Oracle SQL training course description The Oracle SQL course is designed to give delegates practical experience in writing SQL statements and scripts using Oracle SQL. The basic SELECT statement, the use of SQL functions and the basic table and view handling statements are introduced. What will you learn Create SQL statements to query database tables. Use standard aggregate functions and related SELECT statement clauses. Join Tables. Use basic subqueries and the set operators. Use numeric, character and date functions. Use conversion and other miscellaneous functions. Use SQL parameters. Use complex subqueries. Create and alter tables and views. Insert, update and delete rows in database tables. Manage sequences and synonyms. Oracle SQL training course details Who will benefit: Anyone who needs to use and understand Oracle SQL to query and update data in an Oracle database. Prerequisites: None. Duration 3 days Oracle SQL training course contents Retrieving data with the SELECT statement The SELECT statement, The SELECT and FROM clauses, Conditions and the WHERE clause, Other conditional operators, Logical operators, The ORDER BY clause, Column aliases, Arithmetic expressions, Precedence of operators. Aggregate functions Overview of built In aggregate functions, The GROUP BY clause, The HAVING clause. Joining tables Overview of table joins, Inner joins, Table aliases, Outer joins, Self joins, ANSI standard joins. Basic subqueries and set operators Overview of subqueries, Basic subqueries, Set operators, The union, intersect and ,minus operators. Numeric, character and data functions Function types, Using the table dual to try out functions, Numeric functions, Character functions, String concatenation, Date arithmetic and date functions. Conversion and miscellaneous functions Conversion functions, The NVL and NVL2 functions, The DECODE function, CASE expressions, The COALESCE and NULLIF functions. SQL parameters Command line substitution parameters, The accept command, The define and undefine commands. Complex subqueries Subqueries usage, In-line views, Top-N queries, Subqueries with joins, Multi column subqueries, Correlated subqueries, Subquery rules, Using the ANY, ALL and SOME operators. Managing data Inserting rows, Updating rows, Deleting rows, Verifying updates, Transaction control, Commit and rollback, Savepoints, Commits and constraints, Amending data in SQL developer. Managing tables Creating tables, Specifying constraints, Altering tables, columns and constraints, Dropping tables, columns and constraints, Recovering dropped tables, Copying tables. Managing indexes and views Creating indexes, Dropping indexes, Listing indexes, Creating and using views, Dropping views, Listing views. Managing sequences and synonyms Create a sequence, View sequence details, Create a synonym, List synonyms.
BGP training course description A detailed study of BGP, from the basics of how it works through to advanced issues such as route reflectors, policy, filtering, route selection and routing registries. The course culminates with a study of an industrial strength BGP template illustrating important issues such as bogon filtering. Practical hands on with routers follow the major sessions to reinforce the theory. A multiple choice exam, leading to the LAIT III certification, is available after the course. The exam consists of 60 questions and lasts 2 hours. What will you learn Connect enterprises to the Internet, and ISPs to each other. Describe how BGP works. List, describe and configure the main BGP attributes. Implement and troubleshoot BGP. Work with route aggregation and calculate CIDR prefixes in seconds. Influence traffic paths with BGP. BGP training course details Who will benefit: Anyone who will be working with BGP. Prerequisites: TCP/IP Foundation for engineers Definitive IP routing for engineers. Duration 5 days BGP training course contents Basic BGP IGPs, EGPs, What's BGP? BGP RIB, in/out process, tables peers, adding routes. Hands on Simple configuration and troubleshooting. The Internet and peering ASs, AS numbers, Internet structure, ISP types, ISP network design, IXs, peering vs. transit, public/ private peering, bi/multi-lateral peering. Hands on AS information gathering. How BGP works Incremental updates, Path vector protocols, BGP protocol stack, the BGP header, message types, NLRI, withdrawn routes, route refresh, route dampening. Hands on More troubleshooting, packet analysis. MBGP and IPv6 Multiprotocol routing, AFI, SAFI, MBGP and multicasts, IPv6, MPLS VPNs. Hands on IPv6 BGPv4 aggregation CIDR, benefits, techniques, shortcuts, configuring BGP aggregation, leaking routes. Hands on Reducing routing table