• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

118 Educators providing Other courses in Totton

Regents Park Community College

regents park community college

Southampton

As the Headteacher of this exceptional school, I am extremely proud of our ethos which is based on Respect, Pride, Creativity and Challenge. Staff and students embrace our values and as a result we are, arguably the most improved school on the South Coast. Regents Park is an over- subscribed mixed 11-16 school in the heart of Shirley, Southampton. The school is one of the oldest in Southampton steeped in history and over 100 years old. At Regents Park we provide a wonderful mix of tradition with a modern twist on teaching and learning ensuring that we provide a curriculum that generates interest, challenge and most importantly offers fun and excitement. Ofsted April 2018: ‘Teaching is characterised by highly effective planning, secure subject knowledge among the teachers, the use of a wide range of teaching strategies and the use of detailed information about pupils.’ Our pastoral care is second to none and we pride ourselves in the support and respect that emanates around the school with Student Leadership and Student Voice forming the platform on which the school continues to excel. Ofsted April 2018: ‘The strong messages about respect which flow from the top, and are modelled by all staff, are assimilated by pupils. Accordingly, they treat each other and adults with respect. Pupils’ behaviour around the school is exceptional. Their enthusiasm for learning is admirable, and their conduct in lessons is excellent.’ Our success is built on the commitment we have towards each and every student. As a small community school we understand the needs of each individual and data is used effectively to inspire each child to do their best.

Hampton Trust

hampton trust

Southampton

We are ambitious in our goals and the way in which we help those affected by domestic abuse. To tackle the root cause of domestic abuse we work directly with individuals who are being abusive. We make it our mission and our focus to identify the complexities behind violent, coercive and controlling behaviour to end the cycle of domestic abuse and reduce repeat victimisation. Too often the value of a perpetrator led approach is overlooked in favour of victim services due to the lack of evidence and lack of funding. Our decades of experience working with perpetrators, and subsequent results, has reinforced the belief that people can change. We have access to, and intelligence on, perpetrators outside of criminal justice that no other agencies have, enabling us to measure success rates as well being the first to intervene to ensure victim safety. We know that responding to domestic abuse is a challenge across all frontline services and we can’t do this alone. We work with a range of stakeholders across the voluntary and statutory sector to deliver what we know works. We are fortunate to have excellent partnerships with those sharing our passion to make a difference, no matter how hard it seems. We strongly believe the current criminal justice response to offenders needs reviewing. If we are to address the vulnerabilities associated with offending , and ultimately reduce offence rates, it requires a significant shake up. To that end we are not afraid to test new approaches evident in our innovative criminal justice interventions and the programmes we offer young adult offenders to consider their choices. We are currently exploring a trauma informed response to working with females in the criminal justice system.

Active100

active100

Eastleigh

We started in 2009, and we’ve been on an epic journey ever since. From our beginnings where we were solely focused on children’s football coaching to delivering our first ‘100% Active’ session in 2017, we’ve tried to stay true to our core beliefs. These are that all children should have the opportunity to develop through a variety of exciting activities that engage both body and brain, inspiring them to have a happy and healthy lifestyle. From the outset our focus has always been on children and their enjoyment of being active, learning new skills, improving their confidence and developing friendships. When we started in 2009 were running sessions for approximatley 40 children a month; this has now increased to almost 2000 children a month. We genuinely love being part of the children’s development and over the years we have had some amazing stories to tell. We find it fascinating to observe how individual children are in their handling of situations and how they get their characters across when integrating with new groups of children, even at the age of 18 months old. It is this kind of reward that keeps us focused on our goals, but we have a big challenge! Children of today are growing up in a world where they can lose hours during a day, day after day, week after week through being on electronic devices, during which time they have no interaction with other people. We have to acknowledge that we are living in a technology encompassing world now, but our vision is to create a balance between technology and being active. We want to offer variety and engagement through the sessions we offer to ensure children don’t lose the vital skills which will help them as they develop in life… things such as social skills, the ability to converse, the ability to handle situations, to adapt to changing environments, earn respect, be part of a team and how to win and lose.

Our Version Media

our version media

Southampton

Our Version Media® CIC is a community media enterprise dedicated to increasing positive and authentic representation of black and other communities often demonised by the press. Our work is underpinned by our core values: 1. Everyone can be empowered to tell their stories using a range of media Our founder, broadcast journalist turned social entrepreneur, Veronica Gordon, has fifteen years’ experience across TV, radio and digital media. Here’s her insider tip: with the right training and support, anybody can successfully tell their own stories in creative and compelling ways. 2. Ethnic and cultural diversity should be recognised, acknowledged and celebrated We believe that everyone should feel represented, included and have a sense of belonging. We are amplifying the voices of black and minoritised communities and making these positive and authentic stories more visible. 3. Authentic storytelling is key to building authentic relationships We teach individuals and organisations skills for authentic, inclusive and impactful storytelling. We’re empowering people to use digital media to create and share stories that reflect their real lives, neighbourhoods and communities. 4. Positive stories lead to positive wellbeing We know that the media’s demonisation and negative portrayal of black and marginalised communities is harming people’s mental health and wellbeing [read our survey findings]. By equipping people with media skills to tell their own stories, we’re making positive and authentic stories more visible. This is boosting self-esteem and wellbeing, while counteracting negative stereotypes at the same time. Our profits are reinvested into amplifying black voices We live by our values and reinvest our profits into amplifying the voices of black British, African and Caribbean communities. It’s one of the ways we’re working towards our vision of a world where black joy is seen, celebrated and accepted. We: Host a Black Community Coverage Clinic to deliver free media skills guidance, advice and support to black residents, community organisers/activists/volunteers and community group leaders Give our Mobile Storytelling training to Hampshire’s black residents, community organisers, community activists and community volunteers for free Support free support and promotion for black business owners through our free Black-owned Business Directory

