Are you looking to enhance your Content Editor skills? If yes, then you have come to the right place. Our comprehensive course on Content Editor will assist you in producing the best possible outcome by mastering the Content Editor skills. The Content Editor course is for those who want to be successful. In the Content Editor course, you will learn the essential knowledge needed to become well versed in Content Editor. Our Content Editor course starts with the basics of Content Editor and gradually progresses towards advanced topics. Therefore, each lesson of this Content Editor course is intuitive and easy to understand. Why would you choose the Content Editor course from Compliance Central: Lifetime access to Content Editor course materials Full tutor support is available from Monday to Friday with the Content Editor course Learn Content Editor skills at your own pace from the comfort of your home Gain a complete understanding of Content Editor course Accessible, informative Content Editor learning modules designed by experts Get 24/7 help or advice from our email and live chat teams with the Content Editor Study Content Editor in your own time through your computer, tablet or mobile device. A 100% learning satisfaction guarantee with your Content Editor Course Content Editor Curriculum Breakdown of the Content Editor Course Module 01: Introduction to Copyediting Module 02: Primary Copyediting Procedures Module 03: Checking the Written Copy Module 04: Resources Required for a Copyeditor Module 05: Setting and Using a Style Sheet Module 06: Legal Aspects of Copyediting Module 07: Getting a Job and Career Progression Module 08: Introduction to Proofreading Module 09: The Workflow of a Proofreader Module 10: Proofreading Marks and Symbols Module 11: What to Look For During Proofreading Module 12: Basics of Grammar Module 13: Basics of Sentence Module 14: Structure of Sentence Module 15: Capitalisation and Punctuation Rules Module 16: Spelling Rules Module 17: Checking Commonly Confused Words Module 18: Professional Proofreading CPD 10 CPD hours / points Accredited by CPD Quality Standards Who is this course for? The Content Editor course helps aspiring professionals who want to obtain the knowledge and familiarise themselves with the skillsets to pursue a career in Content Editor. It is also great for professionals who are already working in Content Editor and want to get promoted at work. Requirements To enrol in this Content Editor course, all you need is a basic understanding of the English Language and an internet connection. Career path The Content Editor course will enhance your knowledge and improve your confidence. Content Editor: £25,000 to £45,000 per year Copy Editor: £22,000 to £40,000 per year Proofreader: £20,000 to £35,000 per year Editorial Assistant: £18,000 to £28,000 per year Content Manager: £30,000 to £55,000 per year Publishing Editor: £25,000 to £45,000 per year Certificates CPD Accredited PDF Certificate Digital certificate - Included CPD Accredited PDF Certificate CPD Accredited Hard Copy Certificate Hard copy certificate - £10.79 CPD Accredited Hard Copy Certificate Delivery Charge: Inside the UK: Free Outside of the UK: £9.99 each
Child Sexual Exploitation Child Sexual Exploitation (CSE) and Child Criminal Exploitation (CCE) are serious issues that anyone who works with children, young people, or families should be aware of. Our Child Sexual Exploitation course helps practitioners understand the complexities of child exploitation issues, such as who is most at risk, how children become involved, signs of exploitation, and why young people respond the way they do. The Child Sexual Exploitation course also covers best practices for responding to concerns and making referrals to social care. Courses are including in this Child Sexual Exploitation course: Course 01: Child Sexual Exploitation & Child Criminal Exploitation (CSE & CCE) Course 02: Level 2 Certificate in Understanding Domestic Abuse Course 03: Level 2 Certificate in Understanding Safeguarding and Prevent Course 04: Diploma in Counselling and Psychology Course 05: Level 2 Certificate in Understanding Mental Health in the Early Years [Note: Free PDF certificate will provide as soon as completing the Child Sexual Exploitation course] Course Curriculum ofChild Sexual Exploitation Module 01: An Overview of CSE and CCE Module 02: CSE: Risk Factors, Warning Signs, and Consequences Module 03: A Closer Look to CCE Module 04: Best Practice for Responding to Concerns Assessment Method of Child Sexual Exploitation After completing each module of the Child Sexual Exploitation Course, you will find automated MCQ quizzes. To unlock the next module, you need to complete the quiz task and get at least 60% marks. Certification of Child Sexual Exploitation After completing the MCQ/Assignment assessment for this Child Sexual Exploitation course, you will be entitled to a Certificate of Completion from Training Tale. The certificate is in PDF format, which is completely free to download. A printed version is also available upon request. It will also be sent to you through a courier for £13.99. Who is this course for? Child Sexual Exploitation This Child Sexual Exploitation course is ideal for anyone who works with children, young people and/or families. Requirements Child Sexual Exploitation There are no specific requirements for Child Sexual Exploitation course because it does not require any advanced knowledge or skills. Certificates Certificate of completion Digital certificate - Included
Identifying learning and training needs, designing and sourcing training and learning solutions, delivering and evaluating training.
