• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

46 Bridging courses delivered Live Online

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

CWDP TRAINING COURSE DESCRIPTION The CWDP course consists of instructor-led training applicable to the design of wireless LANs using the latest technologies including 802.11n and 802.11ac. The course goes in-depth into the design process and provides attendees with the knowledge needed to plan, deploy and test modern 802.11-based networks. It also prepares students for the CWDP examination. Students who complete the course will acquire the necessary skills for preparing, planning performing and documenting site surveys and wireless LAN design procedures. WHAT WILL YOU LEARN * Design enterprise WiFi networks. * Select appropriate antennas and Access points. * Perform site surveys. * Describe the security requirements required for enterprise networks. * Test, validate and troubleshoot installations. CWDP TRAINING COURSE DETAILS * Who will benefit: Anyone looking for the skills to analyze, troubleshoot, and optimize any enterprise level Wi-Fi network, no matter which brand of equipment your organization deploys. Anyone looking to become a CWNP. * Prerequisites: CWNA * Duration 5 days CWDP TRAINING COURSE CONTENTS * WLAN design overview Importance of good design, Impact of bad design, Design process, Design skills, Design toolkit. * Requirements analysis Pre-planning, Customer interaction, Requirements gathering, Discovering existing systems, Documenting the environment, Defining constraints, Creating documentation. * Designing for clients and applications Client Device types, Application types, Application-specific design, High density design issues. * Designing for industry Standard corporate networks, Industry-specific designs, Government, Healthcare, Hospitality, Retail, Public hotspots, Transportation, Mobile offices, Outdoor and mesh, Remote networks and branch offices, Last-miles / ISP and bridging. * Vendor selection processes Defining vendor issues, Operational planes, Design models, Understanding architectures. * Radio Frequency (RF) planning RF spectrum, RF behaviors, Modulation and coding schemes, RF accessories, Throughput factors. WLAN hardware selection Antennas, 802.11n and antennas, Choosing Aps, Powering Aps. * Site surveys Site survey tools, Site survey preparation, Predictive site surveys, Manual site surveys, Site survey principles and processes. * Designing for Quality of Service (QoS) QoS overview, QoS application points, Roaming support. * Designing for security Bad security, Authentication solutions, Encryption solutions, Security best practices, Intrusion prevention. * Installation testing, validation and troubleshooting Network health status, Troubleshooting and validation process, Troubleshooting and validation tools, Common problems. * Hands-on lab exercises Hands-on labs depend on the audience and can include use of: Spectrum analyzers, Protocol analyzers, Site Survey software, Diagramming software, Various wireless access points, Various wireless adapters and antennas.

CWDP
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3497

JSPX - Junos Service Provider Switching

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Network engineers, technical support personnel, reseller support engineers, and others responsible for implementing and/or maintaining the Juniper Networks products covered in this course. Overview Introduction to carrier Ethernet Describe the function of an Ethernet LAN Describe Ethernet frame filtering Implement VLAN tagging Implement IRB Implement a virtual switch Describe interconnecting routing instances Describe provider bridging Configure and monitor provider bridging Configure and monitor provider backbone bridging Explain the purpose of the Spanning Tree Protocol (STP) Configure and monitor the STP, the RSTP, the MSTP, and the VSTP Explain the purpose of bridge protocol data unit (BPDU), loop, and root protection Describe the basic operation of link fault management (LFM) Describe the basic operation of connectivity fault management (CFM) Configure and monitor Ethernet OAM Describe and configure Ethernet Ring Protection (ERP) The Junos Service Provider Switching course is a two-day course that provides students with intermediate switching knowledge and configuration examples that are most common in a Service provider implementation. COURSE OUTLINE * Course Introduction CARRIER ETHERNET * Ethernet in the WAN * Ethernet Standards Organizations * MX Series Layer 2 Features ETHERNET SWITCHING AND VIRTUAL LANS * Ethernet LANs * Bridging * Configuring and Monitoring VLANs * Configuring and Monitoring IRB * Layer 2 Address Learning and Forwarding * Layer 2 Firewall Filtering VIRTUAL SWITCHES * Routing Instances Overview * Configuring and Monitoring Virtual Switches * Interconnecting Routing Instances PROVIDER BRIDGING * Expanding the Bridged Network * Provider Bridging * Configuring and Monitoring Provider Bridging * Provider Backbone Bridging * Configuring and Monitoring Provider Backbone Bridging SPANNING-TREE PROTOCOLS * Overview of STP * Overview of RSTP * Overview of MSTP * Overview of VSTP * Configuring and Monitoring Spanning-Tree Protocols * Understanding BPDU, Loop, and Root Protection ETHERNET OAM * OAM Overview * LFM * CFM * Configuring and Monitoring OAM ETHERNET RING PROTECTION * ERP Overview * Configuring and Monitoring ERP * LAG Overview * Configuring and Monitoring a LAG

