• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

45 Educators providing Other courses in Wells

Spirit of the Inca

spirit of the inca

Radstock

Lying flat on my back for 16 days back in 1980 something, I was in so much physical pain that I could not move. It was then that I began to realise that I needed to change my life! I had been literally 'floored'! Stopped in my tracks. I had nowhere to run, or hide. "It wasn't by chance that during that time I came across a reflexologist who helped me to see that this was a turning point in my life. As a result of that meeting, and the healing that followed, I trained to become a reflexologist. My healers journey had begun and everything changed. "Over the course of the next few years, I noticed that some clients healed and others did not. My curiosity and desire to be of service led me to explore all kinds of therapeutic processes... counselling, gestalt, person centred therapy, psychosythesis. It was a great help in understanding how the mind affected the body. And I noticed that now I was able to help more people to heal.. and yet I noticed that still some clients did not. "My wondering about this led me fully into the healing arts and I began to understand that we each have a soul's journey. I had to ask myself: 'Why am I here?' 'What am I meant to be doing with my life?' "At the level of the soul I needed to know that my life has meaning and purpose beyond the everyday, and I learned that creative expression is vital to my wellbeing, as is finding a meaning and purpose that fits who I am. During this time I had many teachers. I trained to be a yoga teacher, I discovered 5 Rythms dance, and explored ways to use my voice... each time reaching out beyond my comfort zone, beyond who I thought I was.. to discover aspects of me that had been hidden or surpressed in the simple act of living this everyday reality. "My wondering led me to run a women's group for ten years. I wanted to explore what it means to be a woman in today's world. Together, we explored the sacred feminine, the goddess, the myths that we live by, we explored sacred landscapes, ceremony and ritual and found ways to connect with Mother Earth, a connection lost in working world today. During those years I took groups on Outward Bound courses in the landscape of Dartmoor. It was as much my journey as it was for those who shared it with me. We all learned a lot about ourselves, about what we were truly capable of. Incredible transformations took place in us all. Above all I learned the resilience of the human spirit, how stepping beyond fear creates inner trust and confidence... and that when we truly face our fears and embrace them we liberate ourselves then our presence liberates others. "Finally my journey led me to Shamanic Training. I have worked with a number of shaman in my life, and now, Incorporating the processes and techniques that I have learned both from the Inca tradition and many other great teachers along the way, I have developed a training which is powerful, beautiful and for me is the final piece in the puzzle. "Working at the level of energy affects all of the bodies: the soul's journey, the mental body, the emotional body and the physical body. I have also learned on this journey that it is a sacred journey, a journey towards wholeness... and the more I heal of myself, the more I affect those around me in a positive, life enriching way. "This is the work that I do in the world, it's the gift that I bring. "My medicine stones form a powerful healing tool called a Mesa. "My Mesa contains the wisdom that comes from my personal healing, the transformation of old worn-out stories of powerlessness, turned into power; of pain and suffering turned into compassion; and ancient wisdom handed down through the ages, through a lineage of medicine men and women whose grace, dignity and childlike innocence reminds me of what we have lost in the Western world. "And now I teach others how to build theirs."

Cookery at the Grange

cookery at the grange

London

The Grange runs outstanding residential cookery courses which can act as a spring board at any stage in life. The Essential Cookery Course is a fun, creative, practical and useful way to spend four weeks, especially following the rigours of the final years of school, university or an intense career… or any other phase of life! It is a really valuable experience which can give the skills, friendships and practicality to last a lifetime, as well as being invaluable in making very employable assets out of able students. "The Essential Cookery Course is aimed at people wanting to venture into ski seasons or seasonal boat work but it's also perfect for anyone who wants to learn new skills. This four-week course will build your confidence in all areas of cookery, as well as menu planning, presentation and kitchen management...." Jamie Magazine Many of our past students have had amazing careers cooking around the world working in great chalets in the Alps and America, on glamorous yachts in the Mediterranean and Caribbean, in beautiful villas, on tropical islands, on safaris in the wilds of Africa and on its rugged coast, on horseback safaris in Mongolia… the list goes on! Our students have worked in many stately homes around this country and in Scottish lodges. Other students use the course as the first step to a career in the food industry – as journalists in top magazines, running restaurants, cooking agencies, cookery schools, party planning organisations, event management and catering companies. They also love to cook for their family and friends. Amongst our famous alumni are Pippa Middleton, Santa Montefiore and Danny Goffey (who came third in Celebrity Masterchef). "SO much more than a cookery course..." Ellie Howes We use the best local ingredients from our gardens, nearby family farms and artisans to make dishes from around the world with fantastic flavours, that are easy to cook. Jane Averill, who leads the Grange, is as passionate about produce as she is about her students. Her global travels enable her to understand and educate about food and cooking through dishes from Europe, Asia and the Middle East. If you would like to visit the Grange please do get in touch to see it all first hand and get a real feel of what we do. The Grange also has a restaurant on site, where students can gain an insight into the commercial world of food and wine. We'd love to welcome you to the Grange.