Newlands Primary School

newlands primary school

Southampton

On behalf of everyone at Newlands Primary School, I would like to take this opportunity to welcome you and your child to our school and hope you have a happy and exciting learning journey with us. At Newlands we work hard to provide a stimulating, supportive and challenging learning environment in which children feel confident and want to learn and do their best. We believe every child wants to succeed and has the potential to achieve great things. We aim to meet the needs of each individual by ensuring we provide them with the opportunities, support and encouragement needed to develop their social, emotional, creative, academic and physical abilities to the full. We are a Rights Respecting School and want our children to know their rights and foster an ethos of tolerance and acceptance of everyone, respecting, not just their own rights, but the rights of others. We believe it is essential that your child feels happy, secure and makes good progress in their learning. We value the contribution parents and carers make in helping children achieve this. We work in partnership with parents and carers to ensure every child does the best they can. All of the adults at Newlands, whether they are staff members, parents, carers, governors, support workers or specialist providers, are role models to our children. By respecting each other and by valuing each child as an active and important member of our school and local community we will encourage children to develop a sense of responsibility for themselves and a respect for others. We want your child to flourish, and feel happy and secure during their time with us in order that they realise Newlands is a place where aspirations and ambitions come true. We want every child to be their own success story and look forward to working in partnership with you to give your child the best start possible to their education and life long learning. We hope you will enjoy your visit to our website and that you find the information you are looking for. If you have any questions or comments please contact the school directly and we will be pleased talk to you and/or arrange a visit..

International Federation Of Surgical Colleges

international federation of surgical colleges

London

The International Federation of Surgical Colleges (IFSC) was founded in 1958 in Stockholm, Sweden, with the objective of speaking with a single voice for world surgery on problems of common interest. Founding members consisted of traditional colleges of surgery and surgical societies from the European continent. Official relations with the WHO started in 1960 and since then the IFSC has been a recognised non-state actor (NSA) in formal relations with the WHO. It is also in consultative status with the UN Economic and Social Council (ECOSOC) where it is in a position to advise the UN on surgical matters. The IFSC remains the only organisation representing surgeons that is in special relations with both the UN and the WHO. Over the years the IFSC regularly changed its goals and operational methods as surgical care delivery, education and training changed in world surgery. In 1992 the constitution was changed to focus primarily in supporting surgical expertise in low income countries and in 2003 the constitution was again revised to state the federation’s goal as “the advancement of surgery in developing [sic] countries, especially Africa, promoting education and training, and help with examinations”. In 2007 a Memorandum of Agreement was signed with the College of Surgeons of East, Central and Southern Africa (COSECSA) to support specific educational projects. Similar support has been extended in different formats to the West Africa College of Surgeons (WACS), basic surgical training in Sri Lanka and the Egyptian Surgical Society. About what we Did From 2010 to 2015, under the leadership of Mr Bob Lane, the IFSC has supported the design, ratification and delivery of courses in basic surgical skills, anastomosis workshops, management of surgical emergencies, surgical critical care and in research methodology to a few hundred surgical trainees, other junior doctors, nurses who work in surgery and associate clinicians, predominantly in sub-Saharan Africa, but also in Sri Lanka. Such courses were always developed and delivered on request from affiliated regional or local surgical organisations, and in consultation with ministries of health about local need. In order to easier manage the business of course delivery the IFSC was registered as a charity in England and Wales in 2011. Included in all training courses was Training of Trainers which was essential in order to create sustainability in surgical learning. Large numbers of senior surgeons joined in the teaching of trainees on our courses and were able to continue running courses independently thereafter, which is still happening in certain centres to this day. To support this process teaching material was handed over to local centres or made available electronically. In 2019 and 2021 online courses in research methodology were developed for surgical and anaesthesia trainees in COSECSA and the College of Anaesthetists of East, Central and Southern Africa (CANECSA) respectively, with guidance and support from the Royal College of Surgeons of Ireland (RCSI), a founding member of IFSC. About us, the WHO and Surgical Learning Over the years IFSC worked hard with likeminded groups to support WHO projects in emergency and essential surgery, such as contributing to the book Surgical Care at the District Hospital, the Alliance on Patient Safety, the Global Initiative for Emergency and Essential Surgical Care (GIEESC) and resolution 68.15 at WHA68 in 2015 on “Strengthening Emergency and Essential Surgical Care and Anaesthesia as a Component of Universal Health Coverage”. In 2020-2021 the IFSC contributed to the development of the Learning Strategy of the new WHO Academy with specific focus on improved global preparedness for health emergencies. Members of the IFSC’s executive board continue to play important roles in the Technical Experts Working Group for advising SADC countries on the implementation of National Surgery, Obstetrics and Anaesthesia Plans as part of Universal Health Coverage. In this process the IFSC actively contributes to implementing the WHO’s “3 Billion” Pillars of work for universal health coverage, better protection from health emergencies and people enjoying better health and wellbeing. The IFSC’s focus in delivering these goals remain in advocacy for global surgery, in supporting education and training in especially essential surgery in first level hospitals and in supporting research skills acquisition by all surgeons in especially low and middle income countries (LMICs). In this way IFSC is trying to contribute to the decolonisation of surgical education and research, and to stop the unethical flow of research data from the Global South to rich countries in the North. It has also become clear that the time for designing surgical training courses in rich Western countries (or any HICs) for delivery in LMICs has come to an end. There remains a vast learning need in surgery in the Global South but such learning is directed from surgical educational institutions and experts in LMICs. The IFSC’s role in supporting such learning needs is increasingly to provide and support individual experts from its member organisations who can help deliver or advise on such learning projects. The SARS-CoV 2 pandemic has made it possible to deliver much of such support virtually, saving the expenses and climate impact of frequent air travel. About our Vision As incoming president of IFSC I have therefore stated three goals: To make IFSC more open and democratic, and more representative of surgeons in LMICs. It means reviewing the constitution, re-introducing a president’s council, changing membership criteria, and nomination and voting processes. To give this momentum, at the AGM a new Secretary-General and a new Chair of the Education and Research Committee were elected from Southern Africa institutions. The majority of surgeons in the world are not trained through traditional surgical colleges and IFSC membership should reflect this. Proposals for changes to IFSC structure and processes will be discussed by the Executive Board (EB) in 2022 and presented at the 2022 AGM for a vote. To play our role in decolonising surgical education, training, research and care. It means discouraging the flow of teaching and training material developed in HICs to be taught in LMICs, and stopping the flow of research data and intellectual property from the Global South to rich institutions in the Global North. IFSC will, however, strongly support surgical learning programmes developed in LMICs, as requested, and continue to support our research methodology courses for trainees in COSECSA, CANECSA and elsewhere to help young surgeons and anaesthetists in LMICs have control of their own research data. To support planetary health. Human, animal, plant and climate health are all interlinked. As IFSC helps with training, ongoing learning and support for essential surgery, it is important that such progress does not come at an unnecessary cost to planetary health. This also means being aware of and speaking out about unnecessary planetary health costs of luxury surgical care in high income environments. For this goal IFSC depends on advice from experts outside our organisation. All the above mean that IFSC needs to work differently to support the role of surgeons and surgery in the world, and encourage members not to think in surgical silos, but consider how we can work with other organisations in global surgery and related groups in e.g. anaesthesia, gynaecology and with other expertise, in order to advance surgical care for patients who are most in need. Although membership of IFSC is through surgical colleges and societies, we hope that those colleagues who read this piece will be encouraged to support the work of IFSC through their respective surgical organisations.