Child Sexual Exploitation & Child Criminal Exploitation (CSE & CCE) Do you want to delve deeper into the intriguing fields of Child Sexual Exploitation & Child Criminal Exploitation (CSE & CCE)? we have designed a special solution for you to make you aware and provide knowledge about Child Sexual Exploitation & Child Criminal Exploitation (CSE & CCE). By attending our Child Sexual Exploitation & Child Criminal Exploitation (CSE & CCE) course, practitioners will have a deeper understanding of the complexities surrounding child exploitation problems. This Child Sexual Exploitation & Child Criminal Exploitation (CSE & CCE) course, will cover the risk factors and the role of children. A number of exploitation warning signs are also explained in this Child Sexual Exploitation & Child Criminal Exploitation (CSE & CCE) course. The reasoning behind young people's reactions to them is also explained in Child Sexual Exploitation & Child Criminal Exploitation (CSE & CCE). Best practices for handling problems and directing pupils to social services are described in our Child Sexual Exploitation & Child Criminal Exploitation (CSE & CCE) course. Join this Child Sexual Exploitation & Child Criminal Exploitation (CSE & CCE) course to realize all that you can achieve! Learning Outcome of this Child Sexual Exploitation & Child Criminal Exploitation (CSE & CCE) Course After completing the Child Sexual Exploitation & Child Criminal Exploitation (CSE & CCE) course, learners will know about: A clear overview of CSE and CCE from this Child Sexual Exploitation & Child Criminal Exploitation (CSE & CCE) course. This Child Sexual Exploitation & Child Criminal Exploitation (CSE & CCE) course also describes risk factors, warning signs, and consequences. The in-depth information about CCE, you will get from the Child Sexual Exploitation & Child Criminal Exploitation (CSE & CCE) course. Overall this Child Sexual Exploitation & Child Criminal Exploitation (CSE & CCE) course will help to acquire the best practices for the concerns. Special Offers of this Child Sexual Exploitation & Child Criminal Exploitation (CSE & CCE) Course This Child Sexual Exploitation & Child Criminal Exploitation (CSE & CCE) Course includes a FREE PDF Certificate. Lifetime access to this Child Sexual Exploitation & Child Criminal Exploitation (CSE & CCE) Course Instant access to this Child Sexual Exploitation & Child Criminal Exploitation (CSE & CCE) Course Get FREE Tutor Support from Monday to Friday in this Child Sexual Exploitation & Child Criminal Exploitation (CSE & CCE) Course Main Course: Child Sexual Exploitation & Child Criminal Exploitation (CSE & CCE) Course Free Courses Course 01: Speech & Language Therapy Course 02: Level 4 Early Years Course [Note: Free PDF certificate as soon as completing the Child Sexual Exploitation & Child Criminal Exploitation (CSE & CCE) course] Child Sexual Exploitation & Child Criminal Exploitation (CSE & CCE) Industry Experts Designed this Child Sexual Exploitation & Child Criminal Exploitation (CSE & CCE)Course into 04 detailed modules. Course Curriculum of Child Sexual Exploitation & Child Criminal Exploitation (CSE & CCE) Module 01: An Overview of CSE and CCE Module 02: CSE: Risk Factors, Warning Signs, and Consequences Module 03: A Closer Look to CCE Module 04: Best Practice for Responding to Concerns Assessment Method of Child Sexual Exploitation & Child Criminal Exploitation (CSE & CCE) After completing each module of the Child Sexual Exploitation & Child Criminal Exploitation Course, you will find automated MCQ quizzes. To unlock the next module, you need to complete the quiz task and get at least 60% marks. Certification of Child Sexual Exploitation & Child Criminal Exploitation (CSE & CCE) After completing the MCQ/Assignment assessment for this Child Sexual Exploitation & Child Criminal Exploitation course, you will be entitled to a Certificate of Completion from Training Tale. Who is this course for? Child Sexual Exploitation & Child Criminal Exploitation (CSE & CCE) This Child Sexual Exploitation & Child Criminal Exploitation: Child Sexual Exploitation & Child Criminal Exploitation (CSE & CCE) course is very beneficial for anybody who works with children, adolescents, or families. Requirements Child Sexual Exploitation & Child Criminal Exploitation (CSE & CCE) Students who intend to enroll in this Child Sexual Exploitation & Child Criminal Exploitation: Child Sexual Exploitation & Child Criminal Exploitation (CSE & CCE) course must meet the following requirements: Child Sexual Exploitation: Good command of the English language Child Sexual Exploitation: Must be vivacious and self-driven. Child Sexual Exploitation: Basic computer knowledge Child Sexual Exploitation: A minimum of 16 years of age is required. Career path Child Sexual Exploitation & Child Criminal Exploitation: Child Sexual Exploitation & Child Criminal Exploitation (CSE & CCE) Start a lucrative career in the rapidly expanding Child Sexual Exploitation & Child Criminal Exploitation (CSE & CCE) field with the aid of this in-depth training. Certificates Certificate of completion Digital certificate - Included
