• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

93 Policy courses in Leeds

Securing Microsoft systems

5.0(3)

By Systems & Network Training

Microsoft security training course description A hands on training course focusing on security in the Microsoft environment. The course progresses from patch management onto the use of Microsoft security tools. Then server, desktop and network security are studied in the Microsoft environment. What will you learn Use Microsoft security tools. Secure Microsoft servers. Secure Microsoft desktops. Secure Microsoft networks. Microsoft security training course details Who will benefit: Technical server support staff. Technical desktop support staff. Technical network staff. Technical security staff. Prerequisites: Supporting Windows server 2016 Networking Microsoft systems. Duration 3 days Microsoft security training course contents Introduction Security threats, Microsoft defaults, admin accounts, security patches, patch management, patch tools. Hands on: Studying Microsoft defaults, applying security patches. Microsoft security tools Microsoft updates, WSUS, Inventory tool, baseline security analyser, URLscan, EventCombMT, Cipher security tool, Port reporter, PortQry. Tools hackers use. Hands on: Using Microsoft security tools. Server security Checklists, core server security, AD, Member server security, Domain controller security, Specific roles. Hands on Hardening Microsoft servers, security templates. Active Directory Admin authority in AD, group policy, trust and authentication. Desktop security Checklists, core client security, anti virus software, anti spyware software, firewalls, securing clients with AD, securing clients with group policy, software restriction policies. Hands on Securing Microsoft desktops. Network security Checklist, IP security, VPNs, PKI, certificate authorities, RAS, RRAS, IAS. Hands on: VPN configuration, IAS configuration. Monitoring Auditing, authorisation and logons, tracking, system monitoring, detecting attacks. Hands on: Monitoring Microsoft systems. Summary Microsoft security response centre, security advisories.

Securing Microsoft systems
Delivered in Internationally or OnlineFlexible Dates
£3,497

Total BGP for engineers

5.0(3)

By Systems & Network Training

BGP training course description A detailed study of BGP, from the basics of how it works through to advanced issues such as route reflectors, policy, filtering, route selection and routing registries. The course culminates with a study of an industrial strength BGP template illustrating important issues such as bogon filtering. Practical hands on with routers follow the major sessions to reinforce the theory. A multiple choice exam, leading to the LAIT III certification, is available after the course. The exam consists of 60 questions and lasts 2 hours. What will you learn Connect enterprises to the Internet, and ISPs to each other. Describe how BGP works. List, describe and configure the main BGP attributes. Implement and troubleshoot BGP. Work with route aggregation and calculate CIDR prefixes in seconds. Influence traffic paths with BGP. BGP training course details Who will benefit: Anyone who will be working with BGP. Prerequisites: TCP/IP Foundation for engineers Definitive IP routing for engineers. Duration 5 days BGP training course contents Basic BGP IGPs, EGPs, What's BGP? BGP RIB, in/out process, tables peers, adding routes. Hands on Simple configuration and troubleshooting. The Internet and peering ASs, AS numbers, Internet structure, ISP types, ISP network design, IXs, peering vs. transit, public/ private peering, bi/multi-lateral peering. Hands on AS information gathering. How BGP works Incremental updates, Path vector protocols, BGP protocol stack, the BGP header, message types, NLRI, withdrawn routes, route refresh, route dampening. Hands on More troubleshooting, packet analysis. MBGP and IPv6 Multiprotocol routing, AFI, SAFI, MBGP and multicasts, IPv6, MPLS VPNs. Hands on IPv6 BGPv4 aggregation CIDR, benefits, techniques, shortcuts, configuring BGP aggregation, leaking routes. Hands on Reducing routing table size. BGP path selection BGP attributes, attribute types, route selection order, Local preference, AS prepend, MEDs. Hands on Influencing traffic with BGP. BGP routing policies What is policy? Examples, route filtering, AS filtering, REs, applying preference selectively, peer groups. Hands on Sophisticated policies. RIPE and routing registries RIRs, Allocations, assignments, PI vs. PA. Objects, RPSL, routing registry, Hands on The RIPE database. Automating BGP configuration Automation tools, whois, IRRToolSet, Bogon lists, tracking bogon lists, HTTP, Peering, routing registries, DNS. Communities What is a community? Community names, communities for: peer types and geography. RFC 1998, default communities. Hands on Setting local preference on other routers. Route servers What are route servers? LINX route servers, route server policy control, What are route collectors, Looking glasses. Hands on Setting up and working with a route server. Peer relationships IBGP, EBGP, next hop self, advertising routes into/out of BGP, synchronisation. Hands on IBGP, troubleshooting a large BGP network. Route reflectors and confederations Full mesh IBGP, Route reflectors, RR configuration and design, confederations, migration issues. Hands on RR configuration. BGP architectures Stub vs. transit AS, when to use BGP, multihoming strategies and issues, default routes. Multihop EBGP, load balancing. Hands on Multihoming. BGP security RFC 7454, security steps, BGP TTL security, filters, RPKI, ROAs, rsync, rrdp, validators. A secure BGP template. Hands on RPKI prefix validation.

