• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

29 Bridge courses in Leeds

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

Concise Cisco switching

5.0(3)

By Systems & Network Training

CONCISE CISCO SWITCHES COURSE DESCRIPTION A hands on course covering the product specifics of Cisco switches. Installation, configuration, maintenance and troubleshooting are all covered in a practical oriented way. VLANs often take up a large part of the course. The course covers all interfaces but concentrates on using the command line interface. Delegates are, however, free to use the web based interface in all exercises. WHAT WILL YOU LEARN * Install Cisco switches. * Use the command line interface and the web based interface to manage Cisco switches. * Configure and troubleshoot Cisco switches. * Perform software upgrades and maintain configurations using TFTP. CONCISE CISCO SWITCHES COURSE DETAILS * Who will benefit: Anyone working with Cisco switches. Particularly aimed at engineers and technicians supporting Cisco switches. * Prerequisites: None. * Duration 2 days CONCISE CISCO SWITCHES COURSE CONTENT * Ethernet review Single segment Ethernet, CSMA/CD, Broadcast domains, collision domains. Hubs, Extending the LAN. Hands on Hub based Ethernet. * Cisco switches What are switches, frame forwarding and filtering, the forwarding database. Hands on Switched based Ethernet. * Configuring Cisco switches Accessing the switch, installing the switch, The CLI, connecting PCs using the switch. Hands on Configuring Cisco switches. * The command line interface User and privilege modes, online help, show, basic troubleshooting. The configuration editor, Global, major and sub commands, enable, secret and other passwords. Hands on Simple troubleshooting using the CLI. * Port configuration Speed, duplex, security, trunking. Hands on Port trunking. * Spanning Tree Protocol Spanning Tree, Loops, effect, root bridges, bridge port states, STP reconfiguration. RSTP and variants. Hands on STP. * VLANS What are VLANs, configuring VLANs, access ports and trunks, 802.1Q, inter VLAN routing. Hands on Access ports, trunks, layer 3 switching. * Housekeeping Configuration management, software management, password recovery. Hands on TFTP. * Managing interconnection devices SNMP, RMON, RMON II. * Troubleshooting LEDs, CDP, logging, Layer 1, layer 2, layer 3. Hands on Fixing things.

Concise Cisco switching
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1497

Total IP multicast for engineers

5.0(3)

By Systems & Network Training

TOTAL IP MULTICAST TRAINING COURSE DESCRIPTION This training course provides an advanced three day hands on study of IP multicast technology focusing on architectures, applications and protocols. All aspects of IP multicasting are covered including PC, server and switch implementations. Design, configuration, support and troubleshooting are all covered in the course. Hands on sessions are used to reinforce the theory rather than teach specific implementations. WHAT WILL YOU LEARN * Design multicast networks. * Explain how multicast networks work. * Compare and contrast the different multicast routing protocols, such as DVMRP, PIM, MBGP and SSM. * Configure PCs, servers, switches and routers for multicasting. * Configure multicast routing protocols including: PIM Dense Mode. PIM Sparse Mode BGP SSM Troubleshoot multicast networks. TOTAL IP MULTICAST TRAINING COURSE DETAILS * Who will benefit: Technical staff working with IP multicasts. * Prerequisites: TCP/IP Foundation for engineers * Duration 3 days TOTAL IP MULTICAST TRAINING COURSE CONTENTS * Introduction What is multicasting? Why multicast? Why not multicast? Multicasting vs. multiple unicasts, Multicasting vs. broadcasts, multicasting applications, the use of unicast addressing for setting up multicast applications, multicast use within standard protocols such as OSPF. hands on Example multicast applications. * Addressing Layer two multicast addresses, Class D addresses, mapping layer 3 addresses onto layer 2 multicast addresses. Multicast addresses on NBMAs, scoping multicast traffic, Multicast address blocks, GLOP, IPv6 and multicasting, anycasting. hands on Multicast addressing. * Multicast architectures Where the different protocols are used, PC to router, router to router, how switches can get involved. hands on Analysing multicast packets. * PC to router Configuring Class D addresses, IGMP, packet formats, queries, reports, maintaining groups, enhancements to IGMP (v2 and v3), Leaving a group, querier elections, hands on Analysing IGMP packets. * Switches and multicasting Controlling multicast traffic with switches, VLANS, static bridge table entries, IGMP snooping, CGMP. hands on Configuring switches for multicast environments. * Router to router MOSPF, DVMRP, PIM Sparse Mode, PIM Dense Mode, MBGP. hands on Simple router configuration for multicasting. * Theory behind multicast routing protocols Distribution trees, source distribution trees, shared trees, core based trees. Reverse path forwarding, Multicast routing protocol types. PIM DM: Flooding, pruning, PIM designated routers, hands on configuring PIM DM. * PIM Sparse mode Rendevous points, discovering RPs, hands on Configuring PIM SM, using different protocols for different groups. PIM SM with one RP, using multiple RPs, Auto RP. * MBGP Multiprotocol routing, how does MBGP work? How MBGP carries multiple protocol information, MBGP and multicasts, MBGP and IPv6. hands on Configuring MBGP for multicasts. * Internet multicasting The internet, ISPs, the MBone, tunnelling, Inter domain multicasting, the role of MBGP, Inter domain problem, MSDP, MSDP operation SSM, PIM-SM and shared trees, SSM, PIM-SSM operation, SSM benefits. hands on MSDP configuration. SSM configuration.

