• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

298 Computing & IT courses in Sheffield

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

Advanced Satellite communications

5.0(3)

By Systems & Network Training

SATELLITE COMMUNICATIONS TRAINING COURSE DESCRIPTION This course starts by recaping some of the essential satellite knowledge required and proceeds to explore the deeper aspects of satellite communications, including hardware, communications and error control coding. WHAT WILL YOU LEARN * Explain how satellite communications work. * Explain how RF works * Explain the architecture of satellite systems. * Use spectrum analysers. SATELLITE COMMUNICATIONS TRAINING COURSE DETAILS * Who will benefit: Anyone working with satellite systems. * Prerequisites: None. * Duration 3 days SATELLITE COMMUNICATIONS TRAINING COURSE CONTENTS * Basic Principles of Satellite Communications GEO, MEO and LEO satellites. Launching and orbits. Frequency bands and polarisation. Satellite footprints. Multibeam coverage. Power spectra. Link budgets. Modulation and coding. Access technologies. Earth station components. Space segment components. Satellite system services. Satellite operators. * Radio frequency propagation Electromagnetic waves principles and generation. Reception of the EM wave. Space wave, sky wave and surface wave theory. The isotropic radiator. Types of antennae and their basic properties. Polar diagrams. International frequency allocation. Spectrum management and utilisation. Radio wave propagation. Line of sight propagation. Propagation for satellite comms. Free space path loss. Path attenuation. Noise and Interference. Power and its measurement. * Satellite antennae and other hardware Power flux density. Effective aperture. Horn antennae. Parabolic reflector. Offset feed. Cassegrain and Gregorian antennae. Antenna feed systems - Horn, TMC, OMJ and polarizer. Antenna steering and mount systems. Array antennae. LNA, LNB, LNC. Microwave tubes - TWT and Klystron. Polarizers. * Earth and Space Segments and the link Earth station antennae. Transponders. Antennae sub systems. Power supplies. Link budgets. System noise. System losses. Interference. Satellite switching. * Ground Communications Equipment Baseband signals. Analogue and Digital systems. Overview of modulation - AM, FM, PM. Digital Modulation. Frequency conversion -up and down conversion. Filters, mixers, local oscillators, IF amplifiers and group delay equalisers. Access methods - single and multiple access systems. Data networks. Television transmission - analogue and digital. Digital signal compression. MPEG processing. * Satellite Navigation Longitude, latitude, altitude, GPS, How GPS works, timing, alternatives to GPS. * Mobile satellite services Voice and Phones, BGAN, TV, GPS to program aerial, VSAT. * Error Control Coding The need for coding. Linear block codes. Cyclic codes. Convolution codes. Interleaving and concatenated codes. Coding gain. Turbo codes. * Test and measurement Theory and practice of Spectrum Analysers.

Advanced Satellite communications
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

Advanced Junos Service Provider Routing

5.0(3)

By Systems & Network Training

ADVANCED JUNOS SP ROUTING COURSE DESCRIPTION This is designed to provide students with detailed coverage of OSPF, IS-IS, BGP, and routing policy. Students will gain experience in configuring, monitoring, and troubleshooting the Junos operating system and in monitoring device and protocol operations. This course uses Juniper Networks vMX Series Routers for the hands-on component, but the lab environment does not preclude the course from being applicable to other Juniper hardware platforms running the Junos OS. WHAT WILL YOU LEARN * Describe and configure OSPF area types and operations. * Configure and monitor IS-IS. * Describe basic BGP operation. * Explain the causes for route instability. * Describe how to troubleshoot routing policy. * Explain the default behaviour of damping on links. ADVANCED JUNOS SP ROUTING COURSE DETAILS * Who will benefit: Network staff working with Junos at layer 3. * Prerequisites: Junos Intermediate Routing * Duration 5 days ADVANCED JUNOS SP ROUTING COURSE CONTENTS * OSPF OSPFv2 Review Link-State Advertisements Protocol Operations OSPF Authentication Lab: OSPF Multi-Area Networks Chapter 3: OSPF Areas Review of OSPF Areas Stub Area Operation and Configuration NSSA Operation and Configuration Route Summarization Lab: OSPF Route Summarization * OSPF Case Studies and Solutions Virtual Links OSPF Multiarea Adjacencies External Reachability Lab: Advanced OSPF Options and Routing Policy * Troubleshooting OSPF Troubleshooting OSPF Lab: OSPF Troubleshooting * IS-IS Overview of IS-IS IS-IS PDUs Neighbors and Adjacencies Configuring and Monitoring IS-IS Lab: IS-IS Configuration and Monitoring * Advanced IS-IS Operations and Configuration Options IS-IS Operations IS-IS Configuration Options IS-IS Routing Policy Lab: Advanced IS-IS Configuration Options and Routing Policy * Multilevel IS-IS Networks Level 1 and Level 2 Operations Multilevel Configuration Lab: Configuring a Multilevel IS-IS Network * Troubleshooting IS-IS Troubleshooting IS-IS Lab: IS-IS Troubleshooting * BGP Review of BGP BGP Operations BGP Path Selection Options Configuration Options Lab: BGP and BGP Attributes * BGP Attributes and Policy - Part1 BGP Policy Next Hop Origin and MED AS Path Lab: BGP Attributes - Next Hop, Origin, MED, and AS Path * Attributes and Policy - Part2 Local Preference Communities Lab: BGP Attributes - Local Preference and Communities * Route Reflection and Confederations Route Reflection Operation Configuration and Routing Knowledge BGP Confederations Lab: Scaling BGP * BGP Route Damping Route Flap and Damping Overview Route Damping Parameters Configuring and Monitoring Route Damping Lab: BGP Route Damping * Troubleshooting BGP Troubleshooting BGP Lab: BGP Troubleshooting * Troubleshooting Policy Troubleshooting Policy Lab: Policy Troubleshooting

