• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

5 Educators providing Courses

Bricolage Consulting

bricolage consulting

I see individual growth and development as being both fragmented and interlinked. By applying the concept of bricolage, a term used in anthropology meaning taking things which are available to create something new within a cultural context, I aim to co-create a safe space for individuals to explore this fragmentation. I would support and encourage individuals to see themselves and life more holistically.  Training, supervision and therapy is available in person, online or through blended online therapy with face to face therapy. Therapy can be short term or open-ended. I find open-ended work most effective and satisfying. We usually meet weekly at a regular time, as this tends to be the best way of being able to support the work. I offer daytime and evening therapy and supervision sessions.. Initially I suggest we meet for an exploratory session, to give us both the chance to find out whether we feel we can work well together. As well as exploring what has brought you to therapy, we will discuss confidentiality, privacy of information, cancellations, holidays, reviews of the work and payment arrangements.  If you decide to work with me, we will discuss and sign a written contract together, including privacy and data protection aspects, then review our work regularly thereafter. Salma Siddique, PhD, FHEA, FRSA, FRAI is an academic and clinical (psychotherapist) anthropologist based in Scotland. She obtained her doctorate in anthropology from the University of St. Andrews and later qualified as a UKCP registered psychotherapist and clinical supervisor.  Research areas Her main research teaching is based on the dialogue between psychoanalysis, psychotherapy and anthropology. This is influenced by her clinical experience working with people in trauma resulting from oppression, abuse, torture, fleeing disaster and conflict zones. Salma actively encourages engagement in research based on the philosophy of indigenous epistemologies. Child observation is at the heart of training and enhancing on-going practice-based evidence. Emerging research practitioners will gain a greater understanding in the application of self-analysis to the research. They will apply a diversity of methods such as psychotherapy, psychoanalysis and (auto)ethnography when considering intersubjectivity and its experience of the 'other' within their own configurations of meanings She is a contributor to research writing as a clinical anthropologist. Her work and practice engage with the tension between collective guilt and personal responsibility examined from the witnessing of identity and belonging through displaced lives, racism and systemic oppression.

Courses matching "Fragmentation"

Show all 23

Advanced TCP/IP

5.0(3)

By Systems & Network Training

Advanced TCP/IP training course description An intensive advanced TCP/IP course focusing on the details of the protocols according to the RFCs. This course is designed to go into the technical details of the protocols and is not for those that are new to TCP/IP. A particular focus is on TCP and performance. Those more interested in routing protocols should see our Definitive IP routing for engineers course. It is expected that delegates are totally familiar with configuration addressing. Hands on sessions consist of protocol analysis using Wireshark. What will you learn Analyse packets and protocols in detail. Troubleshoot networks using Wireshark. Find performance problems using Wireshark. Perform network forensics. Advanced TCP/IP training course details Who will benefit: Advanced technical staff. Prerequisites: TCP/IP Foundation for engineers Duration 5 days Advanced TCP/IP training course contents IP Fragmentation and MTU issues, Path MTU discovery, Geolocation, unusual IP addresses, forwarding broadcasts, DiffServ, DSCP, ECN, assured and expedited forwarding. TTL usage in traceroute, Protocol field. Sanitising IP addresses in trace files. Wireshark and checksum errors. IPv6 The header. Extension headers. Traffic class and flow labels. Tunnelling. IPv6 and fragmentation. ARP Requests, responses, gratuitous ARP, Proxy ARP, ARP poisoning. ICMP ping, Round Trip Times, ICMP redirect, ICMP router advertisement and solicitation, Time Exceeded, Destination unreachable. ICMPv6: Similarity to ICMPv4, Neighbor discovery and the replacement of ARP. MLD. First hop redundancy ICMP discovery, HSRP, VRRP, GLBP. IGMP Multicast overview, multicast architecture, multicast addresses, IGMP v1, IGMPv2, IGMPv3. UDP Use in broadcasts and multicasts. Port numbers. TCP Connections, RST, FIN, sequence numbering, packet loss recovery, Fast recovery, RTO timeout, SACK, TCP flow control, receive window, congestion window, van Jacobsen, nagle, delayed ACKs, PSH, URG, TCP options, MSS, Window scaling, TCP timestamps. Congestion notification. Hands on Troubleshooting with sequence numbers, Wireshark IO and TCP graphs to analyse performance. Window size issues. DHCP DHCP header. Relationship to BOOTP. Discover, offer, request, decline, ACK, release. Lease, renewal and rebind times. Relay agents. DHCPv6 DNS Names and addresses, Resource Records, queries, responses, problems. MDNS. HTTP Requests, methods, request modifiers, response codes. HTTPS. SSL, TLS. Proxies. Hands on Redirects, recreating pages from packets. FTP Commands, responses, passive/active mode. Email SMTP, POP3, IMAP, commands responses. Voice and Video RTP, RTCP, SIP. IP PBXs. Traffic flows. Hands on Voice playback. SNMP MIBs, GET, TRAP, polling. Performance Baselining, high latency, Wireshark and timings, packet loss, redirections, small packets, congestion, name resolution. Security Network forensics, scanning and discovery, suspect traffic. IPsec, SSH.

