LTE Backhaul training course description This course provides a concise insight into the LTE backhaul. Key parts of the course are detailed looks at the transport of messages and the S1 and X2 protocols. What will you learn Describe the overall architecture of LTE. Explain how data and signalling messages are transported in LTE. Describe the S1 protocol. Describe the X2 protocol. LTE Backhaul training course details Who will benefit: Anyone working with LTE. Prerequisites: Mobile communications demystified Duration 2 days LTE Backhaul training course contents Introduction In the first section of the course, we review LTE and its hardware and software architecture. Requirements and key features of LTE. LTE Architecture and capabilities of the UE. Architecture of the E-UTRAN, functions of the eNB. EPC architecture, and functions of the MME, SGW, PGW and PCRF. System interfaces and protocol stacks. Example information flows. Dedicated and default bearers. EMM, ECM and RRC state diagrams. Architecture of the radio access network In this section, we look in more detail at the architecture of the evolved UMTS terrestrial radio access network (E-UTRAN). Logical and physical architecture of the E-UTRAN. Numbering, addressing and identification. E-UTRAN functions. E-UTRAN protocol stacks. Timing and frequency synchronisation in LTE. Transport of data and signalling in LTE Here, we look in more detail at the techniques and protocols that are used to transport data and signalling messages across the evolved UMTS terrestrial radio access network and the evolved packet core. Quality of service in LTE. The GPRS tunnelling protocol. Differentiated services Multi-protocol label switching (MPLS). The stream control transmission protocol (SCTP). The S1 application protocol This section gives a detailed account of the signalling procedures in the S1 application protocol, which the MME uses to control the operation of the eNB. The material looks at the procedures, messages and information elements, and relates them to the system-level procedures in which they are used. S1 setup procedure. UE context management procedures. Non access stratum information transport. Procedures for managing the evolved radio access bearer (E-RAB). Paging procedures. Mobility management procedures for S1-based handovers. Procedures in support of self-optimising networks. The X2 application protocol This section gives a detailed account of the signalling procedures in the X2 application protocol, which is used for peer-to-peer communication between eNBs. The material looks at the procedures, messages and information elements, and relates them to the system-level procedures in which they are used. X2 setup procedure. Mobility management procedures for X2-based handovers Procedures in support of self-optimising networks. High level system operation In the final section, we bring our discussions of the S1 and X2 application protocols together by reviewing the system-level operation of LTE. Attach procedure. Transitions between the states of RRC Idle and RRC Connected. Tracking area updates in RRC Idle. Handover procedures in RRC Connected.
CCNA training course description The Implementing and Administering Cisco Solutions (CCNA) course gives you a broad range of fundamental knowledge for all IT careers. Through a combination of lecture, hands-on labs, and self-study, you will learn how to install, operate, configure, and verify basic IPv4 and IPv6 networks. The course covers configuring network components such as switches, routers, and wireless LAN controllers; managing network devices; and identifying basic security threats. It also gives a foundation in network programmability, and software-defined networking What will you learn Install, configure, and operate a small to medium sized network Gain a foundation in the essentials of networking, security, and automation Prepare for the 200-301 CCNA exam, which earns CCNA certification CCNA training course details Who will benefit: Network support help desk technicians involved in the basic installation, operation, and verification of Cisco networks. Anyone seeking CCNA certification. Prerequisites: Introduction to Data communications & networking Duration 5 days CCNA training course content After taking this course, you should be able to: Identify the components of a computer network and describe their basic characteristics. Understand the model of host-to-host communication. Describe the Cisco IOS software. Describe LANs and the role of switches within LANs. Describe Ethernet and describe the operation of switches. Install a switch and perform the initial configuration. Describe the TCP/IP Internet layer, IPv4, its addressing scheme, and subnetting. Describe the TCP/IP Transport and Application layers Explore functions of routing. Implement basic configuration on a Cisco router. Explain host-to-host comms across switches and routers. Identify and resolve common switched network issues and common problems