Redcliffe Ki Aikido Club - Bristol

redcliffe ki aikido club - bristol

Somerset,

To become a Ki Federation member you will sign a membership form agreeing to the Ki Federation rules below. Membership Membership is open to individuals who have paid the annual membership fees laid down from time to time by the Federation (save that individuals who are over the age of 70 are exempt from membership fees), and follow the form of Ki Aikido the Federation specifies . Membership Categories Adult membership is open to individuals of 17 years and over. Youth membership is open to those between the age of 14 and 16 years. Senior Citizen membership is open to individuals of 65 years and over Junior membership is open to those between the age of 5 and 13 years. Unemployed/Student (Student rate for under 21’s only) Disabled Joint membership Honorary members may be appointed at the discretion of the Executive Committee. Doctors Certificate Members with a pre-existing physical medieval condition, or who are disabled, must provide a letter from their GP confirming their fitness to practice. Insurance Cover Membership fees of the Federation includes insurance cover. However, disabled members and members with a pre-existing physical medical condition, and who have not provided the required doctors’ certificate, will be covered for public liability only. When a member reaches 75 they will be covered for public liability only. Membership Cards Members will be issued with membership cards which must be produced before admission to any course held by the Federation or its affiliated clubs. Lost cards may be replaced on payment of a fee laid down from time to time by the Federation. Dress for Ki Aikido Female Kyu Grades: White kidogi, coloured belt, black hakama Male Kyu Grades: White kidogi, coloured belt 1st Dan: White kidogi, black belt, black hakama with 1 red stripe 2nd Dan: White kidogi, black belt, black hakama with 2 red stripes 3rd Dan: White kidogi, black belt, black hakama with 3 red stripes 4th Dan: White kidogi, black belt, black hakama with 4 red stripes 5th Dan: White kidogi, white belt, black hakama with 1 white stripe 6th Dan: White kidogi, white belt, black hakama with 2 white stripes 7th Dan: White kidogi, red and white belt, black hakama with 3 white stripes 8th Dan: White kidogi, red and white belt, black hakama with 2 red and 3 white stripes On special occasions: 5th & 6th Dans: White kidogi, white belt, white hakama 7th Dans: White kidogi, red and white belt, white hakama 8th Dans: White kidogi, red and white belt, white hakama with red and white stripe ties No badges should be worn on kidogi or hakama. Slippers should be worn to and from the mat. Alcohol and Drugs Members must not consume any alcohol before a practise. The use of drugs other than for medical purposes is prohibited at all times. General Etiquette Politeness, rules of behaviour and common decency are part of the practice of Ki Aikido. Members should:- Respect their teachers Be courteous to other members Be quiet inside the dojo Keep kidogi clean and fingernails and toe nails short Maintain a good standard of general cleanliness Be kind to lower grades Be moderate in daily eating and drinking Try to avoid fighting Members must not practise the arts of Ki Aikido outside the dojo. The Federation will only recognise grades awarded by the Federation. Weapons All weapons must be carried in a weapons bag when not in use. The use of live blades is not permitted except under the supervision of the Technical Director or President of the Federation. Disciplinary Action Any member who contravenes the regulations of the Federation, or misuse the techniques of Ki Aikido, or acts in a manner that affects the interests and/or reputation of the Federation and its members, will be required to attend a hearing before the Executive Committee. The Executive Committee shall have the power to take appropriate disciplinary action including expulsion, suspension, demotion in grade, or whatever other action the Executive Committee deems necessary. Amendments to Membership Rules The Federation reserves the right to amend or add to these membership rules. All changes will be notified to members through their teachers. By continuing with membership of the Federation, members are deemed to agree to abide by all membership rules applicable at that time.

Diocese of Bath & Wells Education department

diocese of bath & wells education department

3.0(4)

Somerset

In response to God’s immense love for us we seek to be God’s people living and telling the story of Jesus. Our vision and strategy speaks of the story of Jesus; his life, teaching and work, his death and resurrection; the story which is the context of our faith and the content of our message. We seek to live this story as disciples of Jesus Christ in the world and to tell it, both in sharing the good news and by the way in which our lives speak about Him. Priorities Three priorities for action are at the centre of diocesan life in order to enable every one of us to ‘live and tell the story of Jesus’. These priorities reflect the way in which we seek to put the vision into practice and to address the challenges we face across the diocese, challenges that have grown more stark as a result of the Covid pandemic. To enable all of these to really flourish, we seek to place prayer and worship at the heart of our life together and to build a spirit of unity and generosity in living out our vision. To place mission and evangelism at the heart of everything that we do This priority reminds us that everything we do needs to be set within the context of sharing God’s love with the world (living the story) and proclaiming the gospel (telling the story).We will shape our life together to serve and embrace our communities better; we will undertake more activities and initiatives with an explicitly missional purpose and engage more proactively with our communities at a personal, parish, deanery and diocesan level. To align our resources towards mission We will shift the balance of the resources we deploy in time, people and buildings towards mission and provide more resources for explicitly missional roles; that we will invest in our communities and in initiatives in order to follow God’s missionary purposes; and that we will seek numerical and spiritual growth as we trust in the leading and guiding of God’s Holy Spirit. To identify, develop and release the gifts of all people We will seek new ministry models that help us all to make best use of the gifts and talents that God has given to his people; that we will seek to build congregations that flourish through serving each other, serving their communities and witness to the love of God in Jesus Christ.

