• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

14 Bridging courses in London

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

Junos Service Provider Switching

5.0(3)

By Systems & Network Training

JUNOS SERVICE PROVIDER SWITCHING TRAINING COURSE DESCRIPTION This course provides students with an overview of switching concepts such as LANs, Layer 2 address learning, bridging, virtual LANs (VLANs), provider bridging, VLAN translation, spanning-tree protocols, and Ethernet Operation, Administration, and Maintenance (OAM). This course also covers Junos operating system-specific implementations. Junos Service Provider Switching is an intermediatelevel course. WHAT WILL YOU LEARN * Describe carrier Ethernet. * Describe the function of an Ethernet LAN. * Implement VLAN tagging. * Describe the components of provider bridging. * Identify and use available tools to resolve network issues. * Configure and monitor Ethernet OAM, ERP, LAG, STP, the RSTP, the MSTP, and the VSTP. JUNOS SERVICE PROVIDER SWITCHING TRAINING COURSE DETAILS * Who will benefit: Individuals responsible for configuring and monitoring devices running the Junos OS. * Prerequisites: Junos Intermediate Routing * Duration 2 days JUNOS SERVICE PROVIDER SWITCHING TRAINING COURSE CONTENTS * Ethernet Switching and Virtual LANs Ethernet LANs Bridging Configuring and Monitoring VLANs Automating VLAN Administration Configuring and Monitoring IRB Layer 2 Address Learning and Forwarding Layer 2 Firewall Filtering Ethernet Switching and VLANs Lab * Virtual Switches Routing Instances Overview Configuring and Monitoring Virtual Switches Interconnecting Routing Instances Logical Systems Virtual Switches Lab * Provider Bridging Expanding the Bridged Network Provider Bridging Configuring and Monitoring Provider Bridging Provider Bridging Lab * Spanning-Tree Protocols Overview of STP Overview of RSTP Overview of MSTP Overview of VSTP Configuring and Monitoring Spanning-Tree Protocols Understanding BPDU, Loop, and Root Protection MSTP Lab * Ethernet OAM OAM Overview LFM CFM Configuring and Monitoring Ethernet OAM Ethernet OAM Lab * High Availability and Network Optimization ERP Overview Configuring and Monitoring ERP Link Aggregation Group Overview Configuring and Monitoring a LAG MC-LAG Overview Configuring and Monitoring an MC-LAG High Availability and Network Optimization Lab * Troubleshooting and Monitoring Introduction to Troubleshooting and Monitoring Troubleshooting and Monitoring Tools Troubleshooting Case Study: Network Congestion Troubleshooting and Monitoring Lab * Appendix A: Carrier Ethernet Ethernet in the WAN Ethernet Standards Organizations MX Series Layer 2 Features * Appendix B: Deprecated Syntaxes Appendix C: MX Series Overview

Junos Service Provider Switching
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2477

Essential EVPN

5.0(3)

