• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

25636 TEC courses delivered Online

STP alternatives

5.0(3)

By Systems & Network Training

STP alternatives training course description The Spanning Tree Protocol (STP) dates from 1985. This course explores the technologies that can be used as an alternative to STP, including FabricPath, SPB and TRILL. What will you learn Explain how STP and RSTP work. Explain how TRILL works. Explain how SPB works. Explain how FabricPath works. STP alternatives training course details Who will benefit: Technical network staff. Prerequisites: Definitive Ethernet switching for engineers Duration 1 day STP alternatives training course contents Introduction Layer 2 versus Layer 3, STP problems: One path, convergence, MAC explosion, STP alternatives. STP 802.1D, how STP works, root bridge, convergence times, single path. RSTP 802.1w, Improvements, convergence times. Link aggregation 802.3ad, Multi system Link aggregation. IS-IS Concepts, Discovery, topology exchange, flooding. Changes for TRILL, FabricPath and SPB. FabricPath Overview, architecture, control plane protocols, DRAP, STP interactions, packet forwarding, configuration. TRILL Concepts, RBridge, TRILL frames, control plane, data plane, learning MAC addresses. SPB 802.1aq, Node ID, Backbone Edge Bridges, Backbone MAC address, customer MACs, I-SID, forwarding database.

STP alternatives
Delivered in Internationally or OnlineFlexible Dates
£2,477

Definitive 802.1X for engineers

5.0(3)

By Systems & Network Training

Definitive 802.1X training course description A hands-on training course concentrating solely on 802.1X. Hands on sessions follow major chapters to reinforce the theory. What will you learn Describe 802.1X. Explain how 802.1X works Configure 802.1X Troubleshoot 802.1X. Definitive 802.1X training course details Who will benefit: Technical network staff. Technical security staff. Prerequisites: SIP for engineers Duration 2 days Definitive 802.1X training course contents Introduction What is 802.1X? Authentication access, 802.3, 802.11. IEEE, 802, 802.1X-2001, 802.1X-2010. Architecture Supplicant, Authenticator, Authentication server, EAP, EAPOL, RADIUS, Diameter. Port configuration 802.1X in a switch environment. Hands on Configuring 802.1X. How it works Controlled ports, uncontrolled ports. Authentication flow chart, Initialisation, initiation, negotiation, authentication. Hands on 802.1X packet analysis. 802.1X and 802.11 WiFi, WiFi security. Hands on 802.1X WiFi port access. EAP Extensible Authentication Protocol, RFC 3748, RFC 5247. EAP methods: Weak, MD5, LEAP, Strong: TTLS, TLS, FAST. Encapsulation: 802.1X, PEAP, RADIUS, Diameter, PPP. 802.1X accounting RADIUS, accounting messages, 802.1X accounting AV pairs. 8021.X and VLANS VLANs, Guest VLAN, restricted VLAN, voice VLAN. Hands on VLAN assignments with 802.1X.

Definitive 802.1X for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

Hardening Cisco Devices

5.0(3)

By Systems & Network Training

Hardening Cisco devices training course description A hands on course focusing on how to lock down Cisco IOS routers and switches. What will you learn Harden Cisco devices. Hardening Cisco devices training course details Who will benefit: Technical network staff. Technical security staff. Prerequisites: TCP/IP foundation for engineers. Duration 5 days Hardening Cisco devices training course content Introduction Router security, Switch security, Cisco IOS, IOS versions, Cisco advisories, the management plane, control plane, data plane. Hands on Checking IOS versions and advisories. Access control Infrastructure ACLs, Transit ACLs. Hands on Restricting access to the device, Filtering data traffic. Management plane: Securing operations Passwords, privilege levels, AAA, TACACS+, RADIUS. Hands on Password management. Management plane: Other general hardening Logging best practices, secure protocols, encrypting management sessions, configuration management. Hands on Hardening the management plane. Control plane Disabling reception and transmission of certain messages, Limiting CPU impact of control plane traffic, securing routing protocols. Hands on Hardening the control plane. Data plane Transit ACLs, disabling unused services, disabling unnecessary protocols, anti spoofing, limiting CPU impact of data plane traffic, identifying and tracing traffic, Netflow, VLANs, port security. Hands on hardening the data plane.