Advanced Junos Service Provider Routing
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

Securing UNIX systems

5.0(3)

By Systems & Network Training

SECURING UNIX SYSTEMS TRAINING COURSE DESCRIPTION This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. WHAT WILL YOU LEARN * Secure UNIX accounts. * Secure UNIX file systems. * Secure UNIX access through the network. SECURING UNIX SYSTEMS COURSE DETAILS * Who will benefit: Linux technical staff needing to secure their systems. * Prerequisites: Linux system administration (LPIC-1) * Duration 5 days SECURING UNIX SYSTEMS COURSE CONTENTS * Cryptography * Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. * Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. * Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. * DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. * Host Security * Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. * Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. * User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. * FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. * Access Control * Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. * Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. * etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. * Network Security * Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. * Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. * Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd * Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing UNIX systems
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

Advanced RF

5.0(3)

By Systems & Network Training

ADVANCED RF TRAINING COURSE DESCRIPTION This course provides a follow on to our popular RF fundamentals course for those that need to know more. WHAT WILL YOU LEARN * Explain RF propagation * Describe the importance of transmission lines in RF systems. * Recognise the issues in RF systems. * Describe transmission measurements. ADVANCED RF TRAINING COURSE DETAILS * Who will benefit: Those working with RF systems. * Prerequisites: RF fundamentals. * Duration 3 days ADVANCED RF TRAINING COURSE CONTENTS * RF propagation The Electromagnetic Spectrum, Electromagnetic Radiation, Spherical Wave Front, The Space Wave, Receive Antenna below the Horizon, Bending the Space Wave , Surface Wave Path, Tilting of Surface Wave, Conductivity, Layers of the Atmosphere, Variations of the Ionosphere, Variations caused by Solar Activity, Multi Hop Transmission, Classification of Radio Waves, Fading, Fading Reduction, Free Space Path Loss, Shadowing of Radio Wave, Signal Levels after Shadowing, Radio Waves as Wavelets, Fresnel Zone. * Transmission Lines Transmission Line Construction, Primary Line Constants, 'T' Networks, Input Impedence, Lossless Unbalanced Line, Standing Waves, Open Circuit / Short Circuit Termination, Short Circuit Standing Waves, Open Circuit Standing Waves, Voltage Standing Wave Pattern, Short Circuit Termination, Open Circuit Termination, The Directional Coupler, Effect of E and M Coupling, Practical Reflectometer. * Antenna Theory The Open Circuit Line, Dipole V/I Distribution, Polar Diagram, Power Pattern ½ Wave Dipole, Half Wave Dipole, Vehicle Mount, Centre Fed Whip Antenna, Antenna Beamwidth, The Yagi Array, Uda Yagi array, Antenna Characteristics, 6 Element Yagi Polar Diagram, Log Periodic Antenna, Helical Antenna. Microwave Dish Array, Typical Microwave Dish Antenna. * Transmission Measurements Transmission Measurements, Effective Isotropic Radiated Power, Fade Margin. * Noise Noise in Communications, Noise Voltage Equivalent Circuit. * Satellite Communications Satellite Communications, Large Earth Station, The Satellite Payload, Geo Stationary Orbit, Basic Orbits, VSAT Terminal, Iridium Phone, The Space Segment, Satellite Footprint, Typical System Hardware. * Mobile Communications Mobile Evolution, The Path to UMTS, Technologies Bit Rate and Mobility, Systems and Specifications, Wireless Networks, Diffraction, Multi Path Propagation, Loss Models, GSM Architecture, OSI Model - GSM, OSI Reference Model, OSI Layers.

Advanced RF
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

MEF Carrier Ethernet 2.0 Certification

5.0(3)

