Peering at LINX training course description A one or two day induction course covering the technical procedures of LINX along with correct interaction with LINX and LINX members. This course focuses on the implementation of the technologies within the LINX network. For those already competent in BGP the one day version of this course is sufficient. What will you learn Explain the role of LINX in the Internet. Correctly connect to LINX. Recognise the correct procedures for peering at LINX. Use the current Best Current Practices. Peering at LINX training course details Who will benefit: Technical staff of new LINX members. Technical staff of companies preparing to join LINX. Non technical staff may also benefit from this course. Prerequisites: None. (For technical staff with BGP knowledge 1 day) Duration 1 to 2 days Peering at LINX training course contents Introduction and review Networks, The Internet, IP, routers, Autonomous systems, the structure of the Internet, the role of Internet Exchanges. BGP and peering. LINX, EuroIX, RIPE. What you get when you join LINX. LINX products: Connexions, Virtual PoPs, Colocation resales, LINX from anywhere. LINX infrastructure The original architecture, The growth of LINX, the current topology. LINX London locations. Dual LAN topology. LON1, LON2. Use of MPLS to connect London sites. Regional peering: LINX NoVa, LINX Manchester, LINX Wales, LINX Scotland, ManxIX, JEDIX. Connecting with LINX nnecting with LINX Locations. 1/10/100/400G. Interface specifications. Link aggregation. The racks and space provided, access to the racks, connecting WAN circuits into LINX. The connection form, How to link your ISP with LINX, switch assignments, limits on traffic, average measured traffic, getting statistics from LINX, Using looking glass. Allowed traffic. Port security Configuration hints LINX IP details, IPv4, IPv6, PTR records, Cisco base configuration, Juniper base configuration. Peering with other LINX members Preparing for peering, the peering template, setting up the peering, RFC 2142, the RIPE database, contacts, peeringdb.net, solving downed BGP sessions, escalation procedures. Peering configuration hints Cisco BGP configuration, Juniper BGP configuration. LINX additional services Private interconnect, LINX time service. NTP, Strata. The LINX route server Bi lateral peering, Multi lateral peering. How the LINX route server is configured. Use of communities on the route server, template for peering with the route server. Summary Getting further information, the LINX website, the LINX mailing lists.
SAFe® Agile Software Engineering: Virtual In-House Training The introduction of Lean-Agile and DevOps principles and practices into software engineering has sparked new skills and approaches that help organizations deliver higher-quality, software-centric solutions faster and more predictably. This workshop-oriented course explores foundational principles and practices and how continuous flow of value delivery and built-in quality are enabled by XP technical practices, Behavioral-Driven Development (BDD), and Test-Driven Development (TDD). Attendees will learn proven practices to detail, model, design, implement, verify, and validate stories in the SAFe® Continuous Delivery Pipeline, as well as the practices that build quality into code and designs. Attendees will also explore how software engineering fits into the larger solution context and understand their role in collaborating on intentional architecture and DevOps. What you will Learn To perform the role of a SAFe® Agile Software Engineer, you should be able to: Define Agile Software Engineering and the underlying values, principles, and practices Apply the Test-First principle to create alignment between tests and requirements Create shared understanding with Behavior-Driven Development (BDD) Communicate with Agile modeling Design from context for testability Build applications with code and design quality Utilize the test infrastructure for automated testing Collaborate on intentional architecture and emergent design Apply Lean-Agile principles to optimize the flow of value Create an Agile Software Engineering plan Introduction to Agile Software Engineering Connecting Principles and Practices to Built-in Quality Accelerating Flow Applying Intentional Architecture Thinking Test-First Discovering Story Details Creating a Shared Understanding with Behavior-Driven Development (BDD) Communicating with Models Building Systems with Code Quality Building Systems with Design Quality Implementing with Quality
ITIL® 4 Leader: Digital and IT Strategy: Virtual In-House Training The ITIL® 4 Leader: Digital and IT Strategy (DITS) is one of the two modules in the ITIL® 4 Strategic Leader (SL) certification scheme. The other module in the SL designation is the ITIL® 4 Strategist: Direct, Plan & Improve. Accredited training for the ITIL® 4 Strategic Leader modules is mandatory to enable full understanding of the core material. The ITIL ® 4 Digital and IT Strategy certification focuses on enabling business success through the creation of digital and IT strategies. The IT and Digital Strategy certification adds a new perspective to the ITIL suite and elevates the discussion around ITIL concepts to a strategic level among business leaders and aspiring leaders. The ITIL® 4 Digital and IT Strategy course is based on the ITIL® 4 Digital and IT Strategy exam specification from AXELOS. With the help of ITIL® 4 concepts and terminology, exercises, and examples included in the course, you will acquire relevant knowledge to pass the certification exam. The core learning material in the course is supported by interactive case study, discussions and activities. What You Will Learn The ITIL ® 4 Digital and IT Strategy course covers the content in relation to the following learning outcomes