• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

246 Architecture courses in London

Definitive H.323 for engineers

5.0(3)

By Systems & Network Training

H.323 TRAINING COURSE DESCRIPTION A hands on course covering IP telephony with H.323. The course starts with a brief review of knowledge students should already possess including RTP and RTCP. The main focus is on H.323 protocols though, progressing from what H.323 is through signalling, call processing and architectures, moving onto more advanced issues including security, multimedia, conferencing, and interoperability. Hands on practicals follow each major theory session. WHAT WILL YOU LEARN * Explain how H.323 works. * Analyse H.323 packets. * Deploy H.323 IP telephony solutions. * Integrate H.323 with other telephony solutions. H.323 TRAINING COURSE DETAILS * Who will benefit: Technical staff working with H.323 * Prerequisites: Voice Over IP * Duration 2 days H.323 TRAINING COURSE CONTENTS * VoIP review Brief review of VoIP, IP, telephones and voice. RTP, RTCP, mixers and translators. * What is H.323? The framework, Why H.323, history, H.323 standards and the ITU, H.323 versions 1,2,3,4, and 5, Annexes and Appendices, capabilities, services, How H.323 works, a basic call. * H.323 protocol stack The overall framework, Audio codecs (H.7xx), Video codecs (H.26x), T.120 data conferencing. * H.323 Architecture Endpoints: Terminals, MCUs, gateways. Gatekeepers, border and peer elements, design issues, signalling with and without gatekeepers. * H.225 Packet format, ASN.1, Information elements, Call setup, Call control. * Gatekeepers Gatekeeper features, admissions, address translation, bandwidth management, call routing, zones, administrative domains, gatekeeper discovery, call establishment, fast connect. RAS packet formats, RAS signalling. Alternate gatekeepers. * H.245 Purpose, call control channel, relationship with H.225, message format, tunnelling. * H.323 Supplementary services Conferencing: point to point, multipoint, hybrid, broadcast, H.332. H.450.x. Call transfer, diversion, hold and waiting. Remote device control (H.282, H.283). Capability exchange, Video. * Security H.235. Authentication, privacy, transport layer level security. * Interoperability Gateways, Inter working with PSTN, SIP and H323. H.246. * Annexes and Appendices An overview.

Definitive H.323 for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2477

Total FabricPath for engineers

5.0(3)

By Systems & Network Training

TOTAL FABRICPATH TRAINING COURSE DESCRIPTION A comprehensive look at Cisco's FabricPath. This course starts with the problems in traditional switched networks then moves onto to how FabricPath solves these problems. As IS-IS is key to loop free topologies in FabricPath networks, this protocol is also studied. WHAT WILL YOU LEARN * Explain the benefits of FabricPath. * Explain how FabricPath works * Explain the role of IS-IS in FabricPath. * Integrate FabricPath into existing networks. TOTAL FABRICPATH TRAINING COURSE DETAILS * Who will benefit: Technical staff working with FabricPath. * Prerequisites: Definitive Ethernet switching for engineers * Duration 1 day TOTAL FABRICPATH TRAINING COURSE CONTENTS * What is FabricPath? Layer 2 versus Layer 3, STP problems: One path, convergence, MAC explosion. Frame routing. Shortest path. Comparison with TRILL. * FabricPath architecture Core and edge, VLANs, vPC+. * IS-IS Link layer IS-IS, SPF trees, traffic management. IS -IS extensions for FabricPath. ISIS TLV. * FabricPath forwarding Routing table, Switch IDs, multi destination trees, IGMP snooping. Roots. MAC versus switch tables. FabricPath Dynamic Resource Allocation Protocol (DRAP). * FabricPath frames Encapsulation, frame format, Switch ID, Forwarding tag. * Miscellaneous Basic configuration, interoperation with STP, TCN forwarding

Total FabricPath for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1397

Securing UNIX systems

5.0(3)