Hardening Cisco Devices
Delivered in Internationally or OnlineFlexible Dates
£2,477

Essential RFID

5.0(3)

By Systems & Network Training

RFID training course description This training course focuses on the technologies used in Radio Frequency Identification (RFID). What will you learn Describe the RFID architecture. Design RFID systems. Evaluate tag types. Recognise common RFID problems. RFID training course details Who will benefit: RFID technologists and system engineers. Prerequisites: RF fundamentals. Duration 2 days RFID training course contents What is RFID? Review of RF basics, what is RFID, RFID history, RFID base system architecture, frequency bands used by RFID, comparison with barcodes. RFID applications Supply chain, asset tracking, theft reduction, retail, access control, tolls. Tags Tag features, types of tag, passive and active, chips, read only, read write, affixing tags, selecting location to affix a tag, tag orientation and location, tag stacking, impact of rate of movement, tag data formats. Interrogators/readers Interrogation zones, interrogator types, antennas, read distance tests, multiple interrogators, synchronisation, dense interrogator environment issues. RFID peripherals. Standards and regulations Global regulatory requirements, regional regulatory requirements, ISO, ETSI, FCC, EPC, safety regulations/issues. Testing and troubleshooting Read rate problems, improperly tagged items, tag failure. RFID system design Antenna types, interference, antenna location and spacing, how many antennas? How many interrogators? tag types, grounding considerations, cabling, site diagrams.

Essential RFID
Delivered in Internationally or OnlineFlexible Dates
£2,477

Session Border Controllers for engineers

5.0(3)

By Systems & Network Training

Session Border Controllers course description A hands on course covering Session Border Controllers with a focus on the technical workings of features commonly found in Session Border Controllers. Hands on practicals follow each major theory session. What will you learn Explain how Session Border Controllers work. Explain the SIP call flow using a SBC. Deploy Session Border Controllers Describe the features found in Session Border Controllers. Session Border Controllers course details Who will benefit: Technical staff working with SIP. Prerequisites: Definitive SIP for engineers Duration 2 days Session Border Controllers course contents SIP review Signalling, media, RTP, SIP, peer to peer, SIP proxies, SIP call flows. Hands on: SIP packet analysis. Session Border Controllers What is a SBC? SBC features, peering scenario, access scenario, NNI SBC, UNI SBC, enterprise SBC. Hands on: SBC call flows SBC topology hiding Header privacy, B2BUA. Hands on: Header analysis. Session control Call admissions, QoS, statistics and billing, redundancy and scalability. Hands on: SBC session control SBC and NAT NAT traversal, STUN, ICE, NAT and SIP, NAT and RTP. Hands on: SBC and NAT traversal. SBC and security DoS, access control, encryption, authentication, toll fraud, regulatory issues, lawful intercept. Hands on: Security. Interoperability mediation Manipulating SIP headers, IMS, IETF, TISPAN, SIP-I. SBC interworking.

Session Border Controllers for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

4G demystified

5.0(3)

