Lean Six Sigma Green Belt Certification Program: In-House Training This learning series is designed to enable participants to fulfill the important role of a Lean Six Sigma Green Belt and to incorporate the Lean Six Sigma mindset into their leadership skills. Green Belt is not just a role, it is also a competency required for leadership positions at many top companies. This learning series is designed to enable participants to fulfill the important role of a Lean Six Sigma Green Belt and to incorporate the Lean Six Sigma mindset into their leadership skills. With a real-world project focus, the series will teach the fundamental methodology, tools, and techniques of the Define, Measure, Analyze, Improve and Control Process Improvement Methodology. This course is delivered through sixteen 3-hour online sessions. What you Will Learn At the end of this program, you will be able to: Identify strategies for effectively leading high performing process improvement teams Analyze whether projects align with business strategy Apply process improvement methodologies to DMAIC steps, based on real world scenarios Explain ways to appropriately respond to process variation Distinguish among best practice problem solving methodologies Evaluate and effectively communicate data-driven decisions, based on real world scenarios Introduction Lean Six Sigma & quality The vision The methodologies The metric Project Selection Why Projects Random idea generation Targeted idea generation CTQs (Critical to Quality) & projects Project screening criteria Quick improvements Introduction to Define Project Planning Developing the core charter Developing a project charter Facilitation Process Management Business process management Top-down process mapping Voice of the Customer Voice of Customer Stakeholder analysis Communication planning Kicking off the project Define Summary Introduction to Measure Data Collection Fact-based decision making Data sampling Operations definitions Data collection plan Measurement system analysis Graphical Statistics for Continuous Data Meet Six SigmaXL Graphical & statistical tools Data stratification Graphical Statistics for Discrete Data Pareto analysis Dot plots Plotting data over time: Looking for patterns Variation Concepts Variation is reality Special Cause and Common Cause variation Example of standard business reporting Individuals Control Chart Process Capability Genesis of process capability Calculating the metrics of Six Sigma Yield metrics: Measuring process efficiency Cost of Poor Quality The Cost of Poor Quality (COPQ) Cost of Quality categories Calculating the Cost of Poor Quality Measure Summary Introduction to Analyze Process Analysis Introduction to process analysis Value-added analysis Cycle time analysis WIP & pull systems Analyzing bottlenecks and constraints Cause & Effect Analysis Fishbone/Ishikawa diagram 5-Whys analysis Graphical & statistical tools Advanced Analysis Why use hypothesis rests? Hypothesis tests Correlation and regression analysis Analyze Summary Introduction to Improve Solutions Creativity techniques Generating alternative solutions Solution selection techniques Introduction to Design of Experiments Introduction to DOE DOE activity Error Proofing Failure mode & effect analysis Poka-Yoke Project Management Fundamentals Successful teams Project roles Conflict management Standardization Standardization The Visual Workplace 5S Piloting & Verifying Results What is a pilot? Evaluating results Improve Summary Introduction to Control Statistical Process Control Review of Special & Common Cause variation Review of Individual Control Chart P-Chart for discrete proportion data Transition Planning Control plan Project closure Control Summary Summary and Next Steps
Overview This course is specially designed to give you intense knowledge and walk you through steps of proven approaches to Public Relations (PR) planning and management. The skills attained through this course can be very well measured and implemented within their work organisation thereby contributing towards the growth of their organisation also helping to build a good reputation and maintaining healthy relationships. You will be shown how the fundamentals of PR are vital, and how significant they are to understanding organisational reputation and relationships. PR professionals are mostly considered as challenging positions and many times have to deal with difficult and even different situations. Therefore, attending this course will enable you to gain the skills needed to present practical and achievable plans.
