Lawful Intercept training course description Packet based networks require a different approach to Lawful Intercept (LI) than that used in circuit switched networks. This course focuses on what Lawful Interception and Data Retention (DR) means to communications service providers in the IP and NGN areas. The course assumes a basic knowledge of IP networking (i.e. DNS, TCP/UDP, IP, RTP) and the building of services on an IP platform (e.g. SIP, SDP, FTP, HTTP). The course first looks at the regulatory context for LI and DR and how this is translated to a practical architecture. What will you learn Recognise the legal and regulatory obligations to provide LI and DR. Identify the components of the handover architecture for each of LI and DR. Identify the preferred location of points of interception and points of retention in the IP network. Map intercepted material to handover protocols. Understand the data mapping defined in the available standards for both LI and DR. Lawful Intercept training course details Who will benefit: Technical and managerial staff needing to implement public networks. Prerequisites: TCP/IP Foundation Duration 1 day Lawful Intercept training course contents What is meant by LI and DR? Review of regulation: Data protection Directive; Data Retention Directive; RIPA. LI architectures Handover and Interception: ETSI standards ES 201 671 and TS 102 232. LI handover protocol IRI and CC handover; correlation; manual interfaces. DR architectures Handover of query results; points of retention. DR query command set Retrieval of retained records. Security concerns Operation privacy; target privacy; storage and transmission integrity. Implementation Identifying PoI and PoR for provided services. LI and DR wrap up Interaction with other services, storage obligations (volume, time, availability).
About this Virtual Instructor Led Training (VILT) This 4 half-day Virtual Instructor Led Training (VILT) course will address a variety of contract and loan structuring issues associated with geothermal energy projects as well as comparison with solar, wind and battery storage. The course is designed to investigate how various project finance techniques and contract structures can be used to achieve a competitive power prices while maintaining a satisfactory equity return. Distinctive project finance features of power facilities that depend on geothermal, wind, hydro or solar resources will be evaluated with financial models. The course will cover economic analysis of exploration and development of geothermal facilities and how to incorporate probability of failure and success into an IRR framework. Subsequent sessions will address the theory underlying liquidated damages for delay, and performance as well as design of other incentives that is inherent in different contract structures. Nuanced project finance issues associated with structuring debt for renewable projects will be discussed including under what conditions the DSCR drives debt capacity and when the debt to capital ratio is instrumental. The course will be taught with a combination of theoretical discussions, term sheet review and focused financial models. Training Objectives Evaluation of the economic risks that arise from uncertainty associated with drilling exploration wells and development wells for geothermal projects. Analyse the theoretical issues with computing LCOE for geothermal projects compared to other renewable and non-renewable resources and the importance of cost of capital for renewable projects; Understand differences in contract structures for renewable projects and dispatchable projects and how a single price structure can distort incentives for efficient construction and operation; Understand components of financing that influence the bid price required to meet a required rate of return on equity and can result in relatively low prices with reasonable returns. Understand the importance of debt sizing constraints and what strategies are relevant when the debt to capital constraint applies relative to when the debt service coverage ratio drives the debt size; Understand how to compute P50, P90 and P99 for different projects driven by resource risk; Understand the difference between mean reverting resource variation and estimation mistakes that do not correct as the basis for 1-year P90 and 10-year P90. Understand under what conditions debt sculpting can affect returns and how synthetic sculpting can be used to increase returns when the DSCR constraint applies. Understand the theory of credit spreads, variable rate debt and interest rates in different currencies and compute the implied probability of default that in inherent in credit spreads. Understand how to evaluate the costs to equity investors and the benefits to lenders for various credit enhancements including DSRA accounts, cash flow sweeps and covenants. Course Level Basic or Foundation Training Methods The VILT will be delivered online in 4 sessions comprising 4 hours per day, with 2 breaks of 10 minutes per day, including time for lectures, discussion, quizzes and short classroom exercises. Trainer Your expert course leader provides financial and economic consulting services to a variety of clients, he