By Systems & Network Training

MEF CARRIER ETHERNET TRAINING COURSE DESCRIPTION The course progresses from a overview of the Carrier Ethernet service and how it works onto looking at the concepts in depth. Service attributes and management follow with the course finishing with studies of practical Carrier Ethernet. WHAT WILL YOU LEARN * Discuss and understand key Carrier Ethernet Concepts. * Understand tasks related to designing, deploying and maintaining a Carrier Ethernet network. * Offer effective solutions to implementing a Carrier Ethernet enterprise network given available customer resources and requirements. * Carry out informed discussions using industry Carrier Ethernet 'vocabulary. * Pass the MEF CECP 2.0 professional accreditation exam. MEF CARRIER ETHERNET TRAINING COURSE DETAILS * Who will benefit: Anyone working with Carrier Ethernet * Prerequisites: The course attendees need to be conversant with data networks, as well as Ethernet and IP technologies. * Duration 5 days MEF CARRIER ETHERNET TRAINING COURSE CONTENTS * Section One: Introduction to Carrier Ethernet * Introduction to Carrier Ethernet: What is Carrier Ethernet? Evolution, advantages, The MEF, MEF specifications; UNI, EVC, OVC, EPL/EVPL, EP-LAN/ EVP-LAN, EP-Tree/EVP-Tree, etc, overview. * How Carrier Ethernet Works: Service Frame Handling. Carrier Ethernet at Customer Premises, metro and core. Carrier Ethernet Workings, UNI attributes, Service Attributes (EVC and EVC per UNI attributes), Bandwidth Profiles, service multiplexing, L2 protocol processing; Carrier Ethernet equipment, CPE, aggregation and homing nodes, core equipment; management systems. * The Setting Up of a Carrier Ethernet Service: Step 1: Choose service type, EPL/EVPL, EP-LAN/EVP-LAN, EPTree/EVP-Tree, EVLine...; Step 2: CPE tasks, UNI-C tasks (UNI attributes, service attributes (EVC and EVC per UNI) and bandwidth profiles), UNI-N tasks (L2 protocol handling). Step 3: Non-CPE tasks, Access, metro and core connections set up. * Section Two: Carrier Ethernet Concepts in depth * Carrier Ethernet Definitions in Depth: UNI, UNI I & II, UNI-N and UNI-C, etc.; NNI/ENNI; EVC; OVC, OVC type (P2P, M2M, Rooted MP), OVC end point (root, leaf, trunk), OVC end point map, OVC end point bundling; Service types in detail, EPL/EVPL, EP-LAN/EVP-LAN, EP-Tree/EVP-Tree, EVLine, Access EPL, Access EVPL . * Carrier Ethernet Service Frame Handling: Unicast, multicast and broadcast frame delivery, Tagged, untagged and priority; Tagging, C and S-Tags, 802.3, 802.1d, 802.1q, 802.1ad, 802.1ah evolution, VLAN ID translation/preservation. CoS preservation. * Other Key Carrier Ethernet Concepts: MTU, MTU at UNI, MTU at ENNI; Physical Layer Attributes, FE, GbE and 10GbE, Service Multiplexing and Bundling Concept and detail, rules and implications; Hairpin Switching * Managing Bandwidth in a Carrier Ethernet Network: Token Bucket Algorithm, EIR, CIR, CBS, EBS, Coupling Flag; Frame Colors, recoloring, Color Awareness attribute, Color Forwarding; Bandwidth Profiles, rules and concepts. MEF CoS identifiers, DEI bit (in S-Tag), PCP bit (in C-Tag or S-Tag), or DSCP (in IP header), Multiflow bandwidth concepts; CoS Label/Color Identification. * Section Three: Carrier Ethernet Service Attributes Overview: Carrier Ethernet 2.0; Blueprint C Service Attributes: Per UNI, Physical interfaces, Frame format, Ingress/egress Bandwidth Profiles, CEVLAN ID/EVC Map, UNI protection. EVC per UNI, Ingress/egress Bandwidth Profiles, etc.; Per EVC, CEVLAN ID Preservation, CoS ID Preservation, Relationship between SLA and SLP, Class of Service, etc. OVC, ENNI, OVC End Point per UNI and OVC End Point per ENNI, Ingress/egress bandwidth profiles, etc. * Section Four: Managing Carrier Ethernet Networks Overview: MEF Service Lifecycle. Carrier Ethernet maintenance: Port, Link & NE failure, Service Protection Technologies, Fault Identification and Recovery, LAG, Active/Standby EVC, Single EVC with transport protection, G.8031, G.8032, MPLS FRR. * SOAMs: Connectivity fault management, connectivity Monitoring, Loopback, Linktrace; Performance Management, Frame Delay, Inter Frame Delay Variation, Availability, Frame Loss Ratio, Resiliency, HLI, DMM, DMR, SLM, SLR; Key Concepts, Single vs dual ended, ordered UNI pair calculations. * LOAMs: Link discovery, link monitoring, etc. * Terminology and Concepts: MEG levels, MIPs. * Section Five: Practical Carrier Ethernet Carrier Ethernet Transport Technologies: Layer 1: SDH. Layer 2: Bridging, provider bridging, PBB, PBBTE. Layer 2.5: MPLS VPWS, MPLS VPLS, MPLS-TP. * Carrier Ethernet Access Technologies: fiber, SDH, active fiber, PON, GPON, 10G PON, OTN, WDM; copper, PDH, G-SDSL, 10Pass-TS, HFC; packet radio. * Optimising mobile backhaul with Carrier Ethernet Key challenges solutions: Market pressure, LTE evolution, elements and architecture (RAN BS, NC, GWIF.), synchronization, bandwidth management. * Circuit Emulation over Ethernet: Purpose, needs and applications. Synchronization: Phased, ToD, External Reference source, SynchE ,NTP, IEEE-1588 v2/ PTP, ACR; MEF Service Definitions for emulated circuits. * Applying what you know: Practical examples and scenarios, Carrier Ethernet solutions; Practice Scenarios, Given a scenario, determine appropriate Ethernet services

MEF Carrier Ethernet 2.0 Certification
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

GPON and FTTx networks

5.0(3)

