unsupervised learning and is an estimate of how long the average learner will take to complete the qualification. The minimum classroom contact time of 4 hours should be delivered over a minimum of half a day. The course can be spread over a maximum of 2 weeks, ensuring that each session is a minimum of two hours. The class ratio for this qualification is a maximum of 16 learners to 1 Trainer/Assessor Why choose Madeleys First Aid Plus Founded in 2021 after Louise left 30 years in the NHS as an Advanced practitioner in A&E/ITU, had spent 1.5 years in Covid ITU Won FSB Best start-up business in the West Midlands in May 2023 Now trained 100's of delegates in Physical and Mental Health First Aid Expenses Travel costs and lunch required, there are many cafes and sandwich bars here in Much Wenlock to buy your lunch, you may eat it in the training room. All training material, books, qualification certificates are included in the price Continuing Studies The RQF Level 1 Awareness of Safeguarding course serves as an introductory course that provides individuals with a basic understanding of safeguarding principles. While it is a standalone qualification, individuals who complete the course may choose to progress further in their safeguarding training and education. Here are some potential progression options: RQF Level 2 Award in Safeguarding: This qualification builds upon the knowledge gained in the Level 1 course and provides a more comprehensive understanding of safeguarding principles, policies, and procedures. It covers topics such as risk assessment, responding to safeguarding concerns, and effective communication in safeguarding contexts. Specialized Safeguarding Courses: Individuals who wish to focus on specific areas of safeguarding can pursue specialized courses related to their field of interest. These courses may include Child Protection, Adult Safeguarding, Domestic Abuse Awareness, Online Safety, or Safeguarding in Healthcare. Specialized courses delve deeper into the specific risks, regulations, and best practices associated with safeguarding vulnerable individuals in those particular contexts. Safeguarding Training for Specific Professions: Many professions have specific safeguarding training requirements tailored to their sector. For example, teachers may need to complete safeguarding training specific to the education setting, healthcare professionals may have training focused on safeguarding vulnerable patients, and social workers may have specialized safeguarding training in line with their role. Progression may involve undertaking profession-specific safeguarding courses or qualifications. Safeguarding Leadership and Management Training: Individuals in supervisory or managerial positions may consider pursuing training that focuses on the leadership and management aspects of safeguarding. This can include courses on developing and implementing safeguarding policies and procedures, managing safeguarding incidents, conducting internal investigations, and providing guidance and support to staff. Continued Professional Development (CPD): Engaging in ongoing CPD activities is essential for staying updated with the latest developments in safeguarding practices and policies. Individuals can attend conferences, workshops, or seminars related to safeguarding, child protection, or specific areas of interest within the field. This allows for continued learning and networking with other professionals. Higher Education: Individuals who wish to pursue a more in-depth study of safeguarding can consider higher education programs in social work, psychology, criminology, or related fields. These programs provide comprehensive knowledge and training in safeguarding practices, policies, and research. They may lead to professional certifications or degrees that enhance career opportunities in safeguarding roles. It's important for individuals to research and explore progression options that align with their specific career goals, interests, and local requirements. Different countries or regions may have varying certification or training requirements for safeguarding roles, so it's advisable to check with relevant regulatory bodies or professional associations for specific guidance.
