• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

29788 OV courses

MEF Carrier Ethernet 2.0 Certification

5.0(3)

By Systems & Network Training

MEF Carrier Ethernet training course description The course progresses from a overview of the Carrier Ethernet service and how it works onto looking at the concepts in depth. Service attributes and management follow with the course finishing with studies of practical Carrier Ethernet. What will you learn Discuss and understand key Carrier Ethernet Concepts. Understand tasks related to designing, deploying and maintaining a Carrier Ethernet network. Offer effective solutions to implementing a Carrier Ethernet enterprise network given available customer resources and requirements. Carry out informed discussions using industry Carrier Ethernet 'vocabulary. Pass the MEF CECP 2.0 professional accreditation exam. MEF Carrier Ethernet training course details Who will benefit: Anyone working with Carrier Ethernet Prerequisites: The course attendees need to be conversant with data networks, as well as Ethernet and IP technologies. Duration 5 days MEF Carrier Ethernet training course contents Section One: Introduction to Carrier Ethernet Introduction to Carrier Ethernet: What is Carrier Ethernet? Evolution, advantages, The MEF, MEF specifications; UNI, EVC, OVC, EPL/EVPL, EP-LAN/ EVP-LAN, EP-Tree/EVP-Tree, etc, overview. How Carrier Ethernet Works: Service Frame Handling. Carrier Ethernet at Customer Premises, metro and core. Carrier Ethernet Workings, UNI attributes, Service Attributes (EVC and EVC per UNI attributes), Bandwidth Profiles, service multiplexing, L2 protocol processing; Carrier Ethernet equipment, CPE, aggregation and homing nodes, core equipment; management systems. The Setting Up of a Carrier Ethernet Service: Step 1: Choose service type, EPL/EVPL, EP-LAN/EVP-LAN, EPTree/EVP-Tree, EVLine...; Step 2: CPE tasks, UNI-C tasks (UNI attributes, service attributes (EVC and EVC per UNI) and bandwidth profiles), UNI-N tasks (L2 protocol handling). Step 3: Non-CPE tasks, Access, metro and core connections set up. Section Two: Carrier Ethernet Concepts in depth Carrier Ethernet Definitions in Depth: UNI, UNI I & II, UNI-N and UNI-C, etc.; NNI/ENNI; EVC; OVC, OVC type (P2P, M2M, Rooted MP), OVC end point (root, leaf, trunk), OVC end point map, OVC end point bundling; Service types in detail, EPL/EVPL, EP-LAN/EVP-LAN, EP-Tree/EVP-Tree, EVLine, Access EPL, Access EVPL . Carrier Ethernet Service Frame Handling: Unicast, multicast and broadcast frame delivery, Tagged, untagged and priority; Tagging, C and S-Tags, 802.3, 802.1d, 802.1q, 802.1ad, 802.1ah evolution, VLAN ID translation/preservation. CoS preservation. Other Key Carrier Ethernet Concepts: MTU, MTU at UNI, MTU at ENNI; Physical Layer Attributes, FE, GbE and 10GbE, Service Multiplexing and Bundling Concept and detail, rules and implications; Hairpin Switching Managing Bandwidth in a Carrier Ethernet Network: Token Bucket Algorithm, EIR, CIR, CBS, EBS, Coupling Flag; Frame Colors, recoloring, Color Awareness attribute, Color Forwarding; Bandwidth Profiles, rules and concepts. MEF CoS identifiers, DEI bit (in S-Tag), PCP bit (in C-Tag or S-Tag), or DSCP (in IP header), Multiflow bandwidth concepts; CoS Label/Color Identification. Section Three: Carrier Ethernet Service Attributes Overview: Carrier Ethernet 2.0; Blueprint C Service Attributes: Per UNI, Physical interfaces, Frame format, Ingress/egress Bandwidth Profiles, CEVLAN ID/EVC Map, UNI protection. EVC per UNI, Ingress/egress Bandwidth Profiles, etc.; Per EVC, CEVLAN ID Preservation, CoS ID Preservation, Relationship between SLA and SLP, Class of Service, etc. OVC, ENNI, OVC End Point per UNI and OVC End Point per ENNI, Ingress/egress bandwidth profiles, etc. Section Four: Managing Carrier Ethernet Networks Overview: MEF Service Lifecycle.Carrier Ethernet maintenance: Port, Link & NE failure, Service Protection Technologies, Fault Identification and Recovery, LAG, Active/Standby EVC, Single EVC with transport protection, G.8031, G.8032, MPLS FRR. SOAMs: Connectivity fault management, connectivity Monitoring, Loopback, Linktrace; Performance Management, Frame Delay, Inter Frame Delay Variation, Availability, Frame Loss Ratio, Resiliency, HLI, DMM, DMR, SLM, SLR; Key Concepts, Single vs dual ended, ordered UNI pair calculations. LOAMs: Link discovery, link monitoring, etc. Terminology and Concepts: MEG levels, MIPs. Section Five: Practical Carrier Ethernet Carrier Ethernet Transport Technologies:Layer 1: SDH. Layer 2: Bridging, provider bridging, PBB, PBBTE. Layer 2.5: MPLS VPWS, MPLS VPLS, MPLS-TP. Carrier Ethernet Access Technologies: fiber, SDH, active fiber, PON, GPON, 10G PON, OTN, WDM; copper, PDH, G-SDSL, 10Pass-TS, HFC; packet radio. Optimising mobile backhaul with Carrier Ethernet Key challenges solutions: Market pressure, LTE evolution, elements and architecture (RAN BS, NC, GWIF.), synchronization, bandwidth management. Circuit Emulation over Ethernet: Purpose, needs and applications. Synchronization: Phased, ToD, External Reference source, SynchE ,NTP, IEEE-1588 v2/ PTP, ACR; MEF Service Definitions for emulated circuits. Applying what you know: Practical examples and scenarios, Carrier Ethernet solutions; Practice Scenarios, Given a scenario, determine appropriate Ethernet services

