Junos Intermediate Routing training course description This course provides students with intermediate routing knowledge and configuration examples. The course includes an overview of protocol-independent routing features, load balancing and filter-based forwarding, OSPF, BGP, IP tunneling, and high availability (HA) features. Junos Intermediate Routing (JIR) is an intermediate-level course. What will you learn Describe typical uses, configure & monitor static, aggregate, and generated routes. Configure and share routes between routing instances. Explain the operations of OSPF. Describe BGP and its basic operations. Configure and monitor GRE and IP-IP tunnels. Junos Intermediate Routing training course details Who will benefit: Engineers responsible for configuring and monitoring devices running the Junos OS. Prerequisites: Intro to the Junos Operating System Duration 2 days Junos Intermediate Routing training course contents Protocol-Independent Routing Static Routes Aggregated Routes Generated Routes Martian Addresses Routing Instances Lab 1 Protocol-Independent Routing Load Balancing and Filter-Based Forwarding Overview of Load Balancing Configuring and Monitoring Load Balancing Overview of Filter-Based Forwarding Configuring and Monitoring Filter-Based Forwarding Lab 2 Load Balancing and Filter-Based Forwarding Open Shortest Path First Overview of OSPF Adjacency Formation and the Designated Router Election OSPF Scalability Configuring and Monitoring OSPF Basic OSPF Troubleshooting Lab 3 Open Shortest Path First Border Gateway Protocol Overview of BGP BGP Attributes IBGP Versus EBGP Configuring and Monitoring BGP Lab 4 Border Gateway Protocol IP Tunneling Overview of IP Tunneling GRE and IP-IP Tunnels Implementing GRE and IP-IP Tunnels Lab 5 IP Tunneling High Availability Overview of High Availability Networks Graceful Restart Graceful RE Switchover Nonstop Active Routing BFD VRRP Lab 6 High Availability Appendix A: IPv6 Introduction to IPv6 Routing Protocol Configuration Examples Tunneling IPv6 over IPv4 Lab 7 (Optional) IPv6 Appendix B: IS-IS Overview of IS-IS Overview of IS-IS PDUs Adjacency Formation and DIS Election Configuring and Monitoring IS-IS Basic IS-IS Troubleshooting Lab 8 (Optional) IS-IS Appendix C: Routing Information Protocol Introduction to RIP RIP Configuration Examples Monitoring and Troubleshooting RIP
ZigBee training course description A hands on course covering the entire ZigBee protocol stack. ZigBee operation, primitives and frame formats are covered in detail using software tools to test and analyse ZigBee commands and demonstrate how these affect the 802.15.4 MAC. Analysers are used to decode packet formats. What will you learn Describe the ZigBee architecture and applications. Explain the workings of ZigBee protocol stack including the 802.15.4, NWK, APS and ZDO sub layers. Describe in detail the ZigBee primitives and how they are used to pass data; make networks; join networks and repair networks. Secure ZigBee networks. ZigBee training course details Who will benefit: Technical staff requiring grounding in ZigBee including application engineers. Prerequisites: RF fundamentals. Duration 2 days ZigBee training course contents Wireless data overview What is 802.15.4 and ZigBee? WLAN, WPAN, Bluetooth vs. ZigBee. Markets. Applications and architecture. ZigBee demonstration. ZigBee Standards and technology The 7-layer model, IEEE WPAN standards overview, 802.15.4 & ZigBee, ZigBee alliance. ZigBee Protocol stack The ZigBee 5 layer model, The network (NWK) sub layer, Application support sub layer (APS), the ZigBee Device Object (ZDO). 802.15.4 Radio Frequencies, modulation, power, DSSS, BPSK/ O-QPSK, channels, symbols, chips and bit rate. 802.15.4 PHY PHY data transfer primitives. The PHY packet. PHY PIB management. 802.15.4 MAC layer The MAC layer overview, CSMA/CA, addresses, frame types, super frames, MAC layer: Data, Data control, Scan and join, PAN maintenance, MAC PIB. Hands on 802.15.4 frame analysis. ZigBee Topologies Point to point topology, star topology, cluster tree, wired integration. Hands on Building a ZigBee network. ZigBee frame formats General frame format, data frames, command frames. Hands on Analysing ZigBee frames. ZigBee NWK NWK data primitives: Request. Confirm. Indication. NWK management primitives: Network discovery, network formation. Permit joining. Start router. Join. Direct join. Leave. Reset. Sync. NWK database management. Hands on NWK analysis ZigBee APS Address mapping, matching devices, binding devices, binding tables. Hands on APS analysis. ZigBee ZDO Device roles, binding requests, initiating and responding, device discovery, service discovery, network management. ZDO Endpoint 0. ZigBee Security Security issues, security modes, MAC security, NWK security, APS security. Applications Writing ZigBee applications, application profiles, End points, Endpoint addressing, clusters of attributes, broadcasts. Hands on Sample ZigBee application.