teaches professional development courses in an assortment of modelling topics (project finance, M&A, and energy). He is passionate about teaching in Africa, South America, Asia and Europe. Many of the unique analytical concepts and modelling techniques he has developed have arisen from discussion with participants in his courses. He has taught customized courses for MIT's Sloan Business School, Bank Paribas, Shell Oil, Society General, General Electric, HSBC, GDF Suez, Citibank, CIMB, Lind Lakers, Saudi Aramco and many other energy and industrial clients. His consulting activities include developing complex project finance, corporate and simulation models, providing expert testimony on financial and economic issues before energy regulatory agencies, and advisory services to support merger and acquisition projects. Our key course expert has written a textbook titled Corporate and Project Finance Modelling, Theory and Practice published by Wiley Finance. The book introduces unique modelling techniques that address many complex issues that are not typically used by even the most experienced financial analysts. For example, it describes how to build user-defined functions to solve circular logic without cumbersome copy and paste macros; how to write function that derives the ratio of EV/EBITDA accounting for asset life, historical growth, taxes, return on investment, and cost of capital; and how to efficiently solve many project finance issues related to debt structuring. He is in the process of writing a second book that describes a series of valuation and analytical mistakes made in finance. This book uses many case studies from Harvard Business School that were thought to represent effective business strategies and later turned into valuation nightmares. Over the course of his career our key course expert has been involved in formulating significant government policy related to electricity deregulation; he has prepared models and analyses for many clients around the world; he has evaluated energy purchasing decisions for many corporations; and, he has provided advice on corporate strategy. His projects include development of a biomass plant, analysis and advisory work for purchase of electricity generation, distribution and transmission assets by the City of Chicago, formulation of rate policy for major metro systems and street lighting networks, advocacy testimony on behalf of low income consumers, risk analysis for toll roads, and evaluation of solar and wind projects. He has constructed many advisory analyses for project finance and merger and acquisition transactions. Lastly, our key course expert was formerly Vice President at the First National Bank of Chicago where he directed analysis of energy loans and also created financial modelling techniques used in advisory projects. He received an MBA specializing in econometrics (with honours) from the University of Chicago and a BSc in Finance from the University of Illinois (with highest university honours). POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations
Concise Cisco switches course description A hands on course covering the product specifics of Cisco switches. Installation, configuration, maintenance and troubleshooting are all covered in a practical oriented way. VLANs often take up a large part of the course. The course covers all interfaces but concentrates on using the command line interface. Delegates are, however, free to use the web based interface in all exercises. What will you learn Install Cisco switches. Use the command line interface and the web based interface to manage Cisco switches. Configure and troubleshoot Cisco switches. Perform software upgrades and maintain configurations using TFTP. Concise Cisco switches course details Who will benefit: Anyone working with Cisco switches. Particularly aimed at engineers and technicians supporting Cisco switches. Prerequisites: None. Duration 2 days Concise Cisco switches course content Ethernet review Single segment Ethernet, CSMA/CD, Broadcast domains, collision domains. Hubs, Extending the LAN. Hands on Hub based Ethernet. Cisco switches What are switches, frame forwarding and filtering, the forwarding database. Hands on Switched based Ethernet. Configuring Cisco switches Accessing the switch, installing the switch, The CLI, connecting PCs using the switch. Hands on Configuring Cisco switches. The command line interface User and privilege modes, online help, show, basic troubleshooting. The configuration editor, Global, major and sub commands, enable, secret and other passwords. Hands on Simple troubleshooting using the CLI. Port configuration Speed, duplex, security, trunking. Hands on Port trunking. Spanning Tree Protocol Spanning Tree, Loops, effect, root bridges, bridge port states, STP reconfiguration. RSTP and variants. Hands on STP. VLANS What are VLANs, configuring VLANs, access ports and trunks, 802.1Q, inter VLAN routing. Hands on Access ports, trunks, layer 3 switching. Housekeeping Configuration management, software management, password recovery. Hands on TFTP. Managing interconnection devices SNMP, RMON, RMON II. Troubleshooting LEDs, CDP, logging, Layer 1, layer 2, layer 3. Hands on Fixing things.
