• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

702 Other courses in Birmingham

Time Management for Healthcare Professionals

By M&K Update Ltd

This workshop is designed to help you manage your time more effectively. It will explore issues with time management, prioritisation and delegation, managing meetings and emails, Managing other peoples priorities and action planning.

Time Management for Healthcare Professionals
Delivered in person or OnlineFlexible Dates
Price on Enquiry

Essential SD-WAN

5.0(3)

By Systems & Network Training

Essential SD-WAN training course description SD-WAN is rapidly growing in use. This vendor neutral course starts with an introduction to what SD-WAN is and when it is useful. Each main area of SD-WAN is then studied in more detail to enable delegates to recognise the technologies used in SD-WAN and then use this information to evaluate SD-WAN products. What will you learn Describe what SD-WAN is (and isn't). Explain how SD-WAN works. Evaluate SD-WAN products. Compare and contrast SD-WAN with other technologies such as MPLS, Ethernet, SDN, NFV and WAN optimisation. Essential SD-WAN training course details Who will benefit: Anyone wishing to learn about SD-WAN. Prerequisites: Network fundamentals. Duration 1 day Essential SD-WAN training course contents What is SD-WAN? What is SD and SDN? What is WAN? Branch/ Office. MPLS, MPLS vs Internet, Ethernet, Broadband, LTE/4G, Cable, Satellite. The impact of the cloud. Single console, Dynamic path selection, automation. Why SD-WAN? Single console Network management, orchestration, administration. Example GUI interfaces. Northbound and southbound APIs. Dynamic path selection SD-WAN transports, Overlay networks, security. VPNs, IPsec. QoS and prioritization. Policies, traffic path rules. Application specific routing, bonding, optimisation. Automation Time saving, removing errors. Zero touch, ZOOM, ZTP. The role of the orchestrator. Real time monitoring of the network. APIs. Architecture and products Hardware solutions, software solutions, virtual appliances. Clouds. SD-WAN edge devices, SDWAN controllers, Orchestrators. HA and SD-WAN. Riverbed, Cisco, Juniper, others. Summary SD-WAN doesn't replace MPLS, virtualisation and SD-WAN. Relationship with SDN and NFV. SDWAN versus WAN optimisation.

Essential SD-WAN
Delivered in Internationally or OnlineFlexible Dates
£1,397

Linux for network engineers

5.0(3)

By Systems & Network Training

Linux training course description A Linux foundation appropriate for all flavours of Linux, focussed on getting network engineers up and running with Linux. The command line is used throughout. The course progresses from the basics of Linux commands onto useful tools such as grep, then shell features such as piping and then onto shell scripting. Administration aspects covered are the tasks network engineers are most likely to encounter such as software installation. Hands on exercises concentrate on network related tasks such as installing net-snmp and using shell scripts to provide network automation. What will you learn Use Linux commands to perform a variety of tasks from manipulating files to handling processes. Create and edit files with vi. Work with permissions. Write simple shell scripts. Install software packages. Configure base networking. Linux training course details Who will benefit: Network engineers. Prerequisites: TCP/IP Foundation Duration 5 days Linux training course contents What is Linux? Linux distributions, open source software. Getting started Logging in, changing passwords, logging out. Hands on Basics and root access. Linux basics Command structure. The Linux manuals, basic commands (who, date, tty, uname, echo, banner...). Hands on Using the CLI. Connecting to a network IP configuration, DHCP, static addressing, routing, ifconfig, ping, netstat, traceroute, dig. Hands on Network configuration and testing. Managing Software Package Concepts, Comparison of package formats, RPM, rpm Commands, Yum, Debian Packages, dpkg, apt-cache, apt-get, dselect, aptitude, Converting Between Package Formats, Dependencies and Conflicts, Startup Script Problems, Shared Libraries, Library Management Hands on Installing network packages such as nmap and net-snmp. Processes and log files ps, kill, background processes, at, exec, priorities. Managing Linux log files. Syslogd. Setting the time. Cron and cronjobs. Managing Processes, the Kernel: The First Process. Hands on Controlling daemons and services. Setting up a TFTP server. Filesystem commands Home directories, manipulating files and directories, Filesystem layout, Pathnames, hard and symbolic links. Viewing files. Hands on Exploring the filesystem, working with network device configuration files. The Linux editors ed, vi, shell escapes, .exrc. Hands on Editing network device configuration files. Extracting data from files grep, find, cut, sort and paste… Hands on Working with syslog files. Permissions Theory, chmod, chown, newgrp. Hands on Handling permission problems. The shell Metacharacters, piping and redirection. Hands on Running SNMP commands and working with their output. Basic shell scripting What are shell scripts? Simple scripts, control structures. Variable. Setting variables, using variables, set, scope, export, sourcing, environmental variables, read. Positional parameters: $0 to $9, $#, $* and others. shift parameter substitution. Control statements: The test command, if , while loops, for loops, the case statement. Hands on Automating network tasks. Customising your environment Environmental variables, stty, .profile and other startup files. Hands on Customising Linux. Introduction to administration The root user, su. Managing users and groups. Hands on The power of root. Archiving files Backups, tar, cpio, dd, gzip. Hands on Working with tar files. Booting Linux and Editing Files Installing Boot Loaders, GRUB Legacy, GRUB 2, Alternative Boot Loaders, the Boot Process, Boot Messages, Runlevels and the Initialization Process, Runlevel Functions, Runlevel Services, Alternative Boot Systems , Upstart, system. Hands on Installing network services on Linux.