JSPX - Junos Service Provider Switching
Delivered on-request, onlineDelivered Online
Price on Enquiry

Personalised Care: From Rhetoric to Reality

By Born at the Right Time

Inspiring, interactive and unique 4-hour CPD certified Communication and Co-production training.

Personalised Care: From Rhetoric to Reality
Delivered Online
Dates arranged on request
£200

ADV-SDWAN-CT - Advanced Cisco SD-WAN Routing, Templates, Policy Configure, and Tshoot

By Nexus Human

Duration 5 Days 30 CPD hours Overview SDWAN Review Advanced Template Design and Troubleshooting Advanced Security Policies on vEdge and IOS-XE Platforms Advanced Local Policies on vEdge and IOS-XE Platforms Advanced Central Policies on vEdge and IOS-XE Platforms Advanced Troubleshooting of Policies on vEdge and IOS-XE Platforms In this Advanced Lab focused SDWAN Course, Students willExplore and Troubleshoot the initials environmentLearn Advanced Techniques to Deploy Templates with the theme of reusabilityDeploy and Troubleshoot Transport BridgingDeploy and Troubleshoot Routing including OSPF, BGP, EIGRPDeploy and Troubleshoot Multicast RoutingDesign, Configure, and Troubleshoot Advanced Security PoliciesDesign, Configure, and Troubleshoot Local PoliciesDesign, Configure, and Troubleshoot Application Aware RoutingDesign, Configure, and Troubleshoot Quality of ServiceDesign, Configure, and Troubleshoot Central Policies Including Hub Spoke, Full Mesh and Custom TopologiesDesign, Configure, and Troubleshoot Central Policies Including Service ChainingDesign, Configure, and Troubleshoot Central Policies Including Traffic Rules & CFLOW CISCO SD-WAN OVERVIEW * Dashboard SD-WAN Architecture SD-WAN WAN Edges SD-WAN Controllers SD-WAN Fabric SD-WAN ADVANCED SETTINGS * Advanced Controller Settings Overlay and vEdge Recommended Settings Forward Error Correction (FEC) Packet Duplication System IP Design LTE Operation SD-WAN HIGH AVAILABILITY * Controller High Availability Controller Scalability Active vManage, Backup Inactive vManage Clustering vManages Disaster Recovery SD-WAN TEMPLATES * Template Overview Future Templates Device template using Future Templates Device template using CLI Templates Designing templates for Reusability Attaching Devices to Templates BRIDGING * Transparent Bridging Bridging Template Configuration cEdge Bridging Template Configuration vEdge Bridging Template Configuration Monitoring Bridging ROUTING PROTOCOLS * Static Routes Dynamic Routing Protocols MULTICAST * Multicast Terms Requirements vEdge Multicast Support cEdge Multicast Support Multicast RPs Multicast Replicators PIM IGMP NETWORK OPTIMIZATION * Optimization Overview TCP Optimization vEdge Optimization Requirements vEdge Optimization Implementation cEdge (IOS-XE) Optimization Requirements cEdge (IOS-XE) Optimization Implementation AppNAV Per Tunnel QoS DIRECT INTERNET ACCESS (DIA) OVERVIEW * SD-WAN Direct Internet Access (DIA) SD-WAN DIA Requirements SD-WAN Direct Internet Access Use Cases SD-WAN Direct Internet Access Design Components SD-WAN Direct Internet Access Design Considerations SD-WAN Direct Internet Access Failover Scenarios Cisco SD-WAN Direct Internet Access Monitoring UNIFIED COMMUNICATIONS * Voice Integration in SD-WAN Voice Feature Templates Voice Policies IOS-XE UC Device Template SD-WAN SECURITY POLICY * Authentication/Encryption/Integrity Firewall IPS (Snort) URL Filtering Web Layer Security Pairwise IPsec Keys SD-WAN LOCAL POLICY * Policy Configuration Overview Policy Framework-Localized Policies Local Control Policy Local Control (Route) Policy Localized Control Policy Configuration Local Data Policy Configure Localized Data Policy for IPv4 SD-WAN CENTRAL POLICY * Policy Creation and Management Guidelines Centralized Data Policies Application Aware Routing Service Chaining Traffic Flow Monitoring with Cflowd Policy Construction Platform Support and Scalability SDWAN MIGRATION * Sequence of Migration Migration Planning DC/Hub Site Migration Branch/Spoke Site Migration ADDITIONAL COURSE DETAILS: Nexus Humans ADV-SDWAN-CT - Advanced Cisco SD-WAN Routing, Templates, Policy Configure, and Tshoot training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the ADV-SDWAN-CT - Advanced Cisco SD-WAN Routing, Templates, Policy Configure, and Tshoot course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