By Systems & Network Training

ESSENTIAL EVPN TRAINING COURSE DESCRIPTION Ethernet VPN (E-VPN) and Provider Backbone Bridging E-VPN (PBB-EVPN) are emerging technologies providing Ethernet services over MPLS. This course studies the technologies in E-VPN/PBB-EVPN providing multi-homing, multi pathing, auto discovery, multicast, forwarding and fast convergence. WHAT WILL YOU LEARN * Differentiate between E-VPN and PBB-EVPN. * Explain how E-VPN operates. * Explain how PBB-EVPN operates. * Explain how E-VPN provides: Multi homing Multi pathing Auto discovery. ESSENTIAL EVPN TRAINING COURSE DETAILS * Who will benefit: Network engineers. Staff working for carriers. * Prerequisites: Definitive Ethernet switching for engineers Concise MPLS for engineers * Duration 2 days ESSENTIAL EVPN TRAINING COURSE CONTENTS * Introduction to EVPN * Network virtualization What Is network virtualization? types of virtual networks, network tunnelling, the consequences of tunnelling, packet load balancing, network interface card behaviour. maximum transmission unit, lack of visibility, VXLAN, protocols to implement the control plane, support for network virtualization technologies, merchant silicon Software, standards. * The building blocks of Ethernet VPN A brief history of EVPN, architecture and protocols for traditional EVPN deployment, EVPN in the data center BGP constructs for Virtual networks, address family indicator/subsequent address family indicator, route distinguisher, route target, RD, RT, and BGP processing, route types, modifications to support EVPN over eBGP, keeping the NEXT HOP unmodified, retaining route targets, FRR support for EVPN, automatic propagation of NEXT HOP, RT/RD derivation, what Is not supported in FRR. * Bridging with Ethernet VPN An overview of traditional bridging, overview of bridging with EVPN, what Ifs, why does NVE L3 get an advertisement for MACA? handling BUM packets, handling MAC moves, support for dual-attached hosts, the host-switch Interconnect, VXLAN model for dual-attached hosts, switch peering solutions, handling Link failures, duplicate multi-destination frames, ARP/ND suppression. * Routing with Ethernet VPN The case for routing in EVPN, routing use cases in the data center, routing models, where is the routing performed? centralized routing, distributed routing, how routing works in EVPN, asymmetric routing, symmetric routing, VRFs in EVPN routing, summarized route announcements, BGP support for EVPN routing, comparing asymmetric and symmetric models, vendor support for EVPN routing. * Configuring and administering Ethernet VPN The sample topology, configuration cases, configuring the MTU, the end first: complete FRR configurations, the Invariants: configuration for the spines, firewall, and servers, centralized routing, asymmetric distributed routing, symmetric routing, dissecting the configuration, configuring the underlay, configuring the overlay: FRR configuring the overlay: interfaces, examining an EVPN network, show running configuration, show BGP summary, show EVPN VNIs and VTEPs, identify which VTEP advertised a MAC address, comparing FRR and Cisco EVPN configurations, considerations for deploying EVPN in large networks.

Essential EVPN
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2477

Total SPB (802.1)for engineers

5.0(3)

By Systems & Network Training

TOTAL SPB TRAINING COURSE DESCRIPTION A comprehensive look at Service Provider Bridging (SPB) as standardised in 802.1aq. This SPB course starts with the problems in traditional switched networks then moves onto to how SPB solves these problems. As IS-IS is key to loop free topologies in SPB networks, this protocols is also studied. WHAT WILL YOU LEARN * Explain the benefits of SPB. * Explain how SPB works. * Explain the role of IS-IS in SPB. * Integrate SPB into existing networks. TOTAL SPB TRAINING COURSE DETAILS * Who will benefit: Technical staff working with Ethernet. * Prerequisites: Definitive Ethernet switching for engineers * Duration 1 day TOTAL SPB TRAINING COURSE CONTENTS * What is SPB? Layer 2 versus Layer 3, STP problems: One path, convergence, MAC explosion. Virtualisation issues: VRF. Service Provider Bridging (SPB), 802.1aq. Virtual Services Network. * SPB variants 802.1Q, 802.1ad, Q-in-Q, VLAN IDs, 802.1ah, M-in-M, I-SID. SPBV, SPBM. SPBM frame format. * How SPB works Node ID, Backbone Edge Bridges, Backbone MAC address, Customer MACs, I-SID. IS-IS. Forwarding database. VSN. * IS-IS Link layer IS-IS, SPF trees, traffic management. IS-IS extensions for SPB. ISIS TLV. * SPB services Data centre bridging, server virtualisation, multitenant applications. Integration of SPB into existing networks. VLAN to ISID mappings. Inter ISID routing, IP/SPB Layer 3 VRF extensions. * Miscellaneous Multicast in SPB environments. Source specific multicast trees. SPB configuration. SPB deployment considerations.

Total SPB (802.1)for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1397

MEF Carrier Ethernet 2.0 Certification

5.0(3)