size. BGP path selection BGP attributes, attribute types, route selection order, Local preference, AS prepend, MEDs. Hands on Influencing traffic with BGP. BGP routing policies What is policy? Examples, route filtering, AS filtering, REs, applying preference selectively, peer groups. Hands on Sophisticated policies. RIPE and routing registries RIRs, Allocations, assignments, PI vs. PA. Objects, RPSL, routing registry, Hands on The RIPE database. Automating BGP configuration Automation tools, whois, IRRToolSet, Bogon lists, tracking bogon lists, HTTP, Peering, routing registries, DNS. Communities What is a community? Community names, communities for: peer types and geography. RFC 1998, default communities. Hands on Setting local preference on other routers. Route servers What are route servers? LINX route servers, route server policy control, What are route collectors, Looking glasses. Hands on Setting up and working with a route server. Peer relationships IBGP, EBGP, next hop self, advertising routes into/out of BGP, synchronisation. Hands on IBGP, troubleshooting a large BGP network. Route reflectors and confederations Full mesh IBGP, Route reflectors, RR configuration and design, confederations, migration issues. Hands on RR configuration. BGP architectures Stub vs. transit AS, when to use BGP, multihoming strategies and issues, default routes. Multihop EBGP, load balancing. Hands on Multihoming. BGP security RFC 7454, security steps, BGP TTL security, filters, RPKI, ROAs, rsync, rrdp, validators. A secure BGP template. Hands on RPKI prefix validation.
UNIX fundamentals training course description An introduction to using the UNIX operating system focussing on the command line. Appropriate for all versions of UNIX. The starting point for all UNIX work, we concentrate on the technical aspects rather than issues such as using browsers. The course is heavily practical in nature. What will you learn Describe UNIX. Log in and use UNIX commands to perform a variety of tasks from manipulating and printing files to looking at and killing processes. Create and edit files with vi. Recognise the role of the administrator. Write simple shell scripts. Customise the user environment. UNIX fundamentals training course details Who will benefit: Anybody who needs to use a UNIX system. Prerequisites: None. Duration 3 days UNIX fundamentals training course contents What is UNIX? Operating systems, UNIX flavours, UNIX features. Getting started Logging in, changing passwords, logging out. UNIX basics Command structure. The UNIX manuals, basic commands (who, date, tty, uname, echo, banner...) Filesystem commands Home directories, manipulating files and directories, Filesystem layout, Pathnames, hard and symbolic links. The UNIX Editors ed, vi, shell escapes, .exrc Extracting data from files grep, find, cut, sort and paste Permissions Theory, chmod, chown, newgrp.. Processes ps, kill, background processes, at, exec, priorities. The Shell Metacharacters, piping and redirection. Basic shell scripting What are shell scripts? Simple scripts, control structures. Variables. Arguments. Customising your environment Environmental variables, stty, .profile and other startup files More shell features Bash and other shells, the history facility, command line editing, aliases, job control, miscellaneous features. Introduction to administration The root user, su and tar Archiving files Backups, tar, cpio, dd, gzip. Unix and hardware Main hardware components, Unix device drivers. Connecting to a network IP configuration, ifconfig, ping, netstat, traceroute, dig.
The NVQ Diploma in Senior Construction Management Qualification is suited to those who are engaged in high level management activity of a construction business and who working in a senior management role and are seeking to obtain the Black CSCS Card. Our team will discuss the qualification process with you prior to signing up in order to ensure that you will be able to complete the qualification. Complete your qualification quickly with the support of your assessor in as little as 10 to 12 weeks providing that you work with your assessor to provide the required evidence. We offer two other qualifications that lead to the Black CSCS card, follow the links below for more information (open in new window): Level 6 NVQ Diploma in Construction Contracting Operations Management – 8 Units – Complete in as little as 10 weeks. Level 6 NVQ Diploma in Construction Site Management – 19 units – Complete in as little 16 to 20 weeks. CSCS Cards We can provide CSCS tests and CSCS cards alongside your qualification without the need to attend the test centre. Speak to our friendly and helpful team for more information.