Total BGP for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,797

LINX 3 training course description A detailed study of BGP, from the basics of how it works through to advanced issues such as route reflectors, policy, filtering, route selection and routing registries. The course culminates with a study of an industrial strength BGP template illustrating important issues such as bogon filtering. Practical hands on with routers follow the major sessions to reinforce the theory. A multiple choice exam, leading to the LAIT III certification, is available after the course. The exam consists of 60 questions and lasts 2 hours. What will you learn Connect enterprises to the Internet, and ISPs to each other. Describe how BGP works. List, describe and configure the main BGP attributes. Implement and troubleshoot BGP. Work with route aggregation and calculate CIDR prefixes in seconds. Influence traffic paths with BGP. LINX 3 training course details Who will benefit: Network engineers. Prerequisites: LAIT I and II OR CCNP and take LAIT I and LAIT II exams whilst on this course. Duration 5 days LINX 3 training course contents Basic BGP IGPs, EGPs, What's BGP? BGP RIB, in/out process, tables peers, adding routes. Hands on Simple configuration and troubleshooting. The Internet and peering ASs, AS numbers, Internet structure, ISP types, ISP network design, IXs, peering vs. transit, public/ private peering, bi/multi-lateral peering. Hands on AS information gathering. How BGP works Incremental updates, Path vector protocols, BGP protocol stack, the BGP header, message types, NLRI, withdrawn routes, route refresh, route dampening. Hands on More troubleshooting, packet analysis. MBGP and IPv6 Multiprotocol routing, AFI, SAFI, MBGP and multicasts, IPv6, MPLS VPNs. Hands on IPv6 BGPv4 aggregation CIDR, benefits, techniques, shortcuts, configuring BGP aggregation, leaking routes. Hands on Reducing routing table size. BGP path selection BGP attributes, attribute types, route selection order, Local preference, AS prepend, MEDs. Hands on Influencing traffic with BGP. BGP routing policies What is policy? Examples, route filtering, AS filtering, REs, applying preference selectively, peer groups. Hands on Sophisticated policies. RIPE and routing registries RIRs, Allocations, assignments, PI vs. PA. Objects, RPSL, routing registry, Hands on The RIPE database. Automating BGP configuration Automation tools, whois, IRRToolSet, Bogon lists, tracking bogon lists, HTTP, Peering, routing registries, DNS. Communities What is a community? Community names, communities for: peer types and geography. RFC 1998, default communities. Hands on Setting local preference on other routers. Route servers What are route servers? LINX route servers, route server policy control, What are route collectors, Looking glasses. Hands on Setting up and working with a route server. Peer relationships IBGP, EBGP, next hop self, advertising routes into/out of BGP, synchronisation. Hands on IBGP, troubleshooting a large BGP network. Route reflectors and confederations Full mesh IBGP, Route reflectors, RR configuration and design, confederations, migration issues. Hands on RR configuration. BGP architectures Stub vs. transit AS, when to use BGP, multihoming strategies and issues, default routes. Multihop EBGP, load balancing. Hands on Multihoming. BGP security RFC 7454, security steps, BGP TTL security, filters, RPKI, ROAs, rsync, rrdp, validators. A secure BGP template. Hands on RPKI prefix validation.

