• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

428 Basic courses in Bradford

Concise Cisco routing

5.0(3)

By Systems & Network Training

CONCISE CISCO ROUTERS COURSE DESCRIPTION A fast paced practical hands on introduction to Cisco routers concentrating on basic product knowledge needed for the real world. Starts with the basics of routing through configuring static routes, RIP, OSPF, and EIGRP ending with access lists. Hands on sessions follow all the major chapters with a major practical at the end to reinforce all that was learnt in the course. WHAT WILL YOU LEARN * Use the Cisco setup script. * Use the Cisco command line. * Perform basic troubleshooting. * Configure - Interfaces - RIP, IGRP - OSPF, EIGRP CONCISE CISCO ROUTERS COURSE DETAILS * Who will benefit: Anyone who will be working with Cisco routers. In particular: Network Administrators, Field engineers, Network support personnel * Prerequisites: None, although a knowledge of the TCP/IP protocols would be advantageous. * Duration 3 days CONCISE CISCO ROUTERS COURSE CONTENT * Basics of routing What are routers? Network protocols, Routing protocols. * The Cisco routers Router models, The IOS, DRAM, SRAM, NVRAM, Flash, ROM and boot flash. * Getting started Accessing the router, installing a Cisco, using the setup script. * The command line interface User and privilege modes, online help show, debug, basic troubleshooting * Configuring Ciscos The configuration editor, Global, major and sub commands, enable, secret and other passwords, telnet. * Miscellaneous exercises Buffered logging, web access, CDP… * Subnetting IP addressing rules. The need for subnetting, subnet masks, Calculating network numbers. * Configuring Interfaces Basics, Ethernet, Serial lines, PPP, DCE, loopback interfaces. * Static routes Why use static routes? Configuring static routes, default routes. * Configuring RIP and IGRP How they work, configuration, troubleshooting. * OSPF Configuration and troubleshooting. * EIGRP Configuration and troubleshooting. * Housekeeping Configuration management, offline editing and TFTP usage. Cisco boot sequence, IOS upgrades. Bypassing Cisco passwords. * Access lists What are access lists? General rules, basic and extended IP access lists. * Putting it all together A series of exercises based around, installs, adds, moves, changes, upgrades and troubleshootin

Concise Cisco routing
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2367

Concise Mikrotik routers for engineers

5.0(3)

By Systems & Network Training

MIKROTIK ROUTERS TRAINING COURSE DESCRIPTION A fast paced practical hands on introduction to Mikrotik routers concentrating on basic product knowledge needed for the real world. Starts with the basics of accessing the routers through configuring static routes, RIP and OSPF, ending with firewalls. Hands on sessions follow all the major chapters. WHAT WILL YOU LEARN * Use Winbox. * Use the Mikrotik command line. * Perform basic troubleshooting. * Configure Interfaces, RIP and OSPF. * Perform housekeeping tasks such as: - save and load configurations - upgrade the OS - recover lost passwords MIKROTIK ROUTERS TRAINING COURSE DETAILS * Who will benefit: Anyone who will be working with Mikrotik routers. * Prerequisites: TCP/IP foundation for engineers * Duration 2 days MIKROTIK ROUTERS TRAINING COURSE CONTENT * Mikrotik routers RouterOS, RouterBoard. System resources. * Getting started Accessing the router, Winbox, Webfig, Quickset. telnet. * The command line interface Contexts, online help, basic troubleshooting. * Configuring Interfaces Basics, Enabling interfaces. Ethernet, loopback interfaces. Adding IP addresses. * Static routes Why use static routes? Configuring static routes, default routes. * Configuring RIP How RIP works, configuration, troubleshooting. * OSPF Configuration and troubleshooting. * Housekeeping Configuration management, offline editing and FTP usage. RouterOS upgrades. Packages. Bypassing passwords. * Other functions DHCP server. * Firewall Connections, chains, actions, filters.

Concise Mikrotik routers for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2477

Public Private Partnership (PPP)

5.0(10)

By GBA Corporate

OVERVIEW -------------------------------------------------------------------------------- Public Private Partnerships (PPPs) are arrangements typified by joined-up working between the public and private sectors. In the broadest sense, PPPs can cover all types of collaboration across the interface between the public and the private sector to deliver services. This course will equip participants with a basic understanding of PPPs and why they are needed. It will walk delegates through a typical PPP process, from the identification of potential PPP projects to risk appraisal, tendering, and implementation.