By Systems & Network Training

4G training course description This course is designed to give the delegate an understanding of the technologies used within a 3G UMTS mobile network. During the course we will investigate the UMTS air interface and the use of Wideband-Code Division Multiple Access (WCDMA) to facilitate high speed data access, together with HSPA to offer mobile broadband services. We will describe the use of soft handover rather than hard handover procedures and soft capacity sharing. The course includes a brief exploration of the UMTS protocol stack and the use of PDP Context and QoS support features. What will you learn Explain the 3G UMTS architecture. Describe the role of a Drifting & Serving RNC. Explain the use of ARQ & HARQ for mobile broadband. Describe how IMS integrates into the architecture. Describe the use of Media Gateway Controllers. Identify the temporary identities used within 3G UMTS. 4G training course details Who will benefit: Anyone working within the telecommunications area, especially within the mobile environment. Prerequisites: Mobile communications demystified Telecommunications Introduction Duration 2 days 4G training course contents LTE Introduction The path to LTE, 3GPP. LTE to LTE advanced. LTE Architecture The core, Access, roaming. Protocols: User plane, Control plane. Example information flows. Bearer management. Spectrum allocation. LTE technologies Transmission, reception, OFDMA, multiple antenna, MIMO. LTE Air interface Air interface protocol stack. Channels, Resource Grid, cell acquisition. Up and downlink controls. Layer 2 protocols. Cell acquisition Power on, selecting networks and cells. RRC connection. Attach procedure. Mobility management Roaming, RRC_IDLE, RRC_CONNECTED, cell reselection, handover, interoperation with UMTS and GSM networks. Voice and text IMS, QoS, policy and charging.

4G demystified
Delivered in Internationally or OnlineFlexible Dates
£2,477

Essential HSPA and HSPA+

5.0(3)

By Systems & Network Training

HSPA and HSPA+ training course description HSDPA (High Speed Downlink Packet Access) and HSUPA (High Speed Uplink Packet Access) provide speeds of upto 14Mbps downlink and 5Mbps uplink. This theory-based course provides an overview of the 3GPP R5 and R6 HSDPA/HSUPA standards and the technologies which are involved. The HSPA+ R7 enhancements are also covered. What will you learn Explain the relationship between HSPA and UMTS. Describe the benefits of HSPA/HSPA+ Explain the HSPA/HSPA+ technical enhancements. Explain packet flows in HSPA/HSPA+. Recognise the migration issues involved with HSPA/HSPA+ HSPA and HSPA+ training course details Who will benefit: Anyone working with HSPA. Prerequisites: Essential UMTS Duration 2 days HSPA and HSPA+ training course contents UMTS review UMTS architecture, components, interfaces, protocols, W-CDMA, standards, 3GPPr5, 3GPPr6, evolution to HSDPA and HSPA. HSPA basics What is HSDPA, what is HSUPA, key features, system capacities, data rates, delays. Key concepts: Adaptive modulation and coding (AMC), QPSK, 16QAM, HARQ, MAC-hs, multiplexing, subframes. HSPA channels Logical, transport, physical channels, dedicated vs. shared channels, HS-PDSCH, HS-SCCH, HS-DPCCH, code multiplexing, E-DCH, Enhanced DPCCH. MAC-architecture Controlling HS-DSCH, flow control, buffering, priority queues, packet scheduling, fast packet scheduling, Selecting modulation and coding. HARQ: Packet retransmissions, Incremental redundancy, comparison with ARQ, TFRC. MAC-d, MAC-c/sh, MAC-hs, MAC-es, MAC-e. HSPA migration HSDPA in the Radio Access Network (RAN), reuse of existing UMTS components, changes required, Impact on Iub/Iur interfaces, new and modified NBAP procedures, backwards compatibility. Packet flows Packet data session setup, simultaneous voice and data, QoS, TCP flow control, WCDMA packet scheduler, mobility procedures. HSPA phase 2 (3GPP r6) What is evolved HSPA? Speeds. Multiple Input Multiple Output (MIMO). Optional all IP architecture. R8 and LTE.