LINX 3
Delivered in Internationally or OnlineFlexible Dates
£2,797

Certified Wireless Security Professional

5.0(3)

By Systems & Network Training

CWSP training course description A hands-on training course concentrating solely on WiFi security with an emphasis on the delegates learning the necessary knowledge and skills to pass the CWSP exam. The course progresses from simple authentication, encryption and key management onto in depth coverage of 802.X and EAP along with many other security solutions such as access control, intrusion prevention and secure roaming. What will you learn Demonstrate the threats to WiFi networks. Secure WiFi networks. Configure: WPA2 RADIUS 802.1x EAP Pass the CWSP exam. CWSP training course details Who will benefit: Technical network staff. Technical security staff. Prerequisites: Certified Wireless Network Associate. Duration 5 days CWSP training course contents WLAN Security overview Standards, security basics, AAA, 802.11 security history. Hands on WLAN connectivity. Legacy 802.11 security Authentication: Open system, shared key. WEP. VPNs. MAC filters. SSID segmentation, SSID cloaking. Hands on Analysing 802.11 frame exchanges, viewing hidden SSIDs. Encryption Basics, AES, TKIP, CCMP, WPA, WPA2. Hands on Decrypting 802.11 data frames. 802.11 layer 2 authentication 802.1X: Supplicant, Authenticator, Authentication server. Credentials. Legacy authentication. EAP, Weak EAP protocols, Strong EAP protocols: EAP -PEAP, EAP-TTLS, EAP-TLS, EAP-FAST. Hands on Analysing 802.1X/EAP frames. 802.11 layer 2 dynamic key generation Robust Security Network. Hands on Authentication and key management. SOHO 802.11 security WPA/WPA2 personal, Preshared Keys, WiFi Protected Setup (WPS). Hands on PSK mapping. WLAN security infrastructure DS, Autonomous APs, WLAN controllers, split MAC, mesh, bridging, location based access control. Resilience. Wireless network management system. RADIUS/LDAP servers, PKI, RBAC. Hands on 802.1X/EAP configuration. RADIUS configuration. 802.11 Fast secure roaming History, RSNA, OKC, Fast BSS transition, 802.11k. Hands on Roaming. Wireless security risks Rogue devices, rogue prevention. Eavesdropping, DOS attacks. Public access and hotspots. Hands on Backtrack. WiFi security auditing Layer 1 audit, layer 2 audit, pen testing. WLAN security auditing tools. WiFi security monitoring Wireless Intrusion Detection and Prevention Systems. Device classification, WIDS/WIPS analysis. Monitoring. 802.11w. Hands on Laptop spectrum analysers. VPNs, remote access, guest access Role of VPNs in 802.11, remote access, hotspots, captive portal. Wireless security policies General policy, functional policy, recommendations.

Certified Wireless Security Professional
Delivered in Internationally or OnlineFlexible Dates
£3,697