By Systems & Network Training

MEF CARRIER ETHERNET TRAINING COURSE DESCRIPTION The course progresses from a overview of the Carrier Ethernet service and how it works onto looking at the concepts in depth. Service attributes and management follow with the course finishing with studies of practical Carrier Ethernet. WHAT WILL YOU LEARN * Discuss and understand key Carrier Ethernet Concepts. * Understand tasks related to designing, deploying and maintaining a Carrier Ethernet network. * Offer effective solutions to implementing a Carrier Ethernet enterprise network given available customer resources and requirements. * Carry out informed discussions using industry Carrier Ethernet 'vocabulary. * Pass the MEF CECP 2.0 professional accreditation exam. MEF CARRIER ETHERNET TRAINING COURSE DETAILS * Who will benefit: Anyone working with Carrier Ethernet * Prerequisites: The course attendees need to be conversant with data networks, as well as Ethernet and IP technologies. * Duration 5 days MEF CARRIER ETHERNET TRAINING COURSE CONTENTS * Section One: Introduction to Carrier Ethernet * Introduction to Carrier Ethernet: What is Carrier Ethernet? Evolution, advantages, The MEF, MEF specifications; UNI, EVC, OVC, EPL/EVPL, EP-LAN/ EVP-LAN, EP-Tree/EVP-Tree, etc, overview. * How Carrier Ethernet Works: Service Frame Handling. Carrier Ethernet at Customer Premises, metro and core. Carrier Ethernet Workings, UNI attributes, Service Attributes (EVC and EVC per UNI attributes), Bandwidth Profiles, service multiplexing, L2 protocol processing; Carrier Ethernet equipment, CPE, aggregation and homing nodes, core equipment; management systems. * The Setting Up of a Carrier Ethernet Service: Step 1: Choose service type, EPL/EVPL, EP-LAN/EVP-LAN, EPTree/EVP-Tree, EVLine...; Step 2: CPE tasks, UNI-C tasks (UNI attributes, service attributes (EVC and EVC per UNI) and bandwidth profiles), UNI-N tasks (L2 protocol handling). Step 3: Non-CPE tasks, Access, metro and core connections set up. * Section Two: Carrier Ethernet Concepts in depth * Carrier Ethernet Definitions in Depth: UNI, UNI I & II, UNI-N and UNI-C, etc.; NNI/ENNI; EVC; OVC, OVC type (P2P, M2M, Rooted MP), OVC end point (root, leaf, trunk), OVC end point map, OVC end point bundling; Service types in detail, EPL/EVPL, EP-LAN/EVP-LAN, EP-Tree/EVP-Tree, EVLine, Access EPL, Access EVPL . * Carrier Ethernet Service Frame Handling: Unicast, multicast and broadcast frame delivery, Tagged, untagged and priority; Tagging, C and S-Tags, 802.3, 802.1d, 802.1q, 802.1ad, 802.1ah evolution, VLAN ID translation/preservation. CoS preservation. * Other Key Carrier Ethernet Concepts: MTU, MTU at UNI, MTU at ENNI; Physical Layer Attributes, FE, GbE and 10GbE, Service Multiplexing and Bundling Concept and detail, rules and implications; Hairpin Switching * Managing Bandwidth in a Carrier Ethernet Network: Token Bucket Algorithm, EIR, CIR, CBS, EBS, Coupling Flag; Frame Colors, recoloring, Color Awareness attribute, Color Forwarding; Bandwidth Profiles, rules and concepts. MEF CoS identifiers, DEI bit (in S-Tag), PCP bit (in C-Tag or S-Tag), or DSCP (in IP header), Multiflow bandwidth concepts; CoS Label/Color Identification. * Section Three: Carrier Ethernet Service Attributes Overview: Carrier Ethernet 2.0; Blueprint C Service Attributes: Per UNI, Physical interfaces, Frame format, Ingress/egress Bandwidth Profiles, CEVLAN ID/EVC Map, UNI protection. EVC per UNI, Ingress/egress Bandwidth Profiles, etc.; Per EVC, CEVLAN ID Preservation, CoS ID Preservation, Relationship between SLA and SLP, Class of Service, etc. OVC, ENNI, OVC End Point per UNI and OVC End Point per ENNI, Ingress/egress bandwidth profiles, etc. * Section Four: Managing Carrier Ethernet Networks Overview: MEF Service Lifecycle. Carrier Ethernet maintenance: Port, Link & NE failure, Service Protection Technologies, Fault Identification and Recovery, LAG, Active/Standby EVC, Single EVC with transport protection, G.8031, G.8032, MPLS FRR. * SOAMs: Connectivity fault management, connectivity Monitoring, Loopback, Linktrace; Performance Management, Frame Delay, Inter Frame Delay Variation, Availability, Frame Loss Ratio, Resiliency, HLI, DMM, DMR, SLM, SLR; Key Concepts, Single vs dual ended, ordered UNI pair calculations. * LOAMs: Link discovery, link monitoring, etc. * Terminology and Concepts: MEG levels, MIPs. * Section Five: Practical Carrier Ethernet Carrier Ethernet Transport Technologies: Layer 1: SDH. Layer 2: Bridging, provider bridging, PBB, PBBTE. Layer 2.5: MPLS VPWS, MPLS VPLS, MPLS-TP. * Carrier Ethernet Access Technologies: fiber, SDH, active fiber, PON, GPON, 10G PON, OTN, WDM; copper, PDH, G-SDSL, 10Pass-TS, HFC; packet radio. * Optimising mobile backhaul with Carrier Ethernet Key challenges solutions: Market pressure, LTE evolution, elements and architecture (RAN BS, NC, GWIF.), synchronization, bandwidth management. * Circuit Emulation over Ethernet: Purpose, needs and applications. Synchronization: Phased, ToD, External Reference source, SynchE ,NTP, IEEE-1588 v2/ PTP, ACR; MEF Service Definitions for emulated circuits. * Applying what you know: Practical examples and scenarios, Carrier Ethernet solutions; Practice Scenarios, Given a scenario, determine appropriate Ethernet services