Essential HSPA and HSPA+
Delivered in Internationally or OnlineFlexible Dates
£2,477

Essential ZigBee for engineers

5.0(3)

By Systems & Network Training

ZigBee training course description A hands on course covering the entire ZigBee protocol stack. ZigBee operation, primitives and frame formats are covered in detail using software tools to test and analyse ZigBee commands and demonstrate how these affect the 802.15.4 MAC. Analysers are used to decode packet formats. What will you learn Describe the ZigBee architecture and applications. Explain the workings of ZigBee protocol stack including the 802.15.4, NWK, APS and ZDO sub layers. Describe in detail the ZigBee primitives and how they are used to pass data; make networks; join networks and repair networks. Secure ZigBee networks. ZigBee training course details Who will benefit: Technical staff requiring grounding in ZigBee including application engineers. Prerequisites: RF fundamentals. Duration 2 days ZigBee training course contents Wireless data overview What is 802.15.4 and ZigBee? WLAN, WPAN, Bluetooth vs. ZigBee. Markets. Applications and architecture. ZigBee demonstration. ZigBee Standards and technology The 7-layer model, IEEE WPAN standards overview, 802.15.4 & ZigBee, ZigBee alliance. ZigBee Protocol stack The ZigBee 5 layer model, The network (NWK) sub layer, Application support sub layer (APS), the ZigBee Device Object (ZDO). 802.15.4 Radio Frequencies, modulation, power, DSSS, BPSK/ O-QPSK, channels, symbols, chips and bit rate. 802.15.4 PHY PHY data transfer primitives. The PHY packet. PHY PIB management. 802.15.4 MAC layer The MAC layer overview, CSMA/CA, addresses, frame types, super frames, MAC layer: Data, Data control, Scan and join, PAN maintenance, MAC PIB. Hands on 802.15.4 frame analysis. ZigBee Topologies Point to point topology, star topology, cluster tree, wired integration. Hands on Building a ZigBee network. ZigBee frame formats General frame format, data frames, command frames. Hands on Analysing ZigBee frames. ZigBee NWK NWK data primitives: Request. Confirm. Indication. NWK management primitives: Network discovery, network formation. Permit joining. Start router. Join. Direct join. Leave. Reset. Sync. NWK database management. Hands on NWK analysis ZigBee APS Address mapping, matching devices, binding devices, binding tables. Hands on APS analysis. ZigBee ZDO Device roles, binding requests, initiating and responding, device discovery, service discovery, network management. ZDO Endpoint 0. ZigBee Security Security issues, security modes, MAC security, NWK security, APS security. Applications Writing ZigBee applications, application profiles, End points, Endpoint addressing, clusters of attributes, broadcasts. Hands on Sample ZigBee application.