Overview Corporate frauds have the inherent power to bring large organizations to their knees, cause huge monetary loss, prompt lawsuits followed by significant legal expenses, lead to the imprisonment of employees and deteriorate confidence in the market, governments, and institutions. In response, corporations and governments across the globe have stepped up their effort to inspect, prevent and penalize fraudulent practices; resulting in a greater emphasis on the domains of forensic auditing and accounting in the current economy. This training course will empower you to recognize the root causes of fraud and white-collar crime in the current economy, understand the categories of fraud, equip you with methodologies of fraud detection and prevention, and heighten your ability to detect potential fraudulent situations. In addition to the fundamentals of fraud investigation and detection in a digital environment; profit-loss evaluation, analysis of accounting books, legal concepts, and quantification of financial damages are also examined in this course
Perl training course description A hands on introduction to programming in Perl. What will you learn Write Perl programs. Use Perl modules. Debug Perl programs. Examine existing code and determine its function. Perl training course details Who will benefit: Anyone wishing to learn Perl. Prerequisites: None although experience in another high level language would be useful. Duration 5 days Perl training course contents Introduction to Perl What is Perl? When to use Perl, downloading Perl, installing Perl, documentation, perldoc, running Perl, the Perl environment. Perl under UNIX, Perl under Windows. "Hello world". Variables Scalars, data types, $_, strings and numbers, assignment, constants, strict, scope, STDIN. Operators Number operators, string operators, precedence and associativity, converting numbers and strings, shortcut operators. Flow control Blocks, if, else, elseif, unless, foreach, while, for do, until. Regular expressions What are regular expressions? Pattern matching, Perl as a filter, file editing. Strings Comparing strings, concatenating, substrings, chomp, chop, formatting, string manipulation. Subroutines Comparing strings, concatenating, substrings, chomp, chop, formatting, string manipulation. Arrays and hashes Working with arrays, element access, push(), pop(), shift(), unshift(), <STDIN> as an array, associative arrays, hashes of arrays, hash references, arrays of hashes, hashes of hashes. Files Simple file handling, open, close, <FILEHANDLE>, <>, file tests, directory access, directory handles, database access, packing and packing binary data. I/O STDIN, STDOUT and STDERR, Command line arguments,@ARGV. Perl debugging The built in debugger, running the debugger, debugger commands, graphical debuggers. Script syntax errors, single stepping, breakpoints, watches. Packages and modules CPAN, Finding modules, installing modules, using modules, scope. Report formatting Formats, defining a format, invoking a format, field holders. Process management System interaction, system(), exec(), signals. Security issues.
Supporting Windows 10 course description This course is designed to provide students with the knowledge and skills required to support and troubleshoot Windows 10 PCs and devices in a Windows Server domain environment. These skills include understanding of Windows 10 features, how they can be used in an Active Directory environment and how to troubleshoot them. What will you learn Troubleshoot startup issues and operating system services on a Windows 10 PC. Troubleshoot issues related to network connectivity. Troubleshoot client configuration failures and GPO application issues. Troubleshoot issues related to application installation and operation. Recover a PC running Windows 10. Supporting Windows 10 course details Who will benefit: Anyone supporting users running Windows 10 personal computers within a medium to large enterprise. Prerequisites: None. Duration 5 days Supporting Windows 10 course contents Implementing a Troubleshooting Methodology Overview of Windows 10, Introduction to the EDST Job Role, Overview of the Troubleshooting Steps & Tools. Hands on Implementing a Troubleshooting Methodology. Hands on Using Troubleshooting Tools for Windows 10. Troubleshooting Startup Issues Overview of the Windows 10 Startup Recovery Environment, Troubleshooting Startup Settings & Operating System Services Issues, Recovering BitLocker-Protected Drives. Hands on Troubleshooting Startup Issues. Hands on Recovering BitLocker-Encrypted Drives, Creating a New BitLocker Password. Troubleshooting Hardware and Device Drivers Troubleshooting Device Driver Failures & Physical Failures, Overview of Hardware Troubleshooting, Monitoring Reliability, Configuring the Registry. Hands on Troubleshooting Device Driver