ADV-SDWAN-CT - Advanced Cisco SD-WAN Routing, Templates, Policy Configure, and Tshoot
Delivered on-request, onlineDelivered Online
Price on Enquiry

VMware NSX: Install, Configure, Manage [V4.x]

By Nexus Human

Duration 5 Days 30 CPD hours Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture and main components of NSX Explain the features and benefits of NSX Deploy the NSX Management cluster and VMware NSX Edge™ nodes Prepare VMware ESXi™ hosts to participate in NSX networking Create and configure segments for layer 2 forwarding Create and configure Tier-0 and Tier-1 gateways for logical routing Use distributed and gateway firewall policies to filter east-west and north-south traffic in NSX Configure Advanced Threat Prevention features Configure network services on NSX Edge nodes Use VMware Identity Manager™ and LDAP to manage users and access Explain the use cases, importance, and architecture of Federation This five-day, fast-paced course provides comprehensive training to install, configure, and manage a VMware NSX© environment. This course covers key features and functionality offered in the NSX 4.0.0.1 and NSX 4.0.1 releases, including the overall infrastructure, logical switching, logical routing, networking and security services, firewalls and advanced threat prevention, and more. COURSE INTRODUCTION * Introductions and course logistics * Course objectives VMWARE VIRTUAL CLOUD NETWORK AND VMWARE NSX * Introduce the VMware Virtual Cloud Network vision * Describe the NSX product portfolio * Discuss NSX features, use cases, and benefits * Explain NSX architecture and components * Explain the management, control, data, and consumption planes and their functions. PREPARING THE NSX INFRASTRUCTURE * Deploy VMware NSX© ManagerTM nodes on ESXi hypervisors * Navigate through the NSX UI * Explain data plane components such as N-VDS/VDS, transport nodes, transport zones, profiles, and more * Perform transport node preparation and configure the data plane infrastructure * Verify transport node status and connectivity * Explain DPU-based acceleration in NSX * Install NSX using DPUs NSX LOGICAL SWITCHING * Introduce key components and terminology in logical switching * Describe the function and types of L2 segments * Explain tunneling and the Geneve encapsulation * Configure logical segments and attach hosts using NSX UI * Describe the function and types of segment profiles * Create segment profiles and apply them to segments and ports * Explain the function of MAC, ARP, and TEP tables used in packet forwarding * Demonstrate L2 unicast packet flow * Explain ARP suppression and BUM traffic handling NSX LOGICAL ROUTING * Describe the logical routing function and use cases * Introduce the two-tier routing architecture, topologies, and components * Explain the Tier-0 and Tier-1 gateway functions * Describe the logical router components: Service Router and Distributed Router * Discuss the architecture and function of NSX Edge nodes * Discuss deployment options of NSX Edge nodes * Configure NSX Edge nodes and create NSX Edge clusters * Configure Tier-0 and Tier-1 gateways * Examine single-tier and multitier packet flows * Configure static routing and dynamic routing, including BGP and OSPF * Enable ECMP on a Tier-0 gateway * Describe NSX Edge HA, failure detection, and failback modes * Configure VRF Lite NSX BRIDGING * Describe the function of logical bridging * Discuss the logical bridging use cases * Compare routing and bridging solutions * Explain the components of logical bridging * Create bridge clusters and bridge profiles NSX FIREWALLS * Describe NSX segmentation * Identify the steps to enforce Zero-Trust with NSX segmentation * Describe the Distributed Firewall architecture, components, and function * Configure Distributed Firewall sections and rules * Configure the Distributed Firewall on VDS * Describe the Gateway Firewall architecture, components, and function * Configure Gateway Firewall sections and rules NSX ADVANCED THREAT PREVENTION * Explain NSX IDS/IPS and its use cases * Configure NSX IDS/IPS * Deploy NSX Application Platform * Identify the components and architecture of NSX Malware Prevention * Configure NSX Malware Prevention for east-west and north-south traffic * Describe the use cases and architecture of VMware NSX© Intelligence? * Identify the components and architecture of VMware NSX© Network Detection and Response? * Use NSX Network Detection and Response to analyze network traffic events. NSX SERVICES * Explain and configure Network Address Translation (NAT) * Explain and configure DNS and DHCP services * Describe VMware NSX© Advanced Load Balancer? architecture, components, topologies, and use cases. * Configure NSX Advanced Load Balancer * Discuss the IPSec VPN and L2 VPN function and use cases * Configure IPSec VPN and L2 VPN using the NSX UI NSX USER AND ROLE MANAGEMENT * Describe the function and benefits of VMware Identity Manager? in NSX * Integrate VMware Identity Manager with NSX * Integrate LDAP with NSX * Identify the various types of users, authentication policies, and permissions * Use role-based access control to restrict user access * Explain object-based access control in NSX NSX FEDERATION * Introduce the NSX Federation key concepts, terminology, and use cases. * Explain the onboarding process of NSX Federation * Describe the NSX Federation switching and routing functions. * Describe the NSX Federation security concepts.