By Systems & Network Training

SECURING UNIX SYSTEMS TRAINING COURSE DESCRIPTION This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. WHAT WILL YOU LEARN * Secure UNIX accounts. * Secure UNIX file systems. * Secure UNIX access through the network. SECURING UNIX SYSTEMS COURSE DETAILS * Who will benefit: Linux technical staff needing to secure their systems. * Prerequisites: Linux system administration (LPIC-1) * Duration 5 days SECURING UNIX SYSTEMS COURSE CONTENTS * Cryptography * Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. * Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. * Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. * DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. * Host Security * Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. * Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. * User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. * FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. * Access Control * Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. * Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. * etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. * Network Security * Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. * Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. * Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd * Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing UNIX systems
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

Definitive VPNs for engineers

5.0(3)

By Systems & Network Training

DEFINITIVE VPNS TRAINING COURSE DESCRIPTION A hands on course covering VPNs from the basics of benefits and Internet vs. Intranet VPNs through to detailed analysis of the technologies involved in VPNs. All the major VPN protocols are covered including PPPoE, L2TP, SSL, IPsec and dynamic VPNs. MPLS L3 VPNs are also covered. WHAT WILL YOU LEARN * Describe what a VPN is and explain the difference between different VPN types. * Recognise the design and implementation issues involved in implementing a VPN. * Explain how the various technologies involved in a VPN work. * Describe and implement: L2TP, IPsec, SSL, MPLS L3 VPNs. * Evaluate VPN technologies. DEFINITIVE VPNS TRAINING COURSE DETAILS * Who will benefit: Network personnel. * Prerequisites: IP Security foundation for engineers. * Duration 3 days DEFINITIVE VPNS TRAINING COURSE CONTENTS * VPN overview What is a VPN? What is an IP VPN? VPNs vs. Private Data Networks, Internet VPNs, Intranet VPNs, Remote access VPNs, Site to site VPNs, VPN benefits and disadvantages. * VPN Tunnelling VPN components, VPN tunnels, tunnel sources, tunnel end points, hardware based VPNs, Firewall based VPNs, software based VPNs, tunnelling topologies, tunnelling protocols, which tunnelling protocol should you use? requirements of tunnels. * VPN security components Critical VPN security requirements, Encryption and authentication, Diffie Hellman, DES, 3DES, RSA, PKI, Ca server types, pre shared keys versus certificates, Enrolling with a CA, RADIUS in VPNs. * PPP Encapsulation, operation, authentication. Hands on Setting up PPPoE and analysing PPP packets. * PPTP Overview, Components, How it works, control and data connections, GRE. Hands on Building a PPTP VPN. * L2TP Overview, components, how it works, security, packet authentication, L2TP/IPSec, L2TP/PPP, Layer 2 versus layer 3 tunnelling. Hands on Implementing a L2TP tunnel. * IPSec AH, HMAC, ESP, transport and tunnel modes, Security Association, use of encryption and authentication algorithms, manual vs automated key exchange, NAT and other issues. Hands on Implementing an IPSec VPN. * Intranet VPNs Headers, architecture, label switching, LDP, MPLS VPNs. * VPN products and services PE and CPE, management, various VPN products. * VPN issues and architectures VPN architectures: terminate VPN before/on/ after/in parallel with firewall, resilience issues, VRRP, performance issues, QoS and VPNs. documentation.

Definitive VPNs for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2367

Ansible for network engineers

5.0(3)