LTE Airside training course description This course provides a concise insight into the LTE airside. Key parts of the course are detailed looks at the air interface protocol stack, cell acquisition, transmission and reception of data and of he layer 1 procedures along with layer 2 procedures. What will you learn Explain the RF optimisation flowchart. Describe the importance of Reference Signal Received Power (RSRP). List many of the 3GPP recommended KPIs. Describe the concept of APN AMBR and UE AMBR within LTE. Describe the use of planning and optimisation computer tools. LTE Airside training course details Who will benefit: Anyone working with LTE. Prerequisites: Essential LTE Duration 2 days LTE Airside training course contents Introduction and review of LTE This section describes the requirements of LTE and key technical features, and reviews the system architecture. LTE Architecture, UE, E-UTRAN and EPC. Specifications. OFDMA, SC-FDMA and MIMO antennas This section describes the techniques used in the LTE air interface, notably orthogonal frequency division multiple access (OFDMA) and multiple input multiple output (MIMO) antennas. Communication techniques for fading multipath channels. OFDMA, FFT processing and cyclic prefix insertion. SC-FDMA in the LTE uplink. Multiple antenna techniques including transmit & receive diversity and spatial multiplexing. Introduction to the air interface This section covers the operation of the air interface, the channels that it uses, and the mapping to the time and frequency domains of OFDMA and SC-FDMA. Air interface protocol stack. Logical, transport and physical channels. Frame and slot structure, the resource grid. Resource element mapping of the physical channels and physical signals. LTE spectrum allocation. Cell acquisition This is the first of three sections covering the air interface physical layer. Here, we cover mobile procedures to start low-level communications with the cell, and base station transmission of the corresponding information. Primary/secondary synchronisation signals. Downlink reference signals. The master information block. Physical control format indicator channel. Organisation and transmission of the system information. Data transmission and reception In this section, we cover procedures used for data transmission and reception on the shared channels, and describe in detail the individual steps. Data transmission and reception on the uplink and downlink. Scheduling commands and grants on the PDCCH. DL-SCH and UL-SCH. Physical channel processing of the PDSCH and PUSCH. Hybrid ARQ indicators on the PHICH. Uplink control information on the PUCCH. Uplink demodulation and sounding reference signals. Additional physical layer procedure This section concludes our discussion of the air interface physical layer, by discussing a number of procedures that support its operation. Transmission of the physical random access channel. Contention and non-contention based random access procedures. Discontinuous transmission in idle and connected modes. Uplink power control and timing advance. Air interface layer 2 This section describes the architecture and operation of layer 2 of the air interface protocol stack. MAC protocol, interactions with the physical layer, use for scheduling. RLC protocol, transparent, unacknowledged and acknowledged modes. PDCP, including header compression, security functions and recovery from handover.
