• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1083 Other courses in Waltham Abbey

UNIX Virtualization and High Availability

5.0(3)

By Systems & Network Training

UNIX Virtualization and High Availability course description This course covers administering UNIX enterprise-wide with an emphasis on virtualization and high availability. What will you learn Manage Virtual Machines. Manage containers. Manage HA clusters. Manage HA cluster storage. UNIX Virtualization and High Availability course details Who will benefit: Enterprise-level UNIX professional. UNIX professionals working with virtualization and/or High availability. Prerequisites: Linux network administration 2 (LPIC-2) Duration 5 days UNIX Virtualization and High Availability course contents VIRTUALIZATION Virtualization concepts and theory Terminology, Pros and Cons of virtualization, variations of Virtual Machine monitors, migration of physical to VMs, migration of VMs between host systems, cloud computing. Xen Xen architecture, networking and storage, Xen configuration, Xen utilities, troubleshooting Xen installations, XAPI, XenStore, Xen Boot Parameters, the xm utility. KVM KVM architecture, networking and storage, KVM configuration, KVM utilities, troubleshooting KVM installations. Other virtualization solutions OpenVZ and LXC, other virtualization technologies, virtualization provisioning tools. Libvirt and Related Tools libvirt architecture, networking and storage, basic technical knowledge of libvirt and virsh, oVirt. Cloud Management Tools Basic feature knowledge of OpenStack and CloudStack, awareness of Eucalyptus and OpenNebula. Containers Containers versus VMs, Docker, Kubernetes. Load balanced clusters of LVS/IPVS, VRRP, configuration of keepalived, configuration of ldirectord, backend server network configuration. HAProxy, configuration of HAProxy. Failover clusters Pacemaker architecture and components (CIB, CRMd, PEngine, LRMd, DC, STONITHd), Pacemaker cluster configuration, Resource classes (OCF, LSB, Systemd, Upstart, Service, STONITH, Nagios), Resource rules and constraints (location, order, colocation), Advanced resource features (templates, groups, clone resources, multi-state resources), Pacemaker management using pcs, Pacemaker management using crmsh, configuration and management of corosync in conjunction with Pacemaker, other cluster engines (OpenAIS, Heartbeat, CMAN). HIGH AVAILABILITY CLUSTER STORAGE DRBD/cLVM DRBD resources, states and replication modes, configuration of DRBD resources, networking, disks and devices, configuration of DRBD automatic recovery and error handling, management of DRBD using drbdadm. drbdsetup and drbdmeta, Integration of DRBD with Pacemaker, cLVM, integration of cLVM with Pacemaker. Clustered File Systems Principles of cluster file systems. Create, maintain and troubleshoot GFS2 file systems in a cluster, create, maintain and troubleshoot OCFS2 file systems in a cluster, Integration of GFS2 and OCFS2 with Pacemaker, the O2CB cluster stack, other commonly used clustered file systems.

UNIX Virtualization and High Availability
Delivered in Internationally or OnlineFlexible Dates
£3,697

Leadership Skills - Lead, Motivate & Inspire 2 Days Training in London

5.0(1)

By Mangates

Leadership Skills - Lead, Motivate & Inspire 2 Days Training in London

Leadership Skills - Lead, Motivate & Inspire 2 Days Training in London
Delivered In-Person + more
£1,195 to £1,295

The TMJ Joint - An Osteopathic Approach April 2025

By CPD Today

Osteopathic Approach to the Tempro-Mandibular Joint, exploring how the TMJ impacts posture and movement and vice versa. Course will include internal and external treatment to the TMJ

The TMJ Joint - An Osteopathic Approach April 2025
Delivered In-Person in London
£50 to £180

Linux virtualization and High Availability

5.0(3)