Duration 5 Days 30 CPD hours This course is intended for This is an introductory-level systems administration course geared for Systems Administrators and users who wish to learn how to how to install, configure and maintain an Enterprise Linux system in a networked environment. Overview This course is about 50% lab to lecture ratio, combining expert instructor-led discussions with practical hands-on skills that emphasize current techniques, best practices and standards. Working in this hands-on lab environment, guided by our expert practitioner, attendees will explore Installing the Linux operating system and configuring peripherals Performing and modifying startup and shutdown processes Configuring and maintaining basic networking services Creating and maintaining system users and groups Understanding and administering file permissions on directories and regular files Planning and creating disk partitions and file systems Performing maintenance on file systems Identifying and managing Linux processes Automating tasks with cron Performing backups and restoration of files Working with system log files Troubleshooting system problems Analyzing and taking measures to increase system performance Configuring file sharing with NFS Configuring Samba for file sharing with the Windows clients Setting up a basic Web server Understanding the components for setting up a LAMP server Implementing basic security measures Linux System Administration is a comprehensive hands-on course that teaches students how to install, configure and maintain an Enterprise Linux system in a networked environment. This lab-intensive class explores core administrative tasks such as: creating and managing users, creating and maintaining file systems, determining and implementing security measures and performing software installation and package management. Linux networking topics include installing and supporting SSH, NFS, Samba and the Apache Web server. Students will explore common security issues, as well as several tools, such as the PAM modules that help secure the operating system and network environment. Upon successful completion of this course, students will be prepared to maintain Linux systems in a networked business environment. Although the course includes installing and configuring a CentOS 7 / RHEL 7 Linux system, much of the course content also applies to Oracle, Ubuntu, Scientific and other current versions of mainstream Linux distributions. Labs include user and group maintenance, system backups and restoration, software management, administration tasks automation, file system creation and maintenance, managing remote access, working with cron, and configuring basic file sharing and Web services, as well as working with system logging utilities such as rsyslog and much more. System Administration Overview UNIX, Linux and Open Source Duties of the System Administrator Superusers and the Root Login Sharing Superuser Privileges with Others (su and sudo Commands) TCP/IP Networking Fundamentals Online Help Installation and Configuration Planning: Hardware and Software Considerations Site Planning Installation Methods and Types Installation Classes Partitions Logical Volume Manager - LVM File System Overview Swap Partition Considerations Other Partition Considerations The Linux Boot Loader: grub Software Package Selection Adding and Configuring Peripherals Printers Graphics Controllers Basic Networking Configuration Booting to Recovery Mode Booting and Shutting Down Linux Boot Sequence The systemd Daemon The systemctl Command Targets vs. Run Levels Modifying a Target Service Unit Scripts Changing System States Booting into Rescue Mode Shutdown Commands Managing Software and Devices Identifying Software Packages Using rpm to Manage Software Using yum to Manage Software Installing and Removing Software Identifying Devices Displaying Device and System Information (PCI, USB) Plug and Play Devices Device Configuration Tools Managing Users and Groups Setting Policies User File Management The /etc/passwd file The /etc/shadow file The /etc/group file The /etc/gshadow file Adding Users Modifying User Accounts Deleting User Accounts Working with Groups Setting User Environments Login Configuration Files The Linux File System Filesystem Types Conventional Directory Structure Mounting a File System The /etc/fstab File Special Files (Device Files) Inodes Hard File Links Soft File Links Creating New File Systems with mkfs The lost+found Directory Repairing File Systems with fsck The Journaling Attribute File and Disk Management Tools Linux File Security File Permissions Directory Permissions Octal Representation Changing Permissions Setting Default Permissions Access Control Lists (ACLs) The getfacl and setfacl commands SUID Bit SGID Bit The Sticky Bit Controlling Processes Characteristics of Processes Parent-Child Relationship Examining Running Processes Background Processes Controlling Processes Signaling Processes Killing Processes Automating Processes cron and crontab at and batch System Processes (Daemons) Working with the Linux Kernel Linux Kernel Components Types of Kernels Kernel Configuration Options Recompiling the Kernel Shell Scripting Overview Shell Script Fundamentals Bash Shell Syntax Overview Shell Script Examples System Backups Backup Concepts and Strategies User Backups with the tar Command System Backup Options The xfsdump and xfsrestore Commands Troubleshooting the System Common Problems and Symptoms Troubleshooting Steps Repairing General Boot Problems Repairing the GRUB 2 Boot Loader Hard Drive Problems Restoring Shared Libraries System Logs and rsyslogd Basic Networking Networking Services Overview NetworkManager Introduction Network Configuration Files Locations and Formats Enabling and Restarting Network Services with systemtcl Configuring Basic Networking Manually Configuring Basic Networking with NetworkManager LAMP Server Basics LAMP Overview Configuring the Apache Web Server Common Directives Apache Virtual Hosting Configuring an Open Source Database MySQL MariaDB PHP Basics Perl CGI Scripting Introduction to System Security Security Overview Maintaining System Security Server Access Physical Security Network Security Security Tools Port Probing with nmap Intrusion Detection and Prevention PAM Security Modules Scanning the System Maintaining File Integrity Using Firewalls Introduction to firewalld The Samba File Sharing Facility Configure Samba for Linux to Linux/UNIX File Sharing Configure Samba for Linux to Windows File Sharing Use the smbclient Utility to Transfer Files Mount/Connect Samba Shares to Linux and Windows Clients Networked File Systems (NFS) Using NFS to Access Remote File Systems Configuring the NFS Server Configuring the NFS Client Exporting File Systems from the NFS Server to the NFS Client
Learn what mindfulness is.Learn the difference between mindfulness and meditation.Understand what Mindful Meditation is.Feel confident in starting to use mindfulness. Requirements No experience required. Description This course answers the top 10 questions people ask about mindfulness. I have carefully reviewed statistics on the things people want to know about mindfulness according to search engine data, and have put the answers in this course in one big bundle! The questions I answer are: 1. What is mindfulness? 2. Where does mindfulness originate? 3. Can anyone practice mindfulness? 4. Can mindfulness change the brain? 5. Are mindfulness and meditation the same thing? 6. Can mindfulness help with anxiety? 7. Can mindfulness be used at work? 8. Are mindfulness apps worth paying for? 9. What are some mindful activities? 10. How do you get started using mindfulness? This course not only helps beginners learn the basics of mindfulness, but it also teaches how to get started with being mindful in daily life. A lot of people don't know where to start when it comes to mindfulness. I really take it back to basics in this course to help those people. I share my own experiences of using mindfulness, and how it has helped my own mental health to get me to where I am now. Anybody can be mindful, you just have to know where to start. I hope my online learners enjoy the course. I'm happy for you to reach out to me if you are interested in knowing more. Who this course is for: Beginners to mindfulness. Those who have some experience with mindfulness but are not sure how to incorporate it into their life.
Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: Administrator IT support personnel Helpdesk support staff The secondary audience for this course is as follows: Network Engineering Staff Overview Upon completing this course, the learner can meet these overall objectives: Demonstrate an overall understanding of the Cisco Unified Communications Manager (CUCM) system and its environment Configure CUCM to support IP Phones Configure Cisco Unified Communications Manager and IM&Presence to support Cisco Jabber soft client. Configure CUCM to route calls to internal and PSTN destinations Configure User accounts and multi-level administration Demonstrate the use of Self Care Portal functionality Configure user features, including Hunt Groups, Call Pickup, and Call Park. Define the capabilities of and demonstrate the Bulk Administration Tool Define the SMART Licensing model for Cisco Unified Communications Demonstrate the use of the Unified Reporting tool Demonstrate the use of the Dialed Number Analyzer Explain the function of Cisco Unity Connection and the various interfaces that are used to access the system Describe the components that are required for user call processing by Cisco Unity Connection Implement the various features and options that are available to users in Cisco Unity Connection Explore Cisco Unity Connection version features and functions Use the various applications, tools, and reports that are available in Cisco Unity Connection Administering Collaboration Environments (CLACE) is an instructor-led course presented by Skyline-ATS to system administrators and customers involved with the Cisco Unified Communications Manager and Cisco Unity Connection product's day-to-day operation. The CLACE course is the replacement for the CMA / UCA courses. CLACE is a lab-intensive course. The primary focus is learning by performing the configuration tasks. The amount of theory is limited to allow more time for discovery exercises. This course introduces you to the CUCM system, the necessary procedures for administering IP Phones and Users, understanding the Dial Plan, and implementing Features. The course also covers Jabber administration and Cisco Unity Connection administration features, options, and configuration settings. In addition to instructor-led lectures and discussions, you will configure CUCM and Cisco IP Phones in the lab, either in a live classroom or WebEx remote classroom environment. While the CUCM and CUC software used in the class is version 12.5.1, the course material applies to versions 8.x, 9.x, 10.x, 11.x, or 12.x of the applications. The concepts and the lab tasks are the same for most of the software versions. Define Collaboration Technology and Benefits Define Collaboration Benefits Describe On-Premise, Cloud, and Hybrid Deployments Describe On-Premise Collaboration Deployments Describe Cisco's Collaboration Endpoints Describe Cisco Collaboration On-Premise Edge Solutions Describe Cisco's Collaboration On-Premise Conferencing Solutions Describe Cisco Cloud Services Administering Initial Parameters for Cisco Unified Communications Manager Understand the On-Premise Collaboration Deployment Models Describe The Cisco Unified CM Cluster Services Define Network requirements for Collaboration Define Network Services for Collaboration Navigate Cisco Unified CM Discovery 1: Configure Cisco Unified Communications Manager Initial Parameters Explore Cisco Unified CM Groups Discovery 2: Configure the Cisco UCM Core Systems Settings Exploring Endpoints and the Registration Process Identify Cisco Endpoint Solutions Explore the Boot up Process of an Endpoint Describe Power Over Ethernet Discovery 3: Configure an Access Switch for an Endpoint Describe IP Network Settings Discovery 4: Deploy an IP Phone Through Auto and Manual Registration Discovery 5: Administer Endpoints in Cisco Unified Communications Manager Managing Users in Cisco Unified Communications Manager Analyze Cisco UCM Users Types and Settings Describe Methods for Authenticating Cisco UCM Users Discovery 6: Create Local User Accounts Discovery 7: Adding Users in Cisco Unified Communications Manager Describing a Basic Dial Plan Describe the Concepts of a Dial Plan and Call Routing Describe Elements of Call Routing Explore Digit Manipulation and Translation Patterns Discovery 8: Create