• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

5537 Courses in Sheffield delivered Live Online

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

MySQL for developers

5.0(3)

By Systems & Network Training

MYSQL FOR DEVELOPERS TRAINING COURSE DESCRIPTION This MySQL Developers training course is designed for MySQL Developers who have a good understanding of a MySQL database and experience of using SQL commands. The course provides further practical experience in more advanced MySQL commands and SQL statements including Stored Routines, Triggers and Event Scheduling. WHAT WILL YOU LEARN * Provide the skills needed to write more advanced queries and database maintenance statements on a MySQL database. * Use advanced features of the MySQL Client. * Use advanced data types. * Manage the structure of databases and tables. * Manage and using indexes. * Write complex SQL query statements. * Use advanced SQL expressions. * Use advanced SQL functions. * Perform advanced Insert, Update, Delete, Replace and Truncate Operations. * Use user variable syntax and properties. * Import and export data from within MySQL. * Import and export data from the command line. * Perform complex joins to access multiple tables. * Perform complex subqueries. * Create, manage and us views. * Use prepared statements. * Create and use stored routines. * Create and use triggers. * Obtain database metadata. * Optimize queries. * Work with the main storage engines. * Debug MySQL applications. MYSQL FOR DEVELOPERS TRAINING COURSE DETAILS * Who will benefit: MySQL Developers who have a basic understanding of a MySQL database and SQL commands as covered on the Introduction to MySQL course. * Prerequisites: MySQL foundation * Duration 5 days MYSQL FOR DEVELOPERS TRAINING COURSE CONTENTS * Introduction Administration and Course Materials, Course Structure and Agenda, Delegate and Trainer Introductions. * Client/server concepts MySQL client/server architecture, Server modes, Using client programs, Logging in options, Configuration files, Precedence of logging in options Hands on Using client/server * The MySQL client program Using MySQL interactively, The MySQL prompts, Client commands and SQL statements, Editing, Selecting a database, Help, Safe updates, Using script files, Using a source file, Redirecting output into a file, Command line execution, Mysql output formats, Overriding the defaults, Html and xml output, MySQL Utilities. Hands on Using the MySQL client program * Data types Bit data type, Numeric data types, Auto_increment, Character string data types, Character sets and collation, Binary string data types, Enum and Set data types, Temporal data types, Timezone support, Handling Missing Or Invalid Data Values, SQL_MODE options. Hands on Using data types * Identifiers Using Quotes with identifier naming, Case sensitivity in Identifier naming, Qualifying columns with table and database names, Using reserved words as identifiers, Function names Hands on Using identifiers * Databases Database properties, Creating a database, Selecting a database, Altering databases, Dropping databases, Obtaining database metadata, The SHOW command, The INFORMATION_SCHEMA database, The SHOW CREATE command Hands on Using databases * Tables and indexes Table properties, Creating tables, Create table using Select or Like, Temporary tables and memory tables, Altering tables, Adding columns, Changing column widths and types, Renaming columns, Dropping columns, Adding constraints, Dropping constraints, Renaming tables, Change the table storage engine, Multiple alterations, Dropping tables, Emptying tables, Obtaining table metadata, Show create table, The information_schema, Index introduction, Structure of a mysql index, Creating and dropping indexes, Creating an index, Altering a table to add an index, Specifying index type, Dropping indexes, Obtaining Index Metadata. Hands on Creating, altering and dropping tables/indexes * Querying for data The SQL select statement and MySQL differences, Advanced order by, Order by and collation, Order by with enum datatype, Order by with Set datatype, Ordering with distinct and group by Special features of union, Limit and order by clauses, Group By clause, Group_concat, Using Rollup in a Group By clause. Hands on Querying for data * SQL Expressions and functions Components of expressions, Nulls, Numeric expressions, String expressions, Temporal expressions, Comparison functions, Flow control functions, Numeric functions, String functions, Temporal functions. Hands on Using