Total IP multicast for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2367

Introduction to Blackwork Embroidery in Cumbria

By Maire Curtis Lakeland Studio

A relaxed and informal Blackwork Embroidery course in the lovely setting of a converted 18th Century cotton mill in Warwick Bridge, Carlisle. This course has been designed to guide the complete beginner or act as a refresher for those who may have dabbled in Blackwork embroidery in the past. We will cover the history, styles of Blackwork embroidery, threads and techniques.

Introduction to Blackwork Embroidery in Cumbria
Delivered in-person, on-requestDelivered In-Person in Internationally
£88

Project Economics, Risk and Decision Analysis for Oil & Gas

By Asia Edge

ABOUT THIS TRAINING COURSE This 5 full-day training course looks at the setup of economic analysis cases, including the estimation of recoverable reserves, production profiles, commodity prices, and project costs - CAPEX, OPEX, taxes, royalties, transportation, depreciation, before-tax (BTAX) cash-flow, after-tax (ATAX) cash-flow and international fiscal regimes (production sharing agreement and concessionary system). The course begins from the basic required parameters of inflation, interest and time value of money. These concepts are then transformed into profitability indicators. Last but not the least, the profitability indicators are then used to make investment decisions. The emphasis of this course is to bridge the gap between theoretical concepts and their practical limitations. The participants will be able to appreciate the amount of information that they never thought of. Another emphasis of this course is also on the use of Excel's financial functions. This understanding is very critical when it comes to building economic cash-flow models. Over the years, we have seen that participants really struggle with using the Excel functions correctly and this leads to mistakes that can be easily avoided. In each session, multiple choice problems are provided to participants to reinforce their understanding of the concepts covered in the course. Many quick or tips not widely known, are also shared with the participants. The concepts covered in this course are not restricted to downstream, upstream or petrochemical projects. These concepts can be used to evaluate any type of investment under consideration. Participants will require access to computers/laptops with Excel to solve problems during the course. Training Objectives Upon completion of this course, participants will be able to fully understand the gas market dynamics and Investment Evaluation. They will be able to: * Learn how to reduce exposure and mitigate risks in projects by handling uncertainty * Clarify concepts such as time value of money, cash-flow models, capital budgeting, IRR, NPV, income producing investments * Maximise the return on investments through good decision-making processes based on the commercial viability of projects * Improve their decision process, investment and opportunity analysis * Acquire the hands-on experience in building their own economic evaluation models and solving case study-based examples   Target Audience The following oil & gas company personnel will benefit from the knowledge shared in this course: * Facilities and Planning engineers * Project and procurement personnel * Oil & gas engineers * Geologists * Financial Analysts * Commercial managers * Economists * Government officials * Business advisors * Asset managers * E&P managers * Product and business development personnel   Course Level * Basic or Foundation Training Methods     Organisational Impact     Trainer Your expert course leader is a globally recognised subject matter expert in petroleum/project economics and international gas market analysis. He is a recipient of the 2021 Society of Petroleum Engineers (SPE) International Management Award, an award that recognises individuals who make significant technical and professional contributions to the petroleum engineering profession and to the worldwide oil and gas industry. He has 40 years of diversified experience in petroleum engineering, reservoir engineering, project economics and decision analysis. He had been involved in evaluating multi-billion-dollar oil and gas field development, NGL, LNG, GTL, Aluminum smelter, refinery, petrochemical, power and production sharing projects. He has worked with major oil companies such as Saudi Aramco, ZADCO, Qatar Petroleum and companies in USA. He is a registered professional Engineer in the state of Colorado, USA. He is the author of six books: 1. Petroleum Engineering Handbook for the Practicing Engineer, Vol. I and Vol. II, published by PennWell Books, Tulsa, Oklahoma, USA. 2. Project Economics and Decision Analysis, Vol. I and Vol. II, published by PennWell Books, Tulsa, Oklahoma, USA. These books are used as textbooks in universities worldwide to teach petroleum economics to undergraduates and graduate students. 3. Tip & Tricks in Excel based Financial Modeling, Vol. 1 & 2, published by Business Expert Press, New York, USA. He has also authored several papers in the Oil & Gas Journal, The Log Analyst, World Oil, SPE Journals, and Oil & Gas Financial Journal. He has delivered lectures in more than 25 countries around the globe. He has always received excellent feedback, as an expert presenter, from the participants of his courses. Daily daily_agenda     POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Project Economics, Risk and Decision Analysis for Oil & Gas
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3525 to £4099