Clear View Training & Consultancy

clear view training & consultancy

London

We specialize in consultancy and training in OO analysis and design, UML modelling, BPMN, Metadata Management, Model Driven Architecture (MDA), requirements engineering and software engineering process design and implementation. New book - Interactive Computational Geometry in Python! Interactive Computational Geometry in Python, is now released. Click on the link in the sidebar for information and preview chapters. This book is an updated and expanded version of our popular “Interactive Computational Geometry - a taxonomic approach” ported from Mathematica to Python. It has some very useful extra material and greatly improved demonstrations and text. If you are not an experienced Mathematica programmer, you will find the Python code is much easier to undestand. In fact, when we made the port, we were delighted by just how simple and elegant the Python code turned out to be. We will no longer update the Mathematica version (although it will always remain available) and we consider “Interactive Computational Geometry in Python” to now be the definitive version of the text. Python is a great language for this sort of thing, and we hope and expect that moving to Python will make the book accessible to a much wider audience. We are very excited about this book! We have developed a complete process, including software, for creating long-form texts as interactive Jupyter notebooks and this book is the first result of our efforts. If you need help writing your own book in Jupyter, or just need help working with notebooks, please contact us for training and consultancy. Books Jim and Ila are authors of several best selling books on UML, BPMN and Model Driven Architecture. Our latest modeling book is “Secrets of Analysis”. This describes an approach to object oriented analysis called Generative Analysis. It tells you how to take unstructured, informal information, and, through a well-defined process of transformation, produce precise, structured information and ultimately UML models. If you ever wanted to learn the secrets of how experts perform great analysis and produce great UML analysis models, then this book is for you! We expect it will help re-establish OOA as a key discipline for the UML modeller/Business Analyst. Fed up with semantically weak user stories? Want to put some rigour back into your analysis process? This is the answer. Also be sure to check out our “Introduction to BPMN 2”. We believe that this is the first interactive modeling textbook ever produced. It is an enhanced ebook with animations and interactive figures for the iPad and Mac. Animations show you precisely how the various BPMN modeling element work. The interactive edition is available in Apple iBook Store. It is also available in a non interactive PDF version for all other readers from Amazon. Bespoke technical authoring We can help you author interactive texts in: - Apple iBooks - Jupyter - Wolfram Language Future books More or less as a hobby, Jim has been writing an interactive textbook on mathematics, music and musical set theory. There is a Wolfram Language version (which is rally just a scatch pad) and a version in Jupyter that will be published when Jim gets around to finishing it. If you are interested in these topics, contact us for details. Training courses Universities - we offer all of our training materials free to universities. All we ask in rerturn is that if there is a book associated with the materials, it is recommended as a course book. Commercial organizations - all of our training courses are available for delivery or licensing. Contact us for details. We offer: - UML 2 and the Unified Process (of course!) - Introduction to BPMN 2 - Miscellaneous OOAD/MDA/Metadata Management courses - Bespoke courses: if it is anything to do with modelling or UML we can do it! - Any of the advanced topics from “Secrets of Analysis" We have had very many satisfied clients including, JP Morgan, British Airways, Vodafone, AVIVA etc. etc.

Courses matching "Other"