Issues, Resolving Hardware Issues, Adding a Missing Device Driver to a Driver Store, Reverting a Problematic Device Driver. Hands on Troubleshooting Hardware Issues, Diagnosing Memory, Troubleshooting and Repairing Failed Disk Redundancy Synchronizing Settings, Accessing Data on a Foreign Volume. Troubleshooting Remote Computers Using Remote Desktop and Remote Assistance, Remoting with Windows PowerShell Hands on Troubleshooting Remote Computer by using Remote Desktop and Remote Assistance. Hands on Troubleshooting Remote Computer by using Windows PowerShell. Resolving Network Connectivity Issues Determining Network Settings, Troubleshooting Network Connectivity Issues, Troubleshooting Name Resolution. Hands on Resolving Network Connectivity Issues. Hands onResolving Name Resolution Issues. Troubleshooting Group Policy Overview of Group Policy Application, Resolving Client Configuration Failures and GPO Application Issues. Hands on Troubleshooting Group Policy Application Issues. Hands on Resolving Group Policy Issues. Hands on Installing and Sharing a Printer. Troubleshooting User Settings Troubleshooting Sign In Issues, Troubleshooting the Application of User Settings. Hands on Troubleshooting Sign in Problems. Hands on Troubleshooting the Application of User Settings, Resolving Folder Redirection Problem, Resolving Roaming User Profile Problem. Troubleshooting Remote Connectivity Troubleshooting VPN Connectivity Issues & DirectAccess. Hands on Troubleshooting VPN Connectivity Lab : Configuring and Troubleshooting DirectAccess Configuring and Verifying, DirectAccess Client-Side Settings, Troubleshooting DirectAccess. Troubleshooting Resource Access Within a Domain & File Permissions Issues, Recovering Files Encrypted by EFS, Troubleshooting Printer Access Issues. Lab : Troubleshooting File Access Issues Lab : Troubleshooting Access to Encrypted Files. Hands on Troubleshooting Printer Access Issues Troubleshooting Resource Access for Non Domain Member Clients Configuring and Troubleshooting Device Registration, Configuring and Troubleshooting Work Folders, Configuring and Troubleshooting OneDrive Access. Hands on Troubleshooting Resource Access for Clients that are not Domain Members. Troubleshooting Device Registration, Work Folders and OneDrive for Business. Troubleshooting Applications Troubleshooting Desktop App Installation Issues, Desktop Apps, Managing Windows Store Apps, Troubleshooting Access to Company Web Applications. Hands on Troubleshooting Desktop Apps, AppLocker Policy Application & Application Compatibility issue. Hands on Troubleshooting Access to Company Web Applications, Internet Explorer Issue & Microsoft Edge. Maintaining Windows 10 Managing & Troubleshooting Windows Activation, Troubleshooting Performance, Applying Applications. Hands on Monitoring and Troubleshooting Performance. Recovering Data and Operating System File Recovery in Windows 10, Recovering an OS. Hands on Recovering Data, Recovering Data from Azure Backup, Recovering Deleted File by Using File History. Hands on Provisioning Computer to Comply with Company Standards, Provision Computer to Comply with Company Standards.
About this Virtual Instructor Led Training (VILT) This 5 half-day Virtual Instructor Led Training (VILT) course covers carbon capture and geological storage of carbon dioxide. Burning fossil fuels for energy is a major source of carbon dioxide emissions to the atmosphere. Most anthropogenic (man-made) carbon dioxide is emitted by coal-fired or gas-fired power plants, and significant quantities of carbon dioxide are emitted through the production and separation of carbon dioxide-rich natural gas and industries such as cement, iron and steel. Carbon Capture Utilization and Storage, or CCUS, involves the long-term storage of captured carbon dioxide emissions in subsurface geologic formations. This VILT course covers all aspects of CCUS including transport, storage and monitoring, economics and community engagement. It explores in detail the challenges of the current technology of geological storage, monitoring and verification including examples from working projects around the world. Many of these technologies are commonly employed by the petroleum industry. Successful deployment of CCUS will also require economic incentives, appropriate regulation, clarity on liability issues and acceptance by the community. These aspects of CCUS, and the corresponding opportunities for appropriately skilled organisations and individuals also will be discussed. Course Content at a Glance Context for CCS/CCUS as An Emissions-reduction Measure Principles of Geological Storage Finding Geological Storage Sites Stationary Sources of Carbon Dioxide for Capture Carbon Dioxide Capture Technologies Compression and Transport of Carbon Dioxide Economics of CCS/CCUS Community, Safety, Legal & Regulatory Issues Risk Assessment Training Objectives Upon completion of this VILT course, participants will be able to: Identify the need for Carbon Capture and Storage (CCS) Outline the key steps in the Carbon Capture and Storage process Distinguish between reservoir rocks and sealing rocks Describe the importance of permeability and porosity to storing carbon dioxide Contrast the geological structures and trapping mechanisms for storing carbon dioxide Describe the changes in geologically stored carbon dioxide over time Outline the monitoring techniques employed to ensure the carbon dioxide is safely stored Appreciate the industrial applications of carbon dioxide capture Recognize the scale of industry required for transporting and storing carbon dioxide Describe economic considerations for CCS/CCUS Outline the economic and environmental opportunities and challenges with using carbon dioxide injection in a range of applications Explain the challenges of regulatory frameworks and public acceptance in a CCS/CCUS project Identify potential risks of a CCS/CCUS project Outline the risk assessment and management process Target Audience This VILT course is ideally suited for a technical audience - geoscientists, petroleum and chemical engineers - as well as for economists, regulators, legal staff and managers wishing to learn more about the details of both the technical, regulatory and socio-economic aspects of carbon capture and storage. Participants should have: Experience with oil and gas, coal or other energy projects Basic understanding of the energy industry Course Level Intermediate Trainer Your first expert course leader spent 18 years in the Petroleum Industry before joining academia, in both technical and managerial roles with Shell, Arco and Vico. He has received numerous awards, including Distinguished Service, Honorary member and Special Commendation awards from the American Association of Petroleum Geologist (AAPG) and was AAPG's International Vice-President and recently chairman of AAPG's House of Delegates (the Associations Parliamentary body). He is an SPE Distinguished Lecturer (DL) and has served as DL for several other professional organisations, including, AAPG, IPA and PESA. He is currently a Professor of Petroleum Geology and Engineering at the Australian School of Petroleum, University of Adelaide. He holds the South Australia State Chair in Carbon Capture & Storage (CCS) and is also presently Distinguished Scientist of the Cooperative Research Centre for Greenhouse Gas Technologies (CO2CRC), having served earlier as the Storage Program Manager and Chief Scientist. Your second expert course leader has a wide and deep knowledge of major capture technologies: solvent, membrane and adsorption based technologies and has developed pathways for retrofitting CO2 capture and storage (CCS) to fossil fuel-based power plants. He has been actively engaged in Post-combustion capture project management and demonstration projects in Victoria's Latrobe Valley on CO2 capture and hydrogen production, and on CO2 capture using membrane contactor technology. He has led various feasibility studies for the Asian Development Bank on CO2 Capture at Indian Oil Corporation's refineries, for JPOWER on hydrogen production from Victorian brown coal and for Kawasaki on incorporation of CCS in hydrogen production from fossil fuel. He has authored multiple peer reviewed journal articles, co-authored various confidential reports on CO2 capture, utilization and hydrogen production and utility, and has presented his work at various conferences, symposiums and seminars. He has a PhD in Chemical Engineering from Monash University Australia and a Master of Technology in Process Engineering from Indian Institute of Technology Delhi India. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations
Better Business Cases™ Foundation and Practitioner: In-House Training Using this best-practice approach will allow organizations to reduce unnecessary spending and improve the decision-making process which gives you a greater chance of securing necessary funding and support for initiatives. The goal of the combined foundation and practitioner course is to develop a candidate's ability to deliver a comprehensive business case through encouraging expanded knowledge to guide the practical application of theoretical foundations. Upon the completion of this course, a candidate will be able to start applying the model to a real business case development project. The outline presented in the course overview will be addressed in the first 2 days, with the Foundation exam conducted on the morning of Day 3. Then the topics will be revisited at a deeper level, for 2 more days, with the Practitioner exam conducted on the afternoon of Day 5. What you will Learn At the end of this program, you will be