IP security training course description Connection to the Internet is becoming an essential business tool. This course looks at firewalls, digital certificates, encryption and other essential topics for e-commerce sites. A generic course that looks at firewalls and VPNs. Hands on sessions include using hacking tools and configuring firewalls. What will you learn Describe: Basic security attacks RADIUS SSL IPSec VPNs Implement digital certificates Deploy firewalls to protect Web servers and users. Secure Web servers and clients. IP security training course details Who will benefit: Network administrators. Network operators. Security auditors Prerequisites: TCP/IP foundation for engineers Duration 2 days IP security training course contents TCP/IP review Brief overview of the relevant headers. Hands on Download software for course, use analyser to capture passwords on the wire. Security review Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits The Internet worm, IP spoofing, SYN attack, hijacking, Ping o' Death⦠keeping up to date with new threats. Hands on Use a port scanning tool, use a 'hacking' tool. Firewalls Products, Packet filtering, DMZ, content filtering, stateful packet inspection, Proxies, firewall architectures, Intrusion Detection Systems, Viruses. Hands on Set up a firewall and prevent attacks. NAT NAT and PAT, Why use NAT, NAT-ALG, RSIP. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Run a password-cracking program. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, PPP authentication, RADIUS. Hands on Using certificates. Web client and server security Cookies, browser certificates, censorship, PICS. Operating system security, Web server user authentication, Restricting access, Logging, Securing CGI scripts. Hands on Browser security. VPNs and IPSec What is a VPN, tunnelling, L2F, PPTP, L2TP, IPSec, AH, ESP, transport mode, tunnel mode.
Transmission demystified training course description Transmission is the process of sending information along a medium of, copper, fibre or wireless. This course looks at transmission techniques for both telecommunications and data communications with a particular focus on Microwave, SDH, DWDM transmission. The course aims to demystify these technologies by explaining all the buzzwords used in transmission. What will you learn Describe various transmission technologies such as multiplexing and demultiplexing. Explain how Microwave works. Explain how SDH works. Explain how DWDM works. Transmission demystified training course details Who will benefit: Anyone working in telecommunications. Prerequisites: None. Duration 2 days Transmission demystified training course contents Transmission basics Systems, media, signals. Signal degradation, noise, distortion, attenuation. Digital, analogue. Modulation, encoding. RF Frequency, wavelength. Distance / range issues, interference, Antenna, power, dB, RF propagation, testing. Microwave transmission What is microwave transmission, point to point communications, line of sight, parabolic antenna, relays, planning considerations, rain and other issues Wired transmissions Copper, Fibre, optical transmission, fibre characteristics, fibre component parts. Multi Mode Fibre (MMF). Single Mode Fibre (SMF). Fibre connections. Lasers. Attenuations, dispersion, optical signal noise ratios (OSNR) and their effects. Channel Spacing and Signal Direction. Limiting factors to single wavelength. Introduction to SDH Timing and synchronisation of digital signals, the plesiochronous digital hierarchy (PDH), the synchronous digital hierarchy (SDH), service protection with SDH. TDM. SDH6 Standards, basic units, frames, STM1 frame, bit rates, STM0, STM1, STM4, STM16, STM64, STM256, SDH architecture, rings, Add drop multiplexors. SDH network topologies, structure of SDH equipment, SDH synchronisation, protection switching in SDH networks, SDH alarm structure, testing of SDH, equipment and systems, Ethernet over SDH. WDM overview Multiplexing, TDM, WDM benefits. WDM standards. CWDM vs. DWDM. Four Wave Mixing (FWM). Impact and countermeasures to FWM on WDM.tructure of SDH equipment, SDH synchronisation, protection switching in SDH networks, SDH alarm structure, testing of SDH, equipment and systems, Ethernet over SDH. DWDM ITU G.694.1, channel and spacing. Optical Terminal Multiplexers (OTM). Optical Add/Drop Multiplexers (OADM). Adding versus dropping. Optical Amplifiers. Erbium Doped Fibre Amplifiers (EDFA). Transponders and Combiners. Optical and Electrical Cross Connects (OXCs/DXCs). Cross Connect types (Transparent/Opaque). Advantages and disadvantages of various Optical cross connects. IP transmission Telecommunications versus data communications, IP transmission, VoIP, MPLS.