Public Private Partnership (PPP)
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1718 to £3626

UNIX Virtualization and High Availability

5.0(3)

By Systems & Network Training

UNIX VIRTUALIZATION AND HIGH AVAILABILITY COURSE DESCRIPTION This course covers administering UNIX enterprise-wide with an emphasis on virtualization and high availability. WHAT WILL YOU LEARN * Manage Virtual Machines. * Manage containers. * Manage HA clusters. * Manage HA cluster storage. UNIX VIRTUALIZATION AND HIGH AVAILABILITY COURSE DETAILS * Who will benefit: Enterprise-level UNIX professional. UNIX professionals working with virtualization and/or High availability. * Prerequisites: Linux network administration 2 (LPIC-2) * Duration 5 days UNIX VIRTUALIZATION AND HIGH AVAILABILITY COURSE CONTENTS * VIRTUALIZATION * Virtualization concepts and theory Terminology, Pros and Cons of virtualization, variations of Virtual Machine monitors, migration of physical to VMs, migration of VMs between host systems, cloud computing. * Xen Xen architecture, networking and storage, Xen configuration, Xen utilities, troubleshooting Xen installations, XAPI, XenStore, Xen Boot Parameters, the xm utility. * KVM KVM architecture, networking and storage, KVM configuration, KVM utilities, troubleshooting KVM installations. * Other virtualization solutions OpenVZ and LXC, other virtualization technologies, virtualization provisioning tools. * Libvirt and Related Tools libvirt architecture, networking and storage, basic technical knowledge of libvirt and virsh, oVirt. * Cloud Management Tools Basic feature knowledge of OpenStack and CloudStack, awareness of Eucalyptus and OpenNebula. * Containers Containers versus VMs, Docker, Kubernetes. * Load balanced clusters of LVS/IPVS, VRRP, configuration of keepalived, configuration of ldirectord, backend server network configuration. HAProxy, configuration of HAProxy. * Failover clusters Pacemaker architecture and components (CIB, CRMd, PEngine, LRMd, DC, STONITHd), Pacemaker cluster configuration, Resource classes (OCF, LSB, Systemd, Upstart, Service, STONITH, Nagios), Resource rules and constraints (location, order, colocation), Advanced resource features (templates, groups, clone resources, multi-state resources), Pacemaker management using pcs, Pacemaker management using crmsh, configuration and management of corosync in conjunction with Pacemaker, other cluster engines (OpenAIS, Heartbeat, CMAN). * HIGH AVAILABILITY CLUSTER STORAGE * DRBD/cLVM DRBD resources, states and replication modes, configuration of DRBD resources, networking, disks and devices, configuration of DRBD automatic recovery and error handling, management of DRBD using drbdadm. drbdsetup and drbdmeta, Integration of DRBD with Pacemaker, cLVM, integration of cLVM with Pacemaker. * Clustered File Systems Principles of cluster file systems. Create, maintain and troubleshoot GFS2 file systems in a cluster, create, maintain and troubleshoot OCFS2 file systems in a cluster, Integration of GFS2 and OCFS2 with Pacemaker, the O2CB cluster stack, other commonly used clustered file systems.

UNIX Virtualization and High Availability
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

Networking Microsoft Systems

5.0(3)