1...345

Courses matching "Other"

Show all 661

Reservoir Engineering for Geosciences Professionals and Other Disciplines

By EnergyEdge - Training for a Sustainable Energy Future

About this Training Course Reservoir engineering methods, data and models are used in the E&P business to describe and optimise hydrocarbon recovery. This 5 full-day course addresses reservoir engineering concepts and methods to enable cross-disciplinary team work and the smooth exchange of ideas and experience. In this course, participants will gain an in-depth understanding of the fundamentals of reservoir engineering and a broad range of modern reservoir engineering principles and practices for reservoir development and production, including the estimation of oil and gas reserves. The topics covered in this course will be illustrated with practical and actual field cases. Some self-study or reading will be required from participants. Training Objectives By the end of this course, participants will be able to: Describe use of permeability and fluid saturation in reservoir engineering. Explain the assessment of hydrocarbon resources and recoverable reserves estimation. Understand analysis and modelling of fluid behaviour. Explain oil and gas reservoir performance. Describe material balance methods in oil and gas reservoirs. Understand design and analysis of well tests. Understand analysis and production of producing wells and forecasting methods. Describe fluid displacement at the pore and reservoir scale. Explain reservoir simulation approaches. Describe tools for handling the uncertainty in reservoir analysis. Describe various recovery methods from primary to enhanced recovery. Target Audience This course is intended for professionals with prior technical or engineering exposure to exploration and production activities. Targeted participants include geoscientists, production engineers, petrophysicists and petroleum engineers involved with exploration and development of oil & gas reservoirs. The course will also benefit petroleum engineering team leaders as well as IT staff and support staff who work with reservoir engineering, development and production departments. Course Level Basic or Foundation Trainer Your expert course leader is an independent Reservoir Engineering Consultant, providing project consultancy and reservoir engineering training for global customers. He retired from Shell in 2012 and during the last years of his Shell career, he held the Senior Reserves Consultant for the Middle East and Reservoir Engineering Discipline Lead positions. He is a seasoned Petroleum Engineering professional, with global experience in Shell companies and joint ventures (NAM, SSB, SCL, PDO, SKDBV). His technical expertise is in reserves and resource management, reservoir engineering quality assurance, and staff development as well as carbonate reservoirs, modelling and reservoir simulation.  PROFESSIONAL EXPERIENCE 2012 to date Independent Reservoir Engineering Consultant Petroleum and reservoir engineering advice, training and services. Reservoir engineering training for major oil companies, engineering firms and other global customers. Assurance of SPE and SEC reserves compliance. Participation in SPE reserves and resources estimation Advanced Technology Workshops both as an organising committee member and as session speaker.   2008 - 2012 Shell International E&P, the Hague, the Netherlands Senior Reserves Consultant for Shell business units and joint ventures in the Middle East Region Assurance of SEC and SPE compliance of reserves and resources. Industry publications and conference contributions a.o. SPE guidelines on probabilistic reserves estimation.   2006 - 2008 Shell E&P Technology Solutions, Rijswijk, the Netherlands Reservoir Engineering Discipline Lead Responsible for Reservoir Engineering in global projects and for staff planning and development (over 60 international Reservoir Engineers).   2001 - 2005 Centre for Carbonate Studies, SQU, Oman / Shell International E&P Applications and Research / Shell Representative Office Oman   Petroleum Engineering Manager PE Manager in the Carbonate Research Centre, a joint venture between Sultan Qaboos University in Oman and Shell International. Industrial research projects and teaching on recovery aspects of carbonate reservoir development.   1997 - 2000 Shell International E&P, Rijswijk, the Netherlands Principal Reservoir Engineer Coordination of the NOV subsurface team in Shell Kazakhstan Development BV in 2000. Leading role in Shell Gamechanger project on natural gas hydrates. Acting Shell Group Reserves Co-ordinator in 1997-1998. Facilitation of workshops with government shareholders, including discussions on sensitive reserves issues (BSP Petroleum Unit Brunei, PDO Oman, SPDC government Nigeria).   1992 - 1996 Shell Training Centre, Noordwijkerhout, the Netherlands Reservoir Engineering Programme Training Director Advanced PE training events, QA/QC, design and delivery of courses to Shell staff.   1985 - 1992 Shell International, SIPM, the Hague, The Netherlands Senior Reservoir Engineer Reservoir simulation, integrated reservoir modelling and gas field development and major contributor to the Shell internal Gas Field Planning Tool development. Full field reservoir simulation projects supporting Field Development Plans, operational strategies and unitisation negotiations for Shell Group Operating Companies in the United Kingdom, New Zealand and Egypt.   1984 - 1985 Geological Survey of the Netherlands, Ministry of Economic Affairs Reservoir Engineering Section Head Responsible for Petroleum Engineering advice on oil and gas licences to the Ministry of Economic Affairs. First-hand experience with a government view on resource management.   1976 - 1984 NAM, Assen, The Netherlands and SSB/SSPC, Miri, Malaysia Wellsite Operations Engineer / Operational Reservoir Engineer POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Reservoir Engineering for Geosciences Professionals and Other Disciplines
Delivered in Internationally or OnlineFlexible Dates
£3,697 to £4,299