able to: Develop the lifecycle of a business case and establish the relationships between the five cases Apply the steps in the business case development framework, in order to support the production of a business case, using the Five Case Model, for a given scenario. Overview of Better Business Cases Alignment with the strategic planning process Importance of the Business Case using the Five Case Model Overview of the Five Case Model Purpose of the key stages in the development of a spending proposal Purpose of a Business Justification Case Business Case Development Process Purpose of project / programme assurance and assurance reviews Responsibility for producing the Business Case Determining the Strategic Context and Undertaking the Strategic Assessment Scoping the Scheme and Preparing the Strategic Outline Case Planning the Scheme and Preparing the Outline Business Case Procuring the Solution and Preparing the Full Business Case Implementation and monitoring Evaluation and feedback Making the Case for Change Agree on the strategic context Determine spending objectives, existing arrangements, and business needs Determine potential business scope and key service requirements Determine benefits, risks, constraints, and dependencies Exploring the Preferred Way Forward Agree on critical success factors Determine long list options and SWOT analysis Recommend a preferred way forward Determining Potential Value for Money Revisit the short list Prepare the economic appraisal for short-listed options Undertake benefits appraisal Undertake risk appraisal Select preferred option and undertake sensitivity analysis Preparing for the Potential Deal Determine the procurement strategy Determine service streams and required outputs Outline potential risk apportionment Outline potential payment mechanisms Ascertain contractual issues and accountancy treatment Ascertaining Affordability and Funding Requirement Prepare the financial model Prepare the financial appraisals Planning for Successful Delivery Plan programme / project management Plan change and contract management Plan benefits realization Plan risk management Plan programme / project assurance and post-project evaluation Procuring the Value for Money Solution Revisit the case for change Revisit the OBC options Detail procurement process and evaluation of best and final offers (BAFOs) Contracting for the Deal Set out the negotiated deal and contractual arrangements Set out the financial implications of the deal Ensuring Successful Delivery Finalize project management arrangements and plans Finalize change management arrangements and plans Finalize benefits realization arrangements and plans Finalize risk management arrangements and plans Finalize contract management arrangements and plans Finalize post-project evaluation arrangements and plans
BGP training course description A detailed study of BGP, from the basics of how it works through to advanced issues such as route reflectors, policy, filtering, route selection and routing registries. The course culminates with a study of an industrial strength BGP template illustrating important issues such as bogon filtering. Practical hands on with routers follow the major sessions to reinforce the theory. A multiple choice exam, leading to the LAIT III certification, is available after the course. The exam consists of 60 questions and lasts 2 hours. What will you learn Connect enterprises to the Internet, and ISPs to each other. Describe how BGP works. List, describe and configure the main BGP attributes. Implement and troubleshoot BGP. Work with route aggregation and calculate CIDR prefixes in seconds. Influence traffic paths with BGP. BGP training course details Who will benefit: Anyone who will be working with BGP. Prerequisites: TCP/IP Foundation for engineers Definitive IP routing for engineers. Duration 5 days BGP training course contents Basic BGP IGPs, EGPs, What's BGP? BGP RIB, in/out process, tables peers, adding routes. Hands on Simple configuration and troubleshooting. The Internet and peering ASs, AS numbers, Internet structure, ISP types, ISP network design, IXs, peering vs. transit, public/ private peering, bi/multi-lateral peering. Hands on AS information gathering. How BGP works Incremental updates, Path vector protocols, BGP protocol stack, the BGP header, message types, NLRI, withdrawn routes, route refresh, route dampening. Hands on More troubleshooting, packet analysis. MBGP and IPv6 Multiprotocol routing, AFI, SAFI, MBGP and multicasts, IPv6, MPLS VPNs. Hands on IPv6 BGPv4 aggregation CIDR, benefits, techniques, shortcuts, configuring BGP aggregation, leaking routes. Hands on Reducing routing table size. BGP path selection BGP attributes, attribute types, route selection order, Local preference, AS prepend, MEDs. Hands on Influencing traffic with BGP. BGP