Linux for network engineers
Delivered in Internationally or OnlineFlexible Dates
£2,797

SAFe Advanced Scrum Master: In-House Training

By IIL Europe Ltd

SAFe® Advanced Scrum Master: In-House Training Prepare to step into a SAFe® leadership role and learn how to facilitate Agile team, program, and enterprise success by becoming a SAFe® 5 Advanced Scrum Master (SASM). This course prepares current Scrum Masters for their leadership role in facilitating Agile team, program, and enterprise success in a SAFe® implementation. Explore facilitation of cross-team interactions in support of program execution and relentless improvement. Expand the Scrum paradigm with an introduction to scalable engineering and DevOps practices, the application of Kanban to facilitate the flow of value, and supporting interactions with architects, product management, and other critical stakeholders. Learn actionable tools for building high-performing teams and explore practical ways of addressing Agile and Scrum anti-patterns in the enterprise. What you will Learn To perform the role of a SAFe® Advanced Scrum Master, you should be able to: Apply SAFe® principles to facilitation, enablement, and coaching in a multi-team environment Build a high-performing team and foster relentless improvement at scale Address Agile and Scrum anti-patterns Support the adoption of engineering practices, DevOps, and Agile architecture Learn to apply Kanban and Extreme Programming (XP) frameworks to optimize flow and improve the team's work Facilitate program planning, execution, and delivery of end-to-end systems value Support learning through participation in communities of practice and innovation cycles Exploring the Scrum Master role in the SAFe® enterprise Applying SAFe® Principles: A Scrum Master's perspective Exploring Agile and Scrum anti-patterns Facilitating program execution Improving flow with Kanban and XP Building high-performing teams Improving program performance with Inspect and Adapt

SAFe Advanced Scrum Master: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,795