of the exam specification for ITIL ® 4 Digital and IT Strategy: Demonstrate the use of the ITIL guiding principles in Digital and IT Strategy decisions and activities Understand how to leverage digital strategy to react to digital disruption Understand the relationship between the concepts of Digital and IT Strategy, the service value system and the service value chain, and explain how to utilize them to create value Understand how an organization uses Digital and IT Strategy to remain viable in environments disrupted by digital technology Understand strategic approaches made possible by digital and information technology to achieve customer/market relevance and operational excellence Understand the risks and opportunities of Digital and IT Strategy Understand the steps and techniques involved in defining and advocating for a Digital and IT Strategy Understand how to implement a Digital and IT Strategy Key Concepts of Digital and IT Strategy Digital, Information, and Communication Technology Digital Transformation Services, Products, and Competitive Advantage Tiers of Strategy Business Models Operating Models Strategy and the Service Value System Opportunity and Demand Value Governance ITIL® Guiding Principles Continual Improvement ITIL® Practices What is Vision? Disruptions Vision Digital Disruptions Balanced Strategic Focus Positioning Tools for Digital Organizations Assignment 1: Digital Disruption and Digital Positioning Where Are We Now? Environmental Analysis Opportunity Analysis Digital Readiness Assessment How Do We Get There (Strategic Planning) Strategy Planning Financial Aspects of Digital and IT Strategy Business Models for Strategy Planning Portfolio Optimization How Do We Get There (Strategic Approaches) Strategic Approaches for Digital Organizations Strategic Approaches for Operational Excellence Strategic Approaches to Evolution Strategic Approaches to Social Responsibility and Sustainability Assignment 2: Strategic Approaches for Digital Organizations Take Action (Managing Strategic Initiatives) How Strategies are Implemented Coordinating Strategy and Strategic Initiatives Leading Digital Transformation Digital Leadership Assignment 3: Strategy Planning and Communication Did We Get There? (Measuring Strategy) Key Facts About Measurement Measuring a Strategy Instrumenting Strategy How Do We Keep the Momentum Going Long-Term Momentum: Ensuring Organizational Viability Short-Term Momentum: Parallel Operation Assignment: Digital Strategy in VUCA Environment Managing Innovation and Emerging Technologies Managing Innovation Formal Approach to Innovation Management Culture that Supports Innovation Approaches to Innovation Evaluating and Adopting Emerging Technology Managing Strategic Risk Risk Management Risk Identification Risk Posture Risk Treatment
The role of an MLRO is one of high responsibility, with financial and personal consequences if something goes wrong. As an MLRO or Deputy MLRO, you need the confidence and practical skills to tackle the unique challenges these roles present. Part of the ICA Practitioner Series, this unique certification is written by MLROs for MLROs and provides a practical framework and toolkit that gives you the knowledge and skills to: navigate the complex role of a Money Laundering Reporting Officer mitigate risks make changes and set goals challenge stakeholders make informed decisions and demonstrate the rationale manage relationships with boards and regulators effectively. This qualification covers the following topics: Interview questions and wider due diligence before taking up an MLRO / Deputy MLRO position Governance - senior management responsibilities - prescribed responsibilities Management information & report writing Risk assessment and risk appetite Policies, procedures & operational implementation Staff, training, leading and influencing/psychological models to develop interpersonal skills Quality of oversight - obtaining trusted data First 100 days - main risks and expectations Form A - FCA Registration, fit & proper interview Building Trust - stakeholder management, committees, management information, regulatory interaction, the MLRO Report Problem shooting and escalation pathways
Firewalls training course description A technical hands on training course covering firewall technologies. This focuses on the whys and hows of firewall technology rather than looking at manufacturer specific issues. What will you learn Design secure firewall protected networks. Test firewalls. Evaluate firewalls Configure firewalls Firewalls training course details Who will benefit: Technical staff wanting to learn about Filrewalls including: Technical network staff. Technical security staff. Prerequisites: IP security foundation for engineers Duration 2 days Firewalls training course contents Firewall introduction Security review, what is a firewall? What do firewalls do? Firewall benefits, concepts. Hands on Configuring the network to be used in later labs, launching various attacks on a target. Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls, blade based firewalls, personal firewalls, which firewall should you use? Firewall products. Hands on Configuring a simple firewall. Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on Stateful packet inspection firewalls. Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall advantages and disadvantages. Hands on Proxy firewalls. Personal firewalls The role of personal firewalls, Windows XP, Zonealarm. Hands on Configuring a personal firewall. Firewall architectures Home based, small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. Securing communications VPNs, IPsec. Firewall configuration of VPNs, integration of dedicated VPN devices and firewalls. Hands on IPSec VPN configuration. Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls.