MEF Carrier Ethernet 2.0 Certification
Delivered in Internationally or OnlineFlexible Dates
£4,997

Advanced Junos Security

5.0(3)

By Systems & Network Training

Advanced Junos Security training course description This course provides students with intermediate routing knowledge and configuration examples. The course includes an overview of protocol-independent routing features, load balancing and filter-based forwarding, OSPF, BGP, IP tunneling, and high availability (HA) features. Junos Intermediate Routing (JIR) is an intermediate-level course. What will you learn Demonstrate the understanding of integrated user firewall. Implement next generation Layer 2 security features. Implement virtual routing instances in a security setting. Utilize Junos tools for troubleshooting Junos security implementations. Implement IPS policy. Advanced Junos Security training course details Who will benefit: Individuals responsible for implementing, monitoring, and troubleshooting Junos security components. Prerequisites: Intro to the Junos Operating System Duration 5 days Advanced Junos Security training course contents Junos Layer 2 Packet Handling and Security Features Transparent Mode Security Secure Wire Layer 2 Next Generation Ethernet Switching MACsec Lab 2 Implementing Layer 2 Security Virtualization Virtualization Overview Routing Instances Logical Systems Lab 3 Implementing Junos Virtual Routing AppSecure Theory AppSecure Overview AppID Overview AppID Techniques Application System Cache Custom Application Signatures AppSecure Implementation AppTrack AppFW AppQoS APBR SSL Proxy Lab 4 Implementing AppSecure Working with Log Director Log Director Overview Log Director Components Installing and setting up Log Director Clustering with the Log Concentrator VM Administrating Log Director Lab 5 Deploying Log Director Sky ATP Theory Sky ATP Overview Monitoring Sky ATP Analysis and Detection of Malware Sky ATP Implementation Configuring Sky ATP Installing Sky ATP Analysis and detection of Malware Infected Host Case Study Lab 6 Instructor Led Sky ATP Demo Implementing UTM UTM Overview AntiSpam AntiVirus Content and Web Filtering Lab 7 Implementing UTM Introduction to IPS IPS Overview Network Asset Protection Intrusion Attack Methods Intrusion Prevention Systems IPS Inspection Walkthrough IPS Policy and Configuration SRX IPS Requirements IPS Operation Modes Basic IPS Policy Review IPS Rulebase Operations Lab 8 Implementing Basic IPS Policy SDSN SDSN Overview, Components & Configuration Policy Enforcer Troubleshooting SDSN Use Cases Lab 9 Implementing SDSN Enforcement, Monitoring, and Reporting User Role Firewall and Integrated User Firewall Overview User Role Firewall Implementation Monitoring User Role Firewall Integrated User Firewall Implementation Monitoring Integrated User Firewall Lab 10 Configure User Role Firewall and Integrated User Firewall Troubleshooting Junos Security Troubleshooting Methodology Troubleshooting Tools Identifying IPsec Issues Lab 11 Performing Security Troubleshooting Techniques Appendix A: SRX Series Hardware and Interfaces Branch SRX Platform Overview High End SRX Platform Overview SRX Traffic Flow and Distribution SRX Interfaces