routing policies What is policy? Examples, route filtering, AS filtering, REs, applying preference selectively, peer groups. Hands on Sophisticated policies. RIPE and routing registries RIRs, Allocations, assignments, PI vs. PA. Objects, RPSL, routing registry, Hands on The RIPE database. Automating BGP configuration Automation tools, whois, IRRToolSet, Bogon lists, tracking bogon lists, HTTP, Peering, routing registries, DNS. Communities What is a community? Community names, communities for: peer types and geography. RFC 1998, default communities. Hands on Setting local preference on other routers. Route servers What are route servers? LINX route servers, route server policy control, What are route collectors, Looking glasses. Hands on Setting up and working with a route server. Peer relationships IBGP, EBGP, next hop self, advertising routes into/out of BGP, synchronisation. Hands on IBGP, troubleshooting a large BGP network. Route reflectors and confederations Full mesh IBGP, Route reflectors, RR configuration and design, confederations, migration issues. Hands on RR configuration. BGP architectures Stub vs. transit AS, when to use BGP, multihoming strategies and issues, default routes. Multihop EBGP, load balancing. Hands on Multihoming. BGP security RFC 7454, security steps, BGP TTL security, filters, RPKI, ROAs, rsync, rrdp, validators. A secure BGP template. Hands on RPKI prefix validation.
LINX 3 training course description A detailed study of BGP, from the basics of how it works through to advanced issues such as route reflectors, policy, filtering, route selection and routing registries. The course culminates with a study of an industrial strength BGP template illustrating important issues such as bogon filtering. Practical hands on with routers follow the major sessions to reinforce the theory. A multiple choice exam, leading to the LAIT III certification, is available after the course. The exam consists of 60 questions and lasts 2 hours. What will you learn Connect enterprises to the Internet, and ISPs to each other. Describe how BGP works. List, describe and configure the main BGP attributes. Implement and troubleshoot BGP. Work with route aggregation and calculate CIDR prefixes in seconds. Influence traffic paths with BGP. LINX 3 training course details Who will benefit: Network engineers. Prerequisites: LAIT I and II OR CCNP and take LAIT I and LAIT II exams whilst on this course. Duration 5 days LINX 3 training course contents Basic BGP IGPs, EGPs, What's BGP? BGP RIB, in/out process, tables peers, adding routes. Hands on Simple configuration and troubleshooting. The Internet and peering ASs, AS numbers, Internet structure, ISP types, ISP network design, IXs, peering vs. transit, public/ private peering, bi/multi-lateral peering. Hands on AS information gathering. How BGP works Incremental updates, Path vector protocols, BGP protocol stack, the BGP header, message types, NLRI, withdrawn routes, route refresh, route dampening. Hands on More troubleshooting, packet analysis. MBGP and IPv6 Multiprotocol routing, AFI, SAFI, MBGP and multicasts, IPv6, MPLS VPNs. Hands on IPv6 BGPv4 aggregation CIDR, benefits, techniques, shortcuts, configuring BGP aggregation, leaking routes. Hands on Reducing routing table size. BGP path selection BGP attributes, attribute types, route selection order, Local preference, AS prepend, MEDs. Hands on Influencing traffic with BGP. BGP routing policies What is policy? Examples, route filtering, AS filtering, REs, applying preference selectively, peer groups. Hands on Sophisticated policies. RIPE and routing registries RIRs, Allocations, assignments, PI vs. PA. Objects, RPSL, routing registry, Hands on The RIPE database. Automating BGP configuration Automation tools, whois, IRRToolSet, Bogon lists, tracking bogon lists, HTTP, Peering, routing registries, DNS. Communities What is a community? Community names, communities for: peer types and geography. RFC 1998, default communities. Hands on Setting local preference on other routers. Route servers What are route servers? LINX route servers, route server policy control, What are route collectors, Looking glasses. Hands on Setting up and working with a route server. Peer relationships IBGP, EBGP, next hop self, advertising routes into/out of BGP, synchronisation. Hands on IBGP, troubleshooting a large BGP network. Route reflectors and confederations Full mesh IBGP, Route reflectors, RR configuration and design, confederations, migration issues. Hands on RR configuration. BGP architectures Stub vs. transit AS, when to use BGP, multihoming strategies and issues, default routes. Multihop EBGP, load balancing. Hands on Multihoming. BGP security RFC 7454, security steps, BGP TTL security, filters, RPKI, ROAs, rsync, rrdp, validators. A secure BGP template. Hands on RPKI prefix validation.