MEF Carrier Ethernet 2.0 Certification
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4997

Definitive Ethernet LANS for engineers

5.0(3)

By Systems & Network Training

ETHERNET LANS TRAINING COURSE DESCRIPTION THIS COURSE HAS BEEN REPLACED AS PART OF OUR CONTINUOUS CURRICULUM DEVELOPMENT. PLEASE SEE OUR * Definitive Ethernet switching course WHAT WILL YOU LEARN * Describe what Ethernet is and how it works. * Install Ethernet networks * Troubleshoot Ethernet networks * Analyse Ethernet packets * Design Ethernet networks * Recognise the uses of Hubs, Bridges, switches and routers. ETHERNET LANS TRAINING COURSE DETAILS * Who will benefit: Those wishing to find out more about how their LAN works. * Prerequisites: Intro to Data comms & networking. * Duration 3 days ETHERNET LANS TRAINING COURSE CONTENTS * What is Ethernet? LANS, What is Ethernet?, history, standards, the OSI reference model, how Ethernet works, CSMA/CD. Ethernet Cabling UTP, cat 3,4,5, Cat 5e, Cat 6, Cat 7, fibre optic cable, MMF, SMF. Hands on Making a cable. * 802.3 physical specifications Distance limitations, hubs and repeaters, 5-4-3-2-1 rule, 10BaseT, 10BaseF, 100BaseTX, 100BaseFX, 1000BaseSX, 1000BaseT, 10gbe. Hands on Working with hubs. * Ethernet layer 2 Overview, NICS, device drivers, MAC addresses, broadcasts, multicasts, frame formats, Ether II, 802.3, 802.2, SNAP, compatibility, Ethernet type numbers, Ethernet multicast addresses, Ethernet vendor codes. Hands on Installing Ethernet components, analysing MAC headers. * IP and Ethernet ARP Hands on Analysing ARP packets. * Ethernet extensions Full/half duplex, auto negotiation, flow control methods, 802.3ad, 802.3af, 802.3ah. Hands on Configuration of full/half duplex. * Ethernet speed enhancements Encoding, Carrier extension, packet bursting, jumbo frames. * Prioritisation 802.1P, 802.1Q, TOS, WRR, QOS, VLANs. Hands on 802.1p testing * Interconnecting LANS Broadcast domains, Collision domains, What are bridges, transparent bridging, What are switches? STP, VLANS, What are routers? Layer 3 switches, Connecting Ethernet to the WAN. Hands on STP, Analysing Ethernet frames in a routed architecture. * Troubleshooting and maintaining Ethernet Utilisation, performance, TDR and other testers, bottlenecks, statistics, RMON. Hands on Monitoring performance, troubleshooting tools.

Definitive Ethernet LANS for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3497

Essential Carrier Ethernet course

5.0(3)