Drill String Design & Drilling Optimization

By EnergyEdge - Training for a Sustainable Energy Future

About this Training Course The drill string is the simplest piece of equipment in use on a drilling rig and at the same time, the most critical piece. We use the qualifier 'basic' because although 99% of the drill string comprises plain tubes that are just screwed together, the lowest section, just above the bit, can go to extreme loading and is fitted with highly sophisticated electronics packages providing both positional and lithological data as well as a steering system to drive and orient the bit. The principle tasks of the drill string are also deceptively simple. These are to: Convey each drill bit to the bottom of the hole and then to retrieve it when worn, Act as a conduit to convey drilling fluid at high pressure down to the bit and Transmit torque from surface to bit, occasionally in concert with a hydraulic motor to drive this bit. This 3 full-day course will cover in detail what it takes to decide on minimum drill string specifications, which are able to support the loads to which it will be subjected. In addition to the need to use a drill string with minimum strength requirements, we also need to ensure that we can prevent drill string failure. If the failure consists of a small split or leak of any kind, then the time involved may be little more than that required for a roundtrip to change the bit. If the string parts, then the recovery is likely to take a considerable amount of time. In a worst case scenario, the fish in the hole may prove impossible to retrieve, requiring a sidetrack. A less than optimal design of the string will reduce the efficiency of the operation and almost always leads to premature bit wear. This is particularly true when we are unable to measure and control the dynamics of the drill string as a whole and the bottomhole assembly in particular. Axial vibrations, torsional vibrations and lateral vibrations may take place in various degrees of severity. The behaviour of the drill string while operating under torsional vibrations is thought to be of great importance and may result in torsional buckling. This course will also cover the drilling optimization limiters, how to identify them and how to remove them. This is done by understanding the drill string dynamics - by operating under the most favourable conditions and by measuring the dynamics in the vicinity of the bit (or at the bit) in order to make timely adjustments. Training Objectives The course homes in what office staff needs to know and plan for and what field staff needs to know and implement. By the end of this course, participants will be familiar with: Critical dimensions of common drill pipe and weld-on tool joints and its relation to yield for calculation of tensile, torsional and burst resistance. Make-up torque of connections that relate to the tool joint dimensions and the torsional strength of that connection. Use of design factors and safety factors on tensile and torsional strength in relation to new and worn state. Conditions which could lead to drill pipe collapse. Situations where limitations on sinusoidal (snake) and helical buckling will apply and the influence of radial clearance and deviation. Failure of drill pipe (fatigue) and the circumstances under which these would occur (rotation across doglegs, pipe in compression etc). Mechanism under which hardbanding would induce casing wear and the methods applied to measure and prevent any significant wear. Drill pipe inspection methods we apply to identify early flaws/cracks/corrosion, to measure dimensions, to inspect tool joints etc. Common BHA components, including heavy wall drill pipe, their external/internal dimensions, connections (API, proprietary) and appearance (such as spiral). Significance of thread compounds to ensure the correct make-up torque is applied. Significance of drill string/BHA 'neutral point' in the context of drill string component failure. Basic design principles for a BHA make-up in a vertical, low/medium deviated and highly deviated well in terms of weight transfer and drag/torque. Stabilization principles for a pendulum (vertical), a stabilized (vertical or tangent), a build and a drop-off assembly. BHA design and stabilization in relation to mitigation/elimination of vibration and to the elimination of tension, torsion or fatigue failure. Matching bit aggressiveness, gauge length, BHA stabilization, steerability and Mechanical Specific Energy (MSE) to mitigate the severity of any vibration. Bit efficiency and reduction of wear by understanding mechanical and hydraulic limiters. How to perform a passive or active drill-off test. Importance of being conversant with API 7G RP and/or equivalent data books, to look up/check the recommended tensile/torque and other parameters for the drill string in use. Target Audience This course is intended for staff directly or indirectly involved in the delivery of challenging wells such as junior to senior well engineers, both in office-based planning and operations and field-based operator/contractor supervisory staff such as company men and toolpushers. Trainer Your expert course leader has over 45 years of experience in the Oil & Gas industry. During that time, he has worked exclusively in the well engineering domain. After being employed in 1974 by Shell, one of the major oil & gas producing operators, he worked as an apprentice on drilling rigs in the Netherlands. After a year, he was sent for his first international assignment to the Sultanate of Oman where he climbed up the career ladder from Assistant Driller, to Driller, to wellsite Petroleum Engineer and eventually on-site Drilling Supervisor, actively engaged in the drilling of development and exploration wells in almost every corner of this vast desert area. At that time, drilling techniques were fairly basic and safety was just a buzz word, but such a situation propels learning and the fruits of 'doing-the-basics' are still reaped today when standing in front of a class. After some seven years in the Middle East, a series of other international assignments followed in places like the United Kingdom, Indonesia, Turkey, Denmark, China, Malaysia, and Russia. Apart from on-site drilling supervisory jobs on various types of drilling rigs (such as helicopter rigs) and working environments (such as jungle and artic), he was also assigned to research, to projects and to the company's learning centre. In research, he was responsible for promoting directional drilling and surveying and advised on the first horizontal wells being drilled, in projects, he was responsible for a high pressure drilling campaign in Nigeria while in the learning centre, he looked after the development of new engineers joining the company after graduating from university. He was also involved in international well control certification and served as chairman for a period of three years. In the last years of his active career, he worked again in China as a staff development manager, a position he nurtured because he was able to pass on his knowledge to a vast number of new employees once again. After retiring in 2015, he has delivered well engineering related courses in Australia, Indonesia, Brunei, Malaysia, China, South Korea, Thailand, India, Dubai, Qatar, Kuwait, The Netherlands, and the United States. The training he provides includes well control to obtain certification in drilling and well intervention, extended reach drilling, high pressure-high temperature drilling, stuck pipe prevention and a number of other ad-hoc courses. He thoroughly enjoys training and is keen to continue taking classes as an instructor for some time to come. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Drill String Design & Drilling Optimization
Delivered in Internationally or OnlineFlexible Dates
£1,461 to £1,699

