• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

557 Running courses

Junos Service Provider Switching

5.0(3)

By Systems & Network Training

Junos Service Provider Switching training course description This course provides students with an overview of switching concepts such as LANs, Layer 2 address learning, bridging, virtual LANs (VLANs), provider bridging, VLAN translation, spanning-tree protocols, and Ethernet Operation, Administration, and Maintenance (OAM). This course also covers Junos operating system-specific implementations. Junos Service Provider Switching is an intermediatelevel course. What will you learn Describe carrier Ethernet. Describe the function of an Ethernet LAN. Implement VLAN tagging. Describe the components of provider bridging. Identify and use available tools to resolve network issues. Configure and monitor Ethernet OAM, ERP, LAG, STP, the RSTP, the MSTP, and the VSTP. Junos Service Provider Switching training course details Who will benefit: Individuals responsible for configuring and monitoring devices running the Junos OS. Prerequisites: Junos Intermediate Routing Duration 2 days Junos Service Provider Switching training course contents Ethernet Switching and Virtual LANs Ethernet LANs Bridging Configuring and Monitoring VLANs Automating VLAN Administration Configuring and Monitoring IRB Layer 2 Address Learning and Forwarding Layer 2 Firewall Filtering Ethernet Switching and VLANs Lab Virtual Switches Routing Instances Overview Configuring and Monitoring Virtual Switches Interconnecting Routing Instances Logical Systems Virtual Switches Lab Provider Bridging Expanding the Bridged Network Provider Bridging Configuring and Monitoring Provider Bridging Provider Bridging Lab Spanning-Tree Protocols Overview of STP Overview of RSTP Overview of MSTP Overview of VSTP Configuring and Monitoring Spanning-Tree Protocols Understanding BPDU, Loop, and Root Protection MSTP Lab Ethernet OAM OAM Overview LFM CFM Configuring and Monitoring Ethernet OAM Ethernet OAM Lab High Availability and Network Optimization ERP Overview Configuring and Monitoring ERP Link Aggregation Group Overview Configuring and Monitoring a LAG MC-LAG Overview Configuring and Monitoring an MC-LAG High Availability and Network Optimization Lab Troubleshooting and Monitoring Introduction to Troubleshooting and Monitoring Troubleshooting and Monitoring Tools Troubleshooting Case Study: Network Congestion Troubleshooting and Monitoring Lab Appendix A: Carrier Ethernet Ethernet in the WAN Ethernet Standards Organizations MX Series Layer 2 Features Appendix B: Deprecated Syntaxes Appendix C: MX Series Overview

Junos Service Provider Switching
Delivered in Internationally or OnlineFlexible Dates
£2,477

Agile and Scrum Fundamentals: In-House Training

By IIL Europe Ltd

Agile and Scrum Fundamentals: In-House Training The overall goal of the course is to provide learners with the fundamentals of what Agile and Scrum are, and how to effectively apply Agile methods in your projects. What you will Learn At the end of this program, you will be able to: Describe Agile and Scrum foundation concepts Compare and contrast Agile roles to traditional roles Initiate an Agile project Develop Release Plans Build an Iteration Plan Execute an Iteration Implement Agile in your environment Getting Started Introductions Workshop orientation Expectations Foundation Concepts Project Lifecycles What is Agile? Why Agile? A range of Agile methods Focus on Scrum The People Side of Agile A range of Agile roles Focus on Scrum roles Unique characteristics of Agile Teams Building effective Agile Teams Initiating an Agile Project Conducting Sprint Zero Setting the vision Building the Product Backlog and User Stories Defining Acceptance Criteria Planning Releases Planning releases Estimating user stories Prioritizing user stories Selecting a Sprint length Estimating velocity Creating a release plan Planning an Iteration Conducting the Sprint Planning Meeting Building the Sprint Backlog Creating a Sprint Plan Running an Iteration Executing Sprint activities Using Burn-down and Burn-up Charts Negotiating changes during a Sprint Conducting the Sprint Review Meeting Implementing Agile Conditions of success for implementing Agile and Scrum Implementing Agile Final words

Agile and Scrum Fundamentals: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,495

Hydronics Unlocked - Scotland

5.0(434)

By Warmur Academy

Training for heating Engineers to further understand flow pipe sizing Pump maps velocity separation, system balancing & reto survey for ASHP

Hydronics Unlocked - Scotland
Delivered In-Person in Edinburgh + more
£690

Kantha mug rug team building

5.0(1)

By Make it!

