• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

31599 TEC courses

Coiled Tubing Operations – Equipment, Applications, Well Control, Safety & Emerging Technologies

By EnergyEdge - Training for a Sustainable Energy Future

Dive into the world of coiled tubing operations, equipment, well control, safety, and emerging technologies with EnergyEdge's comprehensive classroom training course. Enroll now to stay ahead.

Coiled Tubing Operations – Equipment, Applications, Well Control, Safety & Emerging Technologies
Delivered In-PersonFlexible Dates
£2,799 to £2,999

Network management technologies

5.0(3)

By Systems & Network Training

Network management technologies course description A comprehensive tour of the available network management technologies available for todays networks. The course starts with basic tools such as syslog along with Python network automation. SNMP is then covered with the *flow technologies and streaming telemetry. Configuration management with ansible, Python, NETCONF and RESTCONF is then studied. The final part of the course looks at SDN. Hands on sessions are used throughout to reinforce the theory rather than teach specific manufacturer equipment. Note that sections are available as individual courses. What will you learn Evaluate network management technologies. Evaluate network management technologies. Recognise the weaknesses of SNMP versus NETCONF and streaming telemetry. Explain the role of NETCONF and RESTCONF. Compare & contrast *flow and streaming telemetry. Explain the role of SDN in network management. Automate network configuration with ansible and Python. Network management technologies course details Who will benefit: Those wishing to manage networks. (Previous Python experience is NOT needed) Prerequisites: Intro to data comms Duration 5 days Network management technologies course content Basic network management Network management What is network management? Benefits, issues. FCAPS model. Fault management, Configuration management, accounting, performance, security. What to manage, what not to manage. Managing network devices, managing servers. Monitoring networks Traditional network tools Ping..., SSH, syslog, TFTP for configurations. nmap. Wireshark. CLI. Web based management. Splunk. Nessus, snort, Kali. Hands on syslog, network inventories. Network automation using the CLI Programming and automating networks, netOps. Python, Git. Python network modules, SSH, paramiko, netmiko. EVE-NG. Hands onPython network modules. Structured versus unstructured data Problems with automation and unstructured data. XML, JSON, YAML. The role of YANG. Hands on Parsing data. SNMP SNMP architecture, SNMP MIBs, SMI, the SNMP protocol, polling security. Configuring SNMP. SNMPv1, v2, v3, SNMP security. Which version should you use? MIBs and MIB structure. mib-2, extra parts of mib-2, Private enterprise MIBs. Summary: What SNMP is good/bad at. Hands on Configuring agents and a NMS. MIB browsing. Server management Microsoft, Linux, application polling. WMI vs SNMP. Hands on: Application polling. Performance management *flow Polling, push vs pull, netflow, sflow, IPFIX, *flow. Flows. Where to monitor traffic. Comparing *flow with SNMP. Architecture: Generators and collectors. When flows are exported. NetFlow reporting products. SolarWinds. Hands on Netflow configuration. Collectors. Streaming telemetry Model driven telemetry, periodic/on change. Structured data. Telemetry protocol stack. gRPC and gNMI. Protobuf. gNMI operations. Telemetry architecture. Telegraf, databases, Grafana. Hands on Telemetry example. Configuration management Configuration management tools Chef, puppet, ansible, saltstack. Ansible architecture, controlling machines, nodes, agentless, SSH, modules. Inventories, playbooks, modules, network modules, jinja2 templates. Hands on Network configuration with ansible. NETCONF What is NETCONF? Protocol stack, Data stores, traffic flows, validating configurations, rollback. YANG data models and how YANG is used by NETCONF. XML. Explorers and other tools. Hands on anx, Python and NETCONF. RESTCONF The REST API, HTTP, What is RESTCONF? Tools including Postman. Comparison with NETCONF. Hands on Configuration with RESTCONF. Python network automation: configuration SSH issues. Using structured data. Jinja2. ncclient, requests, NAPALM, Nornir. Automated testing. Hands on Python network device configuration with nornir. Software Defined Networks and orchestration Classic SDN What is SDN? benefits. SDN architecture. SDN applications, SDN switches, SDN controllers, Network Operating Systems. Control plane, data plane. Northbound interfaces. SDN components. Southbound interfaces. OpenFlow. ONF, OpenFlow ports, Flow tables. Network virtualization Virtual networks, virtual switches, NfV. Service chaining. NfV and SDN. SDN implementations Classic SDN, Hybrid SDN, SDN via APIs, SDN via overlays. Data centre SDN, VXLAN, Service Provider SDN, SD WAN, Enterprise SDN, WiFi. SDN and open source OpenDaylight, OpenVSwitch, Open Networking Forum, Open Network Operating System. Hands onOpenStack. SD-WAN What is SD-WAN? Architecture: Edge, gateway, orchestrator, controller. Overlay and underlay. Use of MPLS, 4G/5G. Benefits and features. Secure Access Service Edge (SASE).

Network management technologies
Delivered in Internationally or OnlineFlexible Dates
£3,697

EV Battery Design and Charger Technology – Understand The Applications Of Sustainable Mobility

By EnergyEdge - Training for a Sustainable Energy Future

Unlock the future of sustainable mobility with EnergyEdge. Explore EV battery design and charger technology in our comprehensive training program. Join now!

EV Battery Design and Charger Technology – Understand The Applications Of Sustainable Mobility
Delivered In-PersonFlexible Dates
£2,399 to £2,499

ISO 14298:2021 Security Printing Management System Lead Auditor Course

5.0(1)

By Cognicert Limited

The "ISO 14298:2021 Lead Auditor Course" integrates the principles of ISO 14298:2021, the International Standard for Security Printing Management, with the methodologies outlined in ISO 19011:2018, the Guidelines for Auditing Management Systems. The course equips participants with the skills and knowledge required to lead security printing audits effectively, ensuring compliance with ISO 14298:2021, and applies the principles of ISO 17011:2017 for conformity assessment bodies. It covers audit planning, execution, and reporting while emphasizing risk management and continual improvement.