associated with IPv4 addressing. Describe IPv6 main features and addresses, and configure and verify basic IPv6 connectivity. Describe static routing. Describe, implement, and verify VLANs and trunks. Describe inter VLAN routing. Explain the basics of dynamic routing protocols and describe components and terms of OSPF. Explain how STP and RSTP work. Configure link aggregation using EtherChannel. Describe the purpose of Layer 3 redundancy protocols. Describe basic WAN and VPN concepts. Describe the operation of access control lists (ACLs) and their applications in the network. Configure Internet access using DHCP clients and explain and configure NAT on Cisco routers. Describe basic QoS concepts. Describe the concepts of wireless networks, which types of wireless networks can be built, and how to use Wireless LAN Controllers (WLCs). Describe network and device architectures, introduce virtualization, network programmability and SDN and describe smart network management solutions such as Cisco DNA Centerâ¢, SD-Access, and SD-WAN. Configure basic IOS system monitoring tools. Describe the management of Cisco devices. Describe the current security threat landscape. Describe threat defence technologies. Implement a basic security configuration of the device management plane. Implement basic steps to harden network devices. Detailed course outline Exploring the Functions of Networking. The Host-to-Host Communications Model. Operating Cisco IOS Software. Introducing LANs. Exploring the TCP/IP Link Layer. Starting a Switch. The TCP/IP IP layer, IPv4 Addressing, and Subnets. The TCP/IP Transport Layer and Application Layer. Exploring the Functions of Routing. Configuring a Cisco Router. Exploring the Packet Delivery Process. Troubleshooting a Simple Network. Introducing Basic IPv6. Configuring Static Routing. Implementing VLANs and Trunks. Routing Between VLANs. Introducing OSPF. Redundant Switched Topologies with EtherChannel. Explaining Basics of ACL. Enabling Internet Connectivity. Explaining the Evolution of Intelligent Networks. Introducing System Monitoring. Managing Cisco Devices. Securing Administrative Access. Implementing Device Hardening. Self-Study: Building Redundant Switched Topologies. Exploring Layer 3 Redundancy. Introducing WAN Technologies. Introducing QoS. Explaining Wireless Fundamentals. Introducing Architectures and Virtualization. Examining the Security Threat Landscape. Threat Defense Technologies.
Strategic Thinking (In-Person) The goal of this course is to provide you with the building blocks and the motivation to develop the critical skill of strategic thinking. The participants will consider a four-part model that distinguishes strategic thinking from strategic planning and managing. With that understanding, you will investigate the critical components of strategic thinking and how to apply it effectively. What You Will Learn You will learn how to: Define strategic thinking and distinguish it from strategic planning and management Explain a high-level approach to gaining strategic thinking skills Integrate other interpersonal skills, such as self-awareness, systems thinking, leadership, constructive conflict, and collaboration, into the fabric of strategic thinking skills Select appropriate techniques to apply strategic thinking in specific situations Recognize and emulate effective strategic thinking behaviors Getting Started Introductions Course structure Course goals and objectives Foundation Concepts Interactive event: Define Strategic Thinking (ST) Interactive event: Discuss relationship of ST with Strategic Planning, Management and Decision Making Strategic Level Framework - Tying it all together Strategic thinking attributes Strategic Thinking Critical Success Factors Strategic Thinking Critical Success Factors - 5-part model Strategic Thinking and the Organization Critical Success Factors Model applied to an organization Tools Introduction (5): Environmental, 5 Forces, SWOT, Value Proposition, Integral Theory of Worldview Video: Fog of War Strategic Thinking and the Individual Critical Success Factors Model applied to an individual Tools Introduction (5): Thinking Styles, Six Thinking Hats, Reverse Thinking, Systems Thinking, Integral Theory of Worldview Strategic Thinking at the Interpersonal and Team Levels Emotional Intelligence - Self Awareness and Working With Others Team Leadership and Trust Constructive Conflict as the Gateway to Collaboration Interactive event: Testing the Models - Challenge Perspective; What's Missing Applying the critical skill of Strategic Thinking Worldview: Team versus client Trusted Advisor Interactive event: Doing what is asked (Case study, wherein participants review the default case scenario prepared for this workshop and add specific details to make the scenario more relevant to their experiences / needs. Teams develop an action plan for applying ST concepts and techniques they have learned here to the situation, then compare and contrast results.)