Enjoy a simple afternoon tea and some easy crafting with your team at this unique team building event

Kantha mug rug team building
Delivered In-Person in Ayrshire + 3 moreFlexible Dates
£35 to £330

Definitive Puppet for engineers

5.0(3)

By Systems & Network Training

Definitive Puppet training course description Puppet is a framework and toolset for configuration management. This course covers Puppet to enable delegates to manage configurations. Hands on sessions follow all the major sections. What will you learn Deploy Puppet. Manage configurations with Puppet. Build hosts with Puppet. Produce reports with Puppet. Definitive Puppet training course details Who will benefit: Anyone working with Puppet. Prerequisites: Linux fundamentals. Duration 2 days Definitive Puppet training course contents Getting started with Puppet What is Puppet, Selecting the right version of Puppet, Installing Puppet, Configuring Puppet. Developing and deploying Puppet The puppet apply command and modes of operation, Foreground Puppet master, Developing Puppet with Vagrant, Environments, Making changes to the development environment, Testing the new environments with the Puppet agent, Environment branching and merging, Dynamic Puppet environments with Git branches, Summary, Resources. Scaling Puppet Identifying the challenges, Running the Puppet master with Apache and Passenger, Testing the Puppet master in Apache, Load balancing multiple Puppet masters, Scaling further, Load balancing alternatives. Measuring performance, Splay time, Summary, Going further, Resources. Externalizing Puppet configuration External node classification, Storing node configuration in LDAP, Summary, Resources. Exporting and storing configuration Virtual resources, Getting started with exported and stored configurations, Using exported resources, Expiring state resources, Summary, Resources. Puppet consoles The foreman, Puppet enterprise console, Puppetboard, Summary, Resources. Tools and integration Puppet forge and the module tool, Searching and installing a module from the forge, Generating a module, Managing module dependencies, Testing the modules, Developing Puppet modules with Geppetto, Summary, Resources. Reporting with Puppet Getting started, Configuring reporting, Report processors, Custom reporting, Other Puppet reporters, Summary, Resources. Extending Facter and Puppet Writing and distributing custom facts, Developing custom types, providers and functions, Summary, Resources, Complex data structures, Additional backends, Hiera functions in depth, Module data bindings, Hiera examples. Jiera-2, Summary, Resources. Mcollective Installing and configuring Mcollective, testing, Mcollective plugins, accessing hosts with Metadata. Hiera Lists, initial Hiera configuration, Hiera command line utility, complex data structures, additional backends, Hiera functions in depth, module data bindings. Hiera-2.

Definitive Puppet for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,727

Leadership is about 'getting stuff done'. This course concentrates on just that. In a complicated world, it helps leaders to ensure that the right stuff gets done at the right time and in the right way.

Achieving Outputs in a Complex World
Delivered in Loughborough or UK Wide or OnlineFlexible Dates
£378

Red Hat system administration

5.0(3)

By Systems & Network Training

Red Hat training course description This three day hands on course provides a comprehensive coverage of core Linux administration tasks on Red Hat Linux. What will you learn Administer & configure Linux systems. Maintain Linux by handling disk space and taking regular backups. Manage software packages. Perform basic troubleshooting. Maintain a secure Linux system. Describe the organisation and implementation of the filesystem. Red Hat training course details Who will benefit: System administrators. Network administrators. Prerequisites: Linux fundamentals Duration 3 days Red Hat training course contents Managing software Package Concepts, RPM, rpm Commands, Yum, Dependencies and Conflicts, Startup Script Problems, Shared Libraries, Library Management, Managing Processes, the Kernel: The First Process, Process Lists, Foreground & Background Processes, Process Priorities, Killing Processes. Configuring hardware Configuring Firmware and Hardware, IRQs, I/O Addresses, DMA Addresses, Boot Disks, Coldplug and Hotplug Devices, Configuring Expansion Cards and PCI Cards, Kernel Modules, USB Devices, Linux USB Drivers, Configuring Hard Disks, Partitioning Systems, LVM, Common Layouts, Creating Partitions and Filesystems, Maintaining Filesystem Health, Tuning, Journals, Checking Filesystems, Monitoring Disk Use, Mounting and Unmounting Filesystems. Managing files File Management Commands, File Naming and Wildcards, File Archiving, Links, Directory Commands, File Ownership and Group, File access control, Permissions, chmod, Defaults, File Attributes, Disk Quotas, Enabling and setting Quotas, Locating Files, The FHS. Booting Linux and editing files Installing Boot Loaders, GRUB Legacy, GRUB 2, Alternative Boot Loaders, the Boot Process, Boot Messages, Runlevels and the Initialization Process, Runlevel Functions, Runlevel Services, Alternative Boot Systems , Upstart, system. Administering the system Managing Users and Groups, Tuning User and System Environments, Using System Log Files, Understanding syslogd , Setting Logging Options, Manually Logging Data, Rotating Log Files, Reviewing Log File Contents, Maintaining the System Time, Linux Time Concepts, Manually Setting the Time, Using NTP, Running Jobs in the Future, Understanding the Role of cron, Creating System cron Jobs, Creating User cron Jobs, Using anacron, Using at. Configuring basic networking TCP/IP, Network Hardware, Network Addresses, Hostnames, Network Ports, Configuring Linux for a Local Network, Configuring with DHCP, Static IP Address, Configuring Routing, Using GUI Configuration Tools, ifup and ifdown, Diagnosing Network Connections, Testing Connectivity, Tracing a Route, Checking Network Status , Examining Network Traffic, Additional Tools. Securing your systems Administering Network Security, Super Server Restrictions, Disabling Unused Servers, Administering Local Security, Securing Passwords, Limiting root Access, Setting Login, Process, SUID/SGID Files, Configuring SSH, Using GPG, Generating, Importing and Revoking Keys, Encrypting and Decrypting Data, Signing Messages and Verifying Signatures. Clustered File Systems Principles of cluster file systems. Create, maintain and troubleshoot GFS2 file systems in a cluster, create, maintain and troubleshoot OCFS2 file systems in a cluster, Integration of GFS2 and OCFS2 with Pacemaker, the O2CB cluster stack, other commonly used clustered file systems.