By Systems & Network Training

ANSIBLE TRAINING COURSE DESCRIPTION The course focusses on the use of ansible for network devices instead of its usual server use case. The course progresses from the basics of ansible and playbooks onto using network specific modules including NAPALM. The use Jinja2 templating with ansible is also studied. Hands on sessions with ansible configuring routers and switches follow all major sections. WHAT WILL YOU LEARN * Automate tasks with ansible. * Write ansible playbooks. * Configure network devices with ansible. * Troubleshoot network devices with ansible. * Use ansible network modules. * Use jinja2 templates with ansible. ANSIBLE TRAINING COURSE DETAILS * Who will benefit: Network engineers. * Prerequisites: TCP/IP Foundation * Duration 2 days ANSIBLE TRAINING COURSE CONTENTS * What is ansible? The language, the engine, the framework. Uses of ansible, orchestration. Hands on Installing ansible, enabling SSH on network devices. * Ansible architecture How ansible 'normally' works, Agentless, SSH, ansible and Python, modules, how ansible work on network devices, Configuration management, inventories, playbooks, modules, ansible.cfg. Hands on Getting started, running ad hoc commands. * Playbooks ansible-playbook, users, YAML, plays, tasks, modules. ansible-vault. Hands on Running playbooks. * More playbooks Handlers, variables, environmental variables, playbook variables, inventory variables, variable scope and precedence, accessing variables, facts, ansible vault. Conditionals, wait_for. Hands on Using variables and conditions in playbooks. * Inventories /etc/ansible/hosts, inventory variables, static inventories, dynamic inventories. Hands on Inventories and variables. * Ansible network modules Built in modules, custom modules, return values. ansible-doc -l. connection: local, Cisco modules, Juniper module, Hands on Using modules for your network devices. * Ansible templatings The template module, the assemble module, jinja2 templates, for, if else. Hands on Configuring network devices from templates. * Roles and includes Dynamic includes, Handler includes, playbook includes. Roles, role parts: handlers, files, templates, cross platform roles, ansible galaxy. Hands on includes example, building roles. * Ansible and NAPALM Installation, napalm-ansible, NAPALM modules: napalm_diff-yang, napalm_get_facts, napalm_install_config, napalm_parse_yang, napalm_ping, napalm_translate_yang, napalm_validate. Hands on Using NAPALM modules in ansible.

Ansible for network engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2477

DevOps for networking engineers

5.0(3)

By Systems & Network Training

NETWORK DEVOPS COURSE DESCRIPTION This course is not a soft skills course covering the concepts of DevOps but instead concentrates on the technical side of tools and languages for network DevOps. Particular technologies focussed on are ansible, git and Python enabling delegates to leave the course ready to starting automating their network. Hands on sessions follow all major sections. More detailed courses on individual aspects of this course are available. WHAT WILL YOU LEARN * Evaluate network automation tools. * Automate tasks with ansible. * Use git for version control. * Use Python to manage network devices. * Use Python libraries for network devices. NETWORK DEVOPS COURSE DETAILS * Who will benefit: Administrators automating tasks. * Prerequisites: TCP/IP Foundation * Duration 5 days NETWORK DEVOPS COURSE CONTENTS * What is DevOps Programming and automating networks, networks and clouds, AWS, OpenStack, SDN, DevOps for network operations. * Initial configuration Configuring SSH, ZTP, POAP. Hands on Initial lab configuration. * Getting started with ansible The language, the engine, the framework. Uses of ansible, orchestration. The architecture, Controlling machines, nodes, Agentless, SSH, modules. Configuration management, inventories, playbooks, modules, roles. Hands on Installing ansible, running ad hoc commands. * Ansible playbooks ansible-playbook, YAML, plays, tasks, handlers, modules. Playbook variables. Register module, debug module. Hands on Running playbooks. * Ansible Inventories /etc/ansible/hosts, hosts, groups, static inventories, dynamic inventories. Inventory variables, external variables. Limiting hosts. Hands on Static inventories, variables in inventory files. * Ansible modules for networking Built in modules, custom modules, return values. Core modules for network operations. Cisco and/or Juniper modules. ansible_connection. Ansible 2.6 CLI. Hands on Using modules. * Ansible templating and roles aConfiguration management, full configurations, partial configurations. The template module, the assemble module, connection: local, Jinja2 templates, variables, if, for, roles. Hands on Generating multiple configurations from a template. * Network programming and modules Why use Python? Why use ansible? alternatives, ansible tower, Linux network devices. * Programming with Python Python programming Functions. Classes, objects and instances, modules, libraries, packages. Python strings, Python file handling, pip list, pip instal. Hands on Python programming with pyping. * More Python programming Functions. Classes, objects and instances, modules, libraries, packages. Python strings, Python file handling, pip list, pip install. Hands on Python programming with pyping. * Git Distributed version control, repositories, Git and GitHub, Alternatives to GitHub, Installing git, git workflows, creating repositories, adding and editing files, branching and merging, merge conflicts. Hands on working with Git. * Python and networking APIs, Sockets, Telnetlib, pysnmp, ncclient, ciscoconfparse. * Paramiko SSH and Netmiko Integrating Python and network devices using SSH. Netmiko, Netmiko methods. Hands on Netmiko. * NAPALM What is NAPALM, NAPALM operations, getters, Replace, merge, compare, commit, discard. Hands on Configuration with NAPALM. Integrating ansible and NAPALM. * Python and REST REST APIs, enabling the REST API. Accessing the REST API with a browser, cURL, Python and REST, the request library. Hands on Using a REST API with network devices.