Show all 683

Reservoir Engineering for Geosciences Professionals and Other Disciplines

By EnergyEdge - Training for a Sustainable Energy Future

About this Training Course Reservoir engineering methods, data and models are used in the E&P business to describe and optimise hydrocarbon recovery. This 5 full-day course addresses reservoir engineering concepts and methods to enable cross-disciplinary team work and the smooth exchange of ideas and experience. In this course, participants will gain an in-depth understanding of the fundamentals of reservoir engineering and a broad range of modern reservoir engineering principles and practices for reservoir development and production, including the estimation of oil and gas reserves. The topics covered in this course will be illustrated with practical and actual field cases. Some self-study or reading will be required from participants. Training Objectives By the end of this course, participants will be able to: Describe use of permeability and fluid saturation in reservoir engineering. Explain the assessment of hydrocarbon resources and recoverable reserves estimation. Understand analysis and modelling of fluid behaviour. Explain oil and gas reservoir performance. Describe material balance methods in oil and gas reservoirs. Understand design and analysis of well tests. Understand analysis and production of producing wells and forecasting methods. Describe fluid displacement at the pore and reservoir scale. Explain reservoir simulation approaches. Describe tools for handling the uncertainty in reservoir analysis. Describe various recovery methods from primary to enhanced recovery. Target Audience This course is intended for professionals with prior technical or engineering exposure to exploration and production activities. Targeted participants include geoscientists, production engineers, petrophysicists and petroleum engineers involved with exploration and development of oil & gas reservoirs. The course will also benefit petroleum engineering team leaders as well as IT staff and support staff who work with reservoir engineering, development and production departments. Course Level Basic or Foundation Trainer Your expert course leader is an independent Reservoir Engineering Consultant, providing project consultancy and reservoir engineering training for global customers. He retired from Shell in 2012 and during the last years of his Shell career, he held the Senior Reserves Consultant for the Middle East and Reservoir Engineering Discipline Lead positions. He is a seasoned Petroleum Engineering professional, with global experience in Shell companies and joint ventures (NAM, SSB, SCL, PDO, SKDBV). His technical expertise is in reserves and resource management, reservoir engineering quality assurance, and staff development as well as carbonate reservoirs, modelling and reservoir simulation.  PROFESSIONAL EXPERIENCE 2012 to date Independent Reservoir Engineering Consultant Petroleum and reservoir engineering advice, training and services. Reservoir engineering training for major oil companies, engineering firms and other global customers. Assurance of SPE and SEC reserves compliance. Participation in SPE reserves and resources estimation Advanced Technology Workshops both as an organising committee member and as session speaker.   2008 - 2012 Shell International E&P, the Hague, the Netherlands Senior Reserves Consultant for Shell business units and joint ventures in the Middle East Region Assurance of SEC and SPE compliance of reserves and resources. Industry publications and conference contributions a.o. SPE guidelines on probabilistic reserves estimation.   2006 - 2008 Shell E&P Technology Solutions, Rijswijk, the Netherlands Reservoir Engineering Discipline Lead Responsible for Reservoir Engineering in global projects and for staff planning and development (over 60 international Reservoir Engineers).   2001 - 2005 Centre for Carbonate Studies, SQU, Oman / Shell International E&P Applications and Research / Shell Representative Office Oman   Petroleum Engineering Manager PE Manager in the Carbonate Research Centre, a joint venture between Sultan Qaboos University in Oman and Shell International. Industrial research projects and teaching on recovery aspects of carbonate reservoir development.   1997 - 2000 Shell International E&P, Rijswijk, the Netherlands Principal Reservoir Engineer Coordination of the NOV subsurface team in Shell Kazakhstan Development BV in 2000. Leading role in Shell Gamechanger project on natural gas hydrates. Acting Shell Group Reserves Co-ordinator in 1997-1998. Facilitation of workshops with government shareholders, including discussions on sensitive reserves issues (BSP Petroleum Unit Brunei, PDO Oman, SPDC government Nigeria).   1992 - 1996 Shell Training Centre, Noordwijkerhout, the Netherlands Reservoir Engineering Programme Training Director Advanced PE training events, QA/QC, design and delivery of courses to Shell staff.   1985 - 1992 Shell International, SIPM, the Hague, The Netherlands Senior Reservoir Engineer Reservoir simulation, integrated reservoir modelling and gas field development and major contributor to the Shell internal Gas Field Planning Tool development. Full field reservoir simulation projects supporting Field Development Plans, operational strategies and unitisation negotiations for Shell Group Operating Companies in the United Kingdom, New Zealand and Egypt.   1984 - 1985 Geological Survey of the Netherlands, Ministry of Economic Affairs Reservoir Engineering Section Head Responsible for Petroleum Engineering advice on oil and gas licences to the Ministry of Economic Affairs. First-hand experience with a government view on resource management.   1976 - 1984 NAM, Assen, The Netherlands and SSB/SSPC, Miri, Malaysia Wellsite Operations Engineer / Operational Reservoir Engineer POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Reservoir Engineering for Geosciences Professionals and Other Disciplines
Delivered in Internationally or OnlineFlexible Dates
£3,697 to £4,299

Qualatex Fundamentals

By Qualatex

Qualatex Fundamentals Course hosted by Balloon Market. About this event Qualatex Fundamentals Course hosted by Balloon Market Fundamentals – this balloon course for beginners will address all aspects of working with balloons, from basic skills to creative designs, as well as the business essentials necessary to starting a professional balloon business. The class will consist of a combination of demonstrations, presentations and hands-on work. The instructor will demonstrate different balloon types and correct use of equipment and inflation, as well as how to create profitable classic and on-trend designs. This also covers pricing and marketing your work. These are the topics covered during the class: The Qualatex Latex range, equipment overview, air-filled design ideas, pricing your work, Qualatex Microfoil & Bubble balloons, Organic Designs and Helium Inflation With members of the Qualatex team on hand to assist, there will be lots of opportunity to ask questions and network with experienced professionals and other delegates. The day schedule is as follows: • 9:30 – arrive, register & welcome tea/coffee •10:00 – Part 1 of the class •11:30 – Comfort break & Networking •11:45 – Part 2 of the class •13:00 – Lunch & Networking •13:30 – Part 3 of the class •15:00 – Comfort Break & Networking •15:15 – Part 4 of the class •16:30 – Conclusion, Questions, Feedback, Certificates and Group Photo •17:00 - Finish Includes: A comprehensive, full-colour manual that will function as a valuable reference guide, which includes information on float times, basic design principles, pricing, and more. Participants will receive a certificate upon successful completion of the course. By the end of the course you will: Have the knowledge and confidence to create basic balloon creations including bouquets and garlands Understand Health and Safety in the Balloon Business Know how to use different balloons in different situations Have the knowledge to confidently inflate different types of balloons Understand pricing and how to make money from balloons Feel confident in selling your creations with a profitable price tag Have had the opportunity to interact and connect with others in the industry, just like you! Have numerous photo opportunities to use for social media Have the opportunity to appear in a future BMTV episode (should you wish to) Benefits of this course: Comprehensive, full-colour manual which acts as a valuable reference guide for future jobs with float times, design principles and pricing Exclusive discount to use at Balloon Market on the day (Place your order before 1pm on the day and you can have your order delivered to you to take away with you before you leave) Free ‘All Day’ refreshments including light lunch Ample free parking at the venue Easy access (only a few minutes from the motorway (J.2, M27) and 15 minutes from the train station / Southampton Airport and Ferry Terminal!) COVID-19 Safety As this class is being taught in person, class numbers and layout have been adjusted to make allowances for social distancing. We will ask each delegate to comply with any reasonable health and safety guidelines that may be applicable at the time of the course, which may include taking a lateral flow test or having your temperature taken before being allowed admittance to the course. As government guidelines are subject to change, full details of Health and Safety measures in place will be supplied to delegates closer to each event delivery date. If you have any queries about booking, please message the Qualatex team directly on pelmarketing@qualatex.com or Balloon Market on info@balloonmarket.co.uk. Cancellation Policy: In the event the class needs to be cancelled, or you are unable to attend, due to Covid-19 infection or requirement to self-isolate, you will be able to transfer your booking to another date for the same course, or a different Qualatex course. In the event there is no suitable course availability, you will be offered a refund. Instructor : Julie Dunham CBA Want to find out what others think about their investment in training? Click the link below.

