Anger Management 1 Day Training in Slough
Python training course description This Python course focusses on teaching Python for use in network automation and network DevOps. We focus on getting delegates up and running with Python and network automation as quickly as possible rather than making them great programmers. In other words we concentrate on enabling delegates to use network automation libraries such as netmiko, NAPALM and Nornir, and APIs such as NETCONF and RESTCONF rather than enabling delegates to produce object oriented programs. Hands on sessions use Cisco and Juniper devices. What will you learn Run Python programs. Read Python programs. Write Python programs. Debug Python programs. Automate network tasks with Python programs. Configure network devices with Python. Collect data from network devices with Python. Python training course details Who will benefit: Network engineers. Prerequisites: TCP/IP Foundation Duration 5 days Python training course contents What is Python? Programming languages, Why Python? Python in interactive mode, Python scripts, ipython, Python version 2 versus version 3. A simple Python script. Comments. Hands on Installing Python, Hello world. A network example On box vs off box Python. telnet, ssh, NETCONF, HTTP, APIs, manufacturers and API support, analysis of a simple telnetlib program. Hands on Using Python to retrieve the configuration from a network device. Using wireshark to analyse the actions. Python basics I/O, operators, variables and assignment, types, indentation, loops and conditionals. Hands on Modifying the telnet program, changing configurations on a network devices. Functions, classes and methods What are functions, calling functions, builtin functions, useful builtin functions, file handling, classes, objects, creating instances. Hands on Storing configurations in files, configuring devices from files, using an inventory file to work on multiple devices. Libraries and modules Modules, files and packages, import, from-import, Python standard library, other packages, pip install, executing other programs. Managing python libraries. Hands on Using pip, installing and using ipaddress, subprocess to access netsnmp. For the more advanced, using the sockets library. Paramiko and netmiko SSH, enabling SSH on devices, keys. Paramiko versus netmiko, example scripts. pexpect. Hands on Configuring VLANs from Python. pySNMP Gathering facts using previous methods, SNMP review, pySNMP GET, pySNMP and SNMPv3. easySNMP library. Hands on Walking a MIB from Python. NETCONF What is NETCONF? Enabling NETCONF on devices, A first ncclient script, device handlers, get_config, edit_config, copy_config, delete_config, commit, validate, pyEZ, utils_config, utils.sw. Hands on Configuration using ncclient and PyEZ. This session is expanded for those interesting in JunOS automation. Manipulating configuration files Builtin functions, string handling. Unicode. Sequences, strings, lists, tuples. Dictionaries. TextFSM. Regular expressions. JSON, YAML, XML, YANG, Jinja2, templates. Hands on Jinja2 templating with Python to configure network devices. NAPALM Getters, configuration operations, supported devices, NAPALM transport, Config-replace, Config-merge, Compare config, Atomic changes, rollback. Example NAPLAM scripts. Hands on Using NAPALM to gather facts, Using NAPALM for configuration management REST and RESTCONF What is REST, HTTP methods, GET, POST, cURL, Postman, Python requests library. RESTCONF, a RESTCONF example. Hands on Modifying a configuration using RESTCONF. Scapy What is scapy, Scapy in interactive mode, Scapy as a module. Hands on Packet crafting from Python. Warning Errors and exceptions, Exception handling, try, except. Memory management. Garbage collection. Context management, With. Hands on Improving Python code. Nornir What is Nornir? A network automation framework, inventories, connection management and parallelization. Nornir architecture and other libraires. Hands on Setting up nornir, nornir fact gathering, nornir tasks. Optional Writing your own functions, Writing your own classes. pyntc. Hands on Writing reusable code.