VMware NSX: Install, Configure, Manage [V4.x]
Delivered on-request, onlineDelivered Online
Price on Enquiry

VMware NSX-T Data Center: Install, Configure, Manage [V3.2]

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for Experienced security administrators or network administrators Overview By the end of the course, you should be able to meet the following objectives: Describe the architecture and main components of NSX-T Data Center Explain the features and benefits of NSX-T Data Center Deploy the NSX Management cluster and VMware NSX Edge™ nodes Prepare VMware ESXi™ and KVM hosts to participate in NSX-T Data Center networking Create and configure segments for layer 2 forwarding Create and configure Tier-0 and Tier-1 gateways for logical routing Use distributed and gateway firewall policies to filter east-west and north-south traffic in NSX-T Data Center Configure Advanced Threat Prevention features Configure network services on NSX Edge nodes Use VMware Identity Manager and LDAP to manage users and access Explain the use cases, importance, and architecture of Federation This five-day, fast-paced course provides comprehensive training on how to install, configure, and manage a VMware NSX-T? Data Center environment. This course covers key NSX-T Data Center features and functionality offered in the NSX-T Data Center 3.2 release, including the overall infrastructure, logical switching, logical routing, networking and security services, firewalls and advanced threat prevention, and more. COURSE INTRODUCTION * Introductions and course logistics * Course objectives VMWARE VIRTUAL CLOUD NETWORK AND NSX-T DATA CENTER * Introduce the VMware Virtual Cloud Network vision * Discuss NSX-T Data Center solutions, use cases, and benefits * Explain NSX-T Data Center architecture and components * Describe the VMware NSXTM product portfolio and features * Explain the management, control, data, and consumption planes and function PREPARING THE NSX-T DATA CENTER INFRASTRUCTURE * Describe NSX Management Cluster * Deploy VMware NSXTM ManagerTM nodes on VMware ESXi and KVM hypervisors * Navigate through the NSX Manager UI * Explain data-plane components such as N-VDS/VDS, transport nodes, transport zones, profiles, and more * Perform transport node preparation and establish the data center infrastructure * Verify transport node status and connectivity NSX-T DATA CENTER LOGICAL SWITCHING * Introduce key components and terminology in logical switching * Describe the function and types of L2 segments * Explain tunneling and the GENEVE encapsulation * Configure logical segments and attach hosts using NSX Manager UI * Describe the function and types of segment profiles * Create segment profiles and apply them to segments and ports * Explain the function of MAC, ARP, and TEP tables used in packet forwarding * Demonstrate L2 unicast packet flow * Explain ARP suppression and BUM traffic handling NSX-T DATA CENTER LOGICAL ROUTING * Describe