LTE optimization training course description This course gives delegates an understanding of the Key Performance Indicators used within the 3G LTE (4G) network environment. We investigate the 3GPP standards for KPIs (including TR 32.814, TS 32.410 & TS 32.455) these cover GERAN, UMTS & LTE environments. The course details the optimisation procedures and the use of Self optimisation, Selforganising & Self-healing equipment now being deployed across all releases of mobile networks. What will you learn Explain the RF optimisation flowchart. Describe the importance of Reference Signal Received Power (RSRP). List many of the 3GPP recommended KPIs. Describe the concept of APN AMBR and UE AMBR within LTE. Describe the use of planning and optimisation computer tools. LTE optimization training course details Who will benefit: Anyone working with LTE. Prerequisites: Essential LTE Duration 2 days LTE optimization training course contents Introduction to the cellular environment The architecture, 2G (GSM), GPRS/EDGE, The NGMN (Next Generation Mobile Network), media gateway controller, 3GPP Rel99 the 3G introduction, HSPA deployments, 3G LTE (4G). Cellular network procedures GSM/GPRS call setup, GPRS data call setup, 3G UMTS data call setup, Data call (Voice over LTE) in LTE (using IMS), Circuit Switched Fall Back (CSFB) in LTE, IP packet session in LTE. Introduction to the standards The 3GPP specifications body, The numbering structure for KPIs, 2G KPIs, 3G/UMTS KPIs, 3G LTE KPIs, IMS KPIs. Introduction to the KPI definitions KPI definitions, accessibility KPIs, retainability KPIs, mobility KPIs, utilisation KPIs. In-depth overview of the air Interfaces GSM/GPRS FDMA & TDMA solution, 3G UMTS WCDMA solution, HSPA+ sharing spare power (Codes), The 3G LTE uplink & downlink interface explained, Initial attach procedures explained. Problem analysis Reference Signal Received Power (RSRP), Signal to Interference Noise Ratio (SINR), handover success rates, power adjustments, classification of coverage problems, weak coverage & coverage holes, lack of dominant cells, cross coverage, improper tilt settings, uplink/downlink imbalance, signal quality, Azimuths & tilts to reduce interference, Handover failure due to interference, Service drop causes. Mobile RF performance in 2G/3G Performance counters, KPIs, testing & measurement, Drive testing and survey, Data collection and post processing of data, LTE service optimization, bandwidth, poor coverage, Quality, optimization process, KPI optimization, Root Cause Analysis (RCA) applied to RF issues, optimization tools and software. Advanced LTE network planning & optimization LTE UE measurements (RSRP/RSRQ), LTE capacity planning, RF configuration parameters, LTE cell selection/reselection planning, LTE radio network KPIs, LTE user-centric KPIs, LTE network performance KPIs, LTE system utilization KPIs, LTE RF channel performance predictions, LTE channel information processing, LTE channel multiplexing, Physical layer and structure, MIMO in LTE, LTE resource plan LTE and Self-Organizing Networks (SON). Radio network optimization work flow Work flow, the existing network, Optimization team establishment and cluster division, Single site verification, Alarm check, Cell state check, Radio parameters check, Site verification, Statistics analysis, Coverage problem analysis. Mobile internet and QoS issues Cellular QoS reference models. How QoS impact on KPIs and measurements, Introduction to mobile internet, The concept of shared access technologies, Support for QoS in the WCDMA environment, The PDP context model, Supporting end-to-end QoS, EPS bearer concepts, Default EPS bearer, Dedicated EPS bearer, APN-AMBR, UE-AMBR.
ID LINER RUN ONE SKILL UP PERMANENT MAKEUP TRAINING COURSE PER QUARTER TO HELP TRAINEES HONE AND DEVELOP THEIR SKILLSET. THESE COURSES REVIEW AND IMPROVE HOW YOU CURRENTLY WORK, INTRODUCING MORE ADVANCED TECHNIQUES TO TAKE YOU TO THE NEXT LEVEL.