Definitive Nagios training course description Nagios is an open source application designed to provide system and network monitoring. This hands on course gives a comprehensive coverage of using Nagios to provide monitoring of Linux, Windows and network devices. The course is based on Nagios core but contact us if you would like Nagios XI. What will you learn Install Nagios. Configure Nagios. Monitor Windows, Linux and Cisco (and other network equipment) using Nagios. Configure notifications Definitive Nagios training course details Who will benefit: Technical staff working with Nagios. Prerequisites: None. Duration 2 days Definitive Nagios for engineers Nagios architecture Downloading Nagios, Installing Nagios, Nagios core, plugins, frontends, addons. Nagios XI. Nagios Fusion. Hands on Installing Nagios. Getting started with Nagios Nagios files, nagios.cfg, minimal.cfg. Starting and stopping Nagios. Hands on Controlling Nagios. Using Nagios Nagios web interface. Maps, Hosts, host groups, services, service groups, problems. Reports. Configuration. Hands on Using the web interface. Monitoring Linux systems SSH, NRPE. Hands on Monitoring Linux system health. Monitoring Windows systems Installing NSClient++, Configuring NSClient++, check_nt plugin, monitoring uptime, CPU, memory, disks, services, processes. Hands on Monitoring Windows system health. Monitoring network devices SNMP architecture, MIBs. Polling. Hands on Configuring Nagios for SNMP. Agents Configuring Cisco devices for SNMP support, communities, traps, syslog. Hands on Monitoring network devices. Nagios alerts and notifications SNMP traps. Email notifications, SMS alerts other messaging
Network forensics training course description This course studies network forensics-monitoring and analysis of network traffic for information gathering, intrusion detection and legal evidence. We focus on the technical aspects of network forensics rather than other skills such as incident response procedures etc.. Hands on sessions follow all the major sections. What will you learn Recognise network forensic data sources. Perform network forensics using: Wireshark NetFlow Log analysis Describe issues such as encryption. Network forensics training course details Who will benefit: Technical network and/or security staff. Prerequisites: TCP/IP foundation for engineers. Duration 3 days Network forensics training course contents What is network forensics? What it is, host vs network forensics, purposes, legal implications, network devices, network data sources, investigation tools. Hands on whois, DNS queries. Host side network forensics Services, connections tools. Hands on Windows services, Linux daemons, netstat, ifoconfig/ipconfig, ps and Process explorer, ntop, arp, resource monitor. Packet capture and analysis Network forensics with Wireshark, Taps, NetworkMiner. Hands on Performing Network Traffic Analysis using NetworkMiner and Wireshark. Attacks DOS attacks, SYN floods, vulnerability exploits, ARP and DNS poisoning, application attacks, DNS ANY requests, buffer overflow attacks, SQL injection attack, attack evasion with fragmentation. Hands on Detecting scans, using nmap, identifying attack tools. Calculating location Timezones, whois, traceroute, geolocation. Wifi positioning. Hands on Wireshark with GeoIP lookup. Data collection NetFlow, sflow, logging, splunk, splunk patterns, GRR. HTTP proxies. Hands on NetFlow configuration, NetFlow analysis. The role of IDS, firewalls and logs Host based vs network based, IDS detection styles, IDS architectures, alerting. Snort. syslog-ng. Microsoft log parser. Hands on syslog, Windows Event viewer. Correlation Time synchronisation, capture times, log aggregation and management, timelines. Hands on Wireshark conversations. Other considerations Tunnelling, encryption, cloud computing, TOR. Hands on TLS handshake in Wireshark.