expressions and functions * Updating data Update operations and privileges, Inserting rows, Insert using a set clause, Inserting duplicate values, Replacing rows, Updating rows, Update using the order by and limit clauses, Deleting rows, The delete and truncate statements. Exercise: Inserting, updating, replacing and deleting data * Connectors MySQL client interfaces, MySQL connectors, Oracle and community conectors, Connecting to MySQL server using Java and PHP connectors, MySQL and NoSQL, Innodb integration with memcached. * Obtaining database metadata What is metadata?, The mysqlshow utility, The show and describe commands, Describing tables, The information_schema, Listing tables, Listing columns, Listing views, Listing key_columns_usage. Hands on Obtaining database metadata * Debugging Mysql error messages, The show statement, Show errors, Show count(*) errors, Show warnings, Show count(*) warnings, Note messages, The perror utility. Hands on Debugging * Joins Overview of inner joins, Cartesian product, Inner joins with original syntax, Non equi-join, Using table aliases to avoid name clashes, Inner Joins With ISO/ANSI Syntax, Outer Joins, Left outer joins, Right outer joins, Full outer joins, Updating multiple tables simultaneously, Updating rows in one table based on a condition in another, Updating rows in one table reading data from another, Deleting from multiple tables simultaneously, Deleting rows in one table based on a condition in another. Hands on Coding joins * Subqueries Types of subquery, Multiple-column subqueries, Correlated subqueries, Using the ANY, ALL and SOME operators, Using the EXISTS operator, Subqueries as scalar expressions, Inline views, Converting subqueries to joins, Using subqueries in updates and deletes. Hands on Coding subqueries * Views Why views are used, Creating views, View creation restrictions, View algorithms, Updateable views, Altering and dropping views, Displaying information about views, Privileges for views. Hands on Using views * Import and Export Exporting using SQL, Privileges required to export data, Importing using SQL, Messages when loading data, Privileges required to load data, Exporting from the command line, Mysqldump main options, Importing from the command line, Mysqlimport main options. Hands on Importing and exporting * User variables and prepared statements Creating User variables, User variables in a select, Prepared statements, The prepare statement, The execute statement, The deallocate statement, Using prepared statements in code, with connectors. Hands on Using variables and prepared statements * Introduction to stored routines Types of stored routines, Benefits of stored routines, Stored routine features, Differences between procedures and functions, Introduction to the Block, Declaring variables and constants, Assigning values to variables, Definer rights and invoker rights, Using SELECT in stored routines, Altering and dropping stored routines, Obtaining stored routine metadata, Stored routine privileges and execution security. Hands on Writing simple stored routines * Stored routines - program logic The IF .. THEN .. ELSEIF construct, The CASE statement, The basic loop, The while loop, The repeat loop, The iterate statement, Nested loops. Hands on Writing stored routines with program logic * Stored routines - exception handlers and cursors Dealing with errors using Exception handlers, Cursors, What is a cursor?, Cursor operations, Declaring cursors, Opening and closing cursors, Fetching rows, Status checking. Hands on Writing stored routines with program logic * Procedures with parameters Creating procedures with parameters, Calling Procedures With Parameters. Hands on Writing stored routines with parameters * Functions What is a function?, The create function statement, Executing functions, Executing functions from code, Executing functions from SQL statements, The deterministic and SQL clauses. Hands on Writing functions * Triggers Trigger creation, Restrictions on triggers, The create trigger statement, Using the old and new qualifiers, Managing triggers, Destroying triggers, Required privileges. Hands on Writing triggers * Basic optimizations Normalisation of data to third normal form, Using indexes for optimization, General query enhancement, Using Explain to analyze queries, Choosing an INNODB or MYISAM storage engine, Using MySQL Enterprise Monitor in query optimization. Hands on Making use of basic optimizations * More about indexes Indexes and joins Hands on Investigating indexes and joins