By Systems & Network Training

CARRIER ETHERNET TRAINING COURSE DESCRIPTION Ethernet is now the interface of choice for nearly all networking. This comprehensive course looks at the ways carriers can provide this Ethernet interface for their WANs and MANs. The course assumes delegates already have a solid foundation in Ethernet switching and so concentrates on just the Ethernet technologies for Carrier Ethernet. WHAT WILL YOU LEARN * Describe the main Carrier Ethernet services. * Evaluate transports for Carrier Ethernet. * Explain how Ethernet can work over MPLS and SDH. * Explain the Ethernet technologies used to enable Carrier Ethernet. CARRIER ETHERNET TRAINING COURSE DETAILS * Who will benefit: Network engineers. Staff working for carriers. * Prerequisites: Definitive Ethernet switching for engineers. * Duration 2 days CARRIER ETHERNET TRAINING COURSE CONTENTS * Introduction What is Ethernet? LANs, MANs, WANs, Ethernet and switches in the LAN. Traditional LAN/WAN integration, routers. The Ethernet interface for the WAN. Standards: IEEE, MEF, OIF, Ethernet Alliance. * Carrier Ethernet Services E-line: EPL, EVPL. E-LAN: EP-LAN, EVP-LAN. E-Tree: EP-Tree, EVP-Tree. Ethernet Services attributes. Applications: Carrier Ethernet for businesses, Mobile backhaul. Multicasting. * Service attributes Bandwidth profiles, bandwidth parameters, Class of Service, QoS, MTU, Protection mechanisms: STP, RSTP, MSTP, Link aggregation, G.8031, G.8032. * Transporting Carrier Ethernet The main options. 'Pure' Ethernet, Ethernet over SDH, Ethernet over WDM, Ethernet over MPLS. Ethernet switching, addresses and MAC address tables. Carrier Ethernet access technologies. EFM. * Ethernet over MPLS What is MPLS, MPLS-TE, MPLS-VPN, L2 VPNs, VPLS, VPWS. MPLS Fast Reroute. * CET 'Pure' Ethernet, Provider bridging 802.1d, Provider Backbone Bridges 802.1ah. Traffic engineering 802.1Qay. * Carrier Ethernet technologies 802.1ad VLAN stacking, 802.1AX Link aggregation. 802.1Q QoS. * OAM Standards, layers, interworking

Essential Carrier Ethernet course
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2477

Certified Wireless Security Professional

5.0(3)

By Systems & Network Training

CWSP TRAINING COURSE DESCRIPTION A hands-on training course concentrating solely on WiFi security with an emphasis on the delegates learning the necessary knowledge and skills to pass the CWSP exam. The course progresses from simple authentication, encryption and key management onto in depth coverage of 802.X and EAP along with many other security solutions such as access control, intrusion prevention and secure roaming. WHAT WILL YOU LEARN * Demonstrate the threats to WiFi networks. * Secure WiFi networks. * Configure: WPA2 RADIUS 802.1x EAP * Pass the CWSP exam. CWSP TRAINING COURSE DETAILS * Who will benefit: Technical network staff. Technical security staff. * Prerequisites: Certified Wireless Network Associate. * Duration 5 days CWSP TRAINING COURSE CONTENTS * WLAN Security overview Standards, security basics, AAA, 802.11 security history. Hands on WLAN connectivity. * Legacy 802.11 security Authentication: Open system, shared key. WEP. VPNs. MAC filters. SSID segmentation, SSID cloaking. Hands on Analysing 802.11 frame exchanges, viewing hidden SSIDs. * Encryption Basics, AES, TKIP, CCMP, WPA, WPA2. Hands on Decrypting 802.11 data frames. * 802.11 layer 2 authentication 802.1X: Supplicant, Authenticator, Authentication server. Credentials. Legacy authentication. EAP, Weak EAP protocols, Strong EAP protocols: EAP -PEAP, EAP-TTLS, EAP-TLS, EAP-FAST. Hands on Analysing 802.1X/EAP frames. * 802.11 layer 2 dynamic key generation Robust Security Network. Hands on Authentication and key management. * SOHO 802.11 security WPA/WPA2 personal, Preshared Keys, WiFi Protected Setup (WPS). Hands on PSK mapping. * WLAN security infrastructure DS, Autonomous APs, WLAN controllers, split MAC, mesh, bridging, location based access control. Resilience. Wireless network management system. RADIUS/LDAP servers, PKI, RBAC. Hands on 802.1X/EAP configuration. RADIUS configuration. * 802.11 Fast secure roaming History, RSNA, OKC, Fast BSS transition, 802.11k. Hands on Roaming. * Wireless security risks Rogue devices, rogue prevention. Eavesdropping, DOS attacks. Public access and hotspots. Hands on Backtrack. * WiFi security auditing Layer 1 audit, layer 2 audit, pen testing. WLAN security auditing tools. * WiFi security monitoring Wireless Intrusion Detection and Prevention Systems. Device classification, WIDS/WIPS analysis. Monitoring. 802.11w. Hands on Laptop spectrum analysers. * VPNs, remote access, guest access Role of VPNs in 802.11, remote access, hotspots, captive portal. * Wireless security policies General policy, functional policy, recommendations.