the logical routing function and use cases * Introduce the two-tier routing architecture, topologies, and components * Explain the Tier-0 and Tier-1 Gateway functions * Describe the logical router components: Service Router and Distributed Router * Discuss the architecture and function of NSX Edge nodes * Discuss deployment options of NSX Edge nodes * Configure NSX Edge nodes and create NSX Edge clusters * Configure Tier-0 and Tier-1 Gateways * Examine the single-tier and multitier packet flow * Configure static routing and dynamic routing, including BGP and OSPF * Enable ECMP on Tier-0 Gateway * Describe NSX Edge HA, failure detection, and failback modes * Configure VRF Lite NSX-T DATA CENTER BRIDGING * Describe the function of logical bridging * Discuss the logical bridging use cases * Compare routing and bridging solutions * Explain the components of logical bridging * Create bridge clusters and bridge profiles NSX-T DATA CENTER FIREWALLS * Describe NSX segmentation * Identify the steps to enforce Zero-Trust with NSX segmentation * Describe the Distributed Firewall architecture, components, and function * Configure Distributed Firewall sections and rules * Configure the Distributed Firewall on VDS * Describe the Gateway Firewall architecture, components, and function * Configure Gateway Firewall sections and rules NSX-T DATA CENTER ADVANCED THREAT PREVENTION * Explain NSX IDS/IPS and its use cases * Configure NSX IDS/IPS * Deploy the NSX Application Platform * Identify the components and architecture of NSX Malware Prevention * Configure NSX Malware Prevention for east-west and north-south traffic * Describe the use cases and architecture of NSX Intelligence * Identify the components and architecture of VMware NSX© Network Detection and Response? * Use NSX Network Detection and Response to analyze network traffic events. NSX-T DATA CENTER SERVICES * Describe NSX-T Data Center services * Explain and configure Network Address Translation (NAT) * Explain and configure DNS and DHCP services * Describe VMware NSX© Advanced Load Balancer? architecture, components, topologies, and use cases. * Configure NSX Advanced Load Balancer * Discuss the IPSec VPN and L2 VPN function and use cases * Configure IPSec VPN and L2 VPN using the NSX Manager UI NSX-T DATA CENTER USER AND ROLE MANAGEMENT * Describe the function and benefits of VMware Identity Manager? in NSX-T Data Center * Integrate VMware Identity Manager with NSX-T Data Center * Integrate LDAP with NSX-T Data Center * Identify the various types of users, authentication policies, and permissions * Use role-based access control to restrict user access NSX-T DATA CENTER FEDERATION * Introduce the NSX-T Data Center Federation key concepts, terminology, and use-cases. * Explain the onboarding process of NSX-T Data Center Federation * Describe the NSX-T Data Center Federation switching and routing functions. * Describe the NSX-T Data Center Federation security concepts.