By Systems & Network Training

GPON AND FTTX NETWORKS TRAINING COURSE DESCRIPTION Designed to benefit those requiring an in depth knowledge of the principles and applications of Ten Gigabit and Gigabit Passive Optical Networking and Fibre to the X in NG Networks applications and their associated equipment, its flexibility and function within a modern transmission network. Using an effective mix of 'hands on' equipment instruction and correlation to theory based learning the delegate will gain a complete understanding of the equipment and the tasks to be undertaken in a real life situation. WHAT WILL YOU LEARN * Compare PON/FTTx systems. * Explain network elements and designs. * Support applications and network interfaces. * List circuit provisioning and bandwidth requirements. * Understand upstream & downstream issues. * Describe headend & network elements/OLT-ONT. * Perform network testing with OTDR test sets. GPON AND FTTX NETWORKS TRAINING COURSE DETAILS * Who will benefit: Anyone working with GPON and FTTx. * Prerequisites: Introduction to data communications and networking. * Duration 5 days GPON AND FTTX TRAINING COURSE CONTENTS * FTTN, FTTC, FTTH SMF, MMF, Fibre safety and properties (dispersion/attenuation), Fibre reel cables and types, Fibre installation and air blown fibre, Transmitters and receivers - power budget/laser classes. Fibre to the home (FTTH), FTTC (Fibre to the Cabinet), FTTN (Fibre to the node) , FTTD (Fibre to the desk), FFTH topologies and wavelengths, Active or passive optical network. * WDM equipment and GPON OSP design Wavelength considerations, WDM/DWDM/CWDM, EDFA optical amplification, AWG (Arrayed Waveguide Grating) splitters , Couplers (splitters) and losses, Optical splitters 1x2, 1x4, 1x8, 1x16, 1x32, 1x64, 2x64. * PON variants Gigabit passive optical network (GPON), Gigabit Ethernet passive optical network (GEPON), Time division PON (TDM-PON), Wave Division Multiplexing PON (WDM-PON), 1Gbps, 10Gbps, 40Ggps, 100Gbps FSAN (Full Service Access Network) NGA (Next Generation Access), Strategies for TDM-PON to WDM-PON migration, Architecture of NG-PON (hybrid WDM/TDM PON), Additional services than triple play. * GEPON design GPON OSP centralized and distributed design, GPON PON splitters x4 x8 x32, Fibre splice trays /cassette trays & enclosures, GPON field testing and installation verification, GPON physical layer testing, Optical time domain reflectometer (OTDR), Optical power source & meter, Optical return loss (ORL), APON/BPON/GPON/EPON comparisons. * GPON ITU-T G.984.1 Reference model, terminology & architecture, Access network system management functions. ONT & OLT functional block examples. FTTx scenarios, 4 switching arrangements for external access network backup. * GPON ITU-T G.984.2 Physical layer, Enhancement band, Bit rate and wavelengths, FEC and RAMAN. * GPON ITU-T G.984.3 Frame structure, GPON encapsulation method (GEM), GTC adaptation and framing sublayer protocol stack, Status reporting & traffic monitoring DBA (SR-DBA & TM-DBA), Transmission container (T-CONT) types, Downstream & upstream multiplexing, GEM port identifier, Media access control and ONU registration, Extended bandwidth assignment model scheduling architecture, PLOAM & alarm messages, Downstream & Upstream FEC, Process order in a GTC transmit flow. * GPON ITU-T G.984.4 and G.988 ONT management and control interface (OMCI) Management interface, Reference model, Typical ONT with SCTE 55-1 or SCTE 55-2 compliancy. * GPON ITU-T G.984.5 enhancement band Band options, GPON NGA, Wavelength allocation. * GPON ITU-T G.984.6 optical reach extension (G.984.re) Reach extension (RE), OA-based and OEO-based reach extenders, Protection, Reach extender with OTDR blocking filters (BF) and bypass (BYP) filters. * GPON ITU-T G.984.7 long reach Quiet Window. * 10-GPON ITU-T G.987.1 (XG-PON) Scenarios, reference access network architecture, XG-PON with G-PON through WDM1r, G-PON and XG-PON wavelength allocation, G-PON and XG-PON co-existence with video overlay option, RE migration scenarios. * G.989 40Gbps XG-PON2 Functional reference architecture, NG-PON2 system coexistence with legacy systems, Definitions of legacy compatibility terminology. * GPON issues and standards GPON components GPON OLT / GPON ONT, GPON management, Operational support systems (OSS), Network management systems (NMS), OMCI (ONT Management control interface), RG (Residential gateway), Data and prioritised voice channel product, GPON broadband-forum standards, Broadband-forum , TR-069 and TR-156, HPNA (home phone network alliance), Powerline carrier (PLC), GPON DLNI G.hn or G.9960, MOCA, FTTH council certification standard for network certification. Fibre-connected home badge, Ethernet in the first mile (EFM), GPON frame synchronization to network timing, Direct clock synchronization interface (BITS), Multiservice access platform (MSAP), Software planning tool, Superconnected cities / voucher scheme. * Hands on practical assignments Single and multimode fibre recognition, Fibre Cleaning methods, Checking cleaning with an optical microscope, Optical light source and optical power meter referencing, PON splitter and fibre drum testing with an optical power meter, 6km classroom passive optical network testing with an OTDR at 1310/1550nm, Using decibels (dB's) and decibel milliwats (dBm's), Designing networks up to 20km long using vendor specifications (power budget), Fault finding with a visible fault locator.