Scrum Master Exam Prep This workshop prepares you for the Scrum.org Professional Scrum Master (PSM)™ I certification. A voucher for the exam and the access information you will need to take the exam will be provided to you via email after you have completed the course. NOTE: If you have participated in any of IIL's other Scrum workshops, you can bypass this program and focus on reading/studying the Scrum Guide and taking practice exams from Scrum.org. A Scrum Master helps project teams properly use the Scrum framework, increasing the likelihood of the project's overall success. Scrum Masters understand Scrum values, practices, and applications and provide a level of knowledge and expertise above and beyond that of typical project managers. Scrum Masters act as 'servant leaders', helping the rest of the Scrum Team work together and learn the Scrum framework. Scrum Masters also protect the team from both internal and external distractions. The Professional Scrum Master™ I (PSM I) certificate is a Scrum.org credential that enables successful candidates to demonstrate a fundamental level of Scrum mastery. PSM I credential holders will grasp Scrum as described in The Scrum Guide™1 and recognize how those concepts can be applied. They will also share a consistent terminology and approach to Scrum with other certified professionals. Scrum.org does not require that you take their own sponsored or any preparatory training. However, training can facilitate your preparation for this credential. And this course is based on IIL's Scrum Master Workshop, which is aligned with The Scrum Guide™ and was built based on PSM I credentialed expertise. It will provide you with the information you need to pass the exam and IIL will make the arrangements for your online exam. You will be provided with an exam code and instructions, so that you can take the exam at your convenience, any time you are ready after the course. Passwords have no expiration date, but they are valid for one attempt only. What you will Learn You'll learn how to: Successfully prepare for the Scrum.org PSM I exam Comprehend the Agile Manifesto and mindset Explain the fundamental principles of Scrum, including events, artifacts, and roles Guide the Scrum team in their responsibilities Define Ready and Done Write requirements in the form of user stories Estimate using planning poker and prioritize using MoSCoW Facilitate the team through the 5 Sprint events Fulfill the role of Scrum Master in a Scrum project Create Information Radiators to enable transparency Define the structure of the retrospective Getting Started Introductions Workshop orientation Exam prep preview Foundation Concepts Agile History, Values, and Mindset Introduction to Scrum Scrum events Scrum artifacts Scrum Roles and Responsibilities Product Owner responsibilities Scrum Master responsibilities The Team responsibilities Cross-functional teams Building effective teams The Product Backlog and User Stories The Product Backlog User Stories Definition of Done Backlog grooming Estimating User Stories Story points, planning poker Prioritizing User Stories The Sprint Team capacity and velocity The Sprint Planning Meeting The Sprint Backlog The Sprint Learning to self-manage, self-organize, self-improve Sprint Review and Retrospective Project Progress and Completion The Daily Scrum The Task Board and The Burndown Chart Information Radiators Closing a Scrum Project Summary and Next Steps Review of course goals, objectives, and content Exam prep next steps
The QA Level 3 Award in Administering Emergency Oxygen (RQF) qualification has been designed for those who are responsible for providing care to casualties where the administration of emergency oxygen may be required. Over a half day period, candidates will learn about the clinical need for emergency oxygen and the safety considerations of this, as well as how to administer emergency oxygen when dealing with a range of conditions. Successful candidates will leave the course with the knowledge and skills needed to administer emergency oxygen both safely and effectively. Achievement of this qualification confirms candidates have met both the theoretical and practical requirements, however, it does not imply a ‘license to practice’ – the scope of practice is determined by the organisation responsible for oxygen provision. This qualification does not allow candidates to obtain, store or administer oxygen without clinical governance.