Qualatex Fundamentals
Delivered In-PersonFlexible Dates
£36

Networking Microsoft Systems

5.0(3)

By Systems & Network Training

Networking Microsoft Systems course description A hands-on course covering the network aspects of Microsoft systems. The course progresses from basic TCP/IP tools and configuration settings through to advanced security considerations finishing with an overview of Exchange and IIS. Hands on sessions are based on a choice of Windows Server 2003 or Windows 2000 server and Windows XP or Windows 2000 professional. Customised versions with other Microsoft platforms are also available. What will you learn Design networks with consideration for Microsoft issues such as logons. Design, configure and troubleshoot TCP/IP, DNS, WINS and DHCP. Configure security features such as PKI and IPSec. Describe the Windows TCP/IP implementation details. Networking Microsoft Systems course details Who will benefit: Anyone working with Microsoft systems. Prerequisites: TCP/IP foundation for engineers Supporting Windows ( XP or 2000 or 2003) Duration 5 days Networking Microsoft Systems course contents Configuring network cards PnP, resources, Ethernet cards, wireless cards, dial up networking, other cards, Ethernet settings, layer 2 QoS. Configuring and supporting IP Basic IP settings, advanced IP settings, advanced TCP settings, DrTCP and registry settings, security DHCP DHCP server, authorising the DHCP service, DHCP client, DHCP relays, Address pools, options, lease duration's, Integrating with DNS. Microsoft networking overview Workgroups and domains, Domain controllers, the logon process in a network, the role of Active Directory, synchronisation, protocol stacks and bindings. Accessing file and print resources Shared folders, permissions, network printers, browsing, NetBIOS, SMB. WINS Servers, clients, Client registration, renewing and releasing of names. NetBIOS node types. DNS1 Overview, Primary and secondary servers, DDNS, zones, resource records. The browser service Master, backup and other browser roles, elections, announcements, recovery from failure, Inter subnet browsing. TCP/IP implementation details Dead gateway detection, Multi homing, multicasting, MTU path discovery, registry settings, QOS and RSVP, Windows as a router, performance implications of Microsoft services. Internet Access Options, NAT, Firewall capabilities and Proxy server, Internet Authentication Service. Remote Access Installing, RAS servers. RAS process, protocols Security: PKI PPTP, L2TP, What is IPSec, configuring IPSec. Security: VPNs PPTP, L2TP, What is IPSec, configuring IPSec. Other Microsoft networking services & tools Netmeeting, instant messaging, white boarding, document collaboration, video conferencing Microsoft Exchange, IIS, Directory replication, SNMP, Net Monitor, integration with other platforms.

Networking Microsoft Systems
Delivered in Internationally or OnlineFlexible Dates
£3,697

Complete Python programming

5.0(3)