GPON and FTTx networks
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

Wireshark Certified Network Analyst

5.0(3)

By Systems & Network Training

WCNA TRAINING COURSE DESCRIPTION Wireshark is a free network protocol analyser. This hands-on course provides a comprehensive tour of using Wireshark to troubleshoot networks. The course concentrates on the information needed in order to pass the WCNA exam. Students will gain the most from this course only if they already have a sound knowledge of the TCP/IP protocols. WHAT WILL YOU LEARN * Analyse packets and protocols in detail. * Troubleshoot networks using Wireshark. * Find performance problems using Wireshark. * Perform network forensics. WCNA TRAINING COURSE DETAILS * Who will benefit: Technical staff looking after networks. * Prerequisites: TCP/IP Foundation for engineers * Duration 5 days WCNA TRAINING COURSE CONTENTS * What is Wireshark? Network analysis, troubleshooting, network traffic flows. Hands on Download/install Wireshark. * Wireshark introduction Capturing packets, libpcap, winpcap, airpcap. Dissectors and plugins. The menus. Right click. Hands on Using Wireshark. * Capturing traffic Wireshark and switches and routers. Remote traffic capture. Hands on Capturing packets. * Capture filters Applying, identifiers, qualifiers, protocols, addresses, byte values. File sets, ring buffers. Hands on Capture filters. * Preferences Configuration folders. Global and personal configurations. Capture preferences, name resolution, protocol settings. Colouring traffic. Profiles. Hands on Customising Wireshark. * Time Packet time, timestamps, packet arrival times, delays, traffic rates, packets sizes, overall bytes. Hands on Measuring high latency. * Trace file statistics Protocols and applications, conversations, packet lengths, destinations, protocol usages, strams, flows. Hands on Wireshark statistics. * Display filters Applying, clearing, expressions, right click, conversations, endpoints, protocols, combining filters, specific bytes, regex filters. Hands on Display traffic. * Streams Traffic reassembly, UDP and TCP conversations, SSL. Hands on Recreating streams. * Saving Filtered, marked and ranges. Hands on Export. * TCP/IP Analysis The expert system. DNS, ARP, IPv4, IPv6, ICMP, UDP, TCP. Hands on Analysing traffic. * IO rates and trends Basic graphs, Advanced IO graphs. Round Trip Time, throughput rates. Hands on Graphs. * Application analysis DHCP, HTTP, FTP, SMTP. Hands on Analysing application traffic. * WiFi Signal strength and interference, monitor mode and promiscuous mode. Data, management and control frames. Hands on WLAN traffic. * VoIP Call flows, Jitter, packet loss. RTP, SIP. Hands on Playing back calls. * Performance problems Baselining. High latency, arrival times, delta times. Hands on Identifying poor performance. * Network forensics Host vs network forensics, unusual traffic patterns, detecting scans and sweeps, suspect traffic. Hands on Signatures. * Command line tools Tshark, capinfos, editcap, mergecap, text2pcap, dumpcap. Hands on Command tools.

Wireshark Certified Network Analyst
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

Network design

5.0(3)