Advanced TCP/IP
Delivered in Internationally or OnlineFlexible Dates
£3,697

Modernist Literature Essentials

4.3(43)

By John Academy

Overview Like every era, the modern era also has its own take on literature. Learn about the concepts and characteristics of modernist literature and explore its richness with our Modernist Literature Essentials course. This course is meticulously crafted to help you get a clear view of the literature of the modern era. Here, you will learn about stream of consciousness narratives, fragmentation, multiple perspectives and much more. The course will include detailed lessons on Harlem Renaissance and existential and modernist poetry. Then, you will get to know about the post-colonial perspective represented in literature. The modules will also introduce you to the women writers of the modernist era. When you complete the course, you will receive a certificate of achievement. This certificate will increase your employability in the relevant sectors. Enrol now! Course Preview Learning Outcomes Understand the concepts and principles of modernist literature Learn about stream of consciousness narrative style Get introduced to the concepts of fragmentation and multiple perspectives Enhance your knowledge of wasteland, Harlem Renaissance, existential and modernist poetry Familiarise yourself with modernist women writers Why Take This Course From John Academy? Affordable, well-structured and high-quality e-learning study materials Engaging tutorial videos, materials from the industry-leading experts Opportunity to study in a user-friendly, advanced online learning platform Efficient exam systems for the assessment and instant result Earn UK & internationally recognised accredited qualification Easily access the course content on mobile, tablet, or desktop from anywhere, anytime Excellent career advancement opportunities Get 24/7 student support via email. What Skills Will You Learn from This Course? Modernist writing Who Should Take This Modernist Literature Essentials Course? Whether you're an existing practitioner or an aspiring professional, this course is an ideal training opportunity. It will elevate your expertise and boost your CV with key skills and a recognised qualification attesting to your knowledge. Are There Any Entry Requirements? This Modernist Literature Essentials course is available to all learners of all academic backgrounds. But learners should be aged 16 or over to undertake the qualification. And a good understanding of the English language, numeracy, and ICT will be helpful. Certificate of Achievement After completing this course successfully, you will be able to obtain an Accredited Certificate of Achievement. Certificates & Transcripts can be obtained either in Hardcopy at £14.99 or in PDF format at £11.99. Career Path​ This exclusive Modernist Literature Essentials course will equip you with effective skills and abilities and help you explore career paths such as  Professors Author Publisher Module 01: Introduction to Modernism Introduction to Modernism 00:11:00 Module 02: Stream of Consciousness Narrative Stream of Consciousness Narrative 00:12:00 Module 03: Fragmentation and Multiple Perspectives Fragmentation and Multiple Perspectives 00:14:00 Module 04: The Wasteland and the Post-War World The Wasteland and the Post-War World 00:13:00 Module 05: The Harlem Renaissance The Harlem Renaissance 00:11:00 Module 06: Modernist Women Writers Modernist Women Writers 00:10:00 Module 07: Existentialism and Modernist Poetry Existentialism and Modernist Poetry 00:13:00 Module 08: Postcolonial Perspectives Postcolonial Perspectives 00:12:00 Certificate and Transcript Order Your Certificates and Transcripts 00:00:00