About this Training Course The LNG market is developing from a fully based market on long-term contracts, to a more flexible market based on a portfolio of contracts of different durations. The increase of LNG demand, fuelled by South Korea, Japan and several other emerging economies, are creating a base for a more flexible market, where the LNG spot market will be playing a key role. Changes in the LNG market can be identified in the following areas: development of terminals and plant sizes, increased integration throughout the supply chain, diversification of supply sources, increased contractual flexibility and increased geographical distance. This is creating the foundation for the development of the LNG spot market right here in Asia today. This 3 full-day intensive intermediate level course will give you cutting-edge knowledge needed in today's complex LNG market. Increase your knowledge and understanding of the LNG market and spot trading aspects by attending this course. Training Objectives By the end of this course, participants will be able to: Leverage on the current and global drivers of the world Natural gas and LNG markets Understand regional LNG pricing effects and who the key buyers and new sellers are Appreciate the trading structures of LNG and how to structure its risk management Understand the workings and future outlook of the Asian LNG Spot market Discover and exploit the arbitrage trading opportunities between the different markets Learn what LNG derivatives are and how it will become available for hedging and proprietary trading purposes Target Audience This course will benefit: LNG market development executives are drawn from both technical and non-technical (commercial, finance and legal) backgrounds. Participants in an LNG market development team, perhaps with expertise in one area of gas development, will benefit from the course by obtaining a good grounding of all other areas. The course is pitched at an intermediate level, although those with a basic knowledge will be able to grasp most of the concepts covered. Course Level Intermediate Trainer Your course leader is a skilled and accomplished professional with over 25 years of extensive C-level experience in the energy markets worldwide. He has strong expertise in all the aspects of (energy) commodity markets, international sales, marketing of services, derivatives trading, staff training and risk management within dynamic and high-pressure environments. He received a Master's degree in Law from the University of Utrecht in 1987. He started his career at the NLKKAS, the Clearing House of the Commodity Futures Exchange in Amsterdam. After working for the NLKKAS for five years, he was appointed as Member of the Management Board of the Agricultural Futures Exchange (ATA) in Amsterdam at the age of 31. While working for the Clearing House and exchange, he became an expert in all the aspects of trading and risk management of commodities. In 1997, he founded his own specialist-consulting firm that provides strategic advice about (energy) commodity markets, trading and risk management. He has advised government agencies such as the European Commission, investment banks, major utilities, and commodity trading companies and various energy exchanges and market places in Europe, CEE countries, North America and Asia. Some of the issues he has advised on are the development and implementation of a Risk Management Framework, investment strategies, trading and hedging strategies, initiation of Power Exchanges (APX) and other trading platforms, the set-up of (OTC) Clearing facilities, and feasibility and market studies like for the Oil, LNG and the Carbon Market. The latest additions are (Corporate) PPAs and Artificial Intelligence for energy firms. He has given numerous seminars, workshops and (in-house) training sessions about both the physical and financial trading and risk management of commodity and carbon products. The courses have been given to companies all over the world, in countries like Japan, Singapore, Thailand, United Kingdom, Germany, Poland, Slovenia, Czech Republic, Malaysia, China, India, Belgium and the Netherlands. He has published several articles in specialist magazines such as Commodities Now and Energy Risk and he is the co-author of a book called A Guide to Emissions Trading: Risk Management and Business Implications published by Risk Books in 2004. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
LINX 3 training course description A detailed study of BGP, from the basics of how it works through to advanced issues such as route reflectors, policy, filtering, route selection and routing registries. The course culminates with a study of an industrial strength BGP template illustrating important issues such as bogon filtering. Practical hands on with routers follow the major sessions to reinforce the theory. A multiple choice exam, leading to the LAIT III certification, is available after the course. The exam consists of 60 questions and lasts 2 hours. What will you learn Connect enterprises to the Internet, and ISPs to each other. Describe how BGP works. List, describe and configure the main BGP attributes. Implement and troubleshoot BGP. Work with route aggregation and calculate CIDR prefixes in seconds. Influence traffic paths with BGP. LINX 3 training course details Who will benefit: Network engineers. Prerequisites: LAIT I and II OR CCNP and take LAIT I and LAIT II exams whilst on this course. Duration 5 days LINX 3 training course contents