Advanced Junos Security
Delivered in Internationally or OnlineFlexible Dates
£4,997

S.C.I.E.N.C.E.S Of Your Unknown Universe - Extended

By Council For Human Development Swiss Association

The S.C.I.E.N.C.E.S Extended Program is a 6-month powerful personal development training tool incl. 12 individual coaching sessions, based around Neuroplastic Mental Acceleration (NMA): encompassing the eight steps to ascension, spread over 60 x 30 minute training sessions: Accept, Aware, Assess, Adapt, Aspire, Accelerate, Actualise, Ascend. The program is designed to provide mental well-being & acceleration by promoting fluid intelligence (the brain’s ability to learn new skills) though activating neuroplasticity - synaptogenisis & neurogenisis.

S.C.I.E.N.C.E.S Of Your Unknown Universe - Extended
Delivered Online On Demand
£4,000

Polishing Masterclass with Stephen M Goldsmith Thursday 20th and Friday 21st February 2025 (2 Day Course) 10-4pm

5.0(21)

By Workshop 925

We are very pleased to announce that Stephen Goldsmith aka the Gold polishing Guru is coming to our workshop 925 to teach his Masterclass June 2023 . If you’re in the industry, he needs no introduction but for anyone who hasn’t heard of him, he is a master of the polishing craft with over 50 years experience, his client list past and present includes, Asprey, Garrard, Theo Fennell, Hamilton and Inches Crown Jewellers of Scotland, The Royal Mint, The Royal Society. He has polished and restored many famous silverware pieces including the Americas Cup; Davis Cup; Wimbledon Cup and the Premier League Cup and he has also advised the Tower of London Jewel House on the upkeep of their silver collections. He also judged the polishing section of Goldsmiths craft and design awards. WHEN: Thursday 20th and Friday 21st February 2025 WHERE:  Workshop 925 based at The Mayford Centre, just outside of Woking and very close to Guildford. Unit F9 The Mayford Centre, Mayford Green Woking, Surrey  GU22 0PP TUTOR: Stephen M Goldsmith ABOUT STEPHEN: Stephen M Goldsmith started out at Rochester Art college, now known as University for the Creative Arts and was apprenticed at C.J Vander’s in 1971 and indentured with The Worshipful Company of Goldsmiths’. Now a Master Polisher of over 50 years’ experience, originally working for the Crown Jewellers Asprey & Garrards and well-known society jeweller Theo Fennell. Many of the pieces polished are now seen in Palaces, Museums and the rich and famous across the world. Stephen is one the most respected jewellery & silver polishers and is currently is teaching polishing across Europe and is known affectionately as “The Gold polishing Guru”. He has polished and restored many famous silverware pieces including the Americas Cup; Cricket World cup, Wimbledon Cup, Dubai Gold Cup, Premier League Cup. He has also been privileged to work in the jewel house at the Tower of London restoring The Grand Punch bowl made in 1830 and used by the Royal family on many occasions. Also known for polishing the largest pure gold coins made by the Royal Mint the largest being the James Bond 7kg pure gold coin. He is a fellow of the Institute of Professional Goldsmiths (IPG) and their official ambassador and a Master of The Dutch Guild of Goldsmiths. He shares his trade skills by teaching nationally and internationally including at Goldsmiths Centre, School of Master Jeweller’s Birmingham and VanTol & Breet Academy (Netherlands), The School of Jewellery Dublin & The Design & Craft Irish Craft Council in Kilkenny, Vannilla Ink, Aka_bespoke Manchester, Sheila Fleet in Orkney, Patrick Mavros in Zimbabwe and Mauritius. Stephen is a Freeman of The Worshipful Company of Goldsmiths’ and was granted the Freedom of the City of London in 1975. He has also had the very rare