Modernist Literature Essentials
Delivered Online On Demand1 hour 36 minutes
£24.99

Modernist Literature, Existentialism and Modernist Poetry

4.5(3)

By Studyhub UK

Dive deep into the swirling currents of 'Modernist Literature, Existentialism and Modernist Poetry'! Spanning eight comprehensive modules, this course unveils the fabric of Modernism, illuminates the enigmatic Stream of Consciousness narrative, and unravels the intriguing patterns of Fragmentation and Multiple Perspectives. As you journey further, you'll traverse the emotionally-charged landscapes of the Wasteland and the Post-War World, resonate with the vibrant voices of the Harlem Renaissance and the profound insights of Modernist Women Writers. Concluding your journey, you'll explore the nexus of Existentialism and Modernist Poetry, and view literature through the fresh lens of Postcolonial Perspectives. Learning Outcomes Understand the foundational principles of Modernism in literature. Analyse and interpret Stream of Consciousness narrative techniques. Recognise the thematic significance of fragmentation in literary pieces. Identify key figures and movements like the Harlem Renaissance in the modernist era. Develop an understanding of existential themes in modernist poetry. Why choose this Modernist Literature, Existentialism and Modernist Poetry course? Unlimited access to the course for a lifetime. Opportunity to earn a certificate accredited by the CPD Quality Standards after completing this course. Structured lesson planning in line with industry standards. Immerse yourself in innovative and captivating course materials and activities. Assessments are designed to evaluate advanced cognitive abilities and skill proficiency. Flexibility to complete the Modernist Literature, Existentialism and Modernist Poetry Course at your own pace, on your own schedule. Receive full tutor support throughout the week, from Monday to Friday, to enhance your learning experience. Who is this Modernist Literature, Existentialism and Modernist Poetry course for? Individuals keen on exploring the depths of Modernist literary movements. Poetry enthusiasts eager to discover the interplay between existentialism and modernist styles. Literature students seeking to expand their knowledge on postcolonial perspectives. Readers looking to understand the literary significance of the post-war world and wasteland. Aspiring writers aiming to incorporate modernist techniques into their work. Career path Literary Critic - £32,000 to £45,000 Literature Teacher - £24,000 to £39,000 Literary Journal Editor - £28,000 to £42,000 Researcher in Modernist Studies - £30,000 to £43,000 Modernist Literature Author - Variable (dependent on book sales and popularity) Poetry Anthologist - £25,000 to £37,000 Prerequisites This Modernist Literature, Existentialism and Modernist Poetry does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Modernist Literature, Existentialism and Modernist Poetry was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Certification After studying the course materials, there will be a written assignment test which you can take at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £4.99 Original Hard Copy certificates need to be ordered at an additional cost of £8. Course Curriculum Module 01: Introduction to Modernism Introduction to Modernism 00:11:00 Module 02: Stream of Consciousness Narrative Stream of Consciousness Narrative 00:12:00 Module 03: Fragmentation and Multiple Perspectives Fragmentation and Multiple Perspectives 00:14:00 Module 04: The Wasteland and the Post-War World The Wasteland and the Post-War World 00:13:00 Module 05: The Harlem Renaissance The Harlem Renaissance 00:11:00 Module 06: Modernist Women Writers Modernist Women Writers 00:10:00 Module 07: Existentialism and Modernist Poetry Existentialism and Modernist Poetry 00:13:00 Module 08: Postcolonial Perspectives Postcolonial Perspectives 00:12:00