Supporting Microsoft SharePoint course description A concise hands on course enabling delegates to manage and administer a SharePoint site. What will you learn Perform initial farm configuration. Use stsadm commands. Manage content. Secure SharePoint. Customise SharePoint search. Monitor and performance tune SharePoint. Supporting Microsoft SharePoint server course details Who will benefit: Anyone working with Microsoft SQL server Prerequisites: SharePoint Administrators. Duration 2 days Supporting Microsoft SharePoint course contents SharePoint Introduction A SharePoint installation. Initial farm configuration. Creating a site collection. Administering SharePoint Stsadm commands, automation with PowerShell. Managing content Lists, libraries, items and documents Security SecureStore, Users and groups, roles and role assignments. Permission levels. SharePoint search Configure search, refine search. SharePoint performance Diagnostic logging, logging levels, Health anaylzer, performance bottlenecks.
Copper cabling systems training course description A hands on training course covering installation, termination and testing of copper cables in an internal environment. The course covers all copper cabling but hands on sessions focus on unshielded Twisted Pair. What will you learn Recognise different copper cables and when to use them. Install and terminate UTP cables. Test and certify UTP cables. Copper cabling systems training course details Who will benefit: Professional cable installers. Prerequisites: None Duration 2 days Copper cabling systems training course contents Communications principles Use of cables in data networks, Use of cables in telephone networks, conductors and insulators, current, resistance, voltage and Ohms law. Copper cabling per cabling Coaxial versus twisted pair. UTP and STP. Cat 5, 5e, 6 and 7. Straight through, cross over, others. Hands on: Building a simple network. Cable termination Cable termination Preparing cables for termination, termination techniques, termination tools. Wiring standards, colour codes. Hands on: Making your own cables and using them in the simple network. Cable architectures Structure cabling system components, topologies, horizontal wiring, vertical wiring, telecomms rooms, server rooms. Hubs, switches and routers implications. Trunking. Cabling documentation, symbols and abbreviations. Hands on: punch blocks, testing continuity. Cable installation Site surveys: pathways and spaces, support structures, distance limitations. Recommended installation practices, laying and setup, retrofits. Health and safety factors, fire and building codes. Hands on: Performing a site survey, installing cable with floor boxes. Testing Basic testing, volt meters, tone set, Cat 5 testers, Cat 5e testers, Cat 6 testers. Certifying performance, Cat 5, 5e and 6 performance parameters. External factors. Common faults. Hands on: Testing an installation, troubleshooting faults. Other aspects Telephony cables, shielded cables. Hands on: installing telephone cable, testing continuity.