By Systems & Network Training

NETWORKING MICROSOFT SYSTEMS COURSE DESCRIPTION A hands-on course covering the network aspects of Microsoft systems. The course progresses from basic TCP/IP tools and configuration settings through to advanced security considerations finishing with an overview of Exchange and IIS. Hands on sessions are based on a choice of Windows Server 2003 or Windows 2000 server and Windows XP or Windows 2000 professional. Customised versions with other Microsoft platforms are also available. WHAT WILL YOU LEARN * Design networks with consideration for Microsoft issues such as logons. * Design, configure and troubleshoot TCP/IP, DNS, WINS and DHCP. * Configure security features such as PKI and IPSec. * Describe the Windows TCP/IP implementation details. NETWORKING MICROSOFT SYSTEMS COURSE DETAILS * Who will benefit: Anyone working with Microsoft systems. * Prerequisites: TCP/IP foundation for engineers Supporting Windows ( XP or 2000 or 2003) * Duration 5 days NETWORKING MICROSOFT SYSTEMS COURSE CONTENTS * Configuring network cards PnP, resources, Ethernet cards, wireless cards, dial up networking, other cards, Ethernet settings, layer 2 QoS. * Configuring and supporting IP Basic IP settings, advanced IP settings, advanced TCP settings, DrTCP and registry settings, security * DHCP DHCP server, authorising the DHCP service, DHCP client, DHCP relays, Address pools, options, lease duration's, Integrating with DNS. * Microsoft networking overview Workgroups and domains, Domain controllers, the logon process in a network, the role of Active Directory, synchronisation, protocol stacks and bindings. * Accessing file and print resources Shared folders, permissions, network printers, browsing, NetBIOS, SMB. * WINS Servers, clients, Client registration, renewing and releasing of names. NetBIOS node types. * DNS1 Overview, Primary and secondary servers, DDNS, zones, resource records. * The browser service Master, backup and other browser roles, elections, announcements, recovery from failure, Inter subnet browsing. * TCP/IP implementation details Dead gateway detection, Multi homing, multicasting, MTU path discovery, registry settings, QOS and RSVP, Windows as a router, performance implications of Microsoft services. * Internet Access Options, NAT, Firewall capabilities and Proxy server, Internet Authentication Service. * Remote Access Installing, RAS servers. RAS process, protocols * Security: PKI PPTP, L2TP, What is IPSec, configuring IPSec. * Security: VPNs PPTP, L2TP, What is IPSec, configuring IPSec. * Other Microsoft networking services & tools Netmeeting, instant messaging, white boarding, document collaboration, video conferencing Microsoft Exchange, IIS, Directory replication, SNMP, Net Monitor, integration with other platforms.

Networking Microsoft Systems
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

Insurance Risk Management

5.0(10)

By GBA Corporate

OVERVIEW -------------------------------------------------------------------------------- For internal employees who want to understand and expand their roles related to financial reporting, as well as those who simply need a refresher on financial accounting, this course is the ideal way to get up to speed. By exploring concepts that go beyond basic accounting, this course will enable participants to approach financial auditing with renewed confidence. The programme will walk participants through an analysis of an organization's financial statements using case study exercises, where participants will calculate key ratios and analyze trends over time. Engaging in discussions on both historic and current fraud cases, participants will learn how to recognize “red flags” in financial statement reporting.

Insurance Risk Management
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1718 to £3779

Transferring Pricing Method Strategies

5.0(10)

By GBA Corporate

OVERVIEW -------------------------------------------------------------------------------- By the end of this Fundamentals of Transfer Pricing Strategies training course, participants will be able to:   * Acquire basic technical knowledge of transfer pricing * Appreciate the importance of the arm's length principle  * Identify the different stages of a typical transfer pricing analysis * Developing a high-level appreciation of the transfer pricing including tax areas and opportunities for multinationals * Analyze the current transfer pricing legislative framework * Be updated on recent developments in transfer pricing

Transferring Pricing Method Strategies
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1718 to £3626