Introduction to Carbon Capture and Storage (CCS) for Non-Technical Professionals

By EnergyEdge - Training for a Sustainable Energy Future

About this training Carbon Capture and Storage (CCS) is an upcoming new technology that has a vital place within global efforts to decarbonise. It has a unique set of challenges, opportunities and risks to be understood and accommodated within appropriate legal, regulatory, and social and public license frameworks. The course has a strong international and global south emphasis with case studies on CCS projects and will touch on the role of CCS in developing country energy transition. The course satisfies a part of the market that is not currently catered for - the wider science, risks, financing, regulation, planning and social license aspects of CCS. These are issues that are as important as the technical issues in the sense that any of them can be a show-stopper for CCS. Training Objectives Upon completion of this course, participants will be able to: Place CCS within the context of the global geological carbon cycle and the contribution to could make to carbon abatement Explore the basic engineering and other challenges and solutions of CO2 transport and capture Recognize the geological challenges and solutions of CO2 storage Learn the methods of geological and environmental monitoring of CCS sites and why monitoring is important Understand the policy and finance challenges and solutions of CCS projects Know the importance of social license to operate and how to gain a social license to operate Target Audience This course will cater for in-company legal specialists, finance, project managers, marketing and communications specialists; as well as geologists, planners and environmental scientists in regulatory or government roles in regions considering the development of CCS. The course will provide up to date and relevant information to help in understanding opportunities and in managing risk. Geoscientists Government energy regulators and policy makers Financiers and investors Government natural resource and planning department Environmental scientists Finance professionals Marketing and communication professionals Legal specialists Project managers Course Level Basic or Foundation Trainer Your expert course leader is one of the most influential figures in British geoscience. He has 25 years' experience in geological, energy, and palaeontological science and research, including 8 years national level science leadership as the UK's chief geologist (Executive Chief Scientist and Director of Science and Technology of the British Geological Survey). He has been providing geoscience advice to Government for almost 15 years and has an excellent overview of Government policy, industrial activity and funding landscape in applied and energy geoscience, including CCUS and shale gas. He is a well-known communicator of science and has published three single-author popular science books (one award-winning), including the best introductory book on CCS 'Returning Carbon to Nature' Elsevier 2013. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Introduction to Carbon Capture and Storage (CCS) for Non-Technical Professionals
Delivered in Internationally or OnlineFlexible Dates
£2,493 to £2,899

Credit Analysis

5.0(10)

By GBA Corporate

Overview This training course will give participants a developed knowledge of credit analysis. Through a mix of lectures and interactive case studies, participants will be able to perform detailed credit analysis, including analysing market and environment, computing key financial ratios, interpreting cash flows and analysing financing needs. Key Topics Financial needs and the business operating cycle Review of financial statements Financial ratio analysis Corporate cash flow analysis Cash flow projections for debt service Key lending policy guidelines

Credit Analysis
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,779

IFRS (International Financial Reporting Standards)

5.0(10)

By GBA Corporate

Overview Currently, IFRS consists of two principles-based standards, IAS 18 Revenue and IAS 11 (Construction Contracts) and three IFRS Interpretations. These were criticised for failing to provide adequate guidance on application - they have been described as 'vague and inconsistent'. The IASB and the US Financial Accounting Standards Board (FASB) collaborated on a project to develop improved, converged standards for revenue recognition. Preparers must develop a policy for measuring the amount and timing for recognising revenue for goods and services. Revenue is a key performance indicator that drives the recognition of expenses and profits and the valuation of an entity.

IFRS (International Financial Reporting Standards)
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

LTE Architecture and Protocols

5.0(3)