VMware NSX-T Data Center: Install, Configure, Manage [V3.2]
Delivered on-request, onlineDelivered Online
Price on Enquiry

JNCIS - ENT Bundle

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course benefits individuals responsible for configuring and monitoring EX Series switches running Junos ELS. Overview After successfully completing this course, you should be able to: List the benefits of implementing switched LANs. Describe transparent bridging concepts and operations. Describe terms and design considerations for switched LANs. List enterprise platforms that support Layer 2 switching. Configure interfaces for Layer 2 switching operations. Display and interpret the Ethernet switching table. Explain the concept of a VLAN. Describe access and trunk port modes. Configure and monitor VLANs. Describe voice VLAN and native VLAN concepts. Explain inter-VLAN routing operations. Configure and monitor inter-VLAN routing. Explain when a spanning tree is required. Describe STP and Rapid Spanning Tree Protocol (RSTP) operations. List some advantages of using RSTP over STP. Configure and monitor RSTP. Describe the bridge protocol data unit (BPDU), loop, and root protection features. Configure and monitor the BPDU, loop, and root protection features. List and describe various port security features. Configure and monitor port security features. Describe the storm control feature. Configure and monitor storm control. Describe firewall filter support for EX Series Ethernet Switches. Implement and monitor the effects of a firewall filter. List and describe some features that promote high availability. Configure and monitor high availability features. Describe the basic concepts and operational details of a virtual chassis. Implement a virtual chassis with multiple EX4300 switches. Explain the concepts of Ethernet Ring Protection Switching (ERPS). Configure and monitor ERPS. Explain the concepts of Multiple Spanning Tree Protocol (MSTP). Configure and monitor MSTP. This 4-day program includes an overview of protocol independent routing features, load balancing and filter-based forwarding, OSPF, BGP, IP tunneling, switching concepts and operations, virtual LANs (VLANs), the Spanning Tree Protocol (STP), and more. CHAPTER 1: COURSE INTRODUCTION * Course Introduction CHAPTER 2: LAYER 2 SWITCHING * Ethernet Bridging Basics * Terminology and Design Considerations * Overview of Enterprise Switching Platforms * Enabling and Monitoring Layer 2 Switching Operations * Lab 1: Implementing Layer 2 Switching CHAPTER 3: VIRTUAL NETWORKS * Overview of VLANs * Configuring and Monitoring VLANs * Voice VLAN * Native VLAN * Routed VLAN Interfaces * Lab 2: Implementing Virtual Networks CHAPTER 4: ROUTING INSTANCES * Routing Instances Overview * Configuring and Monitoring Virtual Switches CHAPTER 5: SPANNING TREE * Spanning Tree Protocol * Rapid Spanning Tree Protocol * Configuring and Monitoring STP and RSTP * Protection Features: BPDU Protection * Protection Features: Loop Protection * Protection Features: Root Protection * Lab 3: Implementing Spanning Tree CHAPTER 6: PORT SECURITY * MAC Limiting * Persistent MAC Learning * DHCP Snooping * Dynamic ARP Inspection (DAI) * IP Source Guard * Lab 4: Implementing Port Security CHAPTER 7: DEVICE SECURITY AND FIREWALL FILTERS * Storm Control * Firewall Filters * Lab 5: Implementing Storm Control and Firewall Filters CHAPTER 8: VIRTUAL CHASSIS * Overview of Virtual Chassis * Configuring and Monitoring a Virtual Chassis * Lab 6: Implementing a Virtual Chassis System CHAPTER 9: HIGH AVAILABILITY FEATURES * Overview of High Availability Networks * Link Aggregation Groups * Redundant Trunk Groups * Graceful Routing Engine Switchover (GRES) * Nonstop Active Routing (NSR) * Nonstop Bridging (NSB) * Lab 7: Implementing High Availability Features