By Systems & Network Training

Linux virtualization and HA training course description The LPIC-3 certification is the culmination of LPI's multi -level professional certification program. LPIC-3 is designed for the enterprise-level Linux professional and represents the highest level of professional, distribution neutral Linux certification within the industry. LPIC-3 304 covers administering Linux enterprise-wide with an emphasis on virtualization and high availability. At SNT we have enhanced the contents of the course by covering containers. What will you learn Manage Virtual Machines. Manage containers. Manage HA clusters. Manage HA cluster storage. Linux virtualization and HA training course details Who will benefit: Linux professionals working with virtualization and/or High availability. Prerequisites: Linux network administration 2 (LPIC-2) Duration 5 days Linux virtualization and HA training course contents VIRTUALIZATION Virtualization concepts and theory Terminology, Pros and Cons of virtualization, variations of Virtual Machine monitors, migration of physical to VMs, migration of VMs between host systems, cloud computing. Xen Xen architecture, networking and storage, Xen configuration, Xen utilities, troubleshooting Xen installations, XAPI, XenStore, Xen Boot Parameters, the xm utility. KVM KVM architecture, networking and storage, KVM configuration, KVM utilities, troubleshooting KVM installations. Other virtualization solutions OpenVZ and LXC, other virtualization technologies, virtualization provisioning tools. Libvirt and Related Tools libvirt architecture, networking and storage, basic technical knowledge of libvirt and virsh, oVirt. Cloud Management Tools Basic feature knowledge of OpenStack and CloudStack, awareness of Eucalyptus and OpenNebula. Containers Containers versus VMs, Docker, Kubernetes. Load balanced clusters of LVS/IPVS, VRRP, configuration of keepalived, configuration of ldirectord, backend server network configuration. HAProxy, configuration of HAProxy. Failover clusters Pacemaker architecture and components (CIB, CRMd, PEngine, LRMd, DC, STONITHd), Pacemaker cluster configuration, Resource classes (OCF, LSB, Systemd, Upstart, Service, STONITH, Nagios), Resource rules and constraints (location, order, colocation), Advanced resource features (templates, groups, clone resources, multi-state resources), Pacemaker management using pcs, Pacemaker management using crmsh, configuration and management of corosync in conjunction with Pacemaker, other cluster engines (OpenAIS, Heartbeat, CMAN). HIGH AVAILABILITY CLUSTER STORAGE DRBD/cLVM DRBD resources, states and replication modes, configuration of DRBD resources, networking, disks and devices, configuration of DRBD automatic recovery and error handling, management of DRBD using drbdadm. drbdsetup and drbdmeta, Integration of DRBD with Pacemaker, cLVM, integration of cLVM with Pacemaker. Clustered File Systems Principles of cluster file systems. Create, maintain and troubleshoot GFS2 file systems in a cluster, create, maintain and troubleshoot OCFS2 file systems in a cluster, Integration of GFS2 and OCFS2 with Pacemaker, the O2CB cluster stack, other commonly used clustered file systems.

Linux virtualization and High Availability
Delivered in Internationally or OnlineFlexible Dates
£3,697

Conflict Management 1 Day Training in London

By Mangates

Conflict Management 1 Day Training in London

Conflict Management 1 Day Training in London
Delivered In-Person + more
£595 to £795

Total H.248 for Engineers

5.0(3)