Networking Microsoft Systems

5.0(3)

By Systems & Network Training

Networking Microsoft Systems course description A hands-on course covering the network aspects of Microsoft systems. The course progresses from basic TCP/IP tools and configuration settings through to advanced security considerations finishing with an overview of Exchange and IIS. Hands on sessions are based on a choice of Windows Server 2003 or Windows 2000 server and Windows XP or Windows 2000 professional. Customised versions with other Microsoft platforms are also available. What will you learn Design networks with consideration for Microsoft issues such as logons. Design, configure and troubleshoot TCP/IP, DNS, WINS and DHCP. Configure security features such as PKI and IPSec. Describe the Windows TCP/IP implementation details. Networking Microsoft Systems course details Who will benefit: Anyone working with Microsoft systems. Prerequisites: TCP/IP foundation for engineers Supporting Windows ( XP or 2000 or 2003) Duration 5 days Networking Microsoft Systems course contents Configuring network cards PnP, resources, Ethernet cards, wireless cards, dial up networking, other cards, Ethernet settings, layer 2 QoS. Configuring and supporting IP Basic IP settings, advanced IP settings, advanced TCP settings, DrTCP and registry settings, security DHCP DHCP server, authorising the DHCP service, DHCP client, DHCP relays, Address pools, options, lease duration's, Integrating with DNS. Microsoft networking overview Workgroups and domains, Domain controllers, the logon process in a network, the role of Active Directory, synchronisation, protocol stacks and bindings. Accessing file and print resources Shared folders, permissions, network printers, browsing, NetBIOS, SMB. WINS Servers, clients, Client registration, renewing and releasing of names. NetBIOS node types. DNS1 Overview, Primary and secondary servers, DDNS, zones, resource records. The browser service Master, backup and other browser roles, elections, announcements, recovery from failure, Inter subnet browsing. TCP/IP implementation details Dead gateway detection, Multi homing, multicasting, MTU path discovery, registry settings, QOS and RSVP, Windows as a router, performance implications of Microsoft services. Internet Access Options, NAT, Firewall capabilities and Proxy server, Internet Authentication Service. Remote Access Installing, RAS servers. RAS process, protocols Security: PKI PPTP, L2TP, What is IPSec, configuring IPSec. Security: VPNs PPTP, L2TP, What is IPSec, configuring IPSec. Other Microsoft networking services & tools Netmeeting, instant messaging, white boarding, document collaboration, video conferencing Microsoft Exchange, IIS, Directory replication, SNMP, Net Monitor, integration with other platforms.

Networking Microsoft Systems
Delivered in Internationally or OnlineFlexible Dates
£3,697

Complete Python programming

5.0(3)