This Business English tutoring course is designed to help adult learners improve their English language skills within a professional context. Participants will focus on developing their communication skills, vocabulary, and cultural understanding necessary for success in the business world. Through practical exercises, role-plays, and industry-specific materials, learners will enhance their ability to effectively communicate in English within various business situations. Course Duration: 12 weeks (48 sessions) Course Objectives: By the end of this course, participants will: 1. Communicate confidently and effectively in English within a business setting. 2. Expand business-related vocabulary and improve language accuracy. 3. Develop listening skills to understand business conversations and presentations. 4. Enhance reading comprehension skills for business-related texts. 5. Write accurately and coherently for business correspondence. Course Outline: Week 1: Introduction to Business English - Introduction to course objectives, expectations, and methodology - Assessment of participants' current language proficiency and individual learning goals - Overview of key business English skills and areas of focus Week 2: Business Communication Skills - Developing effective oral communication skills for business settings - Role-plays and discussions related to common business scenarios - Enhancing fluency, clarity, and confidence in expressing ideas and opinions Week 3: Business Vocabulary Expansion - Expanding business-related vocabulary and terminology - Exercises and activities to reinforce and practice key business terms - Incorporating industry-specific jargon into oral and written communication Week 4: Business Writing Skills - Improving writing skills for business correspondence - Practice exercises for emails, reports, memos, and other business documents - Enhancing clarity, coherence, and professional tone in written communication Week 5: Listening and Comprehension in Business Contexts - Developing listening skills to understand business conversations, presentations, and meetings - Authentic listening materials related to various business topics - Strategies for note-taking, understanding accents, and extracting key information Week 6: Reading and Comprehension for Business - Developing reading skills for business-related texts - Strategies for skimming, scanning, and understanding complex business documents - Identifying main ideas, supporting details, and summarising key information Week 7: Business Presentation Skills - Developing effective presentation skills for business contexts - Techniques for organising content, engaging the audience, and delivering impactful presentations - Practice sessions with feedback and guidance Week 8: Business Negotiation Skills - Enhancing negotiation skills for business interactions - Role-plays and practical exercises for successful negotiations - Polishing language and strategies for effective business communication Week 9: Business Etiquette and Cultural Understanding - Understanding business etiquette and cultural nuances in professional settings - Developing intercultural communication skills for international business contexts - Practicing effective communication in diverse and multicultural environments Week 10: Business Networking and Socialising - Developing language skills for networking and socialising in business contexts - Role-plays and exercises for effective communication at conferences, events, etc. - Polishing conversational skills, small talk, and building professional relationships Week 11: Business Grammar and Language Accuracy - Reviewing and reinforcing essential grammar rules and structures in a business context - Identification and correction of common errors in business writing and speaking - Exercises and activities to improve language accuracy Week 12: Review and Final Evaluation - Reviewing course content and addressing individual needs - Comprehensive review exercises for all language skills in a business context - Final evaluation and feedback session Note: This syllabus serves as a guideline and can be customised based on the specific needs, interests, and proficiency levels of the participants. The course may also include guest speakers or industry-specific case studies to provide further immersion and practical application of language skills.
Server Load Balancing course description This two-day Server Load Balancing course introduces the concepts of SLB from the reasons to implement, through the basics and then onto details studies of load distribution, health checks, layer 7 switching and Global SLB. What will you learn Explain packet paths when implementing SLB. Recognise the impact of different topologies. Evaluate SLB load distribution methods. Describe how load balancers can improve security. Explain how GSLB works. Server Load Balancing course details Who will benefit: Anyone working with SLB. Prerequisites: None. Duration 2 days Server Load Balancing course contents Introduction Concept, reasons, benefits, alternatives. Other features: Security, Caching. SLB concepts Architectures, Virtual servers, real servers, Virtual IP address, health checks. DNS load balancing. Packet walk using SLB. Load balancing 6 modes of bonding and load balancing without SLB. ISP load balancing. Health. Distribution policies: Round Robin, least connections, weighted distributions, response time, other variations. Persistent versus concurrent. Layer 4 switching L2 SLB, L3 SLB, single arm SLB, DSR, more packet walking, TCP versus UDP, Port numbers. Layer 7 switching Persistence. Cookie switching, Cookie hashing, Cookie insertion, URL switching, URL Hashing, SSL. Health checks Layer 3: ARP, ping. Layer 4: SYN, UDP. Layer 7: HTTP GET, Status codes, HTTP keepalives, content verification, SSL. Other application keepalives. What to do after failure and recovery. Security DOS attack protection, SYN attack protection, Rate limiting: connections, transactions. SSL offload. Redundancy Hot standby, Active standby, Active active. Stateful, stateless. VRRP, STP. GSLB Anycasting. DNS, TTL, DNS load balancing, problems with DNS load balancing,. HTTP redirect, health, thresholds, round trip times, location.