Completion Design

By Asia Edge

ABOUT THIS TRAINING COURSE This 5 full-day course is aimed at engineers and supervisors who already have a basic understanding of well construction methods but who would benefit from a more detailed knowledge of completion design. The course will concentrate on the important aspects of completion design and what makes a safe and efficient well. A common thread of practical examples will be used throughout the course in the form of a case study or 'red-thread' exercise. The case study is based around data all taken from a single field where those attending will work through all the basic issues of a completion design. The exercises associated with the case study is performed in the student's own time after each of the formal sessions. However, at the start of the next day, the case study is reviewed and discussed. The whole case study will continue through all sessions, with each element being reviewed at the start of the next session. There is no 'right' answer to the exercise - producing interesting discussions! The purpose of the course is not to go over specific equipment in detail. Teaching methods include presentations, videos, and animations and the case study. The course will cover: * Types and configurations of completions * The completion design process * Inflow performance, skin and formation damage * Perforating; selection, deployment and interface with rest of completion * Stimulation and impact on completion and flow performance with coverage of modern horizontal multifrac tools * Open hole, non-sand control completions including open hole packers and horizontal well clean up * Sand control; when do you need it, basic types and selection guidelines. Includes standalone screens, ICDs, various gravel packing techniques, frac packs and expandable screens * Tubing sizing, flow estimation and liquid loading * Artificial lift; types and selection criteria, interface with drilling, reservoir and facilities. Design of gas lift and ESPs included * Production chemistry impacts on completion, prevention and removal (scales, wax, asphaltene, hydrates, and souring) * Metallurgy, corrosion, and erosion; metal types and selection of * Elastomers and plastics; types and selection of * Tubing stress analysis; picking the grade and weight of tubing, plus selection criteria for packers and expansion devices. Interface between tubing stress analysis and casing design * Completion equipment; basic types of equipment, reliability and selection criteria for each (tree, safety valve, mandrel, packers, expansion devices etc) * Completion installation; importance of wellbore clean-out, function and types of brines, pointers for efficient completion installation * Non-conventional wells; types and when / where to use them (multilaterals, smart (intelligent) wells and also SAGD, CO2 sequestration, CBM, etc) Training Objectives By the end of this course, the participants should be able to: * Have a good understanding of the completion design process and what makes a good completion design * Understand the importance of the installation process (completion running) in the design process * Have an appreciation of new and developing completion techniques (intelligent wells) Target Audience This course will benefit engineers and field-based personnel such as completion supervisors and production engineers. It is also suitable for completion vendors, specialists such as chemists and subsurface personnel including geologists, reservoir engineers and petrophysicists. Trainer Your expert course leader has 30 years of oil and gas industry experience. A first class degree in geophysics and a master degree in Petroleum Engineering was a prelude to seven years with BP as a petroleum engineer. He left BP and following a short spell in Camco, jointly founded ICE Energy. After six years of completions and petroleum engineering consultancy and training, ICE Energy merged with TRACS International, where he continued with petroleum and completion engineering studies, leading integrated teams, and developing / delivering training courses for a variety of different clients in diverse world-wide locations. In the last five years, he is independent again - focusing on technical consulting and course delivery. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Completion Design
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4385 to £5099

Linux virtualization and High Availability

5.0(3)

By Systems & Network Training

LINUX VIRTUALIZATION AND HA TRAINING COURSE DESCRIPTION The LPIC-3 certification is the culmination of LPI's multi -level professional certification program. LPIC-3 is designed for the enterprise-level Linux professional and represents the highest level of professional, distribution neutral Linux certification within the industry. LPIC-3 304 covers administering Linux enterprise-wide with an emphasis on virtualization and high availability. At SNT we have enhanced the contents of the course by covering containers. WHAT WILL YOU LEARN * Manage Virtual Machines. * Manage containers. * Manage HA clusters. * Manage HA cluster storage. LINUX VIRTUALIZATION AND HA TRAINING COURSE DETAILS * Who will benefit: Linux professionals working with virtualization and/or High availability. * Prerequisites: Linux network administration 2 (LPIC-2) * Duration 5 days LINUX VIRTUALIZATION AND HA TRAINING COURSE CONTENTS * VIRTUALIZATION * Virtualization concepts and theory Terminology, Pros and Cons of virtualization, variations of Virtual Machine monitors, migration of physical to VMs, migration of VMs between host systems, cloud computing. * Xen Xen architecture, networking and storage, Xen configuration, Xen utilities, troubleshooting Xen installations, XAPI, XenStore, Xen Boot Parameters, the xm utility. * KVM KVM architecture, networking and storage, KVM configuration, KVM utilities, troubleshooting KVM installations. * Other virtualization solutions OpenVZ and LXC, other virtualization technologies, virtualization provisioning tools. * Libvirt and Related Tools libvirt architecture, networking and storage, basic technical knowledge of libvirt and virsh, oVirt. * Cloud Management Tools Basic feature knowledge of OpenStack and CloudStack, awareness of Eucalyptus and OpenNebula. * Containers Containers versus VMs, Docker, Kubernetes. * Load balanced clusters of LVS/IPVS, VRRP, configuration of keepalived, configuration of ldirectord, backend server network configuration. HAProxy, configuration of HAProxy. * Failover clusters Pacemaker architecture and components (CIB, CRMd, PEngine, LRMd, DC, STONITHd), Pacemaker cluster configuration, Resource classes (OCF, LSB, Systemd, Upstart, Service, STONITH, Nagios), Resource rules and constraints (location, order, colocation), Advanced resource features (templates, groups, clone resources, multi-state resources), Pacemaker management using pcs, Pacemaker management using crmsh, configuration and management of corosync in conjunction with Pacemaker, other cluster engines (OpenAIS, Heartbeat, CMAN). * HIGH AVAILABILITY CLUSTER STORAGE * DRBD/cLVM DRBD resources, states and replication modes, configuration of DRBD resources, networking, disks and devices, configuration of DRBD automatic recovery and error handling, management of DRBD using drbdadm. drbdsetup and drbdmeta, Integration of DRBD with Pacemaker, cLVM, integration of cLVM with Pacemaker. * Clustered File Systems Principles of cluster file systems. Create, maintain and troubleshoot GFS2 file systems in a cluster, create, maintain and troubleshoot OCFS2 file systems in a cluster, Integration of GFS2 and OCFS2 with Pacemaker, the O2CB cluster stack, other commonly used clustered file systems.