By Systems & Network Training

Complete Python training course description Python is an agile, robust, expressive, fully objectoriented, extensible, and scalable programming language. It combines the power of compiled languages with the simplicity and rapid development of scripting languages. This course covers Python from the very basics of 'hello world!' through to object oriented programming and advanced topics such as multi threading. Hands on follows all the major sections in order to reinforce the theory. What will you learn Read Python programs. Write Python programs. Debug Python programs. Use Python's objects and memory model as well as its OOP features. Complete Python programming training course details Who will benefit: Anyone wishing to learn Python. Prerequisites: None. Duration 5 days Complete Python programming training course contents Welcome to Python: What is Python? Origins, features. Downloading and installing Python, Python manuals, comparing Python, other implementations. Getting started: Program output, the print statement, "hello world!", Program input, raw_input(), comments, operators, variables and assignment, numbers, strings, lists and tuples, dictionaries, indentation, if statement, while Loop, for loop. range(), list comprehensions. Files, open() and file() built-in functions. Errors and exceptions. Functions, Classes, Modules, useful functions. Python basics: Statements and syntax, variable assignment, identifiers, basic style guidelines, memory management, First Python programs, Related modules/developer tools. Python Objects: Other built-in types, Internal Types, Standard type operators, Standard type built-in functions, Categorizing standard types, Unsupported types. Numbers: Integers, Double precision floating point numbers, Complex numbers, Operators, Built-in and factory functions, Other numeric types. Sequences: strings, lists, and tuples: Sequences, Strings, Strings and operators, String-only operators, Built-in functions, String built-in methods, Special features of strings, Unicode, Summary of string highlights, Lists, Operators, Built-in functions, List type built-in methods, Special features of lists, Tuples, Tuple operators and built-in functions, Tuples special features, Copying Python objects and shallow and deep copies. Mapping and set types: Mapping Type: dictionaries and operators, Mapping type built-in and factory functions, Mapping type built-in methods, Dictionary keys, Set types, Set type operators, Built-in functions, Set type built-in methods. Conditionals and loops: If, else and elif statements, Conditional expressions, while, for, break, continue and pass statements, else statement . . . take two, Iterators and iter(), List comprehensions, Generator expressions. Files and input/output: File objects, File built-in functions [open() and file()], File built-in methods and attributes, Standard files, Command-line arguments, File system, File execution, Persistent storage modules. Errors and exceptions: What are exceptions? Detecting and handling exceptions, Context management, Exceptions as strings, Raising exceptions, Assertions, Standard exceptions, Creating Exceptions, Why exceptions, Exceptions and the sys module. Functions: Calling, creating and passing functions, formal arguments, variable-length arguments, functional programming, Variable scope, recursion, generators. Modules: Modules and files, Namespaces, Importing modules, Module import features, Module built-in functions, Packages, Other features of modules. Object-Oriented Programming (OOP): Classes, Class attributes, Instances, Instance attributes, Binding and method invocation, Static methods and class methods, Composition, Sub-classing and derivation, Inheritance, Built-in functions for classes, and other objects, Customizing classes with special methods, Privacy, Delegation, Advanced features of new-style classes (Python 2.2+), Related modules and documentation. Execution environment: Callable and code Objects, Executable object statements and built-in functions, Executing other programs. 'Restricted' and 'Terminating' execution, operating system interface. Regular expressions: Special symbols and characters, REs and Python, Regular expressions example. Network programming: Sockets: communication endpoints, Network programming in Python, SocketServer module, Twisted framework introduction. Internet client programming: What are internet clients? Transferring files, Network news, E-mail. Multithreaded Programming: Threads and processes Python, threads, and the global interpreter lock, The thread and threading Modules. GUI programming: Tkinter and Python programming, Tkinter Examples, Brief tour of other GUIs. Web programming: Web surfing with Python: creating simple web clients, Advanced Web clients, CGI: helping web servers process client data, Building CGI applications, Using Unicode with CGI, Advanced CGI, Web (HTTP) Servers. Database programming: Python database application programmer's interface (DB-API), ORMs. Miscellaneous Extending Python by writing extensions, Web Services, programming MS Office with Win32 COM, Python and Java programming with Jython.

Complete Python programming
Delivered in Internationally or OnlineFlexible Dates
£3,697

UNIX Virtualization and High Availability

5.0(3)

By Systems & Network Training

UNIX Virtualization and High Availability course description This course covers administering UNIX enterprise-wide with an emphasis on virtualization and high availability. What will you learn Manage Virtual Machines. Manage containers. Manage HA clusters. Manage HA cluster storage. UNIX Virtualization and High Availability course details Who will benefit: Enterprise-level UNIX professional. UNIX professionals working with virtualization and/or High availability. Prerequisites: Linux network administration 2 (LPIC-2) Duration 5 days UNIX Virtualization and High Availability course contents VIRTUALIZATION Virtualization concepts and theory Terminology, Pros and Cons of virtualization, variations of Virtual Machine monitors, migration of physical to VMs, migration of VMs between host systems, cloud computing. Xen Xen architecture, networking and storage, Xen configuration, Xen utilities, troubleshooting Xen installations, XAPI, XenStore, Xen Boot Parameters, the xm utility. KVM KVM architecture, networking and storage, KVM configuration, KVM utilities, troubleshooting KVM installations. Other virtualization solutions OpenVZ and LXC, other virtualization technologies, virtualization provisioning tools. Libvirt and Related Tools libvirt architecture, networking and storage, basic technical knowledge of libvirt and virsh, oVirt. Cloud Management Tools Basic feature knowledge of OpenStack and CloudStack, awareness of Eucalyptus and OpenNebula. Containers Containers versus VMs, Docker, Kubernetes. Load balanced clusters of LVS/IPVS, VRRP, configuration of keepalived, configuration of ldirectord, backend server network configuration. HAProxy, configuration of HAProxy. Failover clusters Pacemaker architecture and components (CIB, CRMd, PEngine, LRMd, DC, STONITHd), Pacemaker cluster configuration, Resource classes (OCF, LSB, Systemd, Upstart, Service, STONITH, Nagios), Resource rules and constraints (location, order, colocation), Advanced resource features (templates, groups, clone resources, multi-state resources), Pacemaker management using pcs, Pacemaker management using crmsh, configuration and management of corosync in conjunction with Pacemaker, other cluster engines (OpenAIS, Heartbeat, CMAN). HIGH AVAILABILITY CLUSTER STORAGE DRBD/cLVM DRBD resources, states and replication modes, configuration of DRBD resources, networking, disks and devices, configuration of DRBD automatic recovery and error handling, management of DRBD using drbdadm. drbdsetup and drbdmeta, Integration of DRBD with Pacemaker, cLVM, integration of cLVM with Pacemaker. Clustered File Systems Principles of cluster file systems. Create, maintain and troubleshoot GFS2 file systems in a cluster, create, maintain and troubleshoot OCFS2 file systems in a cluster, Integration of GFS2 and OCFS2 with Pacemaker, the O2CB cluster stack, other commonly used clustered file systems.