Essential Lawful Intercept

5.0(3)

By Systems & Network Training

Lawful Intercept training course description Packet based networks require a different approach to Lawful Intercept (LI) than that used in circuit switched networks. This course focuses on what Lawful Interception and Data Retention (DR) means to communications service providers in the IP and NGN areas. The course assumes a basic knowledge of IP networking (i.e. DNS, TCP/UDP, IP, RTP) and the building of services on an IP platform (e.g. SIP, SDP, FTP, HTTP). The course first looks at the regulatory context for LI and DR and how this is translated to a practical architecture. What will you learn Recognise the legal and regulatory obligations to provide LI and DR. Identify the components of the handover architecture for each of LI and DR. Identify the preferred location of points of interception and points of retention in the IP network. Map intercepted material to handover protocols. Understand the data mapping defined in the available standards for both LI and DR. Lawful Intercept training course details Who will benefit: Technical and managerial staff needing to implement public networks. Prerequisites: TCP/IP Foundation Duration 1 day Lawful Intercept training course contents What is meant by LI and DR? Review of regulation: Data protection Directive; Data Retention Directive; RIPA. LI architectures Handover and Interception: ETSI standards ES 201 671 and TS 102 232. LI handover protocol IRI and CC handover; correlation; manual interfaces. DR architectures Handover of query results; points of retention. DR query command set Retrieval of retained records. Security concerns Operation privacy; target privacy; storage and transmission integrity. Implementation Identifying PoI and PoR for provided services. LI and DR wrap up Interaction with other services, storage obligations (volume, time, availability).

Essential Lawful Intercept
Delivered in Internationally or OnlineFlexible Dates
£1,397