Modernist Literature,  Existentialism and Modernist Poetry
Delivered Online On Demand1 hour 36 minutes
£10.99

Modernist Literature: Trends, Themes & Analysis

4.3(43)

By John Academy

Explore the revolutionary world of Modernist Literature with our comprehensive course on trends, themes, and analysis. Uncover the intricacies of stream of consciousness, fragmentation, and multiple perspectives. Dive into iconic works like "The Waste Land" and discover the richness of the Harlem Renaissance. Delve into the unique voices of Modernist women writers and explore the existentialist threads in poetry. Navigate postcolonial perspectives and gain insights into the 20th-century literary landscape. Join us for a journey through the pages of change and innovation in literature. Enroll now for a deep dive into the heart of Modernism!

Modernist Literature: Trends, Themes & Analysis
Delivered Online On Demand2 hours
£23.99

Total QoS for engineers

5.0(3)

By Systems & Network Training

Total QoS training course description An advanced technical hands on course focusing on Quality of Service issues in IP networks. What will you learn Explain the difference between Integrated services and differentiated services. Explain how DiffServ works. Explain how RSVP works. Design networks supporting QoS. Total QoS training course details Who will benefit: Network administrators. Network operators. Prerequisites: TCP/IP Foundation for engineers Duration 3 days Total QoS training course contents What is QoS QoS and CoS, throwing bandwidth at the problem, Best effort services, Differentiated services, Integrated services, guarantees, the need for QoS, IETF working groups. Application issues Video, Voice, other applications, Jitter, delay, packet loss. Flows, per flow and per aggregate QoS, Stateful vs. stateless QoS, applications vs. network QoS. 'Traditional' IP QoS The TOS field and precedence, the obsolete OSPF use of the TOS field, TCP congestion avoidance. Queuing Where to use queuing, FIFO, Priority queuing, Custom queuing, Weighted Fair Queuing, CBWFQ, PQWFQ, LLQ, RED and WRED. DiffServ Architecture, DSCP, CU, packet classification and marking, meters and conditioners, Bandwidth brokers and COPS, Per Hop Behaviours, best effort PHB, Assured Forwarding PHB, Expedited forwarding PHB, Network Based Application Recognition (NBAR). Layer 2 issues Fragmentation and interleaving, compression (codecs, MPEG formats, header compression…), 802.1p, Subnet bandwidth management, Bandwidth allocators and requestor modules, the use of MPLS, traffic engineering, traffic shaping. RSVP What is RSVP? architectures, paths, path messages, reservations, traffic specifications, tear downs, guaranteed and controlled load, token buckets, Call Admission Control in voice networks, gatekeepers. Other issues Policy based routing, the Resource Allocation Protocol, QoS management tools, baselining networks, design issues, QoS in IPv6, QoS and multicasts.

Total QoS for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,367

Definitive network forensics for engineers

5.0(3)

By Systems & Network Training

Network forensics training course description This course studies network forensics-monitoring and analysis of network traffic for information gathering, intrusion detection and legal evidence. We focus on the technical aspects of network forensics rather than other skills such as incident response procedures etc.. Hands on sessions follow all the major sections. What will you learn Recognise network forensic data sources. Perform network forensics using: Wireshark NetFlow Log analysis Describe issues such as encryption. Network forensics training course details Who will benefit: Technical network and/or security staff. Prerequisites: TCP/IP foundation for engineers. Duration 3 days Network forensics training course contents What is network forensics? What it is, host vs network forensics, purposes, legal implications, network devices, network data sources, investigation tools. Hands on whois, DNS queries. Host side network forensics Services, connections tools. Hands on Windows services, Linux daemons, netstat, ifoconfig/ipconfig, ps and Process explorer, ntop, arp, resource monitor. Packet capture and analysis Network forensics with Wireshark, Taps, NetworkMiner. Hands on Performing Network Traffic Analysis using NetworkMiner and Wireshark. Attacks DOS attacks, SYN floods, vulnerability exploits, ARP and DNS poisoning, application attacks, DNS ANY requests, buffer overflow attacks, SQL injection attack, attack evasion with fragmentation. Hands on Detecting scans, using nmap, identifying attack tools. Calculating location Timezones, whois, traceroute, geolocation. Wifi positioning. Hands on Wireshark with GeoIP lookup. Data collection NetFlow, sflow, logging, splunk, splunk patterns, GRR. HTTP proxies. Hands on NetFlow configuration, NetFlow analysis. The role of IDS, firewalls and logs Host based vs network based, IDS detection styles, IDS architectures, alerting. Snort. syslog-ng. Microsoft log parser. Hands on syslog, Windows Event viewer. Correlation Time synchronisation, capture times, log aggregation and management, timelines. Hands on Wireshark conversations. Other considerations Tunnelling, encryption, cloud computing, TOR. Hands on TLS handshake in Wireshark.