CCNA training course description The Implementing and Administering Cisco Solutions (CCNA) course gives you a broad range of fundamental knowledge for all IT careers. Through a combination of lecture, hands-on labs, and self-study, you will learn how to install, operate, configure, and verify basic IPv4 and IPv6 networks. The course covers configuring network components such as switches, routers, and wireless LAN controllers; managing network devices; and identifying basic security threats. It also gives a foundation in network programmability, and software-defined networking What will you learn Install, configure, and operate a small to medium sized network Gain a foundation in the essentials of networking, security, and automation Prepare for the 200-301 CCNA exam, which earns CCNA certification CCNA training course details Who will benefit: Network support help desk technicians involved in the basic installation, operation, and verification of Cisco networks. Anyone seeking CCNA certification. Prerequisites: Introduction to Data communications & networking Duration 5 days CCNA training course content After taking this course, you should be able to: Identify the components of a computer network and describe their basic characteristics. Understand the model of host-to-host communication. Describe the Cisco IOS software. Describe LANs and the role of switches within LANs. Describe Ethernet and describe the operation of switches. Install a switch and perform the initial configuration. Describe the TCP/IP Internet layer, IPv4, its addressing scheme, and subnetting. Describe the TCP/IP Transport and Application layers Explore functions of routing. Implement basic configuration on a Cisco router. Explain host-to-host comms across switches and routers. Identify and resolve common switched network issues and common problems associated with IPv4 addressing. Describe IPv6 main features and addresses, and configure and verify basic IPv6 connectivity. Describe static routing. Describe, implement, and verify VLANs and trunks. Describe inter VLAN routing. Explain the basics of dynamic routing protocols and describe components and terms of OSPF. Explain how STP and RSTP work. Configure link aggregation using EtherChannel. Describe the purpose of Layer 3 redundancy protocols. Describe basic WAN and VPN concepts. Describe the operation of access control lists (ACLs) and their applications in the network. Configure Internet access using DHCP clients and explain and configure NAT on Cisco routers. Describe basic QoS concepts. Describe the concepts of wireless networks, which types of wireless networks can be built, and how to use Wireless LAN Controllers (WLCs). Describe network and device architectures, introduce virtualization, network programmability and SDN and describe smart network management solutions such as Cisco DNA Centerâ¢, SD-Access, and SD-WAN. Configure basic IOS system monitoring tools. Describe the management of Cisco devices. Describe the current security threat landscape. Describe threat defence technologies. Implement a basic security configuration of the device management plane. Implement basic steps to harden network devices. Detailed course outline Exploring the Functions of Networking. The Host-to-Host Communications Model. Operating Cisco IOS Software. Introducing LANs. Exploring the TCP/IP Link Layer. Starting a Switch. The TCP/IP IP layer, IPv4 Addressing, and Subnets. The TCP/IP Transport Layer and Application Layer. Exploring the Functions of Routing. Configuring a Cisco Router. Exploring the Packet Delivery Process. Troubleshooting a Simple Network. Introducing Basic IPv6. Configuring Static Routing. Implementing VLANs and Trunks. Routing Between VLANs. Introducing OSPF. Redundant Switched Topologies with EtherChannel. Explaining Basics of ACL. Enabling Internet Connectivity. Explaining the Evolution of Intelligent Networks. Introducing System Monitoring. Managing Cisco Devices. Securing Administrative Access. Implementing Device Hardening. Self-Study: Building Redundant Switched Topologies. Exploring Layer 3 Redundancy. Introducing WAN Technologies. Introducing QoS. Explaining Wireless Fundamentals. Introducing Architectures and Virtualization. Examining the Security Threat Landscape. Threat Defense Technologies.