Basic BGP IGPs, EGPs, What's BGP? BGP RIB, in/out process, tables peers, adding routes. Hands on Simple configuration and troubleshooting. The Internet and peering ASs, AS numbers, Internet structure, ISP types, ISP network design, IXs, peering vs. transit, public/ private peering, bi/multi-lateral peering. Hands on AS information gathering. How BGP works Incremental updates, Path vector protocols, BGP protocol stack, the BGP header, message types, NLRI, withdrawn routes, route refresh, route dampening. Hands on More troubleshooting, packet analysis. MBGP and IPv6 Multiprotocol routing, AFI, SAFI, MBGP and multicasts, IPv6, MPLS VPNs. Hands on IPv6 BGPv4 aggregation CIDR, benefits, techniques, shortcuts, configuring BGP aggregation, leaking routes. Hands on Reducing routing table size. BGP path selection BGP attributes, attribute types, route selection order, Local preference, AS prepend, MEDs. Hands on Influencing traffic with BGP. BGP routing policies What is policy? Examples, route filtering, AS filtering, REs, applying preference selectively, peer groups. Hands on Sophisticated policies. RIPE and routing registries RIRs, Allocations, assignments, PI vs. PA. Objects, RPSL, routing registry, Hands on The RIPE database. Automating BGP configuration Automation tools, whois, IRRToolSet, Bogon lists, tracking bogon lists, HTTP, Peering, routing registries, DNS. Communities What is a community? Community names, communities for: peer types and geography. RFC 1998, default communities. Hands on Setting local preference on other routers. Route servers What are route servers? LINX route servers, route server policy control, What are route collectors, Looking glasses. Hands on Setting up and working with a route server. Peer relationships IBGP, EBGP, next hop self, advertising routes into/out of BGP, synchronisation. Hands on IBGP, troubleshooting a large BGP network. Route reflectors and confederations Full mesh IBGP, Route reflectors, RR configuration and design, confederations, migration issues. Hands on RR configuration. BGP architectures Stub vs. transit AS, when to use BGP, multihoming strategies and issues, default routes. Multihop EBGP, load balancing. Hands on Multihoming. BGP security RFC 7454, security steps, BGP TTL security, filters, RPKI, ROAs, rsync, rrdp, validators. A secure BGP template. Hands on RPKI prefix validation.
DNS training course description This three-day hands on DNS training course studies both the UNIX BIND and the Microsoft (MS DNS) implementations. The course starts with the big picture of how DNS works, then client configuration. Primary and secondary servers are then configured, progressing to DDNS, subdomains and security issues. Hands on sessions follow all sections ensuring that troubleshooting techniques are used throughout the course. Students choose whether to use Windows or UNIX for the hands on sessions. What will you learn Describe the architecture of DNS. Explain how DNS works. Install, configure, maintain and troubleshoot DNS DNS training course details Who will benefit: Technical staff wanting to learn DNS including: Network personnel System administrators. Prerequisites: UNIX Fundamentals (or Windows knowledge). TCP/IP foundation for engineers. Duration 3 days DNS training course contents What is DNS? Hostnames, Name resolution, host files, host file problems, What is DNS? The DNS namespace, TLDs, gTLDs, registering domains, Nameservers, how DNS works. Hands on Testing DNS servers on the Internet. DNS clients Ways to use DNS, dynamic and static configuration, multiple nameservers, domain name, searchlist, resolution issues, testing the configuration. Hands on Client configuration. DNS server software Implementations, Microsoft, BIND, daemons and services, installation, starting and stopping servers. Hands on Setting up a DNS server. DNS zone files What is a zone, Zone file overview, Forward zones, Reverse zones, Resource records, A records, PTR, CNAME, Root hints, local zone file. BIND and Microsoft configuration. Hands on Server configuration files. NS and applications MX records, Mail server load balancing, SPF, SRV records, VoIP and SRV, Microsoft and SRV, NAPTR. Hands on Testing records with dig and nslookup. DNS slaves and other servers DNS server types, Server resilience, Slaves, Zone transfers, SOA records, Serial numbers, recommendations, polling based zone transfers, NOTIFY, AD integration, DNS caching, Negative caching, TTL, Caching only servers. Hands on Masters, slaves and zone transfers. The DNS protocol The DNS stack, DNS port numbers, DNS queries, The DNS header, header section format, question format, other section format. Hands on Troubleshooting DNS with Wireshark. Dynamic DNS DHCP, DDNS, IXFR, WINS integration. Hands on Dynamic DNS. Subdomains Root servers, root server selection, Authority, delegation, NS records, subdomain with and without delegation, reverse delegation. Hands on Delegation, setting up a subdomain server. DNS security Restricting queries, DNS and firewalls, Split DNS, forwarders, internal root servers, the use of proxy servers, DNSSEC, TSIG. Hands on Hardening a DNS server. DNS and IPv6 What is IPv6, IPv6 addressing, IPv6 DNS issues, AAAA, IPv6 reverse delegation. Troubleshooting DNS Problem solving, DNS troubleshooting, Zone file checking, Some common errors, Log files, tools, nslookup, dig, host, DNS design, performance, load balancing. Hands on Putting it all together. Summary Useful books, Internet sites, RFCs. Appendix: ENUM What is ENUM, How ENUM works, NAPTR.