honour of winning The Goldsmith’s Company Award twice, plus many other prestigious awards and served as a council member for The Goldsmiths’ Craft and Design Council and a published authority on polishing precious metals “Polishing and Finishing for Jewellers and Silversmiths by the Crowood Press. WHAT DOES THE DAY INVOLVE? We are very pleased to announce that Stephen Goldsmith aka the Gold polishing Guru is coming to our workshop 925 to teach his Masterclass June 2023 . If you’re in the industry, he needs no introduction but for anyone who hasn’t heard of him, he is a master of the polishing craft with over 50 years experience, his client list past and present includes, Asprey, Garrard, Theo Fennell, Hamilton and Inches Crown Jewellers of Scotland, The Royal Mint, The Royal Society. He has polished and restored many famous silverware pieces including the Americas Cup; Davis Cup; Wimbledon Cup and the Premier League Cup and he has also advised the Tower of London Jewel House on the upkeep of their silver collections. He also judged the polishing section of Goldsmiths craft and design awards.You can get a glimpse of what he does on his instagramWHAT HAPPENS DURING THE MASTERCLASS?First, Stephen will talk about his career giving you an insight into the makings of a master craftsman. Then he will demonstrate just why he is known as master polisher. After this demonstration you will be guided by Stephen to try and replicate what you have been shown in the demonstration.After working through a few more exercises you will set to work on your own jewellery, receiving guidance on not just how to achieve the finish you would like for your jewellery but to reach a standard of finish you didn’t know you could.These Masterclasses are a great opportunity to learn from someone who is:a) A true master in our tradeb) Not a grump or condescending because you don’t know somethingc) Happy to chat and share his knowledge!All you need to bring is some of your own jewellery (around 6 items) at the point where it’s ready for polishing.You will have a spindle that is yours for the duration of the masterclass, mops, materials etc will be provided. It can be a messy business so make sure your clothing is workshop friendly!You will also have full access to our workshop, benches, tools and equipment if needed.This Masterclass will leave you with the knowledge and skills to take your polishing to a highly professional standard. EXPERIENCE REQUIRED: This class will benefit jewellers with some experience who are looking to learn to polish their work to a professional level. Our small classes mean we are able to provide each student with the support they require. CLASS SIZE: 6 WHAT TO BRING: For safety reasons, during each class, you are required to wear appropriate footwear, we request that no open toed shoes are worn within Workshop 925. Long hair should also be tied back when working with the equipment. You may also wish to bring a notebook. We have handouts for many demonstrations, but there are always many tips and tricks given verbally by the tutor, which some might like to keep note of. We have a microwave, kettle and fridge to store or cook your lunch choices. PAYMENT OPTIONS: You can pay via our website or in our workshop in person using our card machine. If you prefer to pay directly, you can email us on hello@workshop925.com and we can invoice you manually to arrange a bank transfer. For classes over £80, instalment options are also available. Please email us on hello@workshop925.com to arrange. Gift Voucher – if you have a voucher to redeem, please email us before booking on hello@workshop925.com Please check your dates carefully before booking a class as we are unable to offer refunds. See our Terms & Conditions for full details.