DevOps for networking engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

Network automation for engineers

5.0(3)

By Systems & Network Training

NETWORK AUTOMATION COURSE DESCRIPTION This course is not a soft skills course covering the concepts of DevOps but instead concentrates on the technical side of tools and languages for network DevOps. Particular technologies focussed on are ansible, git and Python enabling delegates to leave the course ready to starting automating their network. Hands on sessions follow all major sections. More detailed courses on individual aspects of this course are available. WHAT WILL YOU LEARN * Evaluate network automation tools. * Automate tasks with ansible. * Use git for version control. * Use Python to manage network devices. * Use Python libraries for network devices. NETWORK AUTOMATION COURSE DETAILS * Who will benefit: Network engineers. * Prerequisites: TCP/IP foundation for engineers. * Duration 5 days NETWORK AUTOMATION COURSE CONTENTS * What is DevOps Programming and automating networks, networks and clouds, AWS, OpenStack, SDN, DevOps for network operations. * Initial configuration Configuring SSH, ZTP, POAP. Hands on Initial lab configuration. * Getting started with ansible The language, the engine, the framework. Uses of ansible, orchestration. The architecture, Controlling machines, nodes, Agentless, SSH, modules. Configuration management, inventories, playbooks, modules, roles. Hands on Installing ansible, running ad hoc commands. * Ansible playbooks ansible-playbook, YAML, plays, tasks, handlers, modules. Playbook variables. Register module, debug module. Hands on Running playbooks. * Ansible Inventories /etc/ansible/hosts, hosts, groups, static inventories, dynamic inventories. Inventory variables, external variables. Limiting hosts. Hands on Static inventories, variables in inventory files. * Ansible modules for networking Built in modules, custom modules, return values. Core modules for network operations. Cisco and/ or Juniper modules. ansible_connection. Ansible 2.6 CLI. Hands on Using modules. * Ansible templating and roles Configuration management, full configurations, partial configurations. The template module, the assemble module, connection: local, Jinja2 templates, variables, if, for, roles. Hands on Generating multiple configurations from a template. * Network programming and modules Why use Python? Why use ansible? alternatives, ansible tower, Linux network devices. * Programming with Python Scripting versus application development, Python interactive mode, Python scripts, Python 2.7 vs Python 3. A simple Python script. Variables, loops, control statements, operators. PEP style guide. Python IDEs. Hands on Simple Python programs. * More Python programming Functions. Classes, objects and instances, modules, libraries, packages. Python strings, Python file handling, pip list, pip install, Hands on Python programming with pyping. * Git Distributed version control, repositories, Git and GitHub, Alternatives to GitHub, Installing git, git workflows, creating repositories, adding and editing files, branching and merging, merge conflicts. Hands on working with Git. * Python and networking APIs, Sockets, Telnetlib, pysnmp, ncclient, ciscoconfparse. * Paramiko SSH and Netmiko Integrating Python and network devices using SSH. Netmiko, Netmiko methods. Hands on Netmiko. * PyEZ Juniper, NETCONF, installing PyEZ, a first pyEZ script, pyEZ configuration management. Hands on Juniper configuration management with pyEZ. * NAPALM What is NAPALM, NAPALM operations, getters, Replace, merge, compare, commit, discard. Hands on Configuration with NAPALM. Integrating ansible and NAPALM. * Python and REST REST APIs, enabling the REST API. Accessing the REST API with a browser, cURL, Python and REST, the request library. Hands on Using a REST API with network devices.