MySQL for developers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2797

Security+

5.0(3)

By Systems & Network Training

SECURITY+ TRAINING COURSE DESCRIPTION A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. WHAT WILL YOU LEARN * Explain general security concepts. * Describe the security concepts in communications. * Describe how to secure an infrastructure. * Recognise the role of cryptography. * Describe operational/organisational security. SECURITY+ TRAINING COURSE DETAILS * Who will benefit: Those wishing to pass the Security+ exam. * Prerequisites: TCP/IP foundation for engineers * Duration 5 days SECURITY+ TRAINING COURSE CONTENTS * General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. * Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. * Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. * Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. * Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.

Security+
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2797

CompTIA A+ bootcamp essentials and electives

5.0(3)

By Systems & Network Training

COMPTIA A+ BOOTCAMP TRAINING COURSE DESCRIPTION This course includes A+ Certification: Systems Hardware and Networking Support Skills and A+ Certification: Operating Systems and Security Support Skills. The course will provide IT "super users" or new support professionals with the fastest route to A+ Certification. Full practical sessions will prepare students for the two A+ Certification exams. Note: Some self-study each evening will be required. WHAT WILL YOU LEARN * Install, configure, and troubleshoot peripheral devices, system components, print devices, wired and wireless LAN links and internet access devices. * Install, configure, and troubleshoot the Microsoft Windows, Linux, and Mac OS PC operating systems plus iOS, Android, and Windows mobile devices. * Perform basic PC maintenance. * Configure access control measures. * Perform basic PC maintenance. COMPTIA A+ BOOTCAMP TRAINING COURSE DETAILS * Who will benefit: Students wishing to take both CompTIA A+ exams. * Prerequisites: PC fundamentals * Duration 5 days NETWORKING MICROSOFT SYSTEMS COURSE CONTENTS * Peripherals and Adapters Motherboard Components, Connection Interfaces, Display Devices, Audio and Multimedia Devices, Removable Storage Devices. * System Components Mass Storage Devices, System Memory, Processors, BIOS and UEFI, Power Supplies. * Troubleshooting and Mobile Devices Troubleshooting System Components, Laptops, Mobile Devices, Troubleshooting Mobile Devices. * Printer and Network Hardware Printers, Configuring Printers, Troubleshooting Printers, Network Architectures, Ethernet Networks. * Networks Wireless Networks, Internet Connections, Internet Protocol, Routers and Firewalls, Troubleshooting Networks. * Supporting Windows (1) Windows Operating System, Administration Tools, Managing Storage, Managing Files, Managing Applications. * Supporting Windows (2) Managing Devices, Managing Performance, Troubleshooting Windows, Installing Windows. * Supporting Windows Troubleshooting Boot Problems, Maintenance and Backup, Threats and Vulnerabilities, Viruses and Malware, Securing Workstations, Securing Data. * Supporting Windows Networks Configuring Network Connections, Securing Network Connections, Configuring Shared Resources, Virtualization and Services. * Linux, OS X, and Mobile OS Linux Operating System, OS X, Mobile Operating Systems, Mobile OS Security and Troubleshooting, Safety and Environmental Procedures, Professionalism and Communication.

CompTIA A+ bootcamp essentials and electives
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2797

Total BGP for engineers

5.0(3)

By Systems & Network Training

BGP TRAINING COURSE DESCRIPTION A detailed study of BGP, from the basics of how it works through to advanced issues such as route reflectors, policy, filtering, route selection and routing registries. The course culminates with a study of an industrial strength BGP template illustrating important issues such as bogon filtering. Practical hands on with routers follow the major sessions to reinforce the theory. A multiple choice exam, leading to the LAIT III certification, is available after the course. The exam consists of 60 questions and lasts 2 hours. WHAT WILL YOU LEARN * Connect enterprises to the Internet, and ISPs to each other. * Describe how BGP works. * List, describe and configure the main BGP attributes. * Implement and troubleshoot BGP. * Work with route aggregation and calculate CIDR prefixes in seconds. * Influence traffic paths with BGP. BGP TRAINING COURSE DETAILS * Who will benefit: Anyone who will be working with BGP. * Prerequisites: TCP/IP Foundation for engineers Definitive IP routing for engineers. * Duration 5 days BGP TRAINING COURSE CONTENTS * Basic BGP IGPs, EGPs, What's BGP? BGP RIB, in/out process, tables peers, adding routes. Hands on Simple configuration and troubleshooting. * The Internet and peering ASs, AS numbers, Internet structure, ISP types, ISP network design, IXs, peering vs. transit, public/ private peering, bi/multi-lateral peering. Hands on AS information gathering. * How BGP works Incremental updates, Path vector protocols, BGP protocol stack, the BGP header, message types, NLRI, withdrawn routes, route refresh, route dampening. Hands on More troubleshooting, packet analysis. * MBGP and IPv6 Multiprotocol routing, AFI, SAFI, MBGP and multicasts, IPv6, MPLS VPNs. Hands on IPv6 * BGPv4 aggregation CIDR, benefits, techniques, shortcuts, configuring BGP aggregation, leaking routes. Hands on Reducing routing table size. * BGP path selection BGP attributes, attribute types, route selection order, Local preference, AS prepend, MEDs. Hands on Influencing traffic with BGP. * BGP routing policies What is policy? Examples, route filtering, AS filtering, REs, applying preference selectively, peer groups. Hands on Sophisticated policies. * RIPE and routing registries RIRs, Allocations, assignments, PI vs. PA. Objects, RPSL, routing registry, Hands on The RIPE database. * Automating BGP configuration Automation tools, whois, IRRToolSet, Bogon lists, tracking bogon lists, HTTP, Peering, routing registries, DNS. * Communities What is a community? Community names, communities for: peer types and geography. RFC 1998, default communities. Hands on Setting local preference on other routers. * Route servers What are route servers? LINX route servers, route server policy control, What are route collectors, Looking glasses. Hands on Setting up and working with a route server. * Peer relationships IBGP, EBGP, next hop self, advertising routes into/out of BGP, synchronisation. Hands on IBGP, troubleshooting a large BGP network. * Route reflectors and confederations Full mesh IBGP, Route reflectors, RR configuration and design, confederations, migration issues. Hands on RR configuration. * BGP architectures Stub vs. transit AS, when to use BGP, multihoming strategies and issues, default routes. Multihop EBGP, load balancing. Hands on Multihoming. * BGP security RFC 7454, security steps, BGP TTL security, filters, RPKI, ROAs, rsync, rrdp, validators. A secure BGP template. Hands on RPKI prefix validation.