Polishing Masterclass with Stephen M Goldsmith Thursday 20th and Friday 21st February 2025 (2 Day Course) 10-4pm
Delivered In-Person in Woking + more
£380

BLS & Management of Anaphylaxis

5.0(50)

By Pochat Training

QA Level 2 Award In Basic Life Support And Management Of Anaphylaxis (RQF) Half day course Gives learners the knowledge and skills to save someone who is in anaphylactic shock Also covers how to prevent this happening in the first place Also available as a bolt-on to certain other courses Course Contents: Incident and Casualty Management Managing an Unresponsive Casualty Recovery Position The Chain of Survival CPR Signs and Symptoms of Anaphylaxis Treatment of Anaphylaxis Medication Use of Adrenaline Auto-Injectors Benefits of this course: Anaphylaxis is a severe and life-threatening allergic reaction, which requires immediate medical attention Did you know that in 2014 there were over 4,000 hospital admissions for anaphylactic shock in England? Every year, the number of those suffering from anaphylaxis is increasing. This makes it very important for people to know what to do when encountering someone who is having an anaphylactic shock This QA Level 2 Award in Basic Life Support and Management of Anaphylaxis (RQF) course has been designed for those who have a specific responsibility at work, at home or as a volunteer, to provide basic life support and manage anaphylaxis when dealing with an emergency Successful applicants will be able to recognise the signs and symptoms of anaphylaxis and will be equipped with the vital skills needed to administer safe, prompt and effective treatment. This includes practising with adrenaline auto-injectors. Accredited, Ofqual regulated qualification: Our Basic Life Support and Management of Anaphylaxis training course is a nationally recognised, Ofqual regulated qualification accredited by Qualsafe Awards.This means that you can be rest assured that your Basic Life Support and Management of Anaphylaxis Certificate fulfils the legal requirements and is a very good way to make sure you and your employees are trained in Management of Anaphylaxis..The Ofqual Register number for this course is 603/2548/3

BLS & Management of Anaphylaxis
Delivered In-Person in Chesterfield + more
£80 to £85

Managing Difficult People and Conversations

5.0(5)

By Puritas

In the modern work environment, managers and leaders must treat all colleagues with respect, including those who are challenging. Understanding the causes of difficult behaviour and being self-aware are crucial for creating a fair and inclusive workplace. This training session equips participants with the knowledge and communication tools to manage and overcome difficult behaviours effectively. This course is available to book for delivery in-house for your organisation and people exclusively, for either a half or full days training workshop. Prices are dependent on size of group ranging from a minimum of 4 to a maximum of 12 delegates. If you have a smaller number of delegates the Puritas 1:1 Leadership Coaching Programme is recommended.

Managing Difficult People and Conversations
Delivered In-Person in Bishop Stortford + 9 more or UK WideFlexible Dates
£1,500 to £2,500

Complete Visual BASIC

5.0(3)