Network automation for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

AutoCAD Mac Basic-Intermediate Training Courses

By London Design Training Courses

AutoCAD Mac Basic to Intermediate Training: Click [https://www.londondesigntrainingcourse.co.uk/product-page/autocad-mac-basic-to-intermediate-training-course] here for more info [https://www.londondesigntrainingcourse.co.uk/product-page/autocad-mac-basic-to-intermediate-training-course] Learn to produce accurate, to-scale 2D drawings with AutoCAD for Mac training.  A project-based course made for AutoCAD Mac users and focused on architecture & interior designs students and professionals. Duration: 10 hrs Method: 1-on-1, Personalized attention. Schedule: Tailor your own schedule by pre-booking a convenient hour of your choice, available from Monday to Saturday between 9 am and 7 pm. AutoCAD Mac Basic to Intermediate Training: * Master precise, to-scale 2D drawings with tailored AutoCAD for Mac training. * Designed for architecture and interior design professionals and students. * Duration: 10 hours of in-depth learning. * Method: Personalized 1-on-1 attention for an immersive learning experience. * Flexible Scheduling: Choose your convenient hour from Monday to Saturday, between 9 am and 7 pm. Book now to customize your training journey! AutoCAD Mac Basic to Intermediate Training: * Master precise, to-scale 2D drawings with tailored AutoCAD for Mac training. * Designed for architecture and interior design professionals and students. * Duration: 10 hours of in-depth learning. * Method: Personalized 1-on-1 attention for an immersive learning experience. * Flexible Scheduling: Choose your convenient hour from Monday to Saturday, between 9 am and 7 pm. Book now to customize your training journey! AutoCAD Mac Basic to Intermediate Training: * Master precise, to-scale 2D drawings with tailored AutoCAD for Mac training. * Designed for architecture and interior design professionals and students. * Duration: 10 hours of in-depth learning. * Method: Personalized 1-on-1 attention for an immersive learning experience. * Flexible Scheduling: Choose your convenient hour from Monday to Saturday, between 9 am and 7 pm. Book now to customize your training journey! AutoCAD Mac Basic to Intermediate Training: * Master precise, to-scale 2D drawings with tailored AutoCAD for Mac training. * Designed for architecture and interior design professionals and students. * Duration: 10 hours of in-depth learning. * Method: Personalized 1-on-1 attention for an immersive learning experience. * Flexible Scheduling: Choose your convenient hour from Monday to Saturday, between 9 am and 7 pm. Book now to customize your training journey!

AutoCAD Mac Basic-Intermediate Training Courses
Delivered in-person, on-request, onlineDelivered Online & In-Person in London
£290