By Systems & Network Training

Total H.248 training course description A course focusing purely on the H.248 protocol. Anyone working through the ITU standards documents can testify to the need of a training course to explain how H.248 really works. This course already assumes knowledge of other VoIP protocols and starts by positioning H.248 in relation to the other protocols. The course then looks at H.248 architectures and concepts before analysing H.248 messages and call flows. What will you learn Describe what H.248 is Recognise where H.248 fits in relation to other VoIP protocols. Explain how H.248 works. Analyse H.248 packets Total H.248 training course details Who will benefit: Technical staff working with H.248 Prerequisites: Voice Over IP. Duration 2 days Total H.248 training course contents What is H.248? Review of VoIP protocols: RTP, RTCP, SIP, SDP, H.323. The PSTN and SS7. Where H.248 fits into the picture. H.248 history. MGCP. The IETF. Megaco. ITU standards. H.248v1, v2, v3. H.248 architectures Media Gateways, Media Gateway Controllers, Gateway Control functions, Signalling Gateways. Reference architectures: IMS/TISPAN: IBCF, IWF, I-BGF, SPDF. MSF: S-SBG-NC, D-SBG-NC. GSMA: IPX Proxy. Softswitches. H.248 concepts The connection model, terminations, streams, contexts. Termination properties: descriptors, context properties. Events, signals, packages. H.248 messages Protocol stack, UDP, TCP. Message structure. Transactions, actions, commands. Requests, replies, acknowledgements. Sample message flows. Binary encoding, ASN syntax, Text encoding. H.248 commands Termination manipulation: Add, Subtract, Move, Modify. Event reporting: Notify. Management: AuditCapability, AuditValue, ServiceChange. H.248 Descriptors What are descriptors? Relationship with messages and commands. Basic descriptors, Descriptors composed of other descriptors. The 19 descriptors. Defaults. H.248 Transactions Groups of commands, transaction Ids, relationship with actions and commands. Requests and replies. H.248 wrap up What is a package? Basic packages. H.248 security. H.248 - SIP interoperation. H.248 interoperation with other protocols.

Total H.248 for Engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

BAG & ACCESSORY DESIGN MASTERCLASS - 1 Week Course

5.0(52)

By The London Leather Workshop

COURSE DESCRIPTION: BAG AND ACCESSORY DESIGN MASTERCLASSThis course is tailored for beginners and intermediate-level participants, offering a distinctive group class format designed to assist aspiring designers or those seeking guidance in bringing to life a practical and viable collection of bags and/or accessories.Through this course, you will gain a comprehensive grasp of fundamental skills in accessory design and what it requires to become a bag designer. It empowers you to transform your creative concepts into tangible realities by providing instruction on the essential steps required for prototyping and manufacturing your collection.In addition to acquiring the skills to design bags and accessories accurately and understanding what information to convey to a prototype maker, this course will guide you through the process of creating patterns and constructing a three-dimensional mock-up for one your design. WHY THIS COURSE DIFFERS FROM THE TYPICAL ‘ACCESSORY DESIGN’ PROGRAMMEThis course has been meticulously designed by a team comprising designers, prototype makers, and handbag manufacturers. It offers a blend of theoretical and practical elements, providing you with the knowledge required by the industry to comprehend and accurately translate your ideas into finished products.Unlike courses that solely focus on creating aesthetically pleasing drawings, this programme emphasizes providing a comprehensive understanding of the intricate and extensive processes involved in designing a collection of handbags. It aims to equip you with the insights necessary to navigate the complexities, ensuring you are well-prepared before and