By Systems & Network Training

Complete Visual BASIC training course description A hands-on introduction to programming in Visual BASIC V6. What will you learn Build Visual BASIC applications. Build simple components. Debug Visual BASIC programs. Examine existing code and determine its function. Complete Visual BASIC training course details Who will benefit: Anyone wishing to program in Visual BASIC. Prerequisites: None although experience in another high level language would be useful. Duration 5 days Complete Visual BASIC training course contents Application development using VB VB features. VB editions, VB terminology. Working in the Development Environment. Event-Driven Programming. Creating a program in VB. Project and executable files. VB reference materials. Visual Basic fundamentals Objects. Controlling objects. Introduction to forms. Introduction to controls. Basic controls. Working with code and forms Modules. Working with code. Interacting with the user. Working with code statements. Managing forms. Variables and procedures Introduction to variables and constants. Working with Procedures and Functions. Controlling program execution Common VB functions. Comparison and relational operators. Conditional structures. Looping structures. Debugging Error types. Debugging logic errors in VB. Working with controls Control types. Standard controls. Advanced standard controls. ActiveX controls. Insertable controls. Data access using the ADO data control Overview of ActiveX Data Objects. VB data access features. Relational database concepts. Using the ADO data Control to access data. SQL. Manipulating data. Using the data form wizard. Input validation Field-Level validation. The masked edit control. Form-Level validation. Form events used when validating data. Error trapping Trapping run time errors. Error handling overview. Enabling an error trap. Errors and the calling chain. In line error handling. Enhancing the User Interface Menus. Status bars. Toolbars. Drag and Drop Overview of Drag and Drop. Mouse events Drag and Drop basics. More about controls Using control arrays. Using the controls collection. Working with object variables. Collections. Finishing touches User Interface design principles. Distributing an application. Creating a default project.

Complete Visual BASIC
Delivered in Internationally or OnlineFlexible Dates
£4,997

The TRANSFORM Process™

5.0(1)

By Silvia Siret - Holistic Life Coach

Applying the Family Constellations approach and more, Silvia Siret - who is a certified, trauma-informed, Holistic Life Coach, Relational Counsellor and Mindfulness Teacher - will intuitively and gently guide the group through a deep mind-body process to greater understanding, a wider perspective, and ways forward.

The TRANSFORM Process™
Delivered In-Person in Oxford + more
£60 to £120

Penetration testing and Ethical Hacking

5.0(3)

By Systems & Network Training

Penetration testing training course description An advanced technical hands on course focusing on hacking and counter hacking. The course revolves around a series of exercises based on "hacking" into a network (pen testing the network) and then defending against the hacks. What will you learn Perform penetration tests. Explain the technical workings of various penetration tests. Produce reports on results of penetration tests. Defend against hackers. Penetration testing training course details Who will benefit: Technical support staff, auditors and security professionals. Staff who are responsible for network infrastructure integrity. Prerequisites: IP Security IP VPNs Duration 5 days Penetration testing training course contents Introduction Hacking concepts, phases, types of attacks, 'White hacking', What is penetration testing? Why use pen testing, black box vs. white box testing, equipment and tools, security lifecycles, counter hacking, pen testing reports, methodologies, legal issues. Physical security and social engineering Testing access controls, perimeter reviews, location reviews, alarm response testing. Request testing, guided suggestions, trust testing. Social engineering concepts, techniques, counter measures, Identity theft, Impersonation on social media, Footprints through social engineering Reconnaissance (discovery) Footprinting methodologies, concepts, threats and countermeasures, WHOIS footprinting, Gaining contacts and addresses, DNS queries, NIC queries, ICMP ping sweeping, system and server trails from the target network, information leaks, competitive intelligence. Scanning pen testing. Gaining access Getting past passwords, password grinding, spoofed tokens, replays, remaining anonymous. Scanning (enumeration) Gaining OS info, platform info, open port info, application info. Routes used, proxies, firewalking, Port scanning, stealth port scanning, vulnerability scanning, FIN scanning, Xmas tree scanning, Null scanning, spoofed scanning, Scanning beyond IDS. Enumeration concepts, counter measures and enumeration pen testing. Hacking Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology, hacking tools and countermeasures. Trojan, Backdoors, Sniffers, Viruses and Worms Detection, concepts, countermeasures, Pen testing Trojans, backdoors, sniffers and viruses. MAC attacks, DHCP attacks, ARP poisoning, DNS poisoning Anti-Trojan software, Malware analysis Sniffing tools. Exploiting (testing) vulnerabilities Buffer overflows,, simple exploits, brute force methods, UNIX based, Windows based, specific application vulnerabilities. DoS/DDoS Concepts, techniques, attack tools, Botnet, countermeasures, protection tools, DoS attack pen testing. SQL Injection Types and testing, Blind SQL Injection, Injection tools, evasion and countermeasures. Securing networks 'Hurdles', firewalls, DMZ, stopping port scans, IDS, Honeypots, Router testing, firewall testing, IDS testing, Buffer Overflow. Cryptography PKI, Encryption algorithms, tools, Email and Disk Encryption. Information security Document grinding, privacy.