Fundamentals of E&P Data Management

By Asia Edge

ABOUT THIS VIRTUAL INSTRUCTOR LED TRAINING (VILT) The energy industry has started its journey to be more data centric by embracing the industry 4.0 concept. As a result, data management - which was considered until recently as a back-office service to support geoscience, reservoir management, engineering, production and maintenance - is now given the spotlight! To become an active stakeholder in this important transition in E&P data management, it is necessary to understand the new technical opportunities offered by the Cloud, Artificial Intelligence and how data governance can pave the way towards more reliable and resilient processes within E&P domain. Several key questions that need to be addressed: 1. Why place more focus on data assets? 2. Is data management just about serving geoscientists or engineers with fresh data? 3. What is the value of data management in the E&P sector for decision making? 4. How to convince the data consumers that the data we provide is reliable? 5. Is the data architecture of my organization appropriate and sustainable? The purpose of this 5 half-day Virtual Instructor Led Training (VILT) course is to present the data challenges facing the energy organizations today and see how they practically solve them. The backbone of this course is based on the DAMA Book of Knowledge for Data Management. The main data management activities are described in sequence with a particular focus on recent technological developments. Training Objectives Upon completion of this VILT course, the participants will be able to: * Understand why the data asset is now considered as a main asset by energy organizations * Appreciate the importance of data governance and become an active stakeholder of it * Understand the architecture and implementation of data structure in their professional environment * Get familiarized with the more important data management activities such as data security and data quality * Integrate their subsurface and surface engineering skills with the data managements concepts This VILT course is unique on several points: * All notions are explained by some short presentations. For each of them, a set of video, exercises, quizzes will be provided to help develop an engaging experience between the trainer and the participants * A pre-course questionnaire to help the trainer focus on the participants' needs and learning objectives * A detailed reference manual * A lexicon of terms for data-management * Limited class size to encourage the interactivity Target Audience This VILT course is intended for: * Junior/new data managers * Geoscientists * Reservoir engineers * Producers * Maintenance specialists * Construction specialists * Human resources * Legal Course Level * Basic or Foundation Training Methods The VILT course will be delivered online in 5 half-days consisting 4 hours per day, with 2 breaks of 10 minutes per day. Course Duration: 5 half-day sessions, 4 hours per session (20 hours in total). Trainer Your expert course leader is a geologist by education who has dedicated his career to subsurface data management services. In 2016, he initiated a tech startup dedicated to Data Management using Artificial Intelligence (AI) tools. He is heavily involved in developing business plans, pricing strategies, partnerships, marketing and SEO, and is the co-author of several Machine Learning publications. He also delivers training on Data Management and Data Science to students and professionals. Based in France, he was formerly Vice President, Sales & Marketing at CGG where he was in charge of the Data Management Services strategy, Sales Manager at Spie O&G Services where he initiated the Geoscience technical assistance activities and Product Manager of interactive seismic inversion software design and marketing at Paradigm.       POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Fundamentals of E&P Data Management
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£953 to £1799

Essential IP addressing and subnetting

5.0(3)

By Systems & Network Training

IP ADDRESSING AND SUBNETTING COURSE DESCRIPTION A course focusing purely on IP addressing and subnetting. The course assumes that delegates already have some knowledge of IP addressing. In particular delegates will be able to calculate subnet numbers in seconds without using binary. WHAT WILL YOU LEARN * Download and install Wireshark. * Calculate subnet numbers in seconds * Design IP addressing schemes. * Troubleshoot IP address problems. * Calculate CIDR prefixes in seconds IP ADDRESSING AND SUBNETTING COURSE DETAILS * Who will benefit: Anyone working with TCP/IP. * Prerequisites: TCP/IP Foundation for engineers * Duration 2 days IP ADDRESSING AND SUBNETTING COURSE CONTENTS * IP addressing review What is an IP address? What is a subnet? Classless IP addressing. The rules of IP addressing. Ways IP addresses are used: On hosts, in packets, in routing tables. Hands on Byte boundary subnetting. * Configuring IP addresses Interfaces, Static vs. dynamic configuration. DHCP: Scopes, leases, relays, using multiple DHCP servers. Multihoming. * Subnetting Default subnet masks, subnet notations. How to subnet without binary. VLSMs. Hands on Bit boundary subnetting. * Address ranges and routing Routing tables, IP address spoofing, host specific routing, subnets in routing tables, supernets in routing tables. CIDR. Impact of choice of routing protocol. Hands on IP addressing plans. * Allocations and assignments IAB, IANA, RIRs, RIPE, LIRs and ISPs. PI vs. PA addressing. Hands on Querying the RIPE database. * Private addressing and NAT NAT, NAPT, NAT terms, private addresses, NAT operation, NAT architecture, NAT and security, why use NAT? NAT-ALG, Types of NAT, RSIP. * Special use addresses Unicasts, broadcasts, multicasts, anycasts. Directed broadcasts. Allowing broadcasts through routers.

Essential IP addressing and subnetting
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1727