Definitive network forensics for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,497

Total IPv6 for engineers

5.0(3)

By Systems & Network Training

IPv6 training course description IPv6 is the next generation Internet Protocol. This hands-on course looks at the benefits and features of the new protocol along with an assessment of the likely impact of the protocol and migration strategies. Practical exercises using PCs and routers follow the major sessions in order to reinforce the theory. What will you learn Configure PCs and routers for IPv6. Troubleshoot IPv6 networks. Analyse IPv6 packets. Plan migration strategies for IPv6. Integrate IPv6 and IPv4 networks. IPv6 training course details Who will benefit: Anyone working in the field of networking. Prerequisites: TCP/IP Foundation for engineers Duration 3 days IPv6 training course contents Introduction Reasons for IPv6, IPv4 weaknesses, what is IPv6? IPv4 solutions for solving address wastage, the origins of IPv6. hands on IPv6 on a PC, IPv6 on a router. IPv6 addressing IPv6 address allocation, address format, Prefixes but no masks, address categories, scope zones, aggregatable global unicast, link local, Unicast, Multicast, Anycast. Prefix delegation. hands on Link local addresses, manual address configuration, name resolution. Plug and play Plug and play addressing, ICMP neighbour discovery, router solicitation, DHCPv6, stateful autoconfiguration and stateless autoconfiguration. hands on Plug and play addresses and default gateways. The IPv6 header The IPv4 header, IPv6 header format, QoS, flow control, priority field, extension headers, hop by hop, destinations header, fragmentation header, security, IPsec, AH, ESP, TCP and UDP, ICMPv6. hands on IPv6 packet analysis. Migrating to IPv6 Overview, migration, dual stack, IPv4 compatible addresses, DNS, IPv6 DNS issues, AAAA records, IPv6 reverse delegation, DNS transport, protocol translators, NAT-PT, NAPT-PT, NAT64, DNS64, tunnelling, tunnel establishment, tunnel brokers, Tunnel types. hands on Dual stack operation, tunnelling, IPv6 name resolution. IPv6 routing IPv6 routing, RIPng packet format, RIPng for IPv6, OSPF for IPv6, MBGP, multiprotocol routing, MBGP and multicasts, MBGP and IPv6. hands on Base router setup for IPv6, IPv6 static routes, RIPng, OSPFv3. MBGP

Total IPv6 for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,367

Total IPsec for engineers

5.0(3)