4G & 5G Roaming Scenarios & Procedures course description This course is designed to explain the roaming procedures of modern mobile networks, based on the GSMA roaming specification the course explains all scenarios where a mobile subscriber may find themselves whilst visiting a preferred mobile network partner. Interconnection between MNOs and the use of GRX & IPX as an interworking process. The course will work through the registration & authentication procedure, download of the user profile, the APN configuration & DIAMETER process to verify user authenticity. VoLTE roaming and IMS registration procedures for voice support & SMS delivery will be discussed and explained. What will you learn Architecture Models Technical requirements for interfaces - 4G Roaming Scenarios Technical requirements & recommendations for services Other Technical Requirements & Recommendations Technical Requirements for QoS support Technical Requirements & Recommendations for Interfaces - 5G Scenarios Technical Requirements & Recommendations for Interworking & Coexistence with E-UTRAN & EPC Technical Requirements & Recommendations for Services Other Technical Requirements & Recommendations 4G & 5G Roaming Scenarios & Procedures course details Who will benefit: Those working in mobile networks. Prerequisites: None. Duration 3 days 4G & 5G Roaming Scenarios & Procedures course contents Architecture Models 4G Evolved Packet System 5G Core Network SGs Interface for CSFB& SMS over SGs Technical Requirements for Interfaces - 4G Roaming Scenarios General requirements for inter-PLMN interfaces Stream Control Transmission Protocol (SCTP) IAMETER S8 Interface SGW selection PGW selection GTP Transport Layer engineering S9 interface Implementation requirements Guidelines for DIAMETER over S9 S6a & S6d interface Gy interface Guidelines for DIAMETER over Gy Legacy interworking scenarios VPLMN has not implemented LTE HPLMN has not implemented LTE Co-existence scenarios Possible scenarios 2G/3G roaming agreement only 2G/3G LTE roaming agreement LTE roaming registrations Consequences of different APN approaches when roaming Guidance regarding the APN approach when roaming Inter-RAT handover Handover & access restrictions to/from 2G/3G & LTE (Active mode) Access restriction for 2G/3G and/or LTE (Idle mode) Handover of PDN Connections between GERAN/UTRAN & LTE Handover to/from non-3GPP accesses & LTE Bandwidth considerations ARP considerations at handover from LTE to 2G/3G Tech requirements & recommendations for Services SMS SMS over SGs Voice CSFB Roaming retry for CSFB Roaming Forwarding for CSFB Coexistence of Roaming Forwarding & Roaming Retry Recommended procedures IMS Voice Roaming Architecture Other Technical Requirements & Recommendations Access Control Addressing APN for IMS based services IMS Well Known APN APN for Home Operator Services Gateway Selection Inter-PLMN roaming handover Data off related functionality Emergency Services Emergency PDN connectivity Emergency Call indicator Security GTP Security DIAMETER Security DIAMTER Roaming hubbing Default APN E-UTRA NR Dual Connectivity with EPC GW Selection for E-UTRA-NR Dual Connectivity TAC/LAC Restriction Guidelines Technical Requirements for QoS support QoS parameters definition QoS Management in the Home Routed architecture QoS control for IMS APN in the S8HR architecture Support of QoS in GRX/IPX QoS Control in Local Breakout architecture Technical Requirements & Recommendations for Interfaces - 5G Scenarios General requirements for inter-PLMN interfaces Transport protocol - TCP/IP Serialisation protocol - JSON Interface Definition language - OpenAPI Application Protocol - HTTP2 Inter-PLMN (N32) Interface N32c N32f ALS & IPX HTTP Proxy SMF & UPF in HPLMN & VPLMN Requirements related to Service Based Architecture Naming, addressing & routing for 5G SA roaming SEPP load distribution SEPP administration, naming convention & routing SEPP HTTP redirections Technical Requirements & Recommendations for Interworking & Coexistence with E-UTRAN & EPC Interworking scenarios Coexistence scenarios Inter-RAT Handover Handover & Access restriction between 5GC & EPC Technical Requirements & Recommendations for Services Network slicing Voice, Video & Messaging Location support UE Route Selection Policy Other Technical Requirements & Recommendations Access control IP Addressing DNN for IMS based services Emergency PDU Session Emergency Services Fallback Security Steering of Roaming in 5GS Technical Requirements for QoS support 5G QoS model 5G QoS profile QoS Control