Management of Portfolios (MoP®) Practitioner: In-House Training In this MoP® Practitioner course, participants will have sufficient knowledge and understanding of how to apply and tailor the MoP guidance and to analyze portfolio data, documentation, and roles in relation to a given situation. MoP helps organizations ensure if the investments are done in the right, change initiatives, and implementing them correctly. This is achieved by: Prioritizing the programs and projects in terms of their contribution to the organization's strategic objectives and overall level of risk Managing the programs and projects consistently to ensure efficient and effective delivery Maximizing the benefit by providing the greatest return from the investment made What you will Learn Define the business case to get senior management approval for portfolio management Plan the implementation of portfolio management Select and adapt MoP principles, practices, and techniques to suit different organizational environments Evaluate examples of MoP information including documents and role descriptions Analyze the solutions adopted in relation to a given scenario Introduction Overview MoP Portfolio Definition Portfolio Management Roles Portfolio Management Documents MoP Practitioner Assignments Portfolio Management Documents Portfolio Delivery How to Implement Practice Exam MoP Practitioner Exam (taken online, after the class has ended)
Live online course with study materials and certificate of completion included Adobe After Effects is recognised as an essential tool for motion graphics and visual effects. Our introductory Adobe After Effects course is designed for those new to post-production techniques, and would like to get the most from this immensely powerful application. Whether you are a motion graphics designer, a web designer, rich media artist or broadcast video editor, this course covers all the techniques you need to successfully start using, or significantly improve your command over, Adobe After Effects. Description Completing this course will enable you to do the following and more: Become familiar with the After Effects workspace Create animations using keyframes Understand keyframe interpolation and velocity Work with the graph editor to fine tune animations Work with Solid, Text and Null layers Work with masks, mattes and track mattes Create Compositions Incorporate video with Photoshop and Illustrator. Use video layering with transfer and blending modes Use Motion Tracker and 3D Camera Tracker Apply and animate Effects Use Colour Correction / Glows + Curves Use filters for special effects Render your final project For the full course content please download the course information pdf listed above. Who is this course for? This workshop is suitable for anyone who wishes to learn Adobe Afer Effects from scratch or wants to improve their existing knowledge of the program. Requirements Attendees should have basic PC or Mac skills. You will need a broadband internet connection to participate in this live online course. Certificates Certificate of completion Digital certificate - Included
Four half-day Leadership modules with mini work placed projects to bring the learning into action in the workplace.
Total IP multicast training course description This training course provides an advanced three day hands on study of IP multicast technology focusing on architectures, applications and protocols. All aspects of IP multicasting are covered including PC, server and switch implementations. Design, configuration, support and troubleshooting are all covered in the course. Hands on sessions are used to reinforce the theory rather than teach specific implementations. What will you learn Design multicast networks. Explain how multicast networks work. Compare and contrast the different multicast routing protocols, such as DVMRP, PIM, MBGP and SSM. Configure PCs, servers, switches and routers for multicasting. Configure multicast routing protocols including: PIM Dense Mode. PIM Sparse Mode BGP SSM Troubleshoot multicast networks. Total IP multicast training course details Who will benefit: Technical staff working with IP multicasts. Prerequisites: TCP/IP Foundation for engineers Duration 3 days Total IP multicast training course contents Introduction What is multicasting? Why multicast? Why not multicast? Multicasting vs. multiple unicasts, Multicasting vs. broadcasts, multicasting applications, the use of unicast addressing for setting up multicast applications, multicast use within standard protocols such as OSPF. hands on Example multicast applications. Addressing Layer two multicast addresses, Class D addresses, mapping layer 3 addresses onto layer 2 multicast addresses. Multicast addresses on NBMAs, scoping multicast traffic, Multicast address