a Basic Dial Plan Describing Class of Service Explore the Concepts of Class of Control Discovery 9: Explore Partitions and Calling Search Spaces Discovery 10: Explore Private Line Automatic Ringdown (PLAR) Enabling Endpoints and Features Configure a Cisco Jabber Endpoint in Cisco UCM Discovery 11: Implementing Common Endpoint Features (Configuring Hunt Groups and Call Coverage) Explore Mobility Discovery 12: Implement Mobility Implementing Media Resources in Cisco Unified Communications Manager Media Resource Overview Media Resource Selection and Access Control Audio and Video Conference Bridge Devices Audio and Video Conference Bridge Integration Options Discovery 13: Configuring Media Resources Reporting and Maintenance Explore the Troubleshooting Process Describe Reporting and Maintenance Tools Describe the Cisco Real-Time Monitoring Tool Discovery 14: Use Reporting and maintenance Tools Describing Cisco Instant Messaging and Presence Describe Cisco IM and Presence Features and Architecture Clustering Describe Cisco IM and Presence Components and Communication Flows Enabling Jabber Cisco Jabber Deployment Modes Discovery 15: Deploy an On-Premise Cisco Jabber Client for Windows Configure Unity Connection Integration Overview of Cisco Unity Connection Integration SIP Integration Typical Integration Mistakes Integration Considerations Discovery 16: Configure the integration between Cisco Unity Connection and Cisco UCM Discovery 17: Configure Voicemail Users Configuring Cisco Unity Connection Call Handlers Call handler Overview System Call Handler Caller Input Operator Call Handler Goodbye Call Handler Directory Handler Interview Handler Troubleshooting Cisco Unity Connection Overview of Cisco Unity Connection Troubleshooting Options Integration Troubleshooting Tools Cisco Real-Time Monitoring Tool Discovery 18: Troubleshoot Cisco Unity Connection Additional course details: Nexus Humans Cisco Administering Collaboration Environments (CLACE) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Administering Collaboration Environments (CLACE) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
The current global demand for clean energy has resulted in rapid growth in the renewable energy sector. As the renewable industry grows, so does the demand for talent to work within it, bringing lots of new career prospects. The industry is the perfect transition for individuals leaving the armed forces who will have benefitted from exposure to many of the skills and experience, as well as the work ethic, that are required to work within this exciting, fast-paced industry.
One -2- One Body Piercing Training Course . 1 or 2 days depending on the level of mentorship you require. Blackpool based
Duration 5 Days 30 CPD hours This course is intended for This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. Overview After successfully completing this course, you should be able to: Describe the various OSPF link-state advertisement (LSA) types. Explain the flooding of LSAs in an OSPF network. Describe the shortest-path-first (SPF) algorithm. Describe OSPF link metrics. Describe the various OSPF authentication methods. Explain the differences between OSPFv2 and OSPFv3. Describe OSPF area types and operations. Configure various OSPF area types. Summarize and restrict routes. Configure OSPF multi-area adjacencies. Configure OSPF virtual links. Explain OSPF external reachability. List useful commands that are used to troubleshoot and verify OSPF. Isolate different OSPF issues. Describe BGP operations. Configure various BGP options. Explain the route selection process for BGP. Describe how to alter the route selection process. Explain the use of routing policies in BGP. Explain how BGP routes are processed. Describe the various BGP attributes and their use. Manipulate common BGP attributes. Review common BGP troubleshooting procedures. List common BGP troubleshooting commands. Identify issues with BGP peering. Explain reasons to use BGP in the Enterprise. Explain how ISP policies can influence external connectivity. Describe three common routing policies for external connectivity in the enterprise. Identify common commands for troubleshooting routing policy. Describe basic multicast terminology. Describe the multicast address space. Describe how RPF is used in a multicast