About this Training Course This 5 full-day course covers all the main elements of IChemE's Process Safety Competency framework: culture, knowledge and competence, engineering and design, human factors, systems and procedures, and assurance. Participants will achieve at least the second level of competence 'Basic Application', which is defined as 'Performs fundamental and routine tasks. Requires occasional supervision. Increased functional expertise and ability. Works with others.' This course examines the interrelation of the various techniques of process safety for analysing and managing process hazards in the hydrocarbon and chemical processing industries. There is a particular emphasis on engineering design aspects with extensive participation in individual and group exercises, tutored exercises and video case studies throughout the course to underpin key learning points. The learning is consolidated in a comprehensive case study and requires collaboration between members of each syndicate. This course has been reviewed and approved by the Institution of Chemical Engineers. IChemE is the global professional membership organisation for chemical, biochemical and process engineers and other professionals involved in the chemical, process and bioprocess industries. Their knowledge of professional standards, close involvement with industry, education and regulators, and their expertise as a leading global training provider, means they are uniquely positioned to independently assess and approve training courses and professional development programmes across the world. Training Objectives By the end of this course, participants will be able to: Acquire the underpinning knowledge required to achieve process safety competency Gain a comprehensive understanding of process safety management Understand the concept of the safety life cycle of a process plant from conceptual design onwards including operation, maintenance and modification Understand the hazard scenarios associated with a process plant Understand how risks can be controlled by hardware and procedural measures Identify and analyse hazard causes and consequences Recognise when specialist analytical expertise is required Generate effective and appropriate measures to reduce risks Justify and communicate practical solutions to non-technical personnel Explain the rationale for process safety measures to decision makers Target Audience This course is suitable for process industry professionals who need to acquire a comprehensive understanding of process safety management, those moving into process safety positions or those who wish to broaden their process safety knowledge within their existing discipline. It is particularly suited for anyone involved in the design, operation, modification or maintenance of a major hazard installation. This includes: Supervisors, operators and maintainers in Oil & Gas, Petrochemical and Chemical industries, process, mechanical and chemical engineers and technicians Design engineers, project engineers and HSE managers Control, automation and instrumentation engineers It will also demonstrate a substantial understanding of process safety for those engaged in Continuous Professional Development or aiming for the Chartered Engineer status. Course Level Basic or Foundation Trainer Your expert course leader has 50 years' experience in chemical and process safety engineering. His early career included 20 years in design and project engineering with various fine chemical and pharmaceutical companies where he designed chemical processes, specified plant equipment and selected materials for highly corrosive and toxic processes, often where textbook data was not available. This was followed by 10 years in offshore oil and gas design projects where he was responsible for setting up a Technical Safety group to change design safety practices in the aftermath of the 1988 Piper Alpha disaster. In recent years, he has been called upon to conduct various offshore and onshore incident investigations. His career has given him experience in project engineering, project management, process design and operations, safety engineering and risk management. He is a Fellow of the UK Institution of Chemical Engineers. He served on the Scottish Branch committee, and was elected chairman for a two-year term in 1991. He has also been chairman of the Safety and Reliability Society - North of Scotland Branch. He has delivered training courses in Process Hazard Analysis (HAZOP and HAZID), Process Safety Management, Hazard Awareness, Risk Assessment, Root Cause Analysis, Failure Modes & Effect Analysis and has lectured on Reliability Analysis to the M.Sc. course in Process Safety and Loss Prevention at Sheffield University. In addition to delivering training courses, he currently facilitates HAZOP / HAZID / LOPA studies and undertakes expert witness roles advising lawyers engaged in contractual disputes, usually involving the design or construction of chemical plants or Oil & Gas production facilities, or criminal prosecutions. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