ISO 14298:2021 Security Printing Management System Lead Auditor Course
Delivered In-Person in London
£640 to £800

Maldon Business Breakfast - Get Grant Ready!

5.0(1)

By Let’s Do Business Group

Join us for the latest Maldon Business Breakfast, where organisations in the VCSE sector and town and parish councils are invited to come together to share ideas, opportunities, and hear updates that shape our district's future. This event will focus on the number of funding opportunities that the Council supports, including the “Where Quality Of Life Matters” Grant Scheme – an exciting new funding opportunity from Maldon District Council. The scheme is offering grants of £1,000 to £10,000 to help bring your community projects and growth plans to life. Whether you're looking to launch a new service, improve community spaces, invest in green technology, or bring people together, this is your chance to find out how the Council can support your work. ✨Wednesday 27th August 2025 ⏰ 9:00am – 11:00am 📍 Maldon & Tiptree F.C, The Drewitt-Barlow Stadium, Park Drive, Maldon, Essex, CM9 5JQ What to Expect: Overview of the Grant Scheme – what it funds, who can apply, when you can apply and how to align with Council priorities Expert Tips from Phil Ashford – learn how to craft compelling applications and showcase your project’s impact Networking with Local Leaders – connect with councils and community organisations from across Maldon District This session is ideal for: Voluntary and community groups Registered charities and social enterprises Town and Parish Councils Discover how to access funding and support that helps grow not only your organisation, but the wider Maldon community. Spaces are limited, so reserve your place now and see how you can be a part of the shaping a vibrant and inclusive Maldon District. Please note: This grant is only available to organisations based in or primarily serving the residents of the Maldon District

Maldon Business Breakfast - Get Grant Ready!
Delivered In-Person in Maldon
FREE

Heat Press Techniques for Textiles (BARNSLEY)

5.0(5)

By Textiles Skills Centre

An Exciting Practical Face to Face Course working with a heat press, for anyone wanting to learn new textile skills and techniques.

Heat Press Techniques for Textiles (BARNSLEY)
Delivered In-Person in Barnsley
£215

EC-Council Certified Cybersecurity Technician (C|CT)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The C|CT is ideal for anyone looking to start their career in cybersecurity or add a strong foundational understanding of the cybersecurity concepts and techniques required to be effective on the job. The course is especially well suited to: Early-career IT professionals, IT managers, career changers, and career advancers Students and recent graduates Overview After completing this course, you will understand: Key concepts in cybersecurity, including information security and network security Information security threats, vulnerabilities, and attacks The different types of malware Identification, authentication, and authorization Network security controls Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration and asset management) Application security design and testing techniques Fundamentals of virtualization, cloud computing, and cloud security Wireless network fundamentals, wireless encryption, and related security measures Fundamentals of mobile, IoT, and OT devices and related security measures Cryptography and public-key infrastructure Data security controls, data backup and retention methods, and data loss prevention techniques Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic The incident handling and response process Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation Concepts in business continuity and disaster recovery Risk management concepts, phases, and frameworks EC-Council?s C|CT certification immerses students in well-constructed knowledge transfer. Training is accompanied by critical thinking challenges and immersive lab experiences that allow candidates to apply their knowledge and move into the skill development phase in the class itself. Upon completing the program, C|CT-certified professionals will have a strong foundation in cybersecurity principles and techniques as well as hands-on exposure to the tasks required in real-world jobs. Course Outline Information Security Threats and Vulnerabilities Information Security Attacks Network Security Fundamentals Identification, Authentication, and Authorization Network Security Controls: Administrative Controls Network Security Controls: Physical Controls Network Security Controls: Technical Controls Network Security Assessment Techniques and Tools Application Security Virtualization and Cloud Computing Wireless Network Security Mobile Device Security Internet of Things (IoT) and Operational Technology (OT) Security Cryptography Data Security Network Troubleshooting Network Traffic Monitoring Network Log Monitoring and Analysis Incident Response Computer Forensics Business Continuity and Disaster Recovery Risk Management

EC-Council Certified Cybersecurity Technician (C|CT)
Delivered OnlineFlexible Dates
£3,495

Negotiation Skills and Techniques for Engineers and Technical Professionals

By EnergyEdge - Training for a Sustainable Energy Future

Develop essential negotiation skills with EnergyEdge's course tailored for engineers and technical professionals. Enroll in our classroom training now!

Negotiation Skills and Techniques for Engineers and Technical Professionals
Delivered In-PersonFlexible Dates
£2,099 to £2,299

Permanent Makeup Laser Removal | N-Light-10 Laser Only

By ID Liner | Permanent Makeup Training & Supplies

HIGHLY SOUGHT-AFTER AND ALREADY AN EXTREMELY LUCRATIVE INDUSTRY, LASER TATTOO REMOVAL IS SET TO BE THE BIGGEST BEAUTY TREND OF 2023!

Permanent Makeup Laser Removal | N-Light-10 Laser Only
Delivered In-PersonFlexible Dates
£8,000

Permanent Makeup Laser Removal - Small Group Training - N-Light-10 Laser

By ID Liner | Permanent Makeup Training & Supplies

HIGHLY SOUGHT-AFTER AND ALREADY AN EXTREMELY LUCRATIVE INDUSTRY, LASER TATTOO REMOVAL IS SET TO BE THE BIGGEST BEAUTY TREND OF 2023!

Permanent Makeup Laser Removal - Small Group Training -         N-Light-10 Laser
Delivered In-PersonFlexible Dates
£8,000