Red Hat system administration
Delivered in Internationally or OnlineFlexible Dates
£3,497

This course will enable you to bring value to the business by putting data science concepts into practice. Data is crucial for understanding where the business is and where it's headed. Not only can data reveal insights, but it can also inform - by guiding decisions and influencing day-to-day operations.

Certified Data Science Practitioner
Delivered in Loughborough or UK Wide or OnlineFlexible Dates
£595

I Don't Know What to Say! - Improvisation for Social Confidence

5.0(6)

By The Sunflower Effect Confidence Courses

Overcome social awkwardness and social anxiety the fast, fun and easier way. DO YOU find yourself drying up or going blank when under pressure, or get tongue-tied when someone makes a smart remark? One of the reasons that you dry up or get tongue-tied – is because you are programmed to go into your head and try to think of something to say. Most of us have become left-brain dominant because of the way we’ve been educated and we don’t know how to activate our powerful and more creative right-brain. This is why the "I Don't Know what to Say" Improvisation Course is so effective at overcoming social difficulties. It gives you access to your spontaneous right-brain, and in fact, enables you to operate from both right and left-brain together. It is probably one of the fastest and most effective ways of building verbal confidence as well as liberating you on all sorts of levels.

I Don't Know What to Say! - Improvisation for Social Confidence
Delivered In-Person in London
£315

Essential EVPN

5.0(3)

By Systems & Network Training

Essential EVPN training course description Ethernet VPN (E-VPN) and Provider Backbone Bridging E-VPN (PBB-EVPN) are emerging technologies providing Ethernet services over MPLS. This course studies the technologies in E-VPN/PBB-EVPN providing multi-homing, multi pathing, auto discovery, multicast, forwarding and fast convergence. What will you learn Differentiate between E-VPN and PBB-EVPN. Explain how E-VPN operates. Explain how PBB-EVPN operates. Explain how E-VPN provides: Multi homing Multi pathing Auto discovery. Essential EVPN training course details Who will benefit: Network engineers. Staff working for carriers. Prerequisites: Definitive Ethernet switching for engineers Concise MPLS for engineers Duration 2 days Essential EVPN training course contents Introduction to EVPN Network virtualization What Is network virtualization? types of virtual networks, network tunnelling, the consequences of tunnelling, packet load balancing, network interface card behaviour. maximum transmission unit, lack of visibility, VXLAN, protocols to implement the control plane, support for network virtualization technologies, merchant silicon Software, standards. The building blocks of Ethernet VPN A brief history of EVPN, architecture and protocols for traditional EVPN deployment, EVPN in the data center BGP constructs for Virtual networks, address family indicator/subsequent address family indicator, route distinguisher, route target, RD, RT, and BGP processing, route types, modifications to support EVPN over eBGP, keeping the NEXT HOP unmodified, retaining route targets, FRR support for EVPN, automatic propagation of NEXT HOP, RT/RD derivation, what Is not supported in FRR. Bridging with Ethernet VPN An overview of traditional bridging, overview of bridging with EVPN, what Ifs, why does NVE L3 get an advertisement for MACA? handling BUM packets, handling MAC moves, support for dual-attached hosts, the host-switch Interconnect, VXLAN model for dual-attached hosts, switch peering solutions, handling Link failures, duplicate multi-destination frames, ARP/ND suppression. Routing with Ethernet VPN The case for routing in EVPN, routing use cases in the data center, routing models, where is the routing performed? centralized routing, distributed routing, how routing works in EVPN, asymmetric routing, symmetric routing, VRFs in EVPN routing, summarized route announcements, BGP support for EVPN routing, comparing asymmetric and symmetric models, vendor support for EVPN routing. Configuring and administering Ethernet VPN The sample topology, configuration cases, configuring the MTU, the end first: complete FRR configurations, the Invariants: configuration for the spines, firewall, and servers, centralized routing, asymmetric distributed routing, symmetric routing, dissecting the configuration, configuring the underlay, configuring the overlay: FRR configuring the overlay: interfaces, examining an EVPN network, show running configuration, show BGP summary, show EVPN VNIs and VTEPs, identify which VTEP advertised a MAC address, comparing FRR and Cisco EVPN configurations, considerations for deploying EVPN in large networks.

Essential EVPN
Delivered in Internationally or OnlineFlexible Dates
£2,477