By Systems & Network Training

LTE Architecture and Protocols course description This course provides a comprehensive tour of the LTE architecture along with services provided and the protocols used. What will you learn Describe the overall architecture of LTE. Explain the information flows through LTE. Describe the LTE security. Describe LTE mobility management. Recognise the next steps for LTE. LTE Architecture and Protocols course details Who will benefit: Anyone working with LTE. Prerequisites: Mobile communications demystified Duration 3 days LTE Architecture and Protocols course contents Introduction History, LTE key features. The 4G ITU process. The LTE 3GPP specifications. Specifications. System Architecture LTE hardware architecture. UE architecture and capabilities. E-UTRAN and eNB. EPC, MME functions, SGW, PGW and PCRF. System interfaces and protocol stacks. Example information flows. Dedicated and default bearers. EMM, ECM, RRC state diagrams. Radio transmission and reception OFDMA, SC-FDMA, MIMO antennas. Air interface protocol stack. Logical, transport and physical channels. Frame and slot structure, the resource grid. Resource element mapping of the physical channels and signals. Cell acquisition, data transmission and random access. MAC, RLC, PDCP protocols. LTE spectrum allocation. Power-on procedures Network and cell selection. RRC connection establishment. Attach procedure, including IP address allocation and default bearer activation. LTE detach procedure. Security in LTE networks LTE security features, identity confidentiality, ciphering and integrity protection. Architecture of network access security in LTE. Secure key hierarchy. Authentication and key agreement procedure. Security mode command procedure. Network domain security architecture. Security associations using IKE and IPSec. Mobility management RRC_IDLE, RRC_CONNECTED. Cell reselection, tracking area updates. Measurement reporting. X2 and S1 based handovers. Interoperation with UMTS, GSM and non-3GPP technologies such as cdma2000. QoS, policy control and charging QoS in LTE, EPS bearers, service data flows and packet flows. The architecture and signalling procedures for policy and charging control. Data transport using GPRS, differentiated services and MPLS. Offline and online charging in LTE. Delivery of voice and text messages over LTE Difficulties and solutions for Voice over LTE. Architecture and call setup procedures for circuit switched fallback. Architecture, protocols and call setup procedures in IP multimedia subsystem. Enhancements in release 9 LTE location services. Multimedia broadcast / multicast service and MBSFN. Cell selection, commercial mobile alert service. LTE Advanced and release 10 Impact of carrier aggregation on LTE air interface. Enhanced MIMO processing on uplink and downlink. Relaying. Release 11 and beyond. OAM and self organising networks Operation, administration, maintenance and provisioning for LTE. Self-configuration of base station parameters. Fractional frequency re-use, inter-cell interference co-ordination. Self-optimisation of base station procedures. Self-healing to detect and recover from faults.

LTE Architecture and Protocols
Delivered in Internationally or OnlineFlexible Dates
£2,367

Management of Risk (M_o_R) Practitioner: In-House Training

By IIL Europe Ltd

Management of Risk (M_o_R®) Practitioner: In-House Training The M_o_R® Practitioner course has been designed to provide learners with the opportunity to practice the practical application of the M_o_R method and covers the twelve M_o_R principles: Approach, Process and the basic techniques essential to managing risks using the M_o_R guidance. The purpose of the M_o_R Practitioner qualification is to confirm that the learner has achieved sufficient understanding of how to apply and tailor M_o_R in a scenario situation. What you will Learn At the end of the M_o_R Practitioner course, learners will gain competencies in: M_o_R framework (principles, approach based on risk documentation, process steps, and embedding and reviewing M_o_R principles Outline of M_o_R approach documents (including policy, process guide, and risk communications plan) Risk identification, assessment, and control Embedding and reviewing M_o_R M_o_R organizational perspectives (strategic, program, project, operational) Benefits The M_o_R Practitioner course offers a wide-ranging set of guidelines that will help in the management of risk in a project or program environment. It will help prepare learners for the M_o_R Practitioner Exam. They will feel more confident in approaching risk management after attending the course and will be aware of the use of different techniques that can assist in this task, including: Improved basis for effective strategy formation Reduced time spent fire-fighting and fewer unwelcome surprises Increased likelihood of successful change initiative outcomes Closer internal focus on doing the right things properly Increase in efficient use of resources waste and fraud Better management of contingency resources M_o_R roles and responsibilities M_o_R health check M_o_R maturity model Risk specialisms (including business continuity management) Introduction Introduction to the course What is a risk? What is risk management? Why is risk management so important? Basic risk definitions The development of knowledge about risk management Corporate governance and internal control Where and when should risk management be applied? M_o_R Principles The purpose of M_o_R principles Aligns with objectives Fits the context Engages stakeholders Provides clear guidance Informs decision-making Facilitates continual improvement Creates a supportive culture Achieves measurable value Risk management maturity models M_o_R Approach Relationship between the documents Risk management policy Risk management process guide Risk management strategy Risk register Issue register Risk response plan Risk improvement plan Risk communications plan M_o_R Process Common process barriers Identify - contexts Identify - the risks Assess - estimate Assess - evaluate Plan Implement Communication throughout the process M_o_R Perspectives Strategic perspective Programme perspective Project perspective Operational perspective Risk Specialisms Business continuity management Incident and crisis management Health and Safety management Financial risk management Environmental risk management Reputational risk management Contract risk management