MySQL Performance & Tuning training course description This MySQL Performance & Tuning course is designed for Database Administrators, Application Developers and Technical Consultants who need to monitor and tune the performance of MySQL servers and databases. The course provides practical experience in monitoring and tuning MySQL servers and databases. Note: This MySQL Performance & Tuning course does not cover clustering (other than at overview level), replication or non-standard storage engines such as Falcon and PBXT. What will you learn Develop a monitoring and tuning plan Use server configuration and status variables. Identify and improve problem queries. Make efficient use of indexes. Monitor and size memory caches and locks. Tune the MyISAM and InnoDB storage engine. Evaluate the use of partitioning for performance. MySQL Performance & Tuning training course details Who will benefit: Anyone who wishes to monitor and tune MySQL performance. Prerequisites: Delegates must have a working knowledge of MySQL Database Administration Duration 3 days MySQL Performance & Tuning training course contents Introduction to performance tuning Tuning overview, Resolving performance issues, Recommended approach to tuning, Items to evaluate, Where to look, Planning a monitoring routine, Building a new database for performance, Tuning an existing database, Setting suitable goals. MySQL performance tuning tools Administration tools, the information schema, performance-related SHOW commands, benchmarking tools, the MySQL performance schema, MonYog. Hands on Obtaining performance information. Schema design Normalisation, de-normalisation, naming conventions, load generation, stress testing and benchmarking tools, selecting data types, data types, character sets, choosing storage engines. Hands on effects of design on performance. Statement tuning Overview of statement tuning, identifying problem queries, the optimizer, explain, explain extended. Hands on identifying problem queries and using explain. Indexes Index overview, Types of index, Index tuning, Indexes and joins. Hands on Indexes and performance. Server configuration and monitoring Server configuration variables, server status variables, table cache, multi-threading, connection issues, query cache. Hands on setting and interpreting server variables and caching. Locking Types of locking, locking and storage engines, effects of locking on performance. Hands on locking and performance. The InnoDB engine Transactions, crash recovery, locking, monitoring InnoDB, caches and buffers, configuring data files, configuring the log files. Hands on InnoDB configuration and performance. Other storage engines MyISAM engine, merge engine, archive engine, memory engine, blackhole engine, CSV engine, the Spider engine, the ColumnStore engine, the MyRocks engine, mixing sorage engines. Hands on storage engine performance. Overview of clustering and performance Advantages of performance, advantages of clustering, performance issues and clustering, the NDBCluster engine, the Galera cluster, the Percona XtraDB cluster, MySQL InnoDB cluster, the federated engine, the federatedX engine, overview of other high availability techniques. NOSQL and Mencached overview. Dumping and loading data SQL statements versus delimited data, parameters affecting dump performance, parameters affecting load performance. Hands on dump and load performance. Partitioned tables Partitioned tables concepts, range partitioning, hash partitioning, key partitioning, list partitioning, composite partitioning or subpartitioning, partition pruning. Hands on partitioned table performance.
Join us for a 2-day Youth Mental Health First Aid (MHFAider®) course at The Ashcombe School in Dorking! Learn how to provide crucial support during a mental health crisis while gaining the skills to spot early signs of mental health issues. This in-person course creates a safe, supportive environment, with self-care prioritised throughout. Subsidised price: £20. Let's make mental health a normal part of everyday life!
SAFe® for Teams: In-House Training Build the skills needed to become a high-performing team member of an Agile Release Train (ART) and learn how to collaborate effectively with other teams by becoming a SAFe® 5 Practitioner (SP). During this course, you will gain an in-depth understanding of the ART, how it delivers value, and what you can do to effectively perform the role using Scrum, Kanban, and Extreme Programming (XP). You will also learn how to write stories and break down features, plan and execute iterations, and plan Program Increments. Finally, you'll learn about the continuous delivery pipeline and DevOps culture, how to effectively integrate with other teams in the program, and what it takes to continuously improve the train. What you will Learn To perform the role of a SAFe® Practitioner, you should be able to: Apply SAFe® to scale Lean and Agile development in their enterprise Know their team and its role on the Agile Release Train Know all other teams on the train, their roles, and the dependencies between the teams Plan Iterations Execute Iterations and demonstrate value Plan Program Increments Integrate and work with other teams on the train Introducing the Scaled Agile Framework® (SAFe®) Building an Agile Team Planning the Iteration Executing the Iteration Executing the Program Increment Practicing SAFe®