Essential ZigBee for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,477

LNG Value Chain & Economics - Optimise Your LNG Projects and Supply Strategies

By EnergyEdge - Training for a Sustainable Energy Future

About this Training Course Liquefied Natural Gas (LNG) has provided intercontinental mobility to natural gas, which now provides about 25% of the global primary energy. Being the cleanest fossil fuel, natural gas/LNG consumption is forecasted to grow in all future scenarios. With the entry of various players, including Trading companies, the LNG value chain is becoming increasingly complex, and a solid understanding of its economics and management of its interfaces have become crucial to identify and assess investment opportunities and risks. Recent market disturbances caused by COVID-19, Oil & Gas price instabilities - coupled with the political (Ukraine/Russia) challenges - make a deep understanding of LNG Value Chain Logistics and Economics even more essential to ensure the security of energy supplies sustainably and profitably. This intermediate level 3 full-day course starts with a concise introduction to the LNG business. Thereafter, the elements of the LNG value chain are described, and their individual economics analysed. A Business Activity Model along the value chain will be developed and discussed in depth, covering the following key processes: 'Buy Gas - Transport Gas - Liquefy Gas - Sell LNG/Products - Ship LNG - Regasify LNG' The integrated chain economics will then be developed and quantified. A hands-on group workshop/exercise developing the economic case of a full-sized Liquefaction project will be carried out, considering the forecasted cash flows throughout the project life, the location of the plant, its markets, project sensitivities and profitability assessment. Participants will be provided with Excel based tools/models (LNG Liquefaction project development Net Present Value (NPV) analyses, Shipping Freight Calculations and Economics) to work through the exercises and also for their future personal use. Training Objectives After the completion of this course, participants will be able to: Understand how the LNG Value Chain operates, bound by the relevant Contracts and Agreements. Learn the basic economic parameters (operating, capital costs, financing, profitability) of each major element of the value chain. Appreciate the complexity of the value chain, and the associated opportunities and risks. Develop quantitative project evaluation skills. Explore options to maximise profitability in a given LNG value chain. Discuss best practices on how to manage, steer and govern these activities. Target Audience Technical, Operational, Shipping, Commercial, Project and Governance professionals who are already active in a specific section of the LNG Value Chain will directly benefit in developing a wider and deeper perspective on how the LNG Value Chain operations and can be optimised. Managers (Technical, Financial, Legal and Governance) less familiar with the specifics of the LNG Industry will also benefit from attending this VILT course, as they will obtain the required background to be able to set sharper targets, suitable performance indicators, and governance and performance assessment guidelines for units engaged in the chain. The course is most relevant for professionals engaged in the LNG industry at: National and International Oil & Gas/Energy Companies LNG Importers/Exporters/Traders/Shippers Government & Regulatory Agencies Finance Institutions It will also apply to the following audience: Business Development Managers Corporate Planning Professionals Project Developers Supply Planners & Scheduling Professionals Regulators Tax & Finance Advisors Compliance Officers Equity Analyst and Bankers Joint Venture Representatives, Board Directors Negotiators and Contracting Staff Trading Professionals Course Level Intermediate Trainer Your expert course leader is an Oil & Gas/LNG professional with more than 35 years of international experience, majority of which was gained at Shell International Joint Ventures engaged in Oil Refining, Supply / Trading, Gas Supply and LNG Businesses in the Netherlands, France, Thailand, Dominican Republic and Nigeria. Since 2004, he has had several roles in the management of the LNG Value Chain including the Commercial Operational Management of Nigeria LNG (NLNG). He played an active role in the start-up and integration of LNG trains 4, 5 and 6 with NLNG becoming the 3rd largest LNG producer in the world in 2007. Commercial operations spanned 4 Gas Supply, 11 LNG Sales & Purchase Agreements, ad-hoc LPG and Condensate Sales and LNG Ship Chartering contracts. Under his supervision, more than 2,000 LNG cargoes were exported. He was part of the organizational transformation of the company from a Project-based set-up to a Production / Commercial based structure and implemented an 'Integrated Planning and Scheduling Department' in which he optimized the value chain (Buy-Gas - Liquify Gas to LNG - Sell - Ship LNG). Staff competence management was one of his focus areas during this period. He was also the NLNG representative on JV Technical, Commercial, Shipping Committees where he interfaced with Government & Regulatory authorities. In 2014, he was appointed as Shell Shareholder representative to NLNG and became a Non-Executive Board member to NLNG companies, including Bonny Gas Transport (BGT) managing 24 LNG Ships. During this period, he was involved in the Economic and Technical steering of the Shipping Fleet and Liquefaction Plant Rejuvenation projects and a further capacity expansion of liquefaction plant which resulted in the achievement of NLNG train 7 project FID in 2019. Since 2016, he has been active as an independent consultant. He co-authored 2 patents and more than 30 published papers/presentations. He holds a PhD from Delft University of Technology in the Netherlands and a MSc and BSc in Chemical Engineering from the University of Birmingham, UK. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

LNG Value Chain & Economics - Optimise Your LNG Projects and Supply Strategies
Delivered in Internationally or OnlineFlexible Dates
£2,751 to £3,199

Certified Information Privacy Technologist (CIPT)