UNIX Virtualization and High Availability
Delivered in Internationally or OnlineFlexible Dates
£3,697

Linux virtualization and High Availability

5.0(3)

By Systems & Network Training

Linux virtualization and HA training course description The LPIC-3 certification is the culmination of LPI's multi -level professional certification program. LPIC-3 is designed for the enterprise-level Linux professional and represents the highest level of professional, distribution neutral Linux certification within the industry. LPIC-3 304 covers administering Linux enterprise-wide with an emphasis on virtualization and high availability. At SNT we have enhanced the contents of the course by covering containers. What will you learn Manage Virtual Machines. Manage containers. Manage HA clusters. Manage HA cluster storage. Linux virtualization and HA training course details Who will benefit: Linux professionals working with virtualization and/or High availability. Prerequisites: Linux network administration 2 (LPIC-2) Duration 5 days Linux virtualization and HA training course contents VIRTUALIZATION Virtualization concepts and theory Terminology, Pros and Cons of virtualization, variations of Virtual Machine monitors, migration of physical to VMs, migration of VMs between host systems, cloud computing. Xen Xen architecture, networking and storage, Xen configuration, Xen utilities, troubleshooting Xen installations, XAPI, XenStore, Xen Boot Parameters, the xm utility. KVM KVM architecture, networking and storage, KVM configuration, KVM utilities, troubleshooting KVM installations. Other virtualization solutions OpenVZ and LXC, other virtualization technologies, virtualization provisioning tools. Libvirt and Related Tools libvirt architecture, networking and storage, basic technical knowledge of libvirt and virsh, oVirt. Cloud Management Tools Basic feature knowledge of OpenStack and CloudStack, awareness of Eucalyptus and OpenNebula. Containers Containers versus VMs, Docker, Kubernetes. Load balanced clusters of LVS/IPVS, VRRP, configuration of keepalived, configuration of ldirectord, backend server network configuration. HAProxy, configuration of HAProxy. Failover clusters Pacemaker architecture and components (CIB, CRMd, PEngine, LRMd, DC, STONITHd), Pacemaker cluster configuration, Resource classes (OCF, LSB, Systemd, Upstart, Service, STONITH, Nagios), Resource rules and constraints (location, order, colocation), Advanced resource features (templates, groups, clone resources, multi-state resources), Pacemaker management using pcs, Pacemaker management using crmsh, configuration and management of corosync in conjunction with Pacemaker, other cluster engines (OpenAIS, Heartbeat, CMAN). HIGH AVAILABILITY CLUSTER STORAGE DRBD/cLVM DRBD resources, states and replication modes, configuration of DRBD resources, networking, disks and devices, configuration of DRBD automatic recovery and error handling, management of DRBD using drbdadm. drbdsetup and drbdmeta, Integration of DRBD with Pacemaker, cLVM, integration of cLVM with Pacemaker. Clustered File Systems Principles of cluster file systems. Create, maintain and troubleshoot GFS2 file systems in a cluster, create, maintain and troubleshoot OCFS2 file systems in a cluster, Integration of GFS2 and OCFS2 with Pacemaker, the O2CB cluster stack, other commonly used clustered file systems.

Linux virtualization and High Availability
Delivered in Internationally or OnlineFlexible Dates
£3,697

Total H.248 for Engineers

5.0(3)