Introduction to Performance Management

By Mpi Learning - Professional Learning And Development Provider

Every employee needs to have their performance managed and it is equally important to 'catch people doing something right

Introduction to Performance Management
Delivered in-person, on-request, onlineDelivered Online & In-Person in Loughborough
£240

University Foundation Year - International Diploma

4.2(10)

By Bournemouth City College

The Level 3 International Foundation Diploma for Higher Education Studies (L3IFDHES) is usually a one-year pre-university qualification that provides students with an entry route to an overseas university. The L3IFDHES prepares students with the essential English language skills, key transferable study skills, cultural knowledge, and chosen specialisms that universities feel bridges the gap between high school and undergraduate study. In January 2023 we offer pathways in business and higher finance. With agreements in place with over 70 universities across the globe, students’ can progress with confidence to a higher education course for further study. Entry Requirements For entry onto the NCC Education Level 3 International Foundation Diploma for Higher Education Studies (L3IFDHES) qualification students must have successfully completed secondary school education. Students must also meet the English language entry requirements of: • IELTS minimum score of 4.5 or above OR • GCE ‘O’ Level English D7 or above Alternatively, a student can take the free NCC Education Higher English Placement Test which is administered by our Accredited Partner Centre’s.

University Foundation Year - International Diploma
Delivered in-person, on-requestDelivered In-Person in Bournemouth
£9000 to £17500

Securing UNIX systems

5.0(3)

By Systems & Network Training

SECURING UNIX SYSTEMS TRAINING COURSE DESCRIPTION This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. WHAT WILL YOU LEARN * Secure UNIX accounts. * Secure UNIX file systems. * Secure UNIX access through the network. SECURING UNIX SYSTEMS COURSE DETAILS * Who will benefit: Linux technical staff needing to secure their systems. * Prerequisites: Linux system administration (LPIC-1) * Duration 5 days SECURING UNIX SYSTEMS COURSE CONTENTS * Cryptography * Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. * Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. * Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. * DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. * Host Security * Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. * Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. * User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. * FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. * Access Control * Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. * Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. * etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. * Network Security * Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. * Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. * Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd * Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing UNIX systems
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

Securing Linux systems

5.0(3)

By Systems & Network Training

SECURING LINUX SYSTEMS TRAINING COURSE DESCRIPTION This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. WHAT WILL YOU LEARN * Secure Linux accounts. * Secure Linux file systems. * Secure Linux access through the network. SECURING LINUX SYSTEMS TRAINING COURSE DETAILS * Who will benefit: Linux technical staff needing to secure their systems. * Prerequisites: Linux system administration (LPIC-1) * Duration 5 days SECURING LINUX SYSTEMS TRAINING COURSE CONTENTS * Cryptography * Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. * Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. * Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. * DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. * Host Security * Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. * Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. * User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. * FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. * Access Control * Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. * Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. * etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. * Network Security * Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. * Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. * Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd * Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing Linux systems
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

Definitive Ethernet LANS for engineers

5.0(3)