By Training Centre

  The CIPT is the first and only certification of its kind worldwide. It was launched by the IAPP in 2014 and updated in early 2023 to meet the growing need that only tech pros can fill-securing data privacy at all stages of IT product and service lifecycles.  Whether you work in the public or private sector, data privacy skills are quickly becoming a must-have-and that's a great opportunity for you.  The CIPT certification also holds accreditation under ISO 17024: 2012 About This Course   What will you learn?   Critical data protection concepts and practices that impact IT Consumer data protection expectations and responsibility How to bake privacy into early stages of IT products and services for cost control, accuracy and speed-to-market How to establish data protection practices for data collection and transfer How to pre-empt data protection issues in the Internet of Things How to factor data protection into data classification and emerging tech such as cloud computing, facial recognition and surveillance How to communicate data protection issues with partners such as management, development, marketing and legal.   This course has two programmatic modules, the first four areas focus on the fundamentals of data protection. The second module takes the fundamentals and puts it into practice.   MODULE 1: Fundamentals of Information Privacy   Unit 1: Common Principles and Approaches to Privacy This unit includes a brief discussion of the modern history of privacy, an introduction to types of information, an overview of information risk management and a summary of modern privacy principles.   Unit 2: Jurisdiction and Industries This unit introduces the major privacy models employed around the globe and provides an overview of privacy and data protection regulation by jurisdictions and industry sectors.   Unit 3: Information Security: Safeguarding Personal Information This unit presents introductions to information security, including definitions, elements, standards and threats/vulnerabilities, as well as introductions to information security management and governance, including frameworks, controls, cryptography and identity and access management (IAM).   Unit 4: Online Privacy: Using Personal Information on Websites and with Other Internet-related Technologies This unit examines the web as a platform, as well as privacy considerations for sensitive online information, including policies and notices, access, security, authentication and data collection. Additional topics include children's online privacy, email, searches, online marketing and advertising, social media, online assurance, cloud computing and mobile devices.    MODULE 2: Privacy in Technology   Unit 1: Understanding the Need for Privacy in the IT Environment This unit highlights the impact that regulatory activities, security threats, advances in technology and the increasing proliferation of social networks have on IT departments.   Unit 2: Core Privacy Concepts This unit reveals how privacy compliance becomes more attainable through developing information lifecycle plans, data identification and classification systems and data flow diagrams.   Unit 3: Regulations and Standards Impacting Privacy in IT This unit introduces privacy laws, regulations and standards that can help IT professionals design better privacy programmes and systems to handle personal information throughout the data lifecycle.   Unit 4: Privacy in Systems and Applications This unit develops an understanding of the risks inherent in the IT environment and how to address them.   Unit 5: Online Privacy Issues This unit presents information about online threats, threat prevention and the role of IT professionals in ensuring proper handling of user data.   Unit 6: De-identifying and Anonymizing Personally Identifiable Information This unit reveals the importance of personally identifiable information and methods for ensuring its protection.   Unit 7: Cloud Computing This unit evaluates privacy and security concerns associated with cloud services, and standards that exist to advise on their use. Prerequisites   There are no prerequisites for this course but attendees would benefit from a review of the materials on the IAPP site. What's Included?   1 years membership of the IAPP  Refreshments & Lunch (Classroom courses only) Participant Guide Official Study Guides Official Practice Exam Official Q&A The Exam Fees Who Should Attend?   The CIPT credential shows you've got the knowledge to build your organisation's data protection structures from the ground up. With regulators worldwide calling for tech professionals to factor data protection into their products and services, the job market for privacy-trained IT pros has never been stronger. As a result, the CIPT is targeted towards; Data Protection Officers IT Managers and Administrators Records Managers System Developers IT Security specialists Accreditation Our Guarantee   We are an approved IAPP Training Partner. You can learn wherever and whenever you want with our robust classroom and interactive online training courses. Our courses are taught by qualified practitioners with a minimum of 25 years commercial experience. We strive to give our delegates the hands-on experience. Our courses are all-inclusive with no hidden extras.  The one-off cost covers the training, all course materials, and exam voucher. Our aim: To achieve a 100% first time pass rate on all our instructor-led courses. Our Promise: Pass first time or 'train' again for FREE. *FREE training offered for retakes - come back within a year and only pay for the exam.

Certified Information Privacy Technologist (CIPT)
Delivered OnlineFlexible Dates
£1,395