About this Virtual Instructor Led Training (VILT) This 4 half-day Virtual Instructor Led Training (VILT) course will address a variety of contract and loan structuring issues associated with geothermal energy projects as well as comparison with solar, wind and battery storage. The course is designed to investigate how various project finance techniques and contract structures can be used to achieve a competitive power prices while maintaining a satisfactory equity return. Distinctive project finance features of power facilities that depend on geothermal, wind, hydro or solar resources will be evaluated with financial models. The course will cover economic analysis of exploration and development of geothermal facilities and how to incorporate probability of failure and success into an IRR framework. Subsequent sessions will address the theory underlying liquidated damages for delay, and performance as well as design of other incentives that is inherent in different contract structures. Nuanced project finance issues associated with structuring debt for renewable projects will be discussed including under what conditions the DSCR drives debt capacity and when the debt to capital ratio is instrumental. The course will be taught with a combination of theoretical discussions, term sheet review and focused financial models. Training Objectives Evaluation of the economic risks that arise from uncertainty associated with drilling exploration wells and development wells for geothermal projects. Analyse the theoretical issues with computing LCOE for geothermal projects compared to other renewable and non-renewable resources and the importance of cost of capital for renewable projects; Understand differences in contract structures for renewable projects and dispatchable projects and how a single price structure can distort incentives for efficient construction and operation; Understand components of financing that influence the bid price required to meet a required rate of return on equity and can result in relatively low prices with reasonable returns. Understand the importance of debt sizing constraints and what strategies are relevant when the debt to capital constraint applies relative to when the debt service coverage ratio drives the debt size; Understand how to compute P50, P90 and P99 for different projects driven by resource risk; Understand the difference between mean reverting resource variation and estimation mistakes that do not correct as the basis for 1-year P90 and 10-year P90. Understand under what conditions debt sculpting can affect returns and how synthetic sculpting can be used to increase returns when the DSCR constraint applies. Understand the theory of credit spreads, variable rate debt and interest rates in different currencies and compute the implied probability of default that in inherent in credit spreads. Understand how to evaluate the costs to equity investors and the benefits to lenders for various credit enhancements including DSRA accounts, cash flow sweeps and covenants. Course Level Basic or Foundation Training Methods The VILT will be delivered online in 4 sessions comprising 4 hours per day, with 2 breaks of 10 minutes per day, including time for lectures, discussion, quizzes and short classroom exercises. Trainer Your expert course leader provides financial and economic consulting services to a variety of clients, he teaches professional development courses in an assortment of modelling topics (project finance, M&A, and energy). He is passionate about teaching in Africa, South America, Asia and Europe. Many of the unique analytical concepts and modelling techniques he has developed have arisen from discussion with participants in his courses. He has taught customized courses for MIT's Sloan Business School, Bank Paribas, Shell Oil, Society General, General Electric, HSBC, GDF Suez, Citibank, CIMB, Lind Lakers, Saudi Aramco and many other energy and industrial clients. His consulting activities include developing complex project finance, corporate and simulation models, providing expert testimony on financial and economic issues before energy regulatory agencies, and advisory services to support merger and acquisition projects. Our key course expert has written a textbook titled Corporate and Project Finance Modelling, Theory and Practice published by Wiley Finance. The book introduces unique modelling techniques that address many complex issues that are not typically used by even the most experienced financial analysts. For example, it describes how to build user-defined functions to solve circular logic without cumbersome copy and paste macros; how to write function that derives the ratio of EV/EBITDA accounting for asset life, historical growth, taxes, return on investment, and cost of capital; and how to efficiently solve many project finance issues related to debt structuring. He is in the process of writing a second book that describes a series of valuation and analytical mistakes made in finance. This book uses many case studies from Harvard Business School that were thought to represent effective business strategies and later turned into valuation nightmares. Over the course of his career our key course expert has been involved in formulating significant government policy related to electricity deregulation; he has prepared models and analyses for many clients around the world; he has evaluated energy purchasing decisions for many corporations; and, he has provided advice on corporate strategy. His projects include development of a biomass plant, analysis and advisory work for purchase of electricity generation, distribution and transmission assets by the City of Chicago, formulation of rate policy for major metro systems and street lighting networks, advocacy testimony on behalf of low income consumers, risk analysis for toll roads, and evaluation of solar and wind projects. He has constructed many advisory analyses for project finance and merger and acquisition transactions. Lastly, our key course expert was formerly Vice President at the First National Bank of Chicago where he directed analysis of energy loans and also created financial modelling techniques used in advisory projects. He received an MBA specializing in econometrics (with honours) from the University of Chicago and a BSc in Finance from the University of Illinois (with highest university honours). POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations
Concise Cisco routers course description A fast paced practical hands on introduction to Cisco routers concentrating on basic product knowledge needed for the real world. Starts with the basics of routing through configuring static routes, RIP, OSPF, and EIGRP ending with access lists. Hands on sessions follow all the major chapters with a major practical at the end to reinforce all that was learnt in the course. What will you learn Use the Cisco setup script. Use the Cisco command line. Perform basic troubleshooting. Configure - Interfaces - RIP, IGRP - OSPF, EIGRP Concise Cisco routers course details Who will benefit: Anyone who will be working with Cisco routers. In particular: Network Administrators, Field engineers, Network support personnel Prerequisites: None, although a knowledge of the TCP/IP protocols would be advantageous. Duration 3 days Concise Cisco routers course content Basics of routing What are routers? Network protocols, Routing protocols. The Cisco routers Router models, The IOS, DRAM, SRAM, NVRAM, Flash, ROM and boot flash. Getting started Accessing the router, installing a Cisco, using the setup script. The command line interface User and privilege modes, online help show, debug, basic troubleshooting Configuring Ciscos The configuration editor, Global, major and sub commands, enable, secret and other passwords, telnet. Miscellaneous exercises Buffered logging, web access, CDP⦠Subnetting IP addressing rules. The need for subnetting, subnet masks, Calculating network numbers. Configuring Interfaces Basics, Ethernet, Serial lines, PPP, DCE, loopback interfaces. Static routes Why use static routes? Configuring static routes, default routes. Configuring RIP and IGRP How they work, configuration, troubleshooting. OSPF Configuration and troubleshooting. EIGRP Configuration and troubleshooting. Housekeeping Configuration management, offline editing and TFTP usage. Cisco boot sequence, IOS upgrades. Bypassing Cisco passwords. Access lists What are access lists? General rules, basic and extended IP access lists. Putting it all together A series of exercises based around, installs, adds, moves, changes, upgrades and troubleshootin
Red Hat training course description This three day hands on course provides a comprehensive coverage of core Linux administration tasks on Red Hat Linux. What will you learn Administer & configure Linux systems. Maintain Linux by handling disk space and taking regular backups. Manage software packages. Perform basic troubleshooting. Maintain a secure Linux system. Describe the organisation and implementation of the filesystem. Red Hat training course details Who will benefit: System administrators. Network administrators. Prerequisites: Linux fundamentals Duration 3 days Red Hat training course contents Managing software Package Concepts, RPM, rpm Commands, Yum, Dependencies and Conflicts, Startup Script Problems, Shared Libraries, Library Management, Managing Processes, the Kernel: The First Process, Process Lists, Foreground & Background Processes, Process Priorities, Killing Processes. Configuring hardware Configuring Firmware and Hardware, IRQs, I/O Addresses, DMA Addresses, Boot Disks, Coldplug and Hotplug Devices, Configuring Expansion Cards and PCI Cards, Kernel Modules, USB Devices, Linux USB Drivers, Configuring Hard Disks, Partitioning Systems, LVM, Common Layouts, Creating Partitions and Filesystems, Maintaining Filesystem Health, Tuning, Journals, Checking Filesystems, Monitoring Disk Use, Mounting and Unmounting Filesystems. Managing files File Management Commands, File Naming and Wildcards, File Archiving, Links, Directory Commands, File Ownership and Group, File access control, Permissions, chmod, Defaults, File Attributes, Disk Quotas, Enabling and setting Quotas, Locating Files, The FHS. Booting Linux and editing files Installing Boot Loaders, GRUB Legacy, GRUB 2, Alternative Boot Loaders, the Boot Process, Boot Messages, Runlevels and the Initialization Process, Runlevel Functions, Runlevel Services, Alternative Boot Systems , Upstart, system. Administering the system Managing Users and Groups, Tuning User and System Environments, Using System Log Files, Understanding syslogd , Setting Logging Options, Manually Logging Data, Rotating Log Files, Reviewing Log File Contents, Maintaining the System Time, Linux Time Concepts, Manually Setting the Time, Using NTP, Running Jobs in the Future, Understanding the Role of cron, Creating System cron Jobs, Creating User cron Jobs, Using anacron, Using at. Configuring basic networking TCP/IP, Network Hardware, Network Addresses, Hostnames, Network Ports, Configuring Linux for a Local Network, Configuring with DHCP, Static IP Address, Configuring Routing, Using GUI Configuration Tools, ifup and ifdown, Diagnosing Network Connections, Testing Connectivity, Tracing a Route, Checking Network Status , Examining Network Traffic, Additional Tools. Securing your systems Administering Network Security, Super Server Restrictions, Disabling Unused Servers, Administering Local Security, Securing Passwords, Limiting root Access, Setting Login, Process, SUID/SGID Files, Configuring SSH, Using GPG, Generating, Importing and Revoking Keys, Encrypting and Decrypting Data, Signing Messages and Verifying Signatures. Clustered File Systems Principles of cluster file systems. Create, maintain and troubleshoot GFS2 file systems in a cluster, create, maintain and troubleshoot OCFS2 file systems in a cluster, Integration of GFS2 and OCFS2 with Pacemaker, the O2CB cluster stack, other commonly used clustered file systems.