Management of Value (MoV®) Foundation This interactive MoV® Foundation course provides a modular and case-study-driven approach to learning Management of Value (MoV). The core knowledge is structured and comprehensive; and well-rounded modules cover the methodology and various techniques. A case study is used to help appreciate the relevance of MoV in its practical application. What you will Learn Upon completion of an MoV course candidates should be able to discuss and explain: The main processes and techniques used within MoV and the reasons for using them How MoV may be applied at portfolio, program, project and operational levels The differences in applying MoV at different stages in a project and the expected outputs from a MoV Study at each stage The circumstances under which MoV should be used The concept of value and how value may be improved The main benefits arising from the use of MoV Approaches for implementing MoV How to respond to external and internal influences The principles of embedding MoV into an organization The key topics in document checklists, the toolbox, health check, organizational maturity and individual competence. Upon successful completion of this course, you will be able to: Organize and contribute constructively to a Management of Value (MoV) Study Demonstrate a knowledge of MoV principles, processes, approach and environment Analyse a company, program or project to establish its organizational value; includes identification and weighting of Value Drivers Pass the AXELOS MoV Foundation Examination Introduction to value management and MoV Value and Value Management Capabilities, Outcomes, Benefits and Disbenefits What is Value? What is Management of Value (MoV)? Why use MoV? Where use MoV? When MoV should be used? What using MoV involve? Selected MoV benefits Relationship with other AXELOS Global Best Practices and Models How MoV fits with other AXELOS Global Best Practice Guides MoV principles Align with organization's objectives Focus on functions and required outcomes Balance the variables to maximise value Apply throughout the investment decision Tailor MoV to suit the subject Learn from experience and improve Assign clear roles and responsibilities and build a supportive culture MoV processes Frame the programme or project Gather information Analyse information Process information Evaluate and select Develop Value Improving Proposals Implement and share outputs MoV techniques Function Analysis Function Analysis System Technique (FAST) Traditional (or classic) FAST Technical FAST Customer FAST Value Trees Measuring value Value profiling (a.k.a. value benchmarking) Simple multi-attribute rating technique (a.k.a. SMART) Value index Value metrics Value for money (VfM) ratio Value Engineering / Analysis Common techniques used in MoV Analysis of information Benchmarking Process Mapping Root Cause Analysis Discounted Cash Flow Analysis Generating Ideas Brainstorming Evaluation and option selection Option Selection Matrix Idea selection Allocation to Categories Idea Selection Matrix Weighting techniques Paired Comparisons Points Distribution Developing VIPs Developing Proposals Cost Benefit Analysis Building Decisions Implementing VIPs Implementation Plans Feedback Following up Tracking Benefits Approach to Implementation Generic approach to MoV implementation Plan the MoV activities Understand and articulate value Prioritize value Improve value Quantify value Monitor improvements in value Learn lessons Environmental factors Portfolio Considerations Programme considerations Project considerations Operational Considerations Embedding MoV into an organization Benefits of Embedding MoV into an organization MoV Policy MoV Policy Composition Embedding MoV into an organisation Key steps Suggested MoV Management Structure Overcoming barriers We do it anyway It takes up too much time We can't afford to make the changes What's in it for me? Don't fix it if it ain't broke Fixed returns on investment MoV products Briefing Meeting Agenda (A.1) Communications Checklist (A.2) Equipment list for an Effective Study/Workshop (A.3) Invitation to join the Study Team (A.4) Option Evaluation Matrix (A.5) Plan the Study (A.6) Recording Idea Selection (A.7) Reporting Study outputs (A.8) Scoping the Study (A.9) Study or Workshop Handbook (A.10) Value-Improvement Proposal Forms (A.11) Value Improvement Tracking Report (A.12) MoV toolbox MoV health check and maturity model P3M3 Maturity Model MoV Maturity Model (aligned with P3M3)