Certified Wireless Security Professional
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

CWDP TRAINING COURSE DESCRIPTION The CWDP course consists of instructor-led training applicable to the design of wireless LANs using the latest technologies including 802.11n and 802.11ac. The course goes in-depth into the design process and provides attendees with the knowledge needed to plan, deploy and test modern 802.11-based networks. It also prepares students for the CWDP examination. Students who complete the course will acquire the necessary skills for preparing, planning performing and documenting site surveys and wireless LAN design procedures. WHAT WILL YOU LEARN * Design enterprise WiFi networks. * Select appropriate antennas and Access points. * Perform site surveys. * Describe the security requirements required for enterprise networks. * Test, validate and troubleshoot installations. CWDP TRAINING COURSE DETAILS * Who will benefit: Anyone looking for the skills to analyze, troubleshoot, and optimize any enterprise level Wi-Fi network, no matter which brand of equipment your organization deploys. Anyone looking to become a CWNP. * Prerequisites: CWNA * Duration 5 days CWDP TRAINING COURSE CONTENTS * WLAN design overview Importance of good design, Impact of bad design, Design process, Design skills, Design toolkit. * Requirements analysis Pre-planning, Customer interaction, Requirements gathering, Discovering existing systems, Documenting the environment, Defining constraints, Creating documentation. * Designing for clients and applications Client Device types, Application types, Application-specific design, High density design issues. * Designing for industry Standard corporate networks, Industry-specific designs, Government, Healthcare, Hospitality, Retail, Public hotspots, Transportation, Mobile offices, Outdoor and mesh, Remote networks and branch offices, Last-miles / ISP and bridging. * Vendor selection processes Defining vendor issues, Operational planes, Design models, Understanding architectures. * Radio Frequency (RF) planning RF spectrum, RF behaviors, Modulation and coding schemes, RF accessories, Throughput factors. WLAN hardware selection Antennas, 802.11n and antennas, Choosing Aps, Powering Aps. * Site surveys Site survey tools, Site survey preparation, Predictive site surveys, Manual site surveys, Site survey principles and processes. * Designing for Quality of Service (QoS) QoS overview, QoS application points, Roaming support. * Designing for security Bad security, Authentication solutions, Encryption solutions, Security best practices, Intrusion prevention. * Installation testing, validation and troubleshooting Network health status, Troubleshooting and validation process, Troubleshooting and validation tools, Common problems. * Hands-on lab exercises Hands-on labs depend on the audience and can include use of: Spectrum analyzers, Protocol analyzers, Site Survey software, Diagramming software, Various wireless access points, Various wireless adapters and antennas.