Data has become the most important resource for every organisation – but the insights gained from data analysis will only ever be truly valuable if they can be clearly expressed to other people. This course is for anybody who works with data, and needs to communicate the meaning that's in the numbers to colleagues, customers, bosses or external stakeholders. It will give you or your team the confidence and skills to translate raw data into compelling visual stories for your key audiences. The principles and skills covered apply to the simplest PowerPoint chart, to more complex interactive visualisations. We’ll work with you before the course to ensure that we understand your organisation and what you’re hoping to achieve. Sample learning content Session 1: What makes a great data-driven story The key elements of a successful infographic or presentation. Industry best practice, and discussion of good (and bad) examples. A simple framework for identifying the Audience, Story and Action. Session 2: Data in context How to balance function and aesthetic appeal. Identifying the right graph, chart, infographic or other visual. Framing the data and providing contextual information. Session 3: Designing for the human brain Using colours to add emphasis and meaning. Design and layout principles, and creating hierarchies of information. The principle of ‘self-sufficiency’, and removing clutter. Session 4: Navigation and narrative Tailoring visualisations for different types of communications. Structuring presentations and longer reports. Thinking in layers to create interactive dashboards. Delivery We deliver our courses over Zoom, to maximise flexibility. The training can be delivered in a single day, or across multiple sessions. All of our courses are live and interactive – every session includes a mix of formal tuition and hands-on exercises. To ensure this is possible, the number of attendees is capped at 16 people. Tutor Alan Rutter is the founder of Fire Plus Algebra. He is a specialist in communicating complex subjects through data visualisation, writing and design. He teaches for General Assembly and runs in-house training for public sector clients including the Home Office, the Department of Transport, the Biotechnology and Biological Sciences Research Council, the Health Foundation, and numerous local government and emergency services teams. He previously worked with Guardian Masterclasses on curating and delivering new course strands, including developing and teaching their B2B data visualisation courses. He oversaw the iPad edition launches of Wired, GQ, Vanity Fair and Vogue in the UK, and has worked with Condé Nast International as product owner on a bespoke digital asset management system for their 11 global markets. Testimonial “I was familiar with Alan’s work as a Guardian Masterclass instructor on data visualisation and digital journalism, which made it easy for me to recommend him for onsite training at the Liverpool School of Tropical Medicine. We had a large group of people interested in honing their abilities to depict their research and stories in engaging ways. Alan’s course provided great insight about common communication pitfalls and how to avoid them, how to become better communicators by understanding the audience diversity, and it showcased some great online tools for creating infographics. This should be mandatory training for all students, academics, report writers and those involved with conveying research to the media as it will help increase the clarity and accessibility of our own research stories.” Dr Lee Haines | Liverpool School of Tropical Medicine
IS-IS training course description A hands on course on IS-IS link state routing protocol. The main focus of the course is the use of IS-IS in an IP only environment but can be tailored to concentrate on the use of IS-IS in CLNP networks. Hands on sessions use Cisco routers. What will you learn Configure and troubleshoot IS-IS. Explain how IS-IS works. Describe the use of Level 1 and Level 2. Design IS-IS networks. IS-IS training course details Who will benefit: Network administrators. Network operators. Prerequisites: TCP/IP Foundation for engineers Duration 2 days IS-IS training course contents Introduction The history of IS-IS, OSI background, terminology, addressing, how OSI networking works, ES-IS, ISIS, IS types, basic OSI configuration, other configuration parameters. Running IS-IS in an IP environment Integrated routing, Dual IS-IS, OSI only IS-IS, IP only IS-IS, packet formats and the use of CLNP, Basic configuration. How IS-IS works in detail Link state theory, tuneable parameters, IS-IS metrics, hellos, CSNP intervals, retransmissions, TLVs, Sub TLVs, Designated routers and pseudo nodes, authentication. Level 1 and level 2 in detail Router types, circuit types, Hot potato routing, route leaking, Area partitioning. Multiple addresses Redistribution and summarisation Tagging and filtering