By Systems & Network Training

Total H.248 training course description A course focusing purely on the H.248 protocol. Anyone working through the ITU standards documents can testify to the need of a training course to explain how H.248 really works. This course already assumes knowledge of other VoIP protocols and starts by positioning H.248 in relation to the other protocols. The course then looks at H.248 architectures and concepts before analysing H.248 messages and call flows. What will you learn Describe what H.248 is Recognise where H.248 fits in relation to other VoIP protocols. Explain how H.248 works. Analyse H.248 packets Total H.248 training course details Who will benefit: Technical staff working with H.248 Prerequisites: Voice Over IP. Duration 2 days Total H.248 training course contents What is H.248? Review of VoIP protocols: RTP, RTCP, SIP, SDP, H.323. The PSTN and SS7. Where H.248 fits into the picture. H.248 history. MGCP. The IETF. Megaco. ITU standards. H.248v1, v2, v3. H.248 architectures Media Gateways, Media Gateway Controllers, Gateway Control functions, Signalling Gateways. Reference architectures: IMS/TISPAN: IBCF, IWF, I-BGF, SPDF. MSF: S-SBG-NC, D-SBG-NC. GSMA: IPX Proxy. Softswitches. H.248 concepts The connection model, terminations, streams, contexts. Termination properties: descriptors, context properties. Events, signals, packages. H.248 messages Protocol stack, UDP, TCP. Message structure. Transactions, actions, commands. Requests, replies, acknowledgements. Sample message flows. Binary encoding, ASN syntax, Text encoding. H.248 commands Termination manipulation: Add, Subtract, Move, Modify. Event reporting: Notify. Management: AuditCapability, AuditValue, ServiceChange. H.248 Descriptors What are descriptors? Relationship with messages and commands. Basic descriptors, Descriptors composed of other descriptors. The 19 descriptors. Defaults. H.248 Transactions Groups of commands, transaction Ids, relationship with actions and commands. Requests and replies. H.248 wrap up What is a package? Basic packages. H.248 security. H.248 - SIP interoperation. H.248 interoperation with other protocols.

Total H.248 for Engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

Python for network engineers

5.0(3)

By Systems & Network Training

Python training course description This Python course focusses on teaching Python for use in network automation and network DevOps. We focus on getting delegates up and running with Python and network automation as quickly as possible rather than making them great programmers. In other words we concentrate on enabling delegates to use network automation libraries such as netmiko, NAPALM and Nornir, and APIs such as NETCONF and RESTCONF rather than enabling delegates to produce object oriented programs. Hands on sessions use Cisco and Juniper devices. What will you learn Run Python programs. Read Python programs. Write Python programs. Debug Python programs. Automate network tasks with Python programs. Configure network devices with Python. Collect data from network devices with Python. Python training course details Who will benefit: Network engineers. Prerequisites: TCP/IP Foundation Duration 5 days Python training course contents What is Python? Programming languages, Why Python? Python in interactive mode, Python scripts, ipython, Python version 2 versus version 3. A simple Python script. Comments. Hands on Installing Python, Hello world. A network example On box vs off box Python. telnet, ssh, NETCONF, HTTP, APIs, manufacturers and API support, analysis of a simple telnetlib program. Hands on Using Python to retrieve the configuration from a network device. Using wireshark to analyse the actions. Python basics I/O, operators, variables and assignment, types, indentation, loops and conditionals. Hands on Modifying the telnet program, changing configurations on a network devices. Functions, classes and methods What are functions, calling functions, builtin functions, useful builtin functions, file handling, classes, objects, creating instances. Hands on Storing configurations in files, configuring devices from files, using an inventory file to work on multiple devices. Libraries and modules Modules, files and packages, import, from-import, Python standard library, other packages, pip install, executing other programs. Managing python libraries. Hands on Using pip, installing and using ipaddress, subprocess to access netsnmp. For the more advanced, using the sockets library. Paramiko and netmiko SSH, enabling SSH on devices, keys. Paramiko versus netmiko, example scripts. pexpect. Hands on Configuring VLANs from Python. pySNMP Gathering facts using previous methods, SNMP review, pySNMP GET, pySNMP and SNMPv3. easySNMP library. Hands on Walking a MIB from Python. NETCONF What is NETCONF? Enabling NETCONF on devices, A first ncclient script, device handlers, get_config, edit_config, copy_config, delete_config, commit, validate, pyEZ, utils_config, utils.sw. Hands on Configuration using ncclient and PyEZ. This session is expanded for those interesting in JunOS automation. Manipulating configuration files Builtin functions, string handling. Unicode. Sequences, strings, lists, tuples. Dictionaries. TextFSM. Regular expressions. JSON, YAML, XML, YANG, Jinja2, templates. Hands on Jinja2 templating with Python to configure network devices. NAPALM Getters, configuration operations, supported devices, NAPALM transport, Config-replace, Config-merge, Compare config, Atomic changes, rollback. Example NAPLAM scripts. Hands on Using NAPALM to gather facts, Using NAPALM for configuration management REST and RESTCONF What is REST, HTTP methods, GET, POST, cURL, Postman, Python requests library. RESTCONF, a RESTCONF example. Hands on Modifying a configuration using RESTCONF. Scapy What is scapy, Scapy in interactive mode, Scapy as a module. Hands on Packet crafting from Python. Warning Errors and exceptions, Exception handling, try, except. Memory management. Garbage collection. Context management, With. Hands on Improving Python code. Nornir What is Nornir? A network automation framework, inventories, connection management and parallelization. Nornir architecture and other libraires. Hands on Setting up nornir, nornir fact gathering, nornir tasks. Optional Writing your own functions, Writing your own classes. pyntc. Hands on Writing reusable code.