Linux virtualization and High Availability
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

CWISA Wireless IoT Solutions Administrator

5.0(3)

By Systems & Network Training

CWISA TRAINING COURSE DESCRIPTION This CWISA course covers wireless technologies with reference to IoT. It examines from an IoT perspective how wireless works, and is an excellent introduction to IoT for the wireless engineer. Topics range from wireless technologies, RF, to mobile networks, IoT, and security. WHAT WILL YOU LEARN * Describe wireless networking and IoT technologies. * Explain basic RF communications. * Plan wireless solutions. * Describe how to implement wireless solutions. * Use best practices in implementing wireless solutions. CWISA TRAINING COURSE DETAILS * Who will benefit: Anyone working with IoT technologies. * Prerequisites: RF fundamentals. * Duration 4 days CWISA TRAINING COURSE CONTENTS * Introduction to wireless technologies History of wireless, radio waves and frequencies, wireless technologies and related components, common components of wireless solutions, LAN networking requirements, Network security, Implementing wireless solutions, staging, documentation, security updates, Industry organizations, IEEE, compatibility and certification groups. * Wireless network use cases Wireless BANs, Wireless PANs, Wireless LANs, Wireless MANs, Wireless WANs, Wireless sensor networks, New network driver-Internet of Things, IoT for industry (IIoT), IoT for connected vehicles, Residential environments, Retail, Education (K12), Higher education, Agriculture, Smart cities / Public access, Health care, Office buildings, Hospitality, Industry, Stadiums, arenas, and large public venues. * Planning wireless solutions Identifying use cases and applications, common wireless requirements and constraints, performing a wireless system design, selecting and evaluating design parameters. * RF communications RF wave characteristics, RF propagation behaviours, RF signal metrics, fundamentals of wireless modulation. other wireless carriers, common frequency bands. * Radio frequency hardware Hardware levels, basic RF hardware components (circuit board level), RF link types (use category). RF device types. * Mobile communications networks Mobile networks, LTE, 5G, Use cases. * Short-range, low-rate, and low-power networks RF and speed, RF and range, RF and power, 802.11, 802.15.4, Bluetooth, LoRa (Long range) / LoRaWAN, ZigBee, 6LoWPAN, NB-IoT and LTE-M. * Wireless sensor networks What is a Wireless Sensor Network (WSN)? WSN applications, Sensors and actuators, WSN architectures, Planning a WSN. * Internet of Things (IoT) Internet of Things (IoT) defined, IoT history and its definition revisited, one more comment on the definition of IoT, IoT verticals, Oil & Gas, IoT structure/ architecture basics, IoT connected objects. * Securing wireless networks Confidentiality, integrity and availability, Privacy, non-repudiation, authenticity & safety, Importance of authentication in wireless networks, Key cryptographic technologies & concepts, Authentication methods, Authorisation, OAuth 2.0 authorisation framework, monitoring. * Troubleshooting wireless solutions Proper solutions design, designing and implementing wireless solutions, basic installation procedures, general configuration considerations, troubleshooting and remediation, troubleshoot common problems in wireless solutions. * Programming, scripting and automation What is an API? categories of APIs, common API communication methods, choosing a language, why are we integrating systems? Application & integration architectures. Data structures & types, XML, YAML, API types.

CWISA Wireless IoT Solutions Administrator
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2797