Total SIPp course description SIPp is a robust performance testing tool designed for evaluating the SIP protocol. This comprehensive course takes you on a journey from the initial installation of SIPp to mastering fundamental scenarios, exploring diverse architectures, delving into statistics analysis, and crafting XML scenario files. What will you learn Monitor SIP traffic with SIPp. Use SIPp for performance testing. Use the standard SIPp scenarios. Create custom scenarios in XML for SIPp. Total SIPp course details Who will benefit: Those working with SIP. Prerequisites: Definitive SIP for engineers Duration 2 days Total SIPp course contents Introduction What is SIPp? SIP review: UAC, UAS, INVITE, BYE. Sample SIP call flows. Hands on Wireshark, SIP call flow. Installing SIPp Getting SIPp, installing SIPp. Using SIPp Running sipp. sipp with uas scenario, sipp with uac scenario. The integrated scenarios. Online help. Hands on uac, uas. Controlling SIPp Hot keys, commands, UDP socket. Running SIPp in the background. Traffic control. SIPp performance testing. Hands on Changing call rates, remote control, pausing traffic. Monitoring SIP traffic Scenario screen, statistics. Response times, counters. Hands on Monitoring SIP traffic. More integrated scenarios SIPp and media and RTP. 3PCC. 3PCC extended. Transport modes: UDP, TCP, TLS, SCTP, IPv6 mono and multi socket. Hands on Third Party Call Control. XML What is XML? Content, markup, elements, attributes. Start tags, end tags. Hands on Displaying embedded scenarios, looking at the XML files of the integrated scenarios. Creating your own XML scenarios scenario, message commands, send, recv, nop, pause, sendCmd, recvCmd, common sipp scenario attributes, command specific sipp scenario attributes. XML DTD, jEdit. Hands on uac and uas scenario XML files. Recv actions Log and warning, exec, variables, variable types, variable scope. External variables. Hands on RTP streaming, Change a calls network destination, injection files. Regular expressions What is an RE. POSIX 1003.2. Re injection. Validation. Hands on regex example.
Introduction to Virtualization course description A comprehensive tour of virtualization. The course concentrates on the actual technologies involved as opposed to any one vendor solution. What will you learn Explain the concepts of virtualization. Partition servers. Create Virtual Machines. Introduction to Virtualization course details Who will benefit: Anyone looking for an introduction to Virtualization. Prerequisites: None. Duration 2 days Introduction to Virtualization course contents Virtualization Concepts What is Virtualisation? What are virtual machines (VMs)? Virtualisation Landscape. Network Virtualisation. Suitability for Organisations. Advantages of deploying Virtualisation. Downsides of deploying Virtualisation. Overview of Virtualisation products. Hypervisors What is a hypervisor? Difference between type 1 and 2 hypervisors. Available hypervisors. Hypervisors and device drivers. Hands on: Installing Oracle VirtualBox on Windows. Creating/Importing/Configuring VMs. Virtualization Hosts Hardware and resource requirements. Installation of the hypervisor. Hands on: Installing Hyper-V role into Windows Server. Creating/Importing/Configuring VMs. Virtual Machines Creating virtual machines. Resource requirements. Settings. Installation of the guest OS. Additional tools/ extensions for hypervisor integration. VM files and their uses. Virtual hard disk and their formats. Hardware pass through. Hands on: Connecting to VMWare ESXi via WebGUI and using ESXi to create/import/configure VMs. VM Snapshots/Checkpoints What is a snapshot? How to use them and how they impact performance? Creating/deleting/merging of snapshots. Hands on: Using ESXi to create/manage snapshots. Command Line use on the Hypervisor Interacting with the hypervisor through the command line. Simple commands to configure the hypervisor and VMs. Simple scripts. Hands on: Connecting to VMWare ESXi via PowerCLI to manipulate VMs and snaphshots. Virtualization Storage Different types of storage: local vs remote. Local and remote storage technologies. Configuring storage. Hands on: Using ESXi to deploy VMs on remote NFS storage. Virtual Networking How is networking done in virtualization environments. What is a virtual switch and vNIC and what are their performance characteristics? NIC teaming and trunking in the virtual world. Port groups and isolation. Physical NICs and their use in virtual switches. Hands on: Using ESXi to create and configure vswitches and networking. Templates and clones What is a template? What is a clone? When to use templates and clones to optimize VM deployment. Migrating/Importing VMs What is migration? Migrating compute and storage. Importing VMs from files or physical machines. Hands on: Using VMWare vCenter Server to clone/ template/migrate VMs, tag resources, create local user accounts and assign permissions. VMs and Backups Taking backups of your VMs. Restoring your VMs from backups. Virtualization and Licensing Different licensing models and costs. Containerization Concepts What is a container and how is it different from a virtual machine. When to use containers. Docker and Kubernetes
Simply speaking, Life Coaching is about raising awareness of how we can move from A to B. Sometimes we don't know what place B is, and we can use Coaching to gain clarity on what B looks and feels like. Life Coaching is non-directive, which means as a Coach, I help you to unlock your potential rather than tell you what to do. The experience creates a space for accountability and motivation to take positive action. My role as your Holistic Coach is to provide you with a safe space for you to ground, explore & embrace your emotions, claim your personal power to design & live your dream life.