By Systems & Network Training

NETWORK DESIGN TRAINING COURSE DESCRIPTION This course provides you with the knowledge needed to perform the design of a network infrastructure that supports desired network solutions to achieve effective performance, scalability, and availability. We recognise that the role of design does not normally require hands on skills but hands on sessions are used to reinforce the theory not to teach configuration or troubleshooting. WHAT WILL YOU LEARN * Create HA enterprise network designs. * Develop optimum Layer 3 designs. * Design effective modern WAN and data center networks. * Develop effective migration approaches to IPv6. * Create effective network security designs. NETWORK DESIGN TRAINING COURSE DETAILS * Who will benefit: Anyone involved with network design. * Prerequisites: TCP/IP Foundation for engineers * Duration 5 days NETWORK DESIGN TRAINING COURSE CONTENTS PART I RELIABLE, RESILIENT ENTERPRISE L2/3 NETWORK DESIGN Optimal Enterprise Campus Design: Enterprise campus design principles, hierarchy, modularity, flexibility, resiliency. EIGRP design: EIGRP Design, Should you use EIGRP? OSPF design: OSPF scalability designs, OSPF area design, OSPF Full-Mesh Design, OSPF Hub-and-Spoke Design, OSPF convergence design and optimization techniques. IS-IS Design: The protocol, IS-IS hierarchical architecture, IS-IS vs OSPF, IS-IS Deep Dive, IS-IS Design Considerations. BGP design: BGP overview, Designing Scalable iBGP Networks, BGP Route Reflector Design, Enhancing the Design of BGP Policies with BGP Communities, Case Study: Designing Enterprise wide BGP Policies Using BGP Communities, BGP Load-Sharing Design. PART II ENTERPRISE IPV6 DESIGN CONSIDERATIONS IPv6 Design Considerations in the Enterprise: IPv6 Deployment and Design Considerations, Considerations for Migration to IPv6 Design, IPv6 Transition Mechanisms, Final Thoughts on IPv6 Transition Mechanisms. Challenges of the Transition to IPv6: IPv6 Services, Link Layer Security Considerations. PART III MODERN ENTERPRISE WIDE-AREA NETWORKS DESIGN Service Provider-Managed VPNs: Choosing Your WAN Connection, Layer 3 MPLS VPNs, Case Study: MPLS VPN Routing Propagation, Layer 2 MPLS VPN Services. Enterprise-Managed WANs: Enterprise-Managed VPNs, GRE, Multipoint GRE, Point-to-Point and Multipoint GRE, IPsec, IPsec and dynamic VTI, DMVPN, Case Study: EIGRP DMVPN, DMVPN and Redundancy, Case Study: MPLS/VPN over GRE/DMVPN, SSL VPN. Enterprise WAN Resiliency Design: WAN Remote-Site Overview, MPLS L3 WAN Design Models, Common L2 WAN Design Models, Common VPN WAN Design Models, 3G/4G VPN Design Models, Remote Site Using Local Internet, Remote-Site LAN, Case Study: Redundancy and Connectivity, NGWAN, SDWAN, and IWAN Solution Overview, IWAN Design Overview, Enterprise WAN and Access Management. PART IV ENTERPRISE DATA CENTER DESIGNS Multitier Data Center Designs: Case Study: Small Data Centers (Connecting Servers to an Enterprise LAN), Case Study: Two-Tier Data Center Network Architecture, Case Study: Three-Tier Data Center Network Architecture. Trends and Techniques to Design Modern Data Centers: The Need for a New Network Architecture, Limitations of Current Networking Technology, Modern Data Center Design Techniques and Architectures, Multitenant Data Center. SDN: SDN characteristics, How SDN addresses current Networking Limitations, SDN Architecture Components, SDN Network Virtualization overlays. Data Center Connections: Data Center Traffic Flows, The Need for DCI, IP Address Mobility, Case Study: Dark Fiber DCI, Pseudowire DCI. PART V DESIGN QOS FOR OPTIMIZED USER EXPERIENCE QoS Overview: QoS Overview, IntServ versus DiffServ, Classification and Marking, Policers and Shapers, Policing Tools: Single-Rate Three-Color Marker, Policing Tools: TwoRate Three-Color Marker, Queuing Tools, Dropping Tools. QoS design principles and best practices: QoS overview, classification and marking design principles, policing and remarking design principles, queuing design principles, dropping design principles, Per-Hop behavior queue design principles, RFC 4594 QoS Recommendation, QoS Strategy Models. Campus QoS, WAN QoS, Data Center QoS. MPLS VPN QoS Design: The Need for QoS in MPLS VPN, Layer 2 Private WAN QoS Administration, Fully Meshed MPLS VPN QoS Administration, MPLS DiffServ Tunneling Modes, Sample MPLS VPN QoS Roles. IPsec VPN QoS Design: The Need for QoS in IPsec VPN, VPN Use Cases and Their QoS Models, IPsec Refresher, Encryption and Classification: Order of Operations, MTU Considerations, DMVPN QoS Considerations. PART VI IP MULTICAST DESIGN Enterprise IP Multicast Design: How Does IP Multicast Work? Multicast Protocols, Multicast Forwarding and RPF Check, Multicast Protocol Basics, PIM-SM Overview, Multicast Routing Table, Basic SSM Concepts, Bidirectional PIM. RP discovery, Anycast RP Features, MSDP. PART VII DESIGNING OPTIMUM ENTERPRISE NETWORK SECURITY Designing Security Services and Infrastructure Protection Network Security Zoning, Designing Infrastructure Protection. Designing firewall & IPS solutions: Firewall architectures, virtualized firewalls. Case Study: Application Tier separation, Case Study: Firewalls in a Data Center, Case Study: Firewall High Availability, IPS Architectures, Case Study: Secure Campus Edge Design (Internet and Extranet Connectivity). IP Multicast Security: Multicast Security Challenges, Multicast Network Security Considerations. Designing Network Access Control Solutions: IEEE 802.1X, EAP, 802.1X supplicants, 802.1X phased deployment, Case Study: Authorization Options. PART VIII DESIGN SCENARIOS Design Case Studies: 1: Enterprise Connectivity, 2: Enterprise BGP with Internet Connectivity, 3: IPv6, 4: Data Center Connectivity, 5: Resilient Enterprise WAN, 6: Secure Enterprise Network, 7: QoS in the Enterprise Network.

Network design
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

Network management technologies

5.0(3)