XSLT training course description This course has been designed as a follow on course for the XML primer course. The course looks at the use of XSLT in the transforming and styling XML documents. What will you learn Transform and style XML documents using XSLT. XSLT training course details Who will benefit: Anyone working with XSLT. Prerequisites: XML primer Duration 2 days XSLT training course contents Introduction Extensible Stylesheet Language (XSL), transforming and formatting XML. XML refresher The basic rules for building an XML document. An introduction to XSLT The basic concepts of XSLT, xsl:output, xsl:template, xsl:value-of. XML documents as trees How the original XML is transformed into a set of nodes, the general terms for manipulating node trees. Paths (XPath) Use of path matching to select required nodes for transformation. Using templates xsl:apply-templates, xsl:template match, nested templates, xsl:copy , <comment> and <element> , default templates, parameters. Control xsl:if, xsl:choose, xsl:for-each, xsl:sort. Constructing the result tree xsl:output, xsl:attribute, xsl:attribute-set, xsl:comment, xsl:processing-instruction, xsl:text, xsl:value-of, xsl:variable. Combining templates xsl:include, xsl:import, xsl:apply-imports. Transforming to text
Definitive 802.1X training course description A hands-on training course concentrating solely on 802.1X. Hands on sessions follow major chapters to reinforce the theory. What will you learn Describe 802.1X. Explain how 802.1X works Configure 802.1X Troubleshoot 802.1X. Definitive 802.1X training course details Who will benefit: Technical network staff. Technical security staff. Prerequisites: SIP for engineers Duration 2 days Definitive 802.1X training course contents Introduction What is 802.1X? Authentication access, 802.3, 802.11. IEEE, 802, 802.1X-2001, 802.1X-2010. Architecture Supplicant, Authenticator, Authentication server, EAP, EAPOL, RADIUS, Diameter. Port configuration 802.1X in a switch environment. Hands on Configuring 802.1X. How it works Controlled ports, uncontrolled ports. Authentication flow chart, Initialisation, initiation, negotiation, authentication. Hands on 802.1X packet analysis. 802.1X and 802.11 WiFi, WiFi security. Hands on 802.1X WiFi port access. EAP Extensible Authentication Protocol, RFC 3748, RFC 5247. EAP methods: Weak, MD5, LEAP, Strong: TTLS, TLS, FAST. Encapsulation: 802.1X, PEAP, RADIUS, Diameter, PPP. 802.1X accounting RADIUS, accounting messages, 802.1X accounting AV pairs. 8021.X and VLANS VLANs, Guest VLAN, restricted VLAN, voice VLAN. Hands on VLAN assignments with 802.1X.
Mikrotik routers training course description A fast paced practical hands on introduction to Mikrotik routers concentrating on basic product knowledge needed for the real world. Starts with the basics of accessing the routers through configuring static routes, RIP and OSPF, ending with firewalls. Hands on sessions follow all the major chapters. What will you learn Use Winbox. Use the Mikrotik command line. Perform basic troubleshooting. Configure Interfaces, RIP and OSPF. Perform housekeeping tasks such as: - save and load configurations - upgrade the OS - recover lost passwords Mikrotik routers training course details Who will benefit: Anyone who will be working with Mikrotik routers. Prerequisites: TCP/IP foundation for engineers Duration 2 days Mikrotik routers training course content Mikrotik routers RouterOS, RouterBoard. System resources. Getting started Accessing the router, Winbox, Webfig, Quickset. telnet. The command line interface Contexts, online help, basic troubleshooting. Configuring Interfaces Basics, Enabling interfaces. Ethernet, loopback interfaces. Adding IP addresses. Static routes Why use static routes? Configuring static routes, default routes. Configuring RIP How RIP works, configuration, troubleshooting. OSPF Configuration and troubleshooting. Housekeeping Configuration management, offline editing and FTP usage. RouterOS upgrades. Packages. Bypassing passwords. Other functions DHCP server. Firewall Connections, chains, actions, filters.
Hardening Cisco devices training course description A hands on course focusing on how to lock down Cisco IOS routers and switches. What will you learn Harden Cisco devices. Hardening Cisco devices training course details Who will benefit: Technical network staff. Technical security staff. Prerequisites: TCP/IP foundation for engineers. Duration 5 days Hardening Cisco devices training course content Introduction Router security, Switch security, Cisco IOS, IOS versions, Cisco advisories, the management plane, control plane, data plane. Hands on Checking IOS versions and advisories. Access control Infrastructure ACLs, Transit ACLs. Hands on Restricting access to the device, Filtering data traffic. Management plane: Securing operations Passwords, privilege levels, AAA, TACACS+, RADIUS. Hands on Password management. Management plane: Other general hardening Logging best practices, secure protocols, encrypting management sessions, configuration management. Hands on Hardening the management plane. Control plane Disabling reception and transmission of certain messages, Limiting CPU impact of control plane traffic, securing routing protocols. Hands on Hardening the control plane. Data plane Transit ACLs, disabling unused services, disabling unnecessary protocols, anti spoofing, limiting CPU impact of data plane traffic, identifying and tracing traffic, Netflow, VLANs, port security. Hands on hardening the data plane.