CWDP
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3497

The CAIA Association is a global professional body dedicated to creating greater alignment, transparency, and knowledge for all investors, with a specific emphasis on alternative investments. -------------------------------------------------------------------------------- COURSE OVERVIEW The CAIA Association is a global professional body dedicated to creating greater alignment, transparency, and knowledge for all investors, with a specific emphasis on alternative investments. A Member-driven organization representing professionals in more than 100 countries, CAIA Association advocates for the highest ethical standards. Whether you need a deep, practical understanding of the world of alternative investments, a solid introduction, or data science skills for the future in finance, the CAIA Association offers a program for you. Why CAIA? Distinguish yourself with knowledge, expertise, and a clear career advantage – become a CAIA Charterholder. CAIA® is the globally recognized credential for professionals allocating, managing, analyzing, distributing, or regulating alternative investments. The Level II curriculum takes a top-down approach and provides Candidates with the skills and tools to conduct due diligence, monitor investments, and appropriately construct an investment portfolio. In addition, the Level II curriculum contains Emerging Topic readings; articles written by academics and practitioners designed to further inform and provoke the Candidate’s investment management process. After passing the Level II exam you are eligible, with relevant professional experience, to join the CAIA Association as a Member and receive the CAIA Charter. You will be part of an elite group of more than 13,000 professionals worldwide. Only after joining the Association, you are eligible to add the CAIA designation to your professional profiles. Who will benefit from enrolling in the CAIA program? Professionals who want to develop a deep level of knowledge and demonstrated expertise in alternative investments and their contribution to the diversified portfolio should pursue the CAIA Charter including: • Asset Allocators • Risk managers • Analysts • Portfolio managers • Traders • Consultants • Business development/marketing • Operations • Advisors Curriculum Topics: Topic 1: Emerging Topics • Decentralized Finance: On Blockchain- and Smart Contract-Based Financial Markets • Technical Guide for Limited Partners: Responsible Investing in Private Equity • Channels for Exposure to Bitcoin • Assessing Long-Term Investor Performance: Principles, Policies and Metrics • Demystifying Illiquid Assets: Expected Returns for Private Equity • An Introduction to Portfolio Rebalancing Strategies • Longevity and Liabilities: Bridging the Gap • A Short Introduction to the World of Cryptocurrencies Topic 2: Ethics, Regulation and ESG • Asset Manager Code • Recommendations and Guidance • Global Regulation • ESG and Alternative Investments • ESG Analysis and Application Topic 3: Models • Modeling Overview and Interest Rate Models • Credit Risk Models • Multi-Factor Equity Pricing Models • Asset Allocation Processes and the Mean-Variance Model • Other Asset Allocation Approaches Topic 4: Institutional Asset Owners and Investment Policies • Types of Asset Owners and the Investment Policy Statement • Foundations and the Endowment Model • Pension Fund Portfolio Management • Sovereign Wealth Funds • Family Offices and the family office Model Topic 5: Risk and Risk Management • Cases in Tail Risk • Benchmarking and Performance Attribution • Liquidity and Funding Risks • Hedging, Rebalancing, and Monitoring • Risk Measurement, Risk Management, and Risk Systems Topic 6: Methods for Alternative Investing • Valuation and Hedging Using Binomial Trees • Directional Strategies and Methods • Multivariate Empirical Methods and Performance Persistence • Relative Value Methods • Valuation Methods for Private Assets: The Case of Real Estate Topic 7: Accessing Alternative Investments • Hedge Fund Replication • Diversified Access to Hedge Funds • Access to Real Estate and Commodities • Access through Private Structures • The Risk and Performance of Private and Listed Assets Topic 8: Due Diligence and Selecting Managers • Active Management and New Investments • Selection of a Fund Manager • Investment Process Due Diligence • Operational Due Diligence • Due Diligence of Terms and Business Activities Topic 9: Volatility and Complex Strategies • Volatility as a Factor Exposure • Volatility, Correlation, and Dispersion Products and Strategies • Complexity and Structured Products • Insurance-Linked and Hybrid Securities • Complexity and the Case of Cross-Border Real Estate Investing -------------------------------------------------------------------------------- DURATION 200 Hours WHATS INCLUDED Course Material Case Study Experienced Lecturer Refreshments Certificate

CAIA Level 2 Course
Delivered In-Person
Dates arranged on request
£1500

NVQ Level 3 - Experienced Worker Route

5.0(9)

By Optima Electrical Training

If you want to start installing independently or with an electrical contractor look no further as this course will give you the skills and knowledge required. This package which will allow you to become a fully qualified domestic installer and enable you to join a Competent Person Self-Certification Scheme and certify your own domestic work.

NVQ Level 3 - Experienced Worker Route
Delivered in-person, on-requestDelivered In-Person in London & 2 more
£1615 to £1995

Educators matching "Bridging"

Show all 31
Lim Solutions

lim solutions

London

LIM SOLUTIONS LIMITED is an acclaimed company that facilitates educational programs for those seeking to study in international institutions of higher learning. We provide a platform where students can easily get access to information and services that enhance their chances of getting enrolled in universities and colleges worldwide. We are comprised of consultants and professionals in the higher education and relocation fields. Our structure is comprised of a start-to-finish methodology that ensures that we undertake the enrollment process from the start to the end. Our consultants ensure that there is a seamless process for students and institutions of higher education to communicate and make the application/enrolment process easier. We are on-hand 24/7 and provide tools that facilitate speedy and effective enrollment to international colleges and universities. Among our partners are several Education Management companies and globally acclaimed universities and colleges. We are particularly targeted at facilitating enrolment of students in UK institutions of higher education. Universities in the UK feature prominently in respected publications such as the Financial Times, Times Higher and the European report on Science and technologies published by the European Commission. This speaks to the global acclaim of study programs in UK universities and colleges. In the UK, the education and research sector takes up 20% of government spending annually, the biggest investment in the UK budget. The United Kingdom has the 4th largest economy globally. It is a democratic state run by a prime minister who is under the Monarchy. It is comprised of 4 countries, but has other territories and islands globally.