By Systems & Network Training

Complete Python training course description Python is an agile, robust, expressive, fully objectoriented, extensible, and scalable programming language. It combines the power of compiled languages with the simplicity and rapid development of scripting languages. This course covers Python from the very basics of 'hello world!' through to object oriented programming and advanced topics such as multi threading. Hands on follows all the major sections in order to reinforce the theory. What will you learn Read Python programs. Write Python programs. Debug Python programs. Use Python's objects and memory model as well as its OOP features. Complete Python programming training course details Who will benefit: Anyone wishing to learn Python. Prerequisites: None. Duration 5 days Complete Python programming training course contents Welcome to Python: What is Python? Origins, features. Downloading and installing Python, Python manuals, comparing Python, other implementations. Getting started: Program output, the print statement, "hello world!", Program input, raw_input(), comments, operators, variables and assignment, numbers, strings, lists and tuples, dictionaries, indentation, if statement, while Loop, for loop. range(), list comprehensions. Files, open() and file() built-in functions. Errors and exceptions. Functions, Classes, Modules, useful functions. Python basics: Statements and syntax, variable assignment, identifiers, basic style guidelines, memory management, First Python programs, Related modules/developer tools. Python Objects: Other built-in types, Internal Types, Standard type operators, Standard type built-in functions, Categorizing standard types, Unsupported types. Numbers: Integers, Double precision floating point numbers, Complex numbers, Operators, Built-in and factory functions, Other numeric types. Sequences: strings, lists, and tuples: Sequences, Strings, Strings and operators, String-only operators, Built-in functions, String built-in methods, Special features of strings, Unicode, Summary of string highlights, Lists, Operators, Built-in functions, List type built-in methods, Special features of lists, Tuples, Tuple operators and built-in functions, Tuples special features, Copying Python objects and shallow and deep copies. Mapping and set types: Mapping Type: dictionaries and operators, Mapping type built-in and factory functions, Mapping type built-in methods, Dictionary keys, Set types, Set type operators, Built-in functions, Set type built-in methods. Conditionals and loops: If, else and elif statements, Conditional expressions, while, for, break, continue and pass statements, else statement . . . take two, Iterators and iter(), List comprehensions, Generator expressions. Files and input/output: File objects, File built-in functions [open() and file()], File built-in methods and attributes, Standard files, Command-line arguments, File system, File execution, Persistent storage modules. Errors and exceptions: What are exceptions? Detecting and handling exceptions, Context management, Exceptions as strings, Raising exceptions, Assertions, Standard exceptions, Creating Exceptions, Why exceptions, Exceptions and the sys module. Functions: Calling, creating and passing functions, formal arguments, variable-length arguments, functional programming, Variable scope, recursion, generators. Modules: Modules and files, Namespaces, Importing modules, Module import features, Module built-in functions, Packages, Other features of modules. Object-Oriented Programming (OOP): Classes, Class attributes, Instances, Instance attributes, Binding and method invocation, Static methods and class methods, Composition, Sub-classing and derivation, Inheritance, Built-in functions for classes, and other objects, Customizing classes with special methods, Privacy, Delegation, Advanced features of new-style classes (Python 2.2+), Related modules and documentation. Execution environment: Callable and code Objects, Executable object statements and built-in functions, Executing other programs. 'Restricted' and 'Terminating' execution, operating system interface. Regular expressions: Special symbols and characters, REs and Python, Regular expressions example. Network programming: Sockets: communication endpoints, Network programming in Python, SocketServer module, Twisted framework introduction. Internet client programming: What are internet clients? Transferring files, Network news, E-mail. Multithreaded Programming: Threads and processes Python, threads, and the global interpreter lock, The thread and threading Modules. GUI programming: Tkinter and Python programming, Tkinter Examples, Brief tour of other GUIs. Web programming: Web surfing with Python: creating simple web clients, Advanced Web clients, CGI: helping web servers process client data, Building CGI applications, Using Unicode with CGI, Advanced CGI, Web (HTTP) Servers. Database programming: Python database application programmer's interface (DB-API), ORMs. Miscellaneous Extending Python by writing extensions, Web Services, programming MS Office with Win32 COM, Python and Java programming with Jython.

Complete Python programming
Delivered in Internationally or OnlineFlexible Dates
£3,697

UNIX Virtualization and High Availability

5.0(3)

By Systems & Network Training

UNIX Virtualization and High Availability course description This course covers administering UNIX enterprise-wide with an emphasis on virtualization and high availability. What will you learn Manage Virtual Machines. Manage containers. Manage HA clusters. Manage HA cluster storage. UNIX Virtualization and High Availability course details Who will benefit: Enterprise-level UNIX professional. UNIX professionals working with virtualization and/or High availability. Prerequisites: Linux network administration 2 (LPIC-2) Duration 5 days UNIX Virtualization and High Availability course contents VIRTUALIZATION Virtualization concepts and theory Terminology, Pros and Cons of virtualization, variations of Virtual Machine monitors, migration of physical to VMs, migration of VMs between host systems, cloud computing. Xen Xen architecture, networking and storage, Xen configuration, Xen utilities, troubleshooting Xen installations, XAPI, XenStore, Xen Boot Parameters, the xm utility. KVM KVM architecture, networking and storage, KVM configuration, KVM utilities, troubleshooting KVM installations. Other virtualization solutions OpenVZ and LXC, other virtualization technologies, virtualization provisioning tools. Libvirt and Related Tools libvirt architecture, networking and storage, basic technical knowledge of libvirt and virsh, oVirt. Cloud Management Tools Basic feature knowledge of OpenStack and CloudStack, awareness of Eucalyptus and OpenNebula. Containers Containers versus VMs, Docker, Kubernetes. Load balanced clusters of LVS/IPVS, VRRP, configuration of keepalived, configuration of ldirectord, backend server network configuration. HAProxy, configuration of HAProxy. Failover clusters Pacemaker architecture and components (CIB, CRMd, PEngine, LRMd, DC, STONITHd), Pacemaker cluster configuration, Resource classes (OCF, LSB, Systemd, Upstart, Service, STONITH, Nagios), Resource rules and constraints (location, order, colocation), Advanced resource features (templates, groups, clone resources, multi-state resources), Pacemaker management using pcs, Pacemaker management using crmsh, configuration and management of corosync in conjunction with Pacemaker, other cluster engines (OpenAIS, Heartbeat, CMAN). HIGH AVAILABILITY CLUSTER STORAGE DRBD/cLVM DRBD resources, states and replication modes, configuration of DRBD resources, networking, disks and devices, configuration of DRBD automatic recovery and error handling, management of DRBD using drbdadm. drbdsetup and drbdmeta, Integration of DRBD with Pacemaker, cLVM, integration of cLVM with Pacemaker. Clustered File Systems Principles of cluster file systems. Create, maintain and troubleshoot GFS2 file systems in a cluster, create, maintain and troubleshoot OCFS2 file systems in a cluster, Integration of GFS2 and OCFS2 with Pacemaker, the O2CB cluster stack, other commonly used clustered file systems.