By Systems & Network Training

ETHERNET LANS TRAINING COURSE DESCRIPTION THIS COURSE HAS BEEN REPLACED AS PART OF OUR CONTINUOUS CURRICULUM DEVELOPMENT. PLEASE SEE OUR * Definitive Ethernet switching course WHAT WILL YOU LEARN * Describe what Ethernet is and how it works. * Install Ethernet networks * Troubleshoot Ethernet networks * Analyse Ethernet packets * Design Ethernet networks * Recognise the uses of Hubs, Bridges, switches and routers. ETHERNET LANS TRAINING COURSE DETAILS * Who will benefit: Those wishing to find out more about how their LAN works. * Prerequisites: Intro to Data comms & networking. * Duration 3 days ETHERNET LANS TRAINING COURSE CONTENTS * What is Ethernet? LANS, What is Ethernet?, history, standards, the OSI reference model, how Ethernet works, CSMA/CD. Ethernet Cabling UTP, cat 3,4,5, Cat 5e, Cat 6, Cat 7, fibre optic cable, MMF, SMF. Hands on Making a cable. * 802.3 physical specifications Distance limitations, hubs and repeaters, 5-4-3-2-1 rule, 10BaseT, 10BaseF, 100BaseTX, 100BaseFX, 1000BaseSX, 1000BaseT, 10gbe. Hands on Working with hubs. * Ethernet layer 2 Overview, NICS, device drivers, MAC addresses, broadcasts, multicasts, frame formats, Ether II, 802.3, 802.2, SNAP, compatibility, Ethernet type numbers, Ethernet multicast addresses, Ethernet vendor codes. Hands on Installing Ethernet components, analysing MAC headers. * IP and Ethernet ARP Hands on Analysing ARP packets. * Ethernet extensions Full/half duplex, auto negotiation, flow control methods, 802.3ad, 802.3af, 802.3ah. Hands on Configuration of full/half duplex. * Ethernet speed enhancements Encoding, Carrier extension, packet bursting, jumbo frames. * Prioritisation 802.1P, 802.1Q, TOS, WRR, QOS, VLANs. Hands on 802.1p testing * Interconnecting LANS Broadcast domains, Collision domains, What are bridges, transparent bridging, What are switches? STP, VLANS, What are routers? Layer 3 switches, Connecting Ethernet to the WAN. Hands on STP, Analysing Ethernet frames in a routed architecture. * Troubleshooting and maintaining Ethernet Utilisation, performance, TDR and other testers, bottlenecks, statistics, RMON. Hands on Monitoring performance, troubleshooting tools.

Definitive Ethernet LANS for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3497

Certified Wireless Network Administrator

5.0(3)

By Systems & Network Training

CWNA TRAINING COURSE DESCRIPTION A hands-on course focusing on the technical support of WiFi. Wireless LANs are often seen as simple communications that are simply installed and then left alone to work. This course ensures that delegates will be able to install WiFi networks which work but also enable the delegates to troubleshoot WiFi when it does go wrong. WHAT WILL YOU LEARN * Compare 802.11 standards. * Configure WiFi networks. * Troubleshoot WiFi networks using spectrum analysers, Wireshark and other tools. * Implement 802.11 security. * Perform RF surveys. CWNA TRAINING COURSE DETAILS * Who will benefit: Technical staff working with WiFi networks. Anyone wishing to pass the CWNA exam. * Prerequisites: Intro to data communications & networking * Duration 5 days CWNA TRAINING COURSE CONTENTS * Introduction History, standards. * RF fundamentals What is RF? Wavelength, Frequency, Amplitude, Phase. Wave behaviour. RF components. Watts, mW, dB, SNR, Link budgets. Hands on Spectrum analysis. Listing WiFi networks. WiFi connection. inSSIDer. * Antennas Radiation envelopes, polar charts, gain, Antenna types. Line of Sight, MIMO. Hands on Connecting, installing, changing antennae. RSSI values. * 802.11 802.11-2007, 802.11 post 2007, 802.11 drafts. 802.11 b/g/n. Hands on WiFi performance measurement. * Spread Spectrum RF frequency bands, FHSS, DSSS, OFDM. Channels. Hands on Configuring channels. * Topologies Mesh, Access points, distribution systems, SSID. Hands on AP configuration. Client connection profiles. * 802.11 MAC CSMA/CA, Management frames, control frames, data frames. Passive scanning, active scanning. Open system authentication. Shared Key authentication. Association. RTS/CTS. Power management. Hands on Capturing frames, analysing frames. * WiFi architecture WiFi client, WLAN architecture: Autonomous, Centralised, distributed. WiFi bridges. WiFi routers. PoE. Hands on WLAN controllers. * Troubleshooting RF interference, multipath, adjacent channels, low SNR, mismatched power. Coverage, capacity. * 802.11 Security Basics, Legacy security: WEP, MAC filters, SSID cloaking. PSK, 8021.X/EAP, WPA/WPA2. TKIP/ CCMP encryption. Guest WLANs. Wireless attacks, intrusion monitoring. Hands on WEP cracking, WPA2 configuration. RADIUS. * RF Site surveys Protocol and spectrum analysis, coverage analysis. Site survey tools. Hands on Performing a site survey.

Certified Wireless Network Administrator
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2797