JNCIS - ENT Bundle
Delivered on-request, onlineDelivered Online
Price on Enquiry

JEX - Junos Enterprise Switching using Enhanced Layer 2 Software

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for This program is designed for students who have attended successfully the IJOS and JRE courses (prior to April 1, 2017) or the IJOS course (since April 3, 2017) and are working toward JNCIA-JUNOS certification. Overview The objectives for this course follow the requirements for the current JNCIA-JUNOS. At the end of this course, the successful student will be able to: Identify the concepts and functionality of various fundamental elements of networking Identify the concepts, benefits and functionality of the core elements of the Junos OS Identify the concepts, operation and functionality of the Junos user interfaces Identify the main elements for configuring Junos devices Describe how to configure basic components of a Junos device Identify methods of monitoring and maintaining Junos devices Describe monitoring and maintenance procedures for a Junos device Identify basic routing concepts and functionality for Junos devices Describe how to configure and monitor basic routing elements for a Junos device Identify the concepts and functionality of routing policy and firewall filters on Junos devices Describe how to configure and monitor routing policies and firewall filters on a Junos device Apply knowledge of Junos operating system configuration, operations, and functionality to real-world scenarios This two-day course provides students with intermediate switching knowledge and configuration examples using Junos Enhanced Layer 2 Software. CHAPTER 1: COURSE INTRODUCTION * Course Introduction CHAPTER 2: LAYER 2 SWITCHING * Ethernet Bridging Basics * Terminology and Design Considerations * Overview of Enterprise Switching Platforms * Enabling and Monitoring Layer 2 Switching Operations * Lab 1: Implementing Layer 2 Switching CHAPTER 3: VIRTUAL NETWORKS * Overview of VLANs * Configuring and Monitoring VLANs * Voice VLAN * Native VLAN * Routed VLAN Interfaces * Lab 2: Implementing Virtual Networks CHAPTER 4: ROUTING INSTANCES * Routing Instances Overview * Configuring and Monitoring Virtual Switches CHAPTER 5: SPANNING TREE * Spanning Tree Protocol * Rapid Spanning Tree Protocol * Configuring and Monitoring STP and RSTP * Protection Features: BPDU Protection * Protection Features: Loop Protection * Protection Features: Root Protection * Lab 3: Implementing Spanning Tree CHAPTER 6: PORT SECURITY * MAC Limiting * Persistent MAC Learning * DHCP Snooping * Dynamic ARP Inspection (DAI) * IP Source Guard * Lab 4: Implementing Port Security CHAPTER 7: DEVICE SECURITY AND FIREWALL FILTERS * Storm Control * Firewall Filters * Lab 5: Implementing Storm Control and Firewall Filters CHAPTER 8: VIRTUAL CHASSIS * Overview of Virtual Chassis * Configuring and Monitoring a Virtual Chassis * Lab 6: Implementing a Virtual Chassis System CHAPTER 9: HIGH AVAILABILITY FEATURES * Overview of High Availability Networks * Link Aggregation Groups * Redundant Trunk Groups * Graceful Routing Engine Switchover (GRES) * Nonstop Active Routing (NSR) * Nonstop Bridging (NSB) * Lab 7: Implementing High Availability Features

JEX - Junos Enterprise Switching using Enhanced Layer 2 Software
Delivered on-request, onlineDelivered Online
Price on Enquiry

Building Successful Work Relationships (Second Edition)

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Professionals desiring to improve working relationships and maximize cooperation and productivity will benefit from this course. Overview After completing this workshop, students will be able to: Describe the importance of effective work relationships Identify the interdependencies between you and your colleagues Communicate effectively to create rapport and connect with others Identify and maintain your network of professional relationships Develop collaborative, trust-based relationships that achieve meaningful results In the interdependent workplace, we rely on each other to get things done. A professional network isn?t something we can take for granted ? mapping work relationships can be a complex task and understanding different behavioral styles takes effort - but it pays off! Good working relationships means more than just reducing conflict and misunderstandings. It also means building trust, increasing influence, and benefitting from the knowledge and advice of co-workers and senior managers. This workshop will help you develop relationship building skills so you can communicate who you are, what you need, and why you need it in a way that builds trust, respect, and a professional reputation. THE IMPORTANCE OF WORK RELATIONSHIPS * Expectations of Work Relationships * The Value of Relationships * Effects of Work Relationships MAPPING YOUR WORK RELATIONSHIPS * A Network of Relationships * Mapping Work Relationships * Languages of Appreciation IDENTIFYING INTERDEPENDENCIES * Clarifying Purpose * Systems Thinking * Analyzing Independencies BRIDGING WORK STYLES * Understanding Behavioral Styles * Strengths and Trouble Spots * Bridging Different Styles BUILDING YOUR NETWORK * Relationships, Communication, and Results * Networking Principles * Reputation Management COLLABORATING FOR SUCCESS * Understanding Personalities * Aspects of Trust * Recognizing Blind Spots ADDITIONAL COURSE DETAILS: Nexus Humans Building Successful Work Relationships (Second Edition) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Building Successful Work Relationships (Second Edition) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Building Successful Work Relationships (Second Edition)
Delivered on-request, onlineDelivered Online
Price on Enquiry