About this Training Course This 3 full-day course will provide insights into many aspects of operating the modern refinery as a business. This will include technical information on refining processes, crude oils and processing options, the place of the refinery in the value chain, refinery cost structure and management, optimization and profit margin, energy and oil loss reduction. This course will also address important management tools and techniques used for economic evaluations in refineries including future trends. This course will include presentations, simulations, a trading game, and exercises. This is an interactive session where participants can propose relevant topics upfront to discuss during class. This course can be further tailored for inexperienced or experienced personnel. Further customization can also include addressing a specific refinery, plant or unit. The option for post-course consultancy or help-desk support is also available. This course can also be offered through Virtual Instructor Led Training (VILT) format. Training Objectives By participating in this highly intensive course, participants will be able to: Understand the main functions in refining processes, configurations and its operating characteristics Analyse the choice of crude, processing options and desired products and product quality parameters Closely review refinery economics and planning, margins, costing & valuation including trading Apply the methodology of refinery optimization and product improvement Gain an application of analytical tools to refinery management, supply chain and their economic drivers Appreciate the current challenges, opportunities and future trends impacting the refining industry Target Audience This course will benefit all refinery technical personnel, operations' process engineers and process managers, technical services engineers and managers, refinery planners, newly-hired refinery personnel and current semi-technical personnel who require introductory training to acquire the broader perspective of refinery economics and supply. Course Level Basic or Foundation Trainer Your expert course leader is a passionate world-class expert with 35 years of international experience in Crude Oil, Refinery Planning and Masterplanning, Process Modelling, LP Modelling and Optimization Best Practices. He has a sound understanding of refinery processes and economics. After retiring from Shell in 2020, he is now a principal consultant for Crude Oil & Refinery Modelling. He enjoys dealing with challenging technical problems and opportunities to deliver value through practical solutions. He has a hands-on mentality, is flexible and builds strong relationship with clients. During his career, he coached many engineers and delivered countless inhouse and external courses on crude oil, hydrocracking and general refinery processes and economics at the Shell Open University and many other client locations. He authored and co-authored several publications and presentations at international conferences and has three patents to his name. He understands how to deliver outstanding services in sometimes difficult cultural and commercial situations, having worked for clients around the world. He works effectively in multi-disciplinary teams, has strong analytical and problem-solving skills as well as excellent consulting, facilitation and interpersonal and multilingual skills. He has an MSc in Chemical & Agricultural Engineering (cum laude) and a BSc in Chemical & Agricultural Engineering from the University Ghent, Belgium. He is currently the Principal Consultant for Crude Oil & Refinery Modeling at Petrogenium, the international, independent, technical consultancy in oil refining, petrochemicals, oil & gas production & renewable resources. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Refinery & Supply Economics
Delivered in Internationally or OnlineFlexible Dates
£3,783 to £4,399

Concise Cisco switching

5.0(3)

By Systems & Network Training

Concise Cisco switches course description A hands on course covering the product specifics of Cisco switches. Installation, configuration, maintenance and troubleshooting are all covered in a practical oriented way. VLANs often take up a large part of the course. The course covers all interfaces but concentrates on using the command line interface. Delegates are, however, free to use the web based interface in all exercises. What will you learn Install Cisco switches. Use the command line interface and the web based interface to manage Cisco switches. Configure and troubleshoot Cisco switches. Perform software upgrades and maintain configurations using TFTP. Concise Cisco switches course details Who will benefit: Anyone working with Cisco switches. Particularly aimed at engineers and technicians supporting Cisco switches. Prerequisites: None. Duration 2 days Concise Cisco switches course content Ethernet review Single segment Ethernet, CSMA/CD, Broadcast domains, collision domains. Hubs, Extending the LAN. Hands on Hub based Ethernet. Cisco switches What are switches, frame forwarding and filtering, the forwarding database. Hands on Switched based Ethernet. Configuring Cisco switches Accessing the switch, installing the switch, The CLI, connecting PCs using the switch. Hands on Configuring Cisco switches. The command line interface User and privilege modes, online help, show, basic troubleshooting. The configuration editor, Global, major and sub commands, enable, secret and other passwords. Hands on Simple troubleshooting using the CLI. Port configuration Speed, duplex, security, trunking. Hands on Port trunking. Spanning Tree Protocol Spanning Tree, Loops, effect, root bridges, bridge port states, STP reconfiguration. RSTP and variants. Hands on STP. VLANS What are VLANs, configuring VLANs, access ports and trunks, 802.1Q, inter VLAN routing. Hands on Access ports, trunks, layer 3 switching. Housekeeping Configuration management, software management, password recovery. Hands on TFTP. Managing interconnection devices SNMP, RMON, RMON II. Troubleshooting LEDs, CDP, logging, Layer 1, layer 2, layer 3. Hands on Fixing things.