UNIX Virtualization and High Availability
Delivered in Internationally or OnlineFlexible Dates
£3,697

Linux virtualization and High Availability

5.0(3)

By Systems & Network Training

Linux virtualization and HA training course description The LPIC-3 certification is the culmination of LPI's multi -level professional certification program. LPIC-3 is designed for the enterprise-level Linux professional and represents the highest level of professional, distribution neutral Linux certification within the industry. LPIC-3 304 covers administering Linux enterprise-wide with an emphasis on virtualization and high availability. At SNT we have enhanced the contents of the course by covering containers. What will you learn Manage Virtual Machines. Manage containers. Manage HA clusters. Manage HA cluster storage. Linux virtualization and HA training course details Who will benefit: Linux professionals working with virtualization and/or High availability. Prerequisites: Linux network administration 2 (LPIC-2) Duration 5 days Linux virtualization and HA training course contents VIRTUALIZATION Virtualization concepts and theory Terminology, Pros and Cons of virtualization, variations of Virtual Machine monitors, migration of physical to VMs, migration of VMs between host systems, cloud computing. Xen Xen architecture, networking and storage, Xen configuration, Xen utilities, troubleshooting Xen installations, XAPI, XenStore, Xen Boot Parameters, the xm utility. KVM KVM architecture, networking and storage, KVM configuration, KVM utilities, troubleshooting KVM installations. Other virtualization solutions OpenVZ and LXC, other virtualization technologies, virtualization provisioning tools. Libvirt and Related Tools libvirt architecture, networking and storage, basic technical knowledge of libvirt and virsh, oVirt. Cloud Management Tools Basic feature knowledge of OpenStack and CloudStack, awareness of Eucalyptus and OpenNebula. Containers Containers versus VMs, Docker, Kubernetes. Load balanced clusters of LVS/IPVS, VRRP, configuration of keepalived, configuration of ldirectord, backend server network configuration. HAProxy, configuration of HAProxy. Failover clusters Pacemaker architecture and components (CIB, CRMd, PEngine, LRMd, DC, STONITHd), Pacemaker cluster configuration, Resource classes (OCF, LSB, Systemd, Upstart, Service, STONITH, Nagios), Resource rules and constraints (location, order, colocation), Advanced resource features (templates, groups, clone resources, multi-state resources), Pacemaker management using pcs, Pacemaker management using crmsh, configuration and management of corosync in conjunction with Pacemaker, other cluster engines (OpenAIS, Heartbeat, CMAN). HIGH AVAILABILITY CLUSTER STORAGE DRBD/cLVM DRBD resources, states and replication modes, configuration of DRBD resources, networking, disks and devices, configuration of DRBD automatic recovery and error handling, management of DRBD using drbdadm. drbdsetup and drbdmeta, Integration of DRBD with Pacemaker, cLVM, integration of cLVM with Pacemaker. Clustered File Systems Principles of cluster file systems. Create, maintain and troubleshoot GFS2 file systems in a cluster, create, maintain and troubleshoot OCFS2 file systems in a cluster, Integration of GFS2 and OCFS2 with Pacemaker, the O2CB cluster stack, other commonly used clustered file systems.

Linux virtualization and High Availability
Delivered in Internationally or OnlineFlexible Dates
£3,697

Total H.248 for Engineers

5.0(3)

By Systems & Network Training

Total H.248 training course description A course focusing purely on the H.248 protocol. Anyone working through the ITU standards documents can testify to the need of a training course to explain how H.248 really works. This course already assumes knowledge of other VoIP protocols and starts by positioning H.248 in relation to the other protocols. The course then looks at H.248 architectures and concepts before analysing H.248 messages and call flows. What will you learn Describe what H.248 is Recognise where H.248 fits in relation to other VoIP protocols. Explain how H.248 works. Analyse H.248 packets Total H.248 training course details Who will benefit: Technical staff working with H.248 Prerequisites: Voice Over IP. Duration 2 days Total H.248 training course contents What is H.248? Review of VoIP protocols: RTP, RTCP, SIP, SDP, H.323. The PSTN and SS7. Where H.248 fits into the picture. H.248 history. MGCP. The IETF. Megaco. ITU standards. H.248v1, v2, v3. H.248 architectures Media Gateways, Media Gateway Controllers, Gateway Control functions, Signalling Gateways. Reference architectures: IMS/TISPAN: IBCF, IWF, I-BGF, SPDF. MSF: S-SBG-NC, D-SBG-NC. GSMA: IPX Proxy. Softswitches. H.248 concepts The connection model, terminations, streams, contexts. Termination properties: descriptors, context properties. Events, signals, packages. H.248 messages Protocol stack, UDP, TCP. Message structure. Transactions, actions, commands. Requests, replies, acknowledgements. Sample message flows. Binary encoding, ASN syntax, Text encoding. H.248 commands Termination manipulation: Add, Subtract, Move, Modify. Event reporting: Notify. Management: AuditCapability, AuditValue, ServiceChange. H.248 Descriptors What are descriptors? Relationship with messages and commands. Basic descriptors, Descriptors composed of other descriptors. The 19 descriptors. Defaults. H.248 Transactions Groups of commands, transaction Ids, relationship with actions and commands. Requests and replies. H.248 wrap up What is a package? Basic packages. H.248 security. H.248 - SIP interoperation. H.248 interoperation with other protocols.

Total H.248 for Engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

Python for network engineers

5.0(3)