WORKING WITH SCRIPT: TURNING WORDS INTO PERFORMANCE

By Fay Beck Studio

AN ONLINE COURSE TEACHING YOU HOW TO WORK WITH SCRIPTS FROM SCRIPT ANALYSIS TO CHARACTER EMBODIMENT USING BECK EMOTIONAL ACCESS TECHNIQUE An actor’s work with the script begins in analysis. However it must end with performance. But how exactly does one move from the information gained during the breakdown phase to embodiment of the character? It is certainly not a straightforward process and it involves a number of steps. When we are talking about embodiment we mean that our bodies and our emotional instruments must be engaged. So, one way to think about this is that we are moving from the cerebral realm (our understanding of the character) to the physical and emotional. The technique developed by the studio’s founder Beck Emotional Access Technique or BEAT for short bridges this gap between the realm of thoughts and understanding, the physical world of behaviour and the internal emotional world which only you experience but of course we, the audience, sense. BEAT has revolutionising actor training by bridging these realms through a set of intuitive exercises known as the BEAT Scales. Actors trained in this technique find it easy to not only access emotions safely, but to also make fine adjustments which lead to deep and nuanced performances. Over the course of 5 weeks, we deliver powerful technique for character embodiment to help you leave behind confusion, uncertainty and approximation. Instead, you will feel empowered through a no nonsense approach that puts you, the feeling body, in the centre. COURSE REQUIREMENTS * To join this course you will need at least intermediate acting skills. Good script analysis skills are presumed. * BEGINNING ACTORS: Consider doing the T102 Script Analysis Course. You will benefit much more from the present course if you are well equipped with sound script analysis skills. * INTERMEDIATE & EXPERIENCED ACTORS: This course is recommend for you! Actors who completed T102, the present course is designed to pick up from where you last left off! KEY POINTS * 5 WEEK COURSE, 5 X 2HR WEEKLY CLASS (TOTAL 10HRS) * SMALL GROUP (MAX 10 PEOPLE) TO POWER LEARNING * SESSIONS CONDUCTED LIVE OVER GOOGLE MEET * CLASSES AVAILABLE TO WATCH BACK WHILE THE COURSE IS RUNNING * 40% THEORY, 60% PRACTICE/HOMEWORK PLAYBACK Acting happens when the decisions and choices you made in your analysis are ‘converted’ into behaviour and emotions. FAY BECK LEARNING OUTCOMES * Framed an understanding of how text and the script affect characterisation * Introduction to Beck Emotional Access Technique (BEAT) * Opportunity to work with Feedback and revise performance * Practiced key exercises designed to extend your grasp of the performance * Learnt to apply BEAT Scales to adjust performance COURSE TERMS APRIL 26TH, MAY 3RD, MAY 10TH, MAY 24TH, MAY 31ST 5 FRIDAYS IN APRIL AND MAY Join us from any timezone around the world. The course runs at generally convenient times for the following Timezones: (UTC+4): 18:00 – 20:00 PM (EG, DUBAI) Central European Time (CET): 16:00 – 18:00 PM (EG, BERLIN, PARIS, ROME) Greenwhich Mean Time (GMT): 15:00 – 17:00 PM (EG. LONDON, GB) Universal Timer Coordinated (UTC): 14:00 – 16:00 PM Eastern Time (EDT) 10:00 AM – 12:00 PM (EG. NEW YORK, US, QUEBEC, CAN) Central Time (CDT): 09:00 AM – 11:00 AM Mountain Time (MDT): 08:00 AM – 10:00 AM Pacific Time (PDT): 07:00 AM – 09:00 AM (EG. LOS ANGELES, US) Not a convenient time for you? Don’t worry this course will run again at a time more suitable for your timezone. Keep up with upcoming by signing up to our newsletter!

WORKING WITH SCRIPT: TURNING WORDS INTO PERFORMANCE
Delivered Online
Dates arranged on request
£280