Management of Risk (M_o_R) Practitioner: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,995

Voice over LTE

5.0(3)

By Systems & Network Training

Voice over LTE training course description This course provides a basic understanding of the 3G LTE Air Interface, SAE, as well as Voice over LTE options and LTE Advanced features. Investigating the standards for the EPS , formulated by the 3GPP standards body, the course will set out to examine and explain the 4G environment from user equipment to border gateway and beyond. This course will ensure the delegate has a grasp of all aspects of the current global deployments, the next steps in upgrades and the promise of things to come. What will you learn Describe the complete EPC architecture. Explain the use of QoS within the air interface & core network. Explore the features of LTE advanced. Describe the various methods of supporting voice services with 3G LTE. Describe IMS structure and control entities. Explain an IMS session. Voice over LTE training course details Who will benefit: Any engineers who are assisting in the deployment of voice services within their LTE networks. Prerequisites: Intro to Data comms & networking Telecommunications Introduction Duration 3 days Voice over LTE training course contents 3GPP standards body Release 8 - Release 12, Supported and expected features. The EPC revisited EPC revisited 3G LTE & EPC Architecture, NB, MME, SGW, PDNGW, PCRF, Interworking capabilities, Protocol stack explored, NAS signalling, Default EPS bearer, Slot allocation algorithms, Scheduling algorithms, Quality of Service requirements, Dedicated EPS bearers. VoLTE deployment strategies Common networks everywhere, GSM/WCDMA view, CDMA view. VoLTE system architecture LTE radio, LTE Radio background, LTE radio architecture, Evolved packet core, EPC entities & functions, EPS mobility management, MS entities, Home subscriber server, Policy & charging rules function. VoLTE functionality Radio functionality, Bearers & schedulers, Mobility, Circuit switched fall back handover, Mobility from 2G/3G back to LTE, Power Saving Features, Positioning services, UE radio access capabilities for VoLTE users. EPC functionalities, LTE subscriber identification, PDN connectivity establishment, EPS dedicated bearer setup, IMS identification, IP multimedia identification module, Public user identity, Private user identity, Relationship between public & private identity, identification of users device, identification of network entities, identification of services, identification without ISIM. IMS service provisioning, Enforcement of allowed services, Service triggering information, Selection of the AS, AS behaviour, Service provisioning in action. VoLTE end-to-end & signalling VoLTE subscription & device configuration. EPS attach for CSFB/IMS VoIP & default bearer. IMS registration, Constructing the REGISTER request, From UE to P-CSCF, From P-CSCF to I-CSCF, From I-CSCF to S-CSCF, S-CSCF challenges the UE, UE's response to the challenge, Registration at the S-CSCF, The 200 OK response, Third-party registration to application servers, Subscription to registration event package, Re-registration & re-authentication, De-registration, Related standards. IMS VoIP session, Constructing the INVITE request, Routing, Media negotiation, Media resource reservation & policy control, Charging, Session release. Voice continuity, PS - PS intersystem handover, Single radio voice call continuity. IMS emergency session, PDN Connection setup for emergency session, Emergency registration, Emergency session. CS fallback for EPS call case, Architecture of CS fallback in EPS, Description of SGs interface, Idle mode signalling reduction, Idle mode vs active mode, CS fallback attachment, Mobile originating call using CSFB, Mobile terminating call using CSFB, Call unrelated CSFB procedures, Mobile terminating roaming retry & forwarding. VoLTE Messaging, Native IMS messages, SMS interworking, Multimedia messaging service. Unstructured supplementary services data simulation in IMS. IMS services VoLTE radio performance Coverage, Latency, Capacity. LTE advanced features Carrier aggregation, Coordinated mMulti-point Operation (CoMP), ICIC & eICIC, Relay node deployment & donor eNBs, Improved cell edge coverage, Reduced control plane latency, Heterogeneous networks, HeNB, security gateways, HeNB gateways.

Voice over LTE
Delivered in Internationally or OnlineFlexible Dates
£2,367