By Systems & Network Training

Python training course description This Python course focusses on teaching Python for use in network automation and network DevOps. We focus on getting delegates up and running with Python and network automation as quickly as possible rather than making them great programmers. In other words we concentrate on enabling delegates to use network automation libraries such as netmiko, NAPALM and Nornir, and APIs such as NETCONF and RESTCONF rather than enabling delegates to produce object oriented programs. Hands on sessions use Cisco and Juniper devices. What will you learn Run Python programs. Read Python programs. Write Python programs. Debug Python programs. Automate network tasks with Python programs. Configure network devices with Python. Collect data from network devices with Python. Python training course details Who will benefit: Network engineers. Prerequisites: TCP/IP Foundation Duration 5 days Python training course contents What is Python? Programming languages, Why Python? Python in interactive mode, Python scripts, ipython, Python version 2 versus version 3. A simple Python script. Comments. Hands on Installing Python, Hello world. A network example On box vs off box Python. telnet, ssh, NETCONF, HTTP, APIs, manufacturers and API support, analysis of a simple telnetlib program. Hands on Using Python to retrieve the configuration from a network device. Using wireshark to analyse the actions. Python basics I/O, operators, variables and assignment, types, indentation, loops and conditionals. Hands on Modifying the telnet program, changing configurations on a network devices. Functions, classes and methods What are functions, calling functions, builtin functions, useful builtin functions, file handling, classes, objects, creating instances. Hands on Storing configurations in files, configuring devices from files, using an inventory file to work on multiple devices. Libraries and modules Modules, files and packages, import, from-import, Python standard library, other packages, pip install, executing other programs. Managing python libraries. Hands on Using pip, installing and using ipaddress, subprocess to access netsnmp. For the more advanced, using the sockets library. Paramiko and netmiko SSH, enabling SSH on devices, keys. Paramiko versus netmiko, example scripts. pexpect. Hands on Configuring VLANs from Python. pySNMP Gathering facts using previous methods, SNMP review, pySNMP GET, pySNMP and SNMPv3. easySNMP library. Hands on Walking a MIB from Python. NETCONF What is NETCONF? Enabling NETCONF on devices, A first ncclient script, device handlers, get_config, edit_config, copy_config, delete_config, commit, validate, pyEZ, utils_config, utils.sw. Hands on Configuration using ncclient and PyEZ. This session is expanded for those interesting in JunOS automation. Manipulating configuration files Builtin functions, string handling. Unicode. Sequences, strings, lists, tuples. Dictionaries. TextFSM. Regular expressions. JSON, YAML, XML, YANG, Jinja2, templates. Hands on Jinja2 templating with Python to configure network devices. NAPALM Getters, configuration operations, supported devices, NAPALM transport, Config-replace, Config-merge, Compare config, Atomic changes, rollback. Example NAPLAM scripts. Hands on Using NAPALM to gather facts, Using NAPALM for configuration management REST and RESTCONF What is REST, HTTP methods, GET, POST, cURL, Postman, Python requests library. RESTCONF, a RESTCONF example. Hands on Modifying a configuration using RESTCONF. Scapy What is scapy, Scapy in interactive mode, Scapy as a module. Hands on Packet crafting from Python. Warning Errors and exceptions, Exception handling, try, except. Memory management. Garbage collection. Context management, With. Hands on Improving Python code. Nornir What is Nornir? A network automation framework, inventories, connection management and parallelization. Nornir architecture and other libraires. Hands on Setting up nornir, nornir fact gathering, nornir tasks. Optional Writing your own functions, Writing your own classes. pyntc. Hands on Writing reusable code.

Python for network engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697

Definitive Nagios for engineers

5.0(1)

By Systems & Network Training

Definitive Nagios training course description Nagios is an open source application designed to provide system and network monitoring. This hands on course gives a comprehensive coverage of using Nagios to provide monitoring of Linux, Windows and network devices. The course is based on Nagios core but contact us if you would like Nagios XI. What will you learn Install Nagios. Configure Nagios. Monitor Windows, Linux and Cisco (and other network equipment) using Nagios. Configure notifications Definitive Nagios training course details Who will benefit: Technical staff working with Nagios. Prerequisites: None. Duration 2 days Definitive Nagios for engineers Nagios architecture Downloading Nagios, Installing Nagios, Nagios core, plugins, frontends, addons. Nagios XI. Nagios Fusion. Hands on Installing Nagios. Getting started with Nagios Nagios files, nagios.cfg, minimal.cfg. Starting and stopping Nagios. Hands on Controlling Nagios. Using Nagios Nagios web interface. Maps, Hosts, host groups, services, service groups, problems. Reports. Configuration. Hands on Using the web interface. Monitoring Linux systems SSH, NRPE. Hands on Monitoring Linux system health. Monitoring Windows systems Installing NSClient++, Configuring NSClient++, check_nt plugin, monitoring uptime, CPU, memory, disks, services, processes. Hands on Monitoring Windows system health. Monitoring network devices SNMP architecture, MIBs. Polling. Hands on Configuring Nagios for SNMP. Agents Configuring Cisco devices for SNMP support, communities, traps, syslog. Hands on Monitoring network devices. Nagios alerts and notifications SNMP traps. Email notifications, SMS alerts other messaging

Definitive Nagios for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

Definitive network forensics for engineers

5.0(3)

By Systems & Network Training

Network forensics training course description This course studies network forensics-monitoring and analysis of network traffic for information gathering, intrusion detection and legal evidence. We focus on the technical aspects of network forensics rather than other skills such as incident response procedures etc.. Hands on sessions follow all the major sections. What will you learn Recognise network forensic data sources. Perform network forensics using: Wireshark NetFlow Log analysis Describe issues such as encryption. Network forensics training course details Who will benefit: Technical network and/or security staff. Prerequisites: TCP/IP foundation for engineers. Duration 3 days Network forensics training course contents What is network forensics? What it is, host vs network forensics, purposes, legal implications, network devices, network data sources, investigation tools. Hands on whois, DNS queries. Host side network forensics Services, connections tools. Hands on Windows services, Linux daemons, netstat, ifoconfig/ipconfig, ps and Process explorer, ntop, arp, resource monitor. Packet capture and analysis Network forensics with Wireshark, Taps, NetworkMiner. Hands on Performing Network Traffic Analysis using NetworkMiner and Wireshark. Attacks DOS attacks, SYN floods, vulnerability exploits, ARP and DNS poisoning, application attacks, DNS ANY requests, buffer overflow attacks, SQL injection attack, attack evasion with fragmentation. Hands on Detecting scans, using nmap, identifying attack tools. Calculating location Timezones, whois, traceroute, geolocation. Wifi positioning. Hands on Wireshark with GeoIP lookup. Data collection NetFlow, sflow, logging, splunk, splunk patterns, GRR. HTTP proxies. Hands on NetFlow configuration, NetFlow analysis. The role of IDS, firewalls and logs Host based vs network based, IDS detection styles, IDS architectures, alerting. Snort. syslog-ng. Microsoft log parser. Hands on syslog, Windows Event viewer. Correlation Time synchronisation, capture times, log aggregation and management, timelines. Hands on Wireshark conversations. Other considerations Tunnelling, encryption, cloud computing, TOR. Hands on TLS handshake in Wireshark.

Definitive network forensics for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,497