blocks, GLOP, IPv6 and multicasting, anycasting. hands on Multicast addressing. Multicast architectures Where the different protocols are used, PC to router, router to router, how switches can get involved. hands on Analysing multicast packets. PC to router Configuring Class D addresses, IGMP, packet formats, queries, reports, maintaining groups, enhancements to IGMP (v2 and v3), Leaving a group, querier elections, hands on Analysing IGMP packets. Switches and multicasting Controlling multicast traffic with switches, VLANS, static bridge table entries, IGMP snooping, CGMP. hands on Configuring switches for multicast environments. Router to router MOSPF, DVMRP, PIM Sparse Mode, PIM Dense Mode, MBGP. hands on Simple router configuration for multicasting. Theory behind multicast routing protocols Distribution trees, source distribution trees, shared trees, core based trees. Reverse path forwarding, Multicast routing protocol types. PIM DM: Flooding, pruning, PIM designated routers, hands on configuring PIM DM. PIM Sparse mode Rendevous points, discovering RPs, hands on Configuring PIM SM, using different protocols for different groups. PIM SM with one RP, using multiple RPs, Auto RP. MBGP Multiprotocol routing, how does MBGP work? How MBGP carries multiple protocol information, MBGP and multicasts, MBGP and IPv6. hands on Configuring MBGP for multicasts. Internet multicasting The internet, ISPs, the MBone, tunnelling, Inter domain multicasting, the role of MBGP, Inter domain problem, MSDP, MSDP operation SSM, PIM-SM and shared trees, SSM, PIM-SSM operation, SSM benefits. hands on MSDP configuration. SSM configuration.
Definitive Segment Routing course description This Segment Routing (SR) training course is a comprehensive program designed to equip network professionals with the knowledge and skills needed to implement and manage SR in modern networking environments. Segment Routing is a cutting-edge network architecture that enhances network flexibility, scalability, and efficiency. This course offers in-depth coverage of SR principles, protocols, and practical implementation techniques. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. What will you learn Explain packet paths when implementing SLB. Explain how Segment Routing works. Explain the relationship between SR and MPLS. Use SR for Traffic Engineering. Troubleshoot Segment Routing. Implement TI-LFA using Segment Routing Definitive Segment Routing course details Who will benefit: This course is ideal for network engineers, architects, and administrators who want to stay up-to-date with the latest networking technologies and enhance their expertise in Segment Routing. Prerequisites: Concise MPLS for engineers Duration 3 days Definitive Segment Routing course contents Introduction to Segment Routing (SR) What is SR? Source based routing, SPRING, history, segments, why SR? SR benefits.SR usage: Traffic Engineering, Shortest path, local protection. Relationship between SR and MPLS, SRv6. Hands on Investigating the base network. Segment Routing architecture SR domains, SR paths, SR segments. Segment types. Segment IDs, combining segments, IGP extensions, control plane components. Hands on Configuring SR, exploring how SR works, Segment Routing protocols SR-MPLS. MPLS label stack operations. Segment Routing Global Block (SRGB). SRLB. IS-IS and OSPF extensions for SR. Prefix segments, adjacency segments. SRGB/IGP interactions. Multidomain SR policies. SPF, Strict SPF. Hands on Analysing IGP SR extension operation. Investigating the SRGB. Segment Routing Traffic Engineering RSVP-TE versus SR-TE. SR policies. Anycast and binding SIDs. SR flexible algorithm flex-algo, Performance measurement delay. Hands on Optimising network paths for various applications. SR integration with 'older' technologies MPLS and LDP integration with SR. Hands on Integration. Topology Independent Loop Free Alternative Classic LFA and IP/MPLS protection mechanisms. TI-LFA protection options. Hands on TI-LFA operation with SR and LDP traffic. Scenarios SDN. Managing SR with SR controllers. Analyse, optimise, automate. Network slicing. BGP peering segments Path Computation Elements, BGP Link State. BGP prefix segments, BGP peer segments. Egress peer engineering. SR enabled VPNs. Hands onBGP segment routing. Troubleshooting Segment Routing IP toolkit: ping and traceroute. MPLS toolkit: MPLS ping, MPLS echo request/reply, MPLS ping, MPLS traceroute and path discovery. Router show commands. Hands on Used throughout the course during exercises. SRv6 Note this is an optional extra day. See our one day SRv6 course for details. IPv6 headers review, routing headers, IPv6 segment, SRv6 segment Identifiers. IPv6 Segment Routing Header. SRH procedures. Hands on Configuring SRv6, Analysing SRv6 operation.