during the design phase. By doing so, the course aims to save you time, expense, and potential frustration when it comes to prototyping and manufacturing your collection.This intensive course will equip you with the skills to potentially save thousands of pounds on product development for your designs and the assistance needed to make your project viable for construction.WHY WE DEVELOPED A FASHION DESIGN COURSEAfter years of designing and developing collections for our clients, we noticed a significant lack of clear information on what it truly takes to become a designer of handbags and fashion accessories.This course is crafted to assist both emerging and struggling designers in developing and articulating their ideas effectively for the prototyping phase. It addresses the needs and challenges faced by our customers, aiming to support and streamline the creative process for project realization. WHO IS THIS COURSE FOR?This course is tailored for aspiring designers seeking professional advice from industry experts, individuals at the beginning of their design careers who require guidance to enhance their design process, or those simply looking to refine their drawing techniques for personal enjoyment.No previous experience is necessary. WHAT WILL BE TAUGHT?Below is a list of topics covered during the classes:Understanding the role of a bag designerBefore designing: understanding and analsing crucial external aspects that will influence your business successAbout your business idea and profile: understanding the target audience, market placement, pricing strategy and moreUnderstanding what a moodboard is and how to use itUnderstanding the differences and purposes of illustrations vs technical drawingsUnderstanding the importance of construction and its impact on your designOverview of the anatomy of a handbag, lining and reinforcementsUnderstanding the structure of a collection: the use of a collection planLearning how to plan a balanced collection of fashion accessoriesUnderstanding finishing options for your designsUnderstanding hardware and its impact on the cost price of your collectionOverview of leather and vegan leatherIdentifying the right materials for your collectionLearning how to draw three-dimensional bagsSketching technical drawingsGoing through the product development of three designsDeveloping patterns and realising 1 three-dimensional mock-up of a bagProviding technical information about your collection to the prototype makerUnderstanding the prototyping processManufacturing your collection: how it works and what the options are. HOW WILL THE CLASS BE TAUGHT?The class will take place in person at our London studio, and the lessons will alternate between theoretical instruction and practical exercises.Some homework will be assigned to students between lessons. HOW LONG IS THIS TUITION?:This course spans an entire week, running from Monday to Friday, 10 am to 5 pm, with a 30-minute lunch break. INCLUDED IN THE COURSE:You will also receive access to a collection of handouts providing relevant information, useful resources and support in continuing your designing process independently.The handouts will contain:– A glossary containing essential key words related to the topic of the lesson– An illustrated glossary containing information about type of bags and bags’ features– An illustrated guide on common hardware used in bags and accessories– Documents about leather types, finishings, tanning processes– Information about perspective and guides to be used as reference to develop your drawings– A list of recommended suppliers for both leather and fittings (physically in London and online) WHAT ARE THE ENTRY REQUIREMENTS?You should be able to use measurements and understand verbal and written English instructions. ARE THERE ANY OTHER COSTS? IS THERE ANYTHING I NEED TO BRING?Materials to exercise with are included.Feel free to bring a notepad, if you would like to take some notes, we will provide the rest.