Regular expressions training course description Regular expressions are an extremely powerful tool for manipulating text and data. They are now standard features in a wide range of languages and popular tools, including Python and MySQL. Regular expressions allow you to code complex and subtle text processing that you never imagined could be automated. Once you've mastered regular expressions, they'll become an invaluable part of your toolkit. You will wonder how you ever got by without them. What will you learn Use Regular Expressions. Troubleshoot Regular Expressions. Compare RE features among different versions. Explain how the regular expression engine works. Optimize REs. Match what you want, not what you don't want. Regular expressions training course details Who will benefit: Anyone looking to use regular expressions. Prerequisites: None. Duration 1 day Regular expressions training course contents Introduction to Regular Expressions Solving real problems, REs as a language, the filename analogy, language analogy, RE frame of mind, searching text files: egrep, egrep metacharacters, start and end of the line, character classes, matching any character with dot, alternation, ignoring differences in capitalization, word boundaries, optional items, other quantifiers: repetition, parentheses and backreferences, the great escape, expanding the foundation, linguistic diversification, the goal of a RE, more examples, RE nomenclature, Improving on the status quo. Extended introductory examples A short introduction to Perl, matching text with regular expressions, toward a more real-world example, side effects of a successful match, Intertwined regular expression, intermission, modifying text with regular expressions, example: form letter, example: prettifying a stock price, automated editing, a small mail utility, adding commas to a number with lookaround, text-to-HTML conversion, that doubled-word thing. Regular expression features and flavours The regex landscape, origins of REs, care and handling of REs, Integrated handling, procedural and object-oriented handling, search-and-replace example. strings character encodings and modes, strings as REs, character-encoding issues, unicode, regex modes and match modes, common metacharacters and features, character representations, character classes and class-like constructs, anchors and other 'zero-width assertions', comments and mode modifiers, grouping capturing conditionals and control. The mechanics of expression processing Two kinds of engines, new standards, regex engine types, from the department of redundancy department, testing the engine type, match basics, about the examples, rule 1: the match that begins earliest wins, engine pieces and parts, rule 2: the standard quantifiers are greedy, regex-directed versus text-directed, NFA engine: regex-directed, DFA engine: text-directed, first thoughts: NFA and DFA in comparison, backtracking, two important points on backtracking, saved states, backtracking and greediness, more about greediness and backtracking, problems of greediness, multi-character 'quotes', lazy quantifiers, greediness and laziness, laziness and backtracking, possessive quantifiers and atomic grouping, possessive quantifiers ?, +, *+, ++ and {m,n}+, the backtracking of lookaround, is alternation greedy? taking advantage of ordered alternation, NFA DFA and posix, the longest-leftmost', posix and the longest-leftmost rule, speed and efficiency. Practical regex techniques Continuation lines, matching an IP address, working with filenames, matching balanced sets of parentheses, watching out for unwanted matches, matching delimited text, knowing your data and making assumptions, stripping leading and trailing whitespace, matching and HTML tag, matching an HTML link, examining an HTTP URL, validating a hostname, plucking a hostname, plucking a URL, parsing CSV files. Crafting an efficient expression Efficiency vs. correctness, localizing greediness, global view of backtracking, more work for POSIX NFA, work required during a non-match, being more specific, alternation can be expensive, benchmarking, know what you re measuring, benchmarking with Python, common optimisations, the mechanics of regex application, pre-application optimizations, optimizations with the transmission, optimization of the regex itself, techniques for faster expressions, common sense techniques, expose literal text, expose anchors, lazy versus greedy: be specific, split into multiple REs, mimic initial-character discrimination, use atomic grouping and possessive quantifiers, lead the engine to a match, unrolling the loop, observations, using atomic grouping and possessive quantifiers, short unrolling examples, unrolling C comments, the free flowing regex, a helping hand to guide the match, a well-guided regex is a fast regex.