By Systems & Network Training

IPsec training course description This hands on course focuses on IPsec VPNs. Rather than focusing on one implementation this course concentrates on the technologies and protocols of IPsec. Starting with an overview of the complete IPsec architecture the course then moves onto ESP packet analysis along with encryption and authentication provided. IKEv1 and IKEv2 are both covered in detail. Having covered IPsec with pre shared keys the course then moves onto IPsec with certificates followed by IPsec issues. The course is vendor neutral with hands on with both Cisco and Microsoft implementations. What will you learn Explain how IPsec works. Explain the role of AH, ESP and IKE. Configure IPsec. Troubleshoot IPsec. IPsec training course details Who will benefit: Technical staff working with IPsec. Prerequisites: Definitive IP VPNs for engineers. Duration 3 days IPsec training course contents What is IPsec? How to spell IPsec, IPsec is IP security, confidentiality, integrity, authenticity, replay protection, what is a VPN? Network layer security, IPsec and IPv4, IPsec and IPv6, the suite of protocols, the standard, IPsec RFCs, IPsec history. Hands on Analysis of 'normal' IP packets. IPsec architecture The IPsec protocols, AH vs ESP, Why two headers? transport mode, tunnel mode, Remote access VPNs, site to site VPNs, security associations, SA database, Security Parameters Index, implementations: Host tack, Bump in the Stack, Bump in the Wire. Hands on Configuring IPsec. AH What AH does, the stack, The AH header, What is authenticated? Device authentication. AH in transport mode, AH in tunnel mode. Hands on AH packet analysis. ESP What ESP does, the ESP header, ESP in transport mode, ESP in tunnel mode, ESP and SA, ESP and SPI. Hands on ESP packet analysis, policy configuration. IPsec encryption IPsec is a framework, standard algorithms, ESP keys, the role of IKE, key lifetimes, how IKE generates the keys, DES, 3DES, AES, cipher block chaining, counter mode, other encryption. Hands on Encryption configuration. IPsec authentication Authentication types, IPsec authentication, Authentication algorithms: MD5, keyed SHA-1, HMAC-MD5, HMAC-SHA-1, HMAC-RIPEMD, other authentication algorithms. Hands on Authentication configuration. IKE Internet Key Exchange, IKE and the SAD, the two phase negotiation, ISAKMP, ISAKMP header, pre shared keys, digital signatures, public key encryption, Diffie Hellman, proposals, counter proposals, nonces, identities, phase 1 negotiation: main mode, aggressive mode, base mode. Phase 2 negotiation: quick mode, new group mode. Hands on IKE packet analysis. More IKE PFS, IKE and dynamic addresses, XAUTH, hybrid authentication, CRACK, ULA, PIC. User level authentication. IKE renegotiation, heartbeats. Hands on Troubleshooting IPsec. IKEv2 The IKEv2 exchange, IKE_SA_INIT, IKE_AUTH, CREATE_CHILD_SA, IKEv2 packets, the informational exchange. Comparing IKev1 vs IKE v2. Hands on IKEv2 configuration and analysis. PKI What is PKI?, Digital certificates, Certificate authorities, CA servers, RA, VA, certificates, CA hierarchy, CRLs, certificate formats. Hands on installing and configuring certificate servers. IPsec issues NAT, IPsec overhead and fragmentation. Summary IPsec strengths and weaknesses. Where to get further information.

Total IPsec for engineers
Delivered in Internationally or OnlineFlexible Dates
£2,367

Intro to data communications & networking

5.0(3)