BAG & ACCESSORY DESIGN MASTERCLASS - 1 Week Course
Delivered In-Person in London + more
£1,017

Python for network engineers

5.0(3)

By Systems & Network Training

Python training course description This Python course focusses on teaching Python for use in network automation and network DevOps. We focus on getting delegates up and running with Python and network automation as quickly as possible rather than making them great programmers. In other words we concentrate on enabling delegates to use network automation libraries such as netmiko, NAPALM and Nornir, and APIs such as NETCONF and RESTCONF rather than enabling delegates to produce object oriented programs. Hands on sessions use Cisco and Juniper devices. What will you learn Run Python programs. Read Python programs. Write Python programs. Debug Python programs. Automate network tasks with Python programs. Configure network devices with Python. Collect data from network devices with Python. Python training course details Who will benefit: Network engineers. Prerequisites: TCP/IP Foundation Duration 5 days Python training course contents What is Python? Programming languages, Why Python? Python in interactive mode, Python scripts, ipython, Python version 2 versus version 3. A simple Python script. Comments. Hands on Installing Python, Hello world. A network example On box vs off box Python. telnet, ssh, NETCONF, HTTP, APIs, manufacturers and API support, analysis of a simple telnetlib program. Hands on Using Python to retrieve the configuration from a network device. Using wireshark to analyse the actions. Python basics I/O, operators, variables and assignment, types, indentation, loops and conditionals. Hands on Modifying the telnet program, changing configurations on a network devices. Functions, classes and methods What are functions, calling functions, builtin functions, useful builtin functions, file handling, classes, objects, creating instances. Hands on Storing configurations in files, configuring devices from files, using an inventory file to work on multiple devices. Libraries and modules Modules, files and packages, import, from-import, Python standard library, other packages, pip install, executing other programs. Managing python libraries. Hands on Using pip, installing and using ipaddress, subprocess to access netsnmp. For the more advanced, using the sockets library. Paramiko and netmiko SSH, enabling SSH on devices, keys. Paramiko versus netmiko, example scripts. pexpect. Hands on Configuring VLANs from Python. pySNMP Gathering facts using previous methods, SNMP review, pySNMP GET, pySNMP and SNMPv3. easySNMP library. Hands on Walking a MIB from Python. NETCONF What is NETCONF? Enabling NETCONF on devices, A first ncclient script, device handlers, get_config, edit_config, copy_config, delete_config, commit, validate, pyEZ, utils_config, utils.sw. Hands on Configuration using ncclient and PyEZ. This session is expanded for those interesting in JunOS automation. Manipulating configuration files Builtin functions, string handling. Unicode. Sequences, strings, lists, tuples. Dictionaries. TextFSM. Regular expressions. JSON, YAML, XML, YANG, Jinja2, templates. Hands on Jinja2 templating with Python to configure network devices. NAPALM Getters, configuration operations, supported devices, NAPALM transport, Config-replace, Config-merge, Compare config, Atomic changes, rollback. Example NAPLAM scripts. Hands on Using NAPALM to gather facts, Using NAPALM for configuration management REST and RESTCONF What is REST, HTTP methods, GET, POST, cURL, Postman, Python requests library. RESTCONF, a RESTCONF example. Hands on Modifying a configuration using RESTCONF. Scapy What is scapy, Scapy in interactive mode, Scapy as a module. Hands on Packet crafting from Python. Warning Errors and exceptions, Exception handling, try, except. Memory management. Garbage collection. Context management, With. Hands on Improving Python code. Nornir What is Nornir? A network automation framework, inventories, connection management and parallelization. Nornir architecture and other libraires. Hands on Setting up nornir, nornir fact gathering, nornir tasks. Optional Writing your own functions, Writing your own classes. pyntc. Hands on Writing reusable code.

Python for network engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697

Stand Up for Yourself (Communication skills and assertiveness)

5.0(6)

By The Sunflower Effect Confidence Courses

Are challenging people getting in the way of your happiness, well-being and success? You may find them at work, in social situations, you may live them or they may be members of your family? Even worse when you see them getting away with things; getting their way even though there is no sense to it; getting advantages over everyone else; and in many cases being rewarded for their abusive behaviour with promotion and other advantages! You probably would never want to behave the way they do. You don’t have it in you or you just couldn’t live with yourself if you behaved like that. Maybe your attempts to confront them have failed and you’ve ended up with egg on your face, with them having more opportunity to have a “dig” at you. As a result, you may have come to the conclusion that it’s the nasty people that get ahead, and someone like you just has to put up with this behaviour from others.

Stand Up for Yourself (Communication skills and assertiveness)
Delivered In-Person in London
£395

SAFe for Teams: In-House Training

By IIL Europe Ltd

SAFe® for Teams: In-House Training Build the skills needed to become a high-performing team member of an Agile Release Train (ART) and learn how to collaborate effectively with other teams by becoming a SAFe® 5 Practitioner (SP). During this course, you will gain an in-depth understanding of the ART, how it delivers value, and what you can do to effectively perform the role using Scrum, Kanban, and Extreme Programming (XP). You will also learn how to write stories and break down features, plan and execute iterations, and plan Program Increments. Finally, you'll learn about the continuous delivery pipeline and DevOps culture, how to effectively integrate with other teams in the program, and what it takes to continuously improve the train. What you will Learn To perform the role of a SAFe® Practitioner, you should be able to: Apply SAFe® to scale Lean and Agile development in their enterprise Know their team and its role on the Agile Release Train Know all other teams on the train, their roles, and the dependencies between the teams Plan Iterations Execute Iterations and demonstrate value Plan Program Increments Integrate and work with other teams on the train Introducing the Scaled Agile Framework® (SAFe®) Building an Agile Team Planning the Iteration Executing the Iteration Executing the Program Increment Practicing SAFe®

SAFe for Teams: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,795
1...34567...109