Concise Cisco switching
Delivered in Internationally or OnlineFlexible Dates
£1,497

IP security foundation for engineers

5.0(3)

By Systems & Network Training

IP security training course description Connection to the Internet is becoming an essential business tool. This course looks at firewalls, digital certificates, encryption and other essential topics for e-commerce sites. A generic course that looks at firewalls and VPNs. Hands on sessions include using hacking tools and configuring firewalls. What will you learn Describe: Basic security attacks RADIUS SSL IPSec VPNs Implement digital certificates Deploy firewalls to protect Web servers and users. Secure Web servers and clients. IP security training course details Who will benefit: Network administrators. Network operators. Security auditors Prerequisites: TCP/IP foundation for engineers Duration 2 days IP security training course contents TCP/IP review Brief overview of the relevant headers. Hands on Download software for course, use analyser to capture passwords on the wire. Security review Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits The Internet worm, IP spoofing, SYN attack, hijacking, Ping o' Death… keeping up to date with new threats. Hands on Use a port scanning tool, use a 'hacking' tool. Firewalls Products, Packet filtering, DMZ, content filtering, stateful packet inspection, Proxies, firewall architectures, Intrusion Detection Systems, Viruses. Hands on Set up a firewall and prevent attacks. NAT NAT and PAT, Why use NAT, NAT-ALG, RSIP. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Run a password-cracking program. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, PPP authentication, RADIUS. Hands on Using certificates. Web client and server security Cookies, browser certificates, censorship, PICS. Operating system security, Web server user authentication, Restricting access, Logging, Securing CGI scripts. Hands on Browser security. VPNs and IPSec What is a VPN, tunnelling, L2F, PPTP, L2TP, IPSec, AH, ESP, transport mode, tunnel mode.

IP security foundation for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,497

Transmission demystified

5.0(3)

By Systems & Network Training

Transmission demystified training course description Transmission is the process of sending information along a medium of, copper, fibre or wireless. This course looks at transmission techniques for both telecommunications and data communications with a particular focus on Microwave, SDH, DWDM transmission. The course aims to demystify these technologies by explaining all the buzzwords used in transmission. What will you learn Describe various transmission technologies such as multiplexing and demultiplexing. Explain how Microwave works. Explain how SDH works. Explain how DWDM works. Transmission demystified training course details Who will benefit: Anyone working in telecommunications. Prerequisites: None. Duration 2 days Transmission demystified training course contents Transmission basics Systems, media, signals. Signal degradation, noise, distortion, attenuation. Digital, analogue. Modulation, encoding. RF Frequency, wavelength. Distance / range issues, interference, Antenna, power, dB, RF propagation, testing. Microwave transmission What is microwave transmission, point to point communications, line of sight, parabolic antenna, relays, planning considerations, rain and other issues Wired transmissions Copper, Fibre, optical transmission, fibre characteristics, fibre component parts. Multi Mode Fibre (MMF). Single Mode Fibre (SMF). Fibre connections. Lasers. Attenuations, dispersion, optical signal noise ratios (OSNR) and their effects. Channel Spacing and Signal Direction. Limiting factors to single wavelength. Introduction to SDH Timing and synchronisation of digital signals, the plesiochronous digital hierarchy (PDH), the synchronous digital hierarchy (SDH), service protection with SDH. TDM. SDH6 Standards, basic units, frames, STM1 frame, bit rates, STM0, STM1, STM4, STM16, STM64, STM256, SDH architecture, rings, Add drop multiplexors. SDH network topologies, structure of SDH equipment, SDH synchronisation, protection switching in SDH networks, SDH alarm structure, testing of SDH, equipment and systems, Ethernet over SDH. WDM overview Multiplexing, TDM, WDM benefits. WDM standards. CWDM vs. DWDM. Four Wave Mixing (FWM). Impact and countermeasures to FWM on WDM.tructure of SDH equipment, SDH synchronisation, protection switching in SDH networks, SDH alarm structure, testing of SDH, equipment and systems, Ethernet over SDH. DWDM ITU G.694.1, channel and spacing. Optical Terminal Multiplexers (OTM). Optical Add/Drop Multiplexers (OADM). Adding versus dropping. Optical Amplifiers. Erbium Doped Fibre Amplifiers (EDFA). Transponders and Combiners. Optical and Electrical Cross Connects (OXCs/DXCs). Cross Connect types (Transparent/Opaque). Advantages and disadvantages of various Optical cross connects. IP transmission Telecommunications versus data communications, IP transmission, VoIP, MPLS.

Transmission demystified
Delivered in Internationally or OnlineFlexible Dates
£1,727