By Systems & Network Training

Data comms training course description A hands on training course introducing the concepts of data communications, moving on to covering both LAN and WAN technology. Quizzes are used extensively to ensure material has sunk in and to maximise learning time. Hands on sessions ensure that by the end of the course delegates have made cables, built LANS and WANS, configured TCP/IP, switches and routers. What will you learn Use the seven layer model to classify networking buzzwords. Build and troubleshoot Ethernet, LAN/WAN and WiFi networks Explain the difference between switches and routers. Connect networks with routers. Data comms training course details Who will benefit: Anyone who requires a technical introduction to networks. Prerequisites: None. Duration 3 days Data comms training course contents What are networks? What is data communications? What are networks? Types of network, LANs, LAN choices, WANs, WAN choices, PANs, SANs, MANs, connecting networks. Internetworks, the internet, clouds. Networks and standards Standards bodies, ISO, ITU, IEEE, IETF, OSI 7 layer reference model, TCP/IP and OSI, ping and the 7 layer model, encapsulation, fragmentation. The physical layer Transmission media: Copper, Fibre, RF, UTP, Cat 5/5e/6/7..., RJ45, straight and cross over cables. Coax, Fibre cable & connectors, SFP, MMF, SMF, radio spectrum, frequencies, ranges, noise and electrical distortion, repeaters. Hands on Cabling, ping. Bandwidth Definition, Bits, bytes, speeds, simplex, half/full duplex, a/symmetrical, aggregation, latency. Calculating bandwidth requirements. The Data Link layer Frames, classifications, standards, LAN/WAN layer 2 technologies (Point to point, virtual circuits). Ethernet What is Ethernet? 802.3, evolution from CSMA/CD, choosing cables, topologies, NICs, MAC addresses. Ethernet frame format. Hands on Analysing Ethernet frames. Ethernet switches Connecting multiple devices, switches work at layer 2, Switches vs. hubs, simultaneous conversations, full duplex, MAC address database, how switches work, switch benefits, loops, STP. Console ports. Hands on Switches and WireShark, configuring switches, broadcast storms, STP. VLANS What are VLANs, why have VLANs. Hands on The effect of VLANs on network traffic. Wireless LANs Type of wireless network. WiFi, 802.11b/g/n/ac, WiFi6, antennae, interference, 802.11 frame format, CSMA/CA, half duplex, Wireless Access Points, security. Hands on Building a WiFi network. WANS WAN architecture, WAN types, service providers, access equipment, DTE, DCE, core equipment, WANs and the 7 layer model, choosing a WAN. WAN access Point to point, multi access, Internet, phone lines, leased lines, xDSL, broadband architecture. DOCSIS, FTTH, PON, SD-WAN. Older technologies (if required): Modems, ISDN, 64k, E1, TDM. Packet switched networks Packet switching, virtual circuits, Hub & spoke, partial & full mesh, MPLS, MPLS and routers, Why MPLS? MPLS -TE, MPLS VPN, Internet VPN. Older technologies (if required). Service provider technologies Transport plane, SDH, SONET, WDM, CWDM, DWDM, DWDM architectures, OTN. TCP/IP Definition, protocols, services, internetworking, the Internet, intranets, IAB, RFCs, IP header, IP addressing, subnet masks, IPv6, TCP, UDP. Hands on IP address and subnet mask configuration. Routers What are routers? Routers vs switches, when to route and when to switch, default gateways, routing tables, static routes, routing protocols. Firewalls, how firewalls work. Hands on Router configuration, tracert. Applications Clients, servers, web, HTTP, Email, resource sharing, IM, VoIP, Video over IP, terminal emulation, ftp, ssh. Hands on telnet

Intro to data communications & networking
Delivered in Internationally or OnlineFlexible Dates
£1,697

Certified Wireless Analysis Professional

5.0(3)