By Systems & Network Training

NETWORK MANAGEMENT TECHNOLOGIES COURSE DESCRIPTION A comprehensive tour of the available network management technologies available for todays networks. The course starts with basic tools such as syslog along with Python network automation. SNMP is then covered with the *flow technologies and streaming telemetry. Configuration management with ansible, Python, NETCONF and RESTCONF is then studied. The final part of the course looks at SDN. Hands on sessions are used throughout to reinforce the theory rather than teach specific manufacturer equipment. Note that sections are available as individual courses. WHAT WILL YOU LEARN * Evaluate network management technologies. * Evaluate network management technologies. * Recognise the weaknesses of SNMP versus NETCONF and streaming telemetry. * Explain the role of NETCONF and RESTCONF. * Compare & contrast *flow and streaming telemetry. * Explain the role of SDN in network management. * Automate network configuration with ansible and Python. NETWORK MANAGEMENT TECHNOLOGIES COURSE DETAILS * Who will benefit: Those wishing to manage networks. (Previous Python experience is NOT needed) * Prerequisites: Intro to data comms * Duration 5 days NETWORK MANAGEMENT TECHNOLOGIES COURSE CONTENT BASIC NETWORK MANAGEMENT * Network management What is network management? Benefits, issues. FCAPS model. Fault management, Configuration management, accounting, performance, security. What to manage, what not to manage. Managing network devices, managing servers. MONITORING NETWORKS * Traditional network tools Ping..., SSH, syslog, TFTP for configurations. nmap. Wireshark. CLI. Web based management. Splunk. Nessus, snort, Kali. Hands on syslog, network inventories. * Network automation using the CLI Programming and automating networks, netOps. Python, Git. Python network modules, SSH, paramiko, netmiko. EVE-NG. Hands onPython network modules. * Structured versus unstructured data Problems with automation and unstructured data. XML, JSON, YAML. The role of YANG. Hands on Parsing data. * SNMP SNMP architecture, SNMP MIBs, SMI, the SNMP protocol, polling security. Configuring SNMP. SNMPv1, v2, v3, SNMP security. Which version should you use? MIBs and MIB structure. mib-2, extra parts of mib-2, Private enterprise MIBs. Summary: What SNMP is good/bad at. Hands on Configuring agents and a NMS. MIB browsing. * Server management Microsoft, Linux, application polling. WMI vs SNMP. Hands on: Application polling. PERFORMANCE MANAGEMENT * *flow Polling, push vs pull, netflow, sflow, IPFIX, *flow. Flows. Where to monitor traffic. Comparing *flow with SNMP. Architecture: Generators and collectors. When flows are exported. NetFlow reporting products. SolarWinds. Hands on Netflow configuration. Collectors. * Streaming telemetry Model driven telemetry, periodic/on change. Structured data. Telemetry protocol stack. gRPC and gNMI. Protobuf. gNMI operations. Telemetry architecture. Telegraf, databases, Grafana. Hands on Telemetry example. CONFIGURATION MANAGEMENT * Configuration management tools Chef, puppet, ansible, saltstack. Ansible architecture, controlling machines, nodes, agentless, SSH, modules. Inventories, playbooks, modules, network modules, jinja2 templates. Hands on Network configuration with ansible. * NETCONF What is NETCONF? Protocol stack, Data stores, traffic flows, validating configurations, rollback. YANG data models and how YANG is used by NETCONF. XML. Explorers and other tools. Hands on anx, Python and NETCONF. * RESTCONF The REST API, HTTP, What is RESTCONF? Tools including Postman. Comparison with NETCONF. Hands on Configuration with RESTCONF. * Python network automation: configuration SSH issues. Using structured data. Jinja2. ncclient, requests, NAPALM, Nornir. Automated testing. Hands on Python network device configuration with nornir. SOFTWARE DEFINED NETWORKS AND ORCHESTRATION * Classic SDN What is SDN? benefits. SDN architecture. SDN applications, SDN switches, SDN controllers, Network Operating Systems. Control plane, data plane. Northbound interfaces. SDN components. Southbound interfaces. OpenFlow. ONF, OpenFlow ports, Flow tables. * Network virtualization Virtual networks, virtual switches, NfV. Service chaining. NfV and SDN. * SDN implementations Classic SDN, Hybrid SDN, SDN via APIs, SDN via overlays. Data centre SDN, VXLAN, Service Provider SDN, SD WAN, Enterprise SDN, WiFi. * SDN and open source OpenDaylight, OpenVSwitch, Open Networking Forum, Open Network Operating System. Hands onOpenStack. * SD-WAN What is SD-WAN? Architecture: Edge, gateway, orchestrator, controller. Overlay and underlay. Use of MPLS, 4G/5G. Benefits and features. Secure Access Service Edge (SASE).

Network management technologies
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

DevOps for networking engineers

5.0(3)

By Systems & Network Training

NETWORK DEVOPS COURSE DESCRIPTION This course is not a soft skills course covering the concepts of DevOps but instead concentrates on the technical side of tools and languages for network DevOps. Particular technologies focussed on are ansible, git and Python enabling delegates to leave the course ready to starting automating their network. Hands on sessions follow all major sections. More detailed courses on individual aspects of this course are available. WHAT WILL YOU LEARN * Evaluate network automation tools. * Automate tasks with ansible. * Use git for version control. * Use Python to manage network devices. * Use Python libraries for network devices. NETWORK DEVOPS COURSE DETAILS * Who will benefit: Administrators automating tasks. * Prerequisites: TCP/IP Foundation * Duration 5 days NETWORK DEVOPS COURSE CONTENTS * What is DevOps Programming and automating networks, networks and clouds, AWS, OpenStack, SDN, DevOps for network operations. * Initial configuration Configuring SSH, ZTP, POAP. Hands on Initial lab configuration. * Getting started with ansible The language, the engine, the framework. Uses of ansible, orchestration. The architecture, Controlling machines, nodes, Agentless, SSH, modules. Configuration management, inventories, playbooks, modules, roles. Hands on Installing ansible, running ad hoc commands. * Ansible playbooks ansible-playbook, YAML, plays, tasks, handlers, modules. Playbook variables. Register module, debug module. Hands on Running playbooks. * Ansible Inventories /etc/ansible/hosts, hosts, groups, static inventories, dynamic inventories. Inventory variables, external variables. Limiting hosts. Hands on Static inventories, variables in inventory files. * Ansible modules for networking Built in modules, custom modules, return values. Core modules for network operations. Cisco and/or Juniper modules. ansible_connection. Ansible 2.6 CLI. Hands on Using modules. * Ansible templating and roles aConfiguration management, full configurations, partial configurations. The template module, the assemble module, connection: local, Jinja2 templates, variables, if, for, roles. Hands on Generating multiple configurations from a template. * Network programming and modules Why use Python? Why use ansible? alternatives, ansible tower, Linux network devices. * Programming with Python Python programming Functions. Classes, objects and instances, modules, libraries, packages. Python strings, Python file handling, pip list, pip instal. Hands on Python programming with pyping. * More Python programming Functions. Classes, objects and instances, modules, libraries, packages. Python strings, Python file handling, pip list, pip install. Hands on Python programming with pyping. * Git Distributed version control, repositories, Git and GitHub, Alternatives to GitHub, Installing git, git workflows, creating repositories, adding and editing files, branching and merging, merge conflicts. Hands on working with Git. * Python and networking APIs, Sockets, Telnetlib, pysnmp, ncclient, ciscoconfparse. * Paramiko SSH and Netmiko Integrating Python and network devices using SSH. Netmiko, Netmiko methods. Hands on Netmiko. * NAPALM What is NAPALM, NAPALM operations, getters, Replace, merge, compare, commit, discard. Hands on Configuration with NAPALM. Integrating ansible and NAPALM. * Python and REST REST APIs, enabling the REST API. Accessing the REST API with a browser, cURL, Python and REST, the request library. Hands on Using a REST API with network devices.