Total BGP for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2797

Windows server 2019 administration

5.0(3)

By Systems & Network Training

WINDOWS SERVER 2019 ADMINISTRATION COURSE DESCRIPTION This five-day instructor-led course is designed primarily for IT professionals who have some experience with Windows Server. It is designed for professionals who will be responsible for managing identity, networking, storage and compute by using Windows Server 2019, and who need to understand the scenarios, requirements, and options that are available and applicable to Windows Server 2019. The course teaches IT professionals the fundamental administration skills required to deploy and support Windows Server 2019 in most organizations. WHAT WILL YOU LEARN * Administrate Windows Server 2019. * Configure file servers and storage. * Manage Hyper-V virtualization and containers. * Implement HA and disaster recovery solutions. * Implement service monitoring and performance monitoring, and apply troubleshooting. * Perform upgrades and migration related to AD DS, and storage. WINDOWS SERVER 2019 ADMINISTRATION COURSE DETAILS * Who will benefit: Technical staff working with Windows server 2019. * Prerequisites: TCP/IP foundation for engineers. Some Windows experience. * Duration 5 days WINDOWS SERVER 2019 ADMINISTRATION COURSE CONTENTS * Windows server administration overview Windows server administration principles and tools, Introducing Windows Server 2019, Windows Server Core Overview. Lab: Deploying and configuring Server Core, Implementing and using remote server administration. * Identity Services in Windows server AD DS, Windows Server domain controllers, Azure AD, Group Policy, Active Directory Certificate Services. Lab: Deploying a new domain controller on Server Core, Configuring Group Policy, Deploying and using certificate services. Network Infrastructure services in Windows server DHCP, DNS services, IPAM. Lab: Deploying and configuring DHCP, Deploying and configuring DNS. * File Servers and Storage management Volumes and file systems, sharing in Windows Server, Storage Spaces in Windows Server, Data Deduplication, Iscsi, Distributed File System. Lab: Implementing Data Deduplication, Configuring iSCSI storage, Configuring redundant storage spaces, Implementing Storage Spaces Direct. * Hyper-V virtualization and containers Hyper-V in Windows Server, Configuring VMs, Securing virtualization in Windows Server, Containers in Windows Server, Overview of Kubernetes. Lab: Creating and configuring VMs, Installing and configuring containers. * High Availability in Windows Server Planning for failover clustering implementation, Creating and configuring failover cluster, stretch clusters, High availability and disaster recovery solutions with Hyper-V VMs. Lab: Configuring iSCSI storage, Configuring a failover cluster, Deploying and configuring a highly available file server, Validating the highly available file server deployment. * Disaster recovery in Windows Server Hyper-V Replica, Backup and restore infrastructure in Windows Server. Lab: Implementing Hyper-V Replica, Implementing backup and restore with Windows Server Backup. * Windows Server security Credentials and privileged access protection, Hardening Windows Server, Just Enough Administration in Windows Server, Securing and analyzing SMB traffic, Windows Server update management. Lab: Configuring Windows Defender Credential Guard, Locating problematic accounts, Implementing LAPS. * Remote Desktop Services in Windows Server Remote Desktop Services, session-based desktop deployment, personal and pooled virtual desktops. Lab: Implementing RDS, Configuring RemoteApp collection settings, Configuring a virtual desktop template. * Remote access and web services in Windows Server Overview of RAS in Windows Server, Implementing VPNs, Implementing NPS, Implementing Always On VPN, Implementing Web Server in Windows Server. Lab: Implementing Web Application Proxy, Implementing VPN in Windows Server, Deploying and Configuring Web Server. * Monitoring, performance, and troubleshooting Windows Server monitoring tools, Performance Monitor, Monitoring event logs for troubleshooting. Lab: Establishing a performance baseline, Identifying the source of a performance problem, Viewing and configuring centralized event logs, Identifying the source of a performance problem, Describe monitoring tools and performance monitoring in Windows Server, Describe event logging and perform event logging monitoring for troubleshooting purposes. * Upgrade and migration in Windows Server AD DS migration, Storage Migration Service, Windows Server migration tools. Lab: Selecting a process to migrate server workloads, Planning how to migrate files by using Storage Migration Service.