Facilitation Skills for Business Analysts: In-House Training This course is part of IIL's Business Analysis Certificate Program (BACP), a program designed to help prepare individuals pass the IIBA® Certification exam to become a Certified Business Analysis Professional (CBAP™). Business analysts are communicators who bridge the gap between people with business needs and knowledge and the people who will provide solutions. Business analysts are continuously involved in communications with stakeholders and developers as they create the solution to business problems. They participate in information-gathering sessions including interviewing, joint requirements definition, and Joint Application Design (JAD) workshops which are used to streamline information gathering and get immediate validation from user representatives. The business analyst is also involved with negotiating the solution with the stakeholders, upper-level management, and the developers, mediating among the groups when disagreements take place, and influencing the results of decisions during the solution cycle. This course teaches the methods needed to organize and run information-gathering events. It combines the basics of graphic decision making and modeling with facilitation, communication, and meeting management skills. What you will Learn At the end of this program, you will be able to: Identify the major touch points between key BABOK® Guide knowledge areas and business analysis communication Describe the facilitation skills that are most supportive of those intersections Improve your ability to apply these skills in the context of your business analyst functions Foundation Concepts The role of the Business analyst (BA) An Introduction to the BABOK® Guide Business analyst roles and the product / project life cycle (PLC) Facilitation skills for the business analyst The BABOK® Guide and Communication An introduction to the communication process Addressing basic communications challenges Planning business analysis communication Communication and BABOK® Guide tasks Targeted Elicitation Techniques Synergy between communication and targeted elicitation techniques Preparing for elicitation Cornerstone targeted technique: interviews Other targeted elicitation techniques Related general communication skills Group Elicitation Techniques Synergy between requirements communication and group elicitation techniques Cornerstone group elicitation technique - requirements workshops Other group elicitation techniques Related general communication skills - meeting management best practices Related general communication skills - facilitating best practices Process / Model-Based Elicitation Techniques Synergy between requirements communication and process / model-based elicitation techniques Process / model-based elicitation techniques Related interpersonal skills - problem solving and decision making Investigative Elicitation Techniques Synergy between requirements communication and investigative elicitation techniques Cornerstone investigative elicitation technique - document analysis Other investigative elicitation techniques Summary of elicitation techniques by usage in the requirements process Using Presentations, Structured Walkthroughs, and Influencing Structured walkthroughs, presentations, and influencing within BABOK® Guide tasks Cornerstone technique - structured walkthroughs General communication skill - presenting Related interpersonal skill - influencing Special Facilitation Skills - Negotiating and Mediating Negotiating Mediating
Linux fundamentals training course description An introduction to using the Linux operating system with a focus on the command line. Appropriate for all versions of Linux. The starting point for all Linux work, we concentrate on the technical aspects rather than issues such as using browsers. The course is heavily practical in nature. The course can be run on any Linux distribution you wish. What will you learn Describe Linux. Log in and use Linux commands to perform a variety of tasks from manipulating and printing files to looking at and killing processes. Create and edit files with vi. Recognise the role of the administrator. Write simple shell scripts. Customise the user environment. Linux fundamentals training course details Who will benefit: Anybody who needs to use a Linux system. Prerequisites: None. Duration 3 days Linux fundamentals training course contents What is Linux? Operating systems, Linux flavours, Linux distributions, open source software. Getting started Logging in, changing passwords, logging out. Linux basics Command structure. The Linux manuals, basic commands (who, date, tty, uname, echo, banner...) Filesystem commands Home directories, manipulating files and directories, Filesystem layout, Pathnames, hard and symbolic links. Viewing files. The Linux editors ed, vi, shell escapes, .exrc Extracting data from files grep, find, cut, sort and paste... Permissions Theory, chmod, chown, newgrp.. Processes ps, kill, background processes, at, exec, priorities. Managing Linux log files. The Shell Metacharacters, piping and redirection. Basic shell scripting What are shell scripts? Simple scripts, control structures. Variables. Arguments. Customising your environment Environmental variables, stty, .profile and other startup files More shell features Bash and other shells, the history facility, command line editing, aliases, job control, miscellaneous features. Introduction to administration The root user, su. Managing users and groups Archiving files Backups, tar, cpio, dd, gzip. Linux and hardware Main hardware components, Linux device drivers. Connecting to a network IP configuration, ifconfig, ping, netstat, traceroute, dig.