network. Describe the basic functionality of IGMP. Describe the multicast service models and modes. Describe PIM-SM operation and configuration when using the ASM model. Describe PIM-SM operation and configuration when using the SSM model. Verify and troubleshoot multicast. Identify environments that may require a modified CoS implementation. Describe the various CoS components and their respective functions. Explain the CoS processing along with CoS defaults on SRX Series devices. Describe situations in which some CoS features are used in the enterprise. Describe the use of the Real-Time Performance Monitoring tool. Verify and troubleshoot CoS. Describe a traditional Campus network design. Understand the need for a new architectural design. Describe the five key concepts of the Evolved Core. Describe the benefits of a Layer 3-based Campus Networks. Describe Layer 2 tunneling. Explain VXLAN functionality. Describe VXLAN gateways. Describe EVPN features. Describe EVPN operations. This five-day course is designed to provide students with the tools required for implementing, monitoring, and troubleshooting Layer 3 components in an enterprise network. Chapter 1: Course Introduction Course Introduction Chapter 2: OSPF OSPFv2 Review Link-State Advertisements Protocol Operations OSPF Authentication OSPFv3 Lab 1: Configuring and Monitoring OSPF Chapter 3: OSPF Areas Review of OSPF Areas Stub Area Operation Stub Area Configuration NSSA Operation NSSA Configuration Route Summarization Lab 2: Configuring and Monitoring OSPF Areas and Route Summarization Chapter 4: Advanced OSPF Options OSPF Multi-Area Adjacencies Virtual Links External Reachability Lab 3: Configuring and Monitoring Routing Policy and Advanced OSPF Options Chapter 5: Troubleshooting Troubleshooting LSDB Consistency Issues Case Study: Adjacency Issues Lab: Troubleshooting OSPF Chapter 6: BGP Review of BGP BGP Configuration Options BGP Operations BGP Path Selection and Options Lab: Implementing BGP Chapter 7: BGP Attributes and Policy Policy and BGP BGP Attributes Details and Manipulation of Common BGP Path Attributes Lab: BGP Attributes Chapter 8: Troubleshooting BGP BGP Troubleshooting BGP Case Study Lab: Troubleshooting BGP Chapter 9: Enterprise Routing Policies Enterprise BGP Core Network Design Enterprise External Network Deployment Lab: Implementing Enterprise Routing Policies Chapter 10: Troubleshooting Policies Routing Policy Structure Using RegEx Routing Policy Troubleshooting Case Study Lab: Troubleshooting Routing Policies Chapter 11: Introduction to Multicast Overview of Multicast Multicast Addressing RPF IGMP Lab: PIM-SM Chapter 12: Multicast Routing Protocols and SSM Overview of Multicast Routing Protocols PIM-SM Using the ASM Model PIM-SM Using the SSM Model Lab: Implementing PIM-SM Lab: Implementing SSM Chapter 13: Troubleshooting Multicast Multicast Troubleshooting Multicast Case Study Lab: Troubleshooting Multicast Chapter 14: Class of Service CoS Components Review and Case Study CoS Processing and CoS Defaults on the SRX Series Device Policing Virtual Channels Monitoring with Resource Performance Monitoring Lab 9: Implementing CoS Features in the Enterprise Chapter 15: Troubleshooting Class of Service CoS Troubleshooting CoS Case Study Lab: Troubleshooting Class of Service Chapter 16: Enterprise Architectures Traditional Enterprise Networks A New Architecture Key Concepts of the Evolved Core IP Fabric Campus Design Chapter 17: VXLAN Layer 2 Connectivity over a Layer 3 Network VXLAN Overview VXLAN Gateways Chapter 18: EVPN-VXLAN Overview of EVPN EVPN Operations EVPN and VXLAN Chapter 19: Configuring EVPN-VXLAN Configuring EVPN-VXLAN Spine Only network Add IP Fabric leaf nodes to a Spine Only design Configuring a new IP Fabric EVPN-VXLAN network Chapter 20: Migrating to an IP Fabric EVPN Routes Useful EVPN Commands Appendix A: BGP Route Reflection Route Reflection Operation Configuration and Routing Knowledge Lab: BGP Route Reflection (Optional) Appendix B: Troubleshooting IS-IS IS-IS Troubleshooting Lab: Troubleshooting IS-IS and Mixed Environments Additional course details: Nexus Humans AJER - Advanced Junos Enterprise Routing training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AJER - Advanced Junos Enterprise Routing course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.