By Systems & Network Training

CWAP training course description This WiFi analysis course consists of hands-on learning using the latest enterprise wireless LAN analysis and troubleshooting tools. The course takes an in-depth look at the functionality of WLANs, intended operation of the 802.11 protocol and Wi-Fi Alliance specifications, WLAN frame formatting and structure, troubleshooting methodology, and protocol analysis. It also includes extensive training in modern spectrum analysis with a focus on advanced RF behaviour analysis, data collection methods, interpreting spectrum plots and charts, and understanding advanced features of WLAN spectrum analysers. What will you learn Analyse WiFi frames using Wireshark. Explain 802.11 protocol operation. Troubleshoot WiFi networks using Wireshark. Troubleshoot WiFi networks using spectrum analysers. CWAP training course details Who will benefit: Technical Network Staff Anyone looking to become a CWAP Prerequisites: Certified Wireless Network Administrator Duration 4 days CWAP training course contents Principles of WLAN Communication 802.11 Working Group, OSI reference model and the 802.11 PHY and MAC, Communication sublayers and data units, WLAN architecture components, Organization of station forwarding Addressing and internetworking operation, Modern WLAN product architectures. Physical (PHY) and MAC Layer Formats and Technologies Physical layer functions, Preamble function and format, Header purpose and structure, Analysis of PHY problems, Physical PPDU formats, 802.11b, 802.11a, 802.11g, 802.11n, MAC frame components, MAC encapsulation, Fields and subfields of the MAC header, Frame Control, Frame types and subtypes and their uses, Addressing, Frame body, Data frame format, Control frame format, Management frame format, Information elements and fields. Beaconing and synchronization Scanning, Client state machine, 802.11 contention, QoS, Admission control, Band steering and airtime fairness mechanisms Fragmentation, Acknowledgments and Block acknowledgments, Protection mechanisms and backward compatibility, Power management, Dynamic Frequency Selection (DFS) and Transmit Power Control (TPC), Security components, methods, and exchanges, Roaming procedures exchanges, Future protocol enhancements. 802.11n Transmit beamforming, Spatial multiplexing, Maximal Ratio Combining (MRC), Space-Time Block Coding, 40 MHz channels, Frame aggregation, HT-OFDM format, Modulation and Coding Schemes (MCS), HT frame formatting and more. Protocol Analysis Tools and Methodology Troubleshooting methodology, Protocol analyser types, Analysis NIC/adapter selection and constraints, Interpreting results based on location, Analyzer settings and features, Filtering and channel scanning, Interpreting decodes, Using advanced analysis features, Assessing WLAN health and behaviour factors, Evaluating network statistics, Troubleshooting common problems, Wired analysis to support wireless network issues. Spectrum Analysis Tools and Methodology Radio frequency behaviour review, Visualizing RF domains using spectrum measurement tools, Spectrum analyser types and operation, Analyser specifications and characteristics, Understanding spectrum data presentation, Interpreting plots and charts, Common WLAN spectrum analyser features, Identifying transmit patterns, Device classification and network impact, Recognizing transmit signatures. Hands on lab exercises Wireshark Setup, Use, and In-Depth Analysis Wireshark is fundamental to troubleshooting. Labs include: - Capabilities, configuration, and data display - Opening, collecting, saving, and modifying capture files. - Filtering traffic, and using colouring rules as analysis aides. - Live captures based on a set of desired collection criteria. - Identify and isolate network problems. - Conversation analysis. - Remote packet capture with an AP. Understanding Frame Components Familiarity with the frame structure and contents is essential in real -world troubleshooting efforts. Labs include: - Understanding the MAC header - Comparing the three major frame types and their subtypes - Analysing frame formats of individual frame types - Analysing 802.11n frame components - Additional information is reported by protocol analysers - Information not visible in protocol analysers Frame Exchanges Understanding frame exchange rules and behaviors is critical to identifying expected and unexpected. It is also necessary to understand what is normal so that aberrations can be properly troubleshot. Labs include: - Connectivity exchanges and sequences - Legacy and modern security exchanges - ERP and HT protection mechanisms - Power save behaviour - Acknowledgments, block acknowledgments, and supporting action frames - Dynamic rate switching - Band steering Troubleshooting Common Problems This lab exposes students to hands-on troubleshooting skills by setting up common problems in WLANs and allowing students to attempt to solve them. - Trouleshooting connectivity exchanges - Troubleshooting 802.1X and EAP exchanges - Troubleshooting roaming Spectrum Analyzer Setup, Use, and In-Depth Analysis Specifically, it will explore the plots and charts used to display spectrum data and how to interpret this data to define a transmitter's impact on the network. The following are covered: - Installing the analyser and using display and navigation - The 'RF perspective' provided by each plot and chart - Using built-in features and automated device identification - Characterizing the behaviours of an interference source - Assessing the impact of an interference source - Determining the impact of transmitter proximity on interference. - Identifying signatures of common transmitters - Remote spectrum analysis with an AP

Certified Wireless Analysis Professional
Delivered in Internationally or OnlineFlexible Dates
£3,297