IPsec training course description This hands on course focuses on IPsec VPNs. Rather than focusing on one implementation this course concentrates on the technologies and protocols of IPsec. Starting with an overview of the complete IPsec architecture the course then moves onto ESP packet analysis along with encryption and authentication provided. IKEv1 and IKEv2 are both covered in detail. Having covered IPsec with pre shared keys the course then moves onto IPsec with certificates followed by IPsec issues. The course is vendor neutral with hands on with both Cisco and Microsoft implementations. What will you learn Explain how IPsec works. Explain the role of AH, ESP and IKE. Configure IPsec. Troubleshoot IPsec. IPsec training course details Who will benefit: Technical staff working with IPsec. Prerequisites: Definitive IP VPNs for engineers. Duration 3 days IPsec training course contents What is IPsec? How to spell IPsec, IPsec is IP security, confidentiality, integrity, authenticity, replay protection, what is a VPN? Network layer security, IPsec and IPv4, IPsec and IPv6, the suite of protocols, the standard, IPsec RFCs, IPsec history. Hands on Analysis of 'normal' IP packets. IPsec architecture The IPsec protocols, AH vs ESP, Why two headers? transport mode, tunnel mode, Remote access VPNs, site to site VPNs, security associations, SA database, Security Parameters Index, implementations: Host tack, Bump in the Stack, Bump in the Wire. Hands on Configuring IPsec. AH What AH does, the stack, The AH header, What is authenticated? Device authentication. AH in transport mode, AH in tunnel mode. Hands on AH packet analysis. ESP What ESP does, the ESP header, ESP in transport mode, ESP in tunnel mode, ESP and SA, ESP and SPI. Hands on ESP packet analysis, policy configuration. IPsec encryption IPsec is a framework, standard algorithms, ESP keys, the role of IKE, key lifetimes, how IKE generates the keys, DES, 3DES, AES, cipher block chaining, counter mode, other encryption. Hands on Encryption configuration. IPsec authentication Authentication types, IPsec authentication, Authentication algorithms: MD5, keyed SHA-1, HMAC-MD5, HMAC-SHA-1, HMAC-RIPEMD, other authentication algorithms. Hands on Authentication configuration. IKE Internet Key Exchange, IKE and the SAD, the two phase negotiation, ISAKMP, ISAKMP header, pre shared keys, digital signatures, public key encryption, Diffie Hellman, proposals, counter proposals, nonces, identities, phase 1 negotiation: main mode, aggressive mode, base mode. Phase 2 negotiation: quick mode, new group mode. Hands on IKE packet analysis. More IKE PFS, IKE and dynamic addresses, XAUTH, hybrid authentication, CRACK, ULA, PIC. User level authentication. IKE renegotiation, heartbeats. Hands on Troubleshooting IPsec. IKEv2 The IKEv2 exchange, IKE_SA_INIT, IKE_AUTH, CREATE_CHILD_SA, IKEv2 packets, the informational exchange. Comparing IKev1 vs IKE v2. Hands on IKEv2 configuration and analysis. PKI What is PKI?, Digital certificates, Certificate authorities, CA servers, RA, VA, certificates, CA hierarchy, CRLs, certificate formats. Hands on installing and configuring certificate servers. IPsec issues NAT, IPsec overhead and fragmentation. Summary IPsec strengths and weaknesses. Where to get further information.