Penetration testing and Ethical Hacking
Delivered in Internationally or OnlineFlexible Dates
£4,997

Advanced Junos Service Provider Routing

5.0(3)

By Systems & Network Training

Advanced Junos SP Routing course description This is designed to provide students with detailed coverage of OSPF, IS-IS, BGP, and routing policy. Students will gain experience in configuring, monitoring, and troubleshooting the Junos operating system and in monitoring device and protocol operations. This course uses Juniper Networks vMX Series Routers for the hands-on component, but the lab environment does not preclude the course from being applicable to other Juniper hardware platforms running the Junos OS. What will you learn Describe and configure OSPF area types and operations. Configure and monitor IS-IS. Describe basic BGP operation. Explain the causes for route instability. Describe how to troubleshoot routing policy. Explain the default behaviour of damping on links. Advanced Junos SP Routing course details Who will benefit: Network staff working with Junos at layer 3. Prerequisites: Junos Intermediate Routing Duration 5 days Advanced Junos SP Routing course contents OSPF OSPFv2 Review Link-State Advertisements Protocol Operations OSPF Authentication Lab: OSPF Multi-Area Networks Chapter 3: OSPF Areas Review of OSPF Areas Stub Area Operation and Configuration NSSA Operation and Configuration Route Summarization Lab: OSPF Route Summarization OSPF Case Studies and Solutions Virtual Links OSPF Multiarea Adjacencies External Reachability Lab: Advanced OSPF Options and Routing Policy Troubleshooting OSPF Troubleshooting OSPF Lab: OSPF Troubleshooting IS-IS Overview of IS-IS IS-IS PDUs Neighbors and Adjacencies Configuring and Monitoring IS-IS Lab: IS-IS Configuration and Monitoring Advanced IS-IS Operations and Configuration Options IS-IS Operations IS-IS Configuration Options IS-IS Routing Policy Lab: Advanced IS-IS Configuration Options and Routing Policy Multilevel IS-IS Networks Level 1 and Level 2 Operations Multilevel Configuration Lab: Configuring a Multilevel IS-IS Network Troubleshooting IS-IS Troubleshooting IS-IS Lab: IS-IS Troubleshooting BGP Review of BGP BGP Operations BGP Path Selection Options Configuration Options Lab: BGP and BGP Attributes BGP Attributes and Policy - Part1 BGP Policy Next Hop Origin and MED AS Path Lab: BGP Attributes - Next Hop, Origin, MED, and AS Path Attributes and Policy - Part2 Local Preference Communities Lab: BGP Attributes - Local Preference and Communities Route Reflection and Confederations Route Reflection Operation Configuration and Routing Knowledge BGP Confederations Lab: Scaling BGP BGP Route Damping Route Flap and Damping Overview Route Damping Parameters Configuring and Monitoring Route Damping Lab: BGP Route Damping Troubleshooting BGP Troubleshooting BGP Lab: BGP Troubleshooting Troubleshooting Policy Troubleshooting Policy Lab: Policy Troubleshooting

Advanced Junos Service Provider Routing
Delivered in Internationally or OnlineFlexible Dates
£4,997