DevOps for networking engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

Educators matching "Computing & IT"

Show all 102
Becky Stevenson

becky stevenson

5.0(8)

Sheffield

My zone of genius is processes – I can quickly improve, reconfigure and map them. And the second thing is ideas – I can generate ideas very quickly and put them into a plan (basically a process). I have over 20 years of experience working at leading companies and I built my first business to six figures in just two years whilst employed full time (Yeah – it was really hard!) During my career, I’ve learned how to systemize, improve and implement processes to ensure that large-scale and complex operations run like clockwork. I now help business owners streamline the running of their business. I show you how to improve the way your business is managed and organised. And in turn show you how to grow, improve profit and introduce new services and income streams. My Mission It is my mission to help as many businesses owners to become efficient, streamlined, productive, profitable, and importantly, happy business owners with my business consultancy. A good customer journey is essential to continued success and I show businesses how to allow customers to buy with ease, build trust and authority with, and by the end, build customers to become your raving fans. How I work I am hands-on and I don’t just give theories. I use a combination of strategy, mentoring, consultancy and coaching. Every company and person is unique, and the approach shouldn’t be the same, it’s adapted to suit the person, the mission, values, and goals of your individual business. I also have a team to help bring solutions to you. Virtual Assistants to help with admin, specialised marketing experts and tech developers to build bespoke business systems (CRMs/Workflow systems) for small to medium-sized businesses. My style My style is straightforward, jargon-free, and looks at the foundations and heart of you and your business. I’m passionate and want to help you grow and instil positive change. The relationship doesn’t end there. You become part of my tribe. I will cheerlead you and shout about you. I will be there for long term support and advice going forward – if you want that, of course! It’s all done with a big smile, positivity, kindness and a genuine interest in the people and businesses I work with. What I love Living on the doorstep of the beautiful Peak District is bliss, I love nothing more than getting out and exploring. I also love hitting my local gym for weight and Hit training (I still can’t do a full press up – but I’m working on it!) Most of all, I love spending time with my husband, daughter, family and friends especially when it involves good coffee, cake, and food.

Little Fishes

little fishes

5.0(22)

Sheffield

Avoid the resource drain and inefficiencies of supplier sprawl through a single supplier that gives you optimised service integration and management. The Littlefish team is ready and waiting to understand the challenges your organisation faces and offer expert solutions and advice – whatever your query or requirements, we’d love to hear from you. Providing managed IT and cyber security services that are tailored to your precise organisational requirements is at the heart of everything we do. Our people-first approach ensures a world-class customer experience and delivers where other IT outsourcing providers often fail to perform. Your business growth is our mission and improving your business performance through world-class IT support is at the heart of everything we do. We tailor IT strategy to fit the level of IT experience the users across your organisation have. This ensures an optimal end user experience, leading to higher service uptake and overall better performance. With our UK based managed IT services specialists on-hand 24/7, we also strip the stress away from your employees, allowing them to focus on what they excel at. Managed IT solutions should be the means to an end that enables your business to operate efficiently and successfully. At Littlefish, we’re always conscious of this, and encourage our people to think and act as though they are walking in the customer’s shoes. Still, don’t take our word for it; here’s what our customers have to say about the genuine business value they’ve realised from partnering with Littlefish.

Lindsey Carr

lindsey carr

5.0(13)

Sheffield

I trained as a Careers Adviser in 2007-8 after a long career working in the charity sector in a range of roles including managing a Volunteer Centre, working with community groups, managing volunteers and recruiting learners to courses run in the community. Some of my more unusual jobs have involved working in a Youth Hostel in the Yorkshire Dales, working on a sheep farm for two years in Australia and being a Tour Guide in a monastery. Being a Careers Adviser has been a great way of combining my two main passions – helping people achieve their goals and researching and disseminating information. An optimist by nature, I believe that everyone has skills, talents and abilities. Sometimes individuals need help uncovering these and with communicating them clearly to employers or with working out their next step on their career journey. I have certainly benefitted myself over the years from the support of various career professionals. Between 2013 – 2017 I was employed as a Careers Adviser delivering a national contract for adults seeking careers advice. Whilst I loved the work I became increasingly frustrated by the limitations of the contract which prevented many clients getting what they really needed support with. I realised the only way to be able to provide an excellent client-centred service was by providing it myself! And so I launched my own business. For your peace of mind I have Professional Indemnity Insurance and am a member of the national Career Development Institute (CDI). As a Registered Professional on the CDI register I am required to carry out 25 hours per year of Continuous Professional Development. I’m really interested in being the Best Career Consultant I can be so I regularly attend training and information events in order to develop my skills and knowledge.