Dive into the essentials of KYC with this comprehensive course. Covering critical aspects such as AML (Anti-Money Laundering), Customer Due Diligence, and UK-specific regulations, this program equips you with the knowledge to navigate industry requirements. Explore methods for executing KYC and AML processes, ensuring compliance, and understanding future trends. Ideal for professionals aiming to enhance their regulatory expertise and safeguard their business operations. Key Features: CPD Certified Free Certificate Developed by Specialist Lifetime Access In this course, learners will understand the basics of Know Your Customer (KYC) and why it's important for businesses. They will learn about Anti-Money Laundering (AML) practices to prevent illegal money activities. The course will teach how to check and verify customer identities through Customer Due Diligence. Learners will explore the specific rules and regulations for KYC, AML, and data privacy in the UK, and understand the requirements industries must follow to comply with these laws. Additionally, the course covers practical methods for conducting KYC and AML checks, and looks at future trends in KYC compliance. By the end of the course, learners will be equipped with the knowledge to help their businesses meet legal standards and protect against financial crimes. Course Curriculum: Module 01: Introduction to KYC. Module 02: AML (Anti-Money Laundering). Module 03: Customer Due Diligence. Module 04: UK Business Regulations: KYC, AML, Data Privacy. Module 05: Regulations to Be Compiled by Industries. Module 06: KYC and AML Methods: Future Compliance Insights. Learning Outcomes: Understand the principles of KYC and its importance in finance. Identify key components of AML regulations and their application. Conduct effective customer due diligence processes according to regulatory standards. Analyse UK-specific KYC, AML, and data privacy laws for compliance. Assess regulatory requirements across various industries for KYC implementation. Explore emerging methods in KYC and AML and their future implications. CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? Financial analysts seeking regulatory compliance knowledge. Compliance officers in banking and financial sectors. Business managers need understanding of KYC and AML practices. Legal professionals advising on financial regulations. Consultants working with financial institutions on regulatory issues. Career path Compliance Analyst Risk Manager Financial Investigator Regulatory Consultant Fraud Prevention Specialist Anti-Money Laundering Officer Certificates Digital certificate Digital certificate - Included Certificate of Completion Digital certificate - Included Will be downloadable when all lectures have been completed.
Jenkins training course description An introduction to Continuous Integration and development (CI/CD) in network automation using Jenkins. The course focusses specifically on the network Devops case of using Jenkins. What will you learn Explain how Jenkins can help with network automation. Configure Jenkins for network Devops. Use Jenkins for network automation. Jenkins training course details Who will benefit: Network engineers. Prerequisites: TCP/IP Foundation Duration 1 day Jenkins training course contents What is Jenkins? DevOps, CI/CD, version control systems, git, automating execution of tasks, Jenkins job, Jenkins pipeline, Jenkins plugins, CI server. Hands on Installing Jenkins. Example pipeline for network automation YAML, GitHub, Jenkins, ansible, network devices. Hands on Investigating a workflow: Auto deploying network configurations. Configuring Jenkins Code repository, build triggers, gerrit and reviews, build environment. A Jenkins job, build step, post build actions, running a Jenkins job, build log, home directory. Hands on Configuring Jenkins. CI using Jenkins Branches, pipeline, git, the git plugin. Hands on A Jenkins job to poll, build and unit test network configurations.