Python for network engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697

Definitive Nagios for engineers

5.0(1)

By Systems & Network Training

Definitive Nagios training course description Nagios is an open source application designed to provide system and network monitoring. This hands on course gives a comprehensive coverage of using Nagios to provide monitoring of Linux, Windows and network devices. The course is based on Nagios core but contact us if you would like Nagios XI. What will you learn Install Nagios. Configure Nagios. Monitor Windows, Linux and Cisco (and other network equipment) using Nagios. Configure notifications Definitive Nagios training course details Who will benefit: Technical staff working with Nagios. Prerequisites: None. Duration 2 days Definitive Nagios for engineers Nagios architecture Downloading Nagios, Installing Nagios, Nagios core, plugins, frontends, addons. Nagios XI. Nagios Fusion. Hands on Installing Nagios. Getting started with Nagios Nagios files, nagios.cfg, minimal.cfg. Starting and stopping Nagios. Hands on Controlling Nagios. Using Nagios Nagios web interface. Maps, Hosts, host groups, services, service groups, problems. Reports. Configuration. Hands on Using the web interface. Monitoring Linux systems SSH, NRPE. Hands on Monitoring Linux system health. Monitoring Windows systems Installing NSClient++, Configuring NSClient++, check_nt plugin, monitoring uptime, CPU, memory, disks, services, processes. Hands on Monitoring Windows system health. Monitoring network devices SNMP architecture, MIBs. Polling. Hands on Configuring Nagios for SNMP. Agents Configuring Cisco devices for SNMP support, communities, traps, syslog. Hands on Monitoring network devices. Nagios alerts and notifications SNMP traps. Email notifications, SMS alerts other messaging

Definitive Nagios for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

Definitive network forensics for engineers

5.0(3)

By Systems & Network Training

Network forensics training course description This course studies network forensics-monitoring and analysis of network traffic for information gathering, intrusion detection and legal evidence. We focus on the technical aspects of network forensics rather than other skills such as incident response procedures etc.. Hands on sessions follow all the major sections. What will you learn Recognise network forensic data sources. Perform network forensics using: Wireshark NetFlow Log analysis Describe issues such as encryption. Network forensics training course details Who will benefit: Technical network and/or security staff. Prerequisites: TCP/IP foundation for engineers. Duration 3 days Network forensics training course contents What is network forensics? What it is, host vs network forensics, purposes, legal implications, network devices, network data sources, investigation tools. Hands on whois, DNS queries. Host side network forensics Services, connections tools. Hands on Windows services, Linux daemons, netstat, ifoconfig/ipconfig, ps and Process explorer, ntop, arp, resource monitor. Packet capture and analysis Network forensics with Wireshark, Taps, NetworkMiner. Hands on Performing Network Traffic Analysis using NetworkMiner and Wireshark. Attacks DOS attacks, SYN floods, vulnerability exploits, ARP and DNS poisoning, application attacks, DNS ANY requests, buffer overflow attacks, SQL injection attack, attack evasion with fragmentation. Hands on Detecting scans, using nmap, identifying attack tools. Calculating location Timezones, whois, traceroute, geolocation. Wifi positioning. Hands on Wireshark with GeoIP lookup. Data collection NetFlow, sflow, logging, splunk, splunk patterns, GRR. HTTP proxies. Hands on NetFlow configuration, NetFlow analysis. The role of IDS, firewalls and logs Host based vs network based, IDS detection styles, IDS architectures, alerting. Snort. syslog-ng. Microsoft log parser. Hands on syslog, Windows Event viewer. Correlation Time synchronisation, capture times, log aggregation and management, timelines. Hands on Wireshark conversations. Other considerations Tunnelling, encryption, cloud computing, TOR. Hands on TLS handshake in Wireshark.

Definitive network forensics for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,497

SAFe for Teams: In-House Training

By IIL Europe Ltd

SAFe® for Teams: In-House Training Build the skills needed to become a high-performing team member of an Agile Release Train (ART) and learn how to collaborate effectively with other teams by becoming a SAFe® 5 Practitioner (SP). During this course, you will gain an in-depth understanding of the ART, how it delivers value, and what you can do to effectively perform the role using Scrum, Kanban, and Extreme Programming (XP). You will also learn how to write stories and break down features, plan and execute iterations, and plan Program Increments. Finally, you'll learn about the continuous delivery pipeline and DevOps culture, how to effectively integrate with other teams in the program, and what it takes to continuously improve the train. What you will Learn To perform the role of a SAFe® Practitioner, you should be able to: Apply SAFe® to scale Lean and Agile development in their enterprise Know their team and its role on the Agile Release Train Know all other teams on the train, their roles, and the dependencies between the teams Plan Iterations Execute Iterations and demonstrate value Plan Program Increments Integrate and work with other teams on the train Introducing the Scaled Agile Framework® (SAFe®) Building an Agile Team Planning the Iteration Executing the Iteration Executing the Program Increment Practicing SAFe®

SAFe for Teams: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,795