Windows server 2019 administration
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2797

LINX II TRAINING COURSE DESCRIPTION An intensive hands on IP routing course leading to LINX Accredited Internet Technician stage 2 focusing on routing in an IP environment. The course concentrates on OSPF and IS-IS but also covers BGP and MPLS. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. A multiple choice exam, leading to the LAIT II certification, is available after the course. The exam consists of 60 questions and lasts 2.0 hours. WHAT WILL YOU LEARN * Calculate subnet numbers in seconds. * Configure and troubleshoot static routes * Explain how OSPF works. * Build resilient networks with VRRP and OSPF. * Implement and troubleshoot OSPF, IS-IS, simple BGP and simple MPLS. * Evaluate and choose appropriate routing protocols for particular scenarios. LINX II TRAINING COURSE DETAILS * Who will benefit: Network engineers. * Prerequisites: LAIT I attendance and 55%+ exam score OR LAIT I exam only and pass (70%+) OR CCNA and take LAIT I exam on this course. * Duration 5 days LINX II TRAINING COURSE CONTENTS * Basic routing Review of LAIT I routing, reading routing tables. Hands on Setting up a routed network. * Static routes Why use static routes? Default routes. Hands on Configuring static routes. * First hop redundancy Default gateways, VRRP/HSRP/GLBP. Load sharing, critical IP addresses. Hands on VRRP. * Basic OSPF What is OSPF? Process IDs, passive interfaces. Hands on Simple OSPF. * Subnetting Bit boundary subnetting, calculating network numbers. Exercise: Subnetting. * OSPF overview Metrics, convergence, DV vs. Link state, IGPs, classless, OSPF features, load sharing, OSPF authentication. Hands on OSPF features. * OSPF within an area How OSPF works, LSAs, LSDB, router IDs, hellos, configuring hellos, exchange protocol. Hands on Investigating OSPF structures. * OSPF areas Scalability, why areas? Area IDs, area 0, ABRs, ABR resilience, areas & LSDBs & LSAs, virtual links. Hands on Multi area OSPF. * Redistribution Multiple routing protocols, common scenarios, routing distance, External LSAs, E1 and E2. Type 4 LSAs. OSPF and default routes. Hands on Configuring static route redistribution. * Route aggregation Route summarisation. How to aggregate, CIDR, ASBR summarisation. Hands on OSPF address summarisation. * OSPF packet formats OSPF packets, protocol stack, packet flows, OSPF headers, neighbours, neighbour states, DRs, adjacencies, BDRs, DR election. Hands on Analysing OSPF packets, troubleshooting. OSPF * OSPF stub areas LSA types, area types, area architecture, stub areas, default routes, benefits & disadvantages of stub areas, TSSAs, NSSAs, Type 7 LSAs. Hands on Stub and TSSA configuration. * IS-IS End systems, Intermediate systems, how IS-IS works, IS-IS router ID, Level 1, Level 2, IS-IS hierarchy. Hands on Configuring IS-IS, troubleshooting IS-IS. * The Internet Autonomous systems, Peering, transit, looking glasses. Hands on Internet routing tables. * Basic BGP IGPs, EGPs, What's BGP? BGP RIB, in/out process, tables peers, adding routes. Hands on Simple configuration and troubleshooting. * Routing IPv6 Multi protocol routing, IPv6 addressing, IPv6 routing tables, IPv6 static routes, OSPFv3, IS-IS and IPv6. Hands on Routing IPv6. * STP and L2 routing STP, RSTP, L2 IS-IS, Multi system link aggregation. Hands on RSTP. * MPLS Core MPLS, MPLS and the 7 layer model, MPLS protocol, MPLS standard, MPLS runs on routers, MPLS history, Why MPLS?, LSRs, PE and P router roles, FEC, swapping labels, MPLS packet format. Hands on Enabling MPLS. Testing and troubleshooting of MPLS. * Appendix EIGRP: How EIGRP works, DUAL.

LINX 2
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2797

CCNA TRAINING COURSE DESCRIPTION The Implementing and Administering Cisco Solutions (CCNA) course gives you a broad range of fundamental knowledge for all IT careers. Through a combination of lecture, hands-on labs, and self-study, you will learn how to install, operate, configure, and verify basic IPv4 and IPv6 networks. The course covers configuring network components such as switches, routers, and wireless LAN controllers; managing network devices; and identifying basic security threats. It also gives a foundation in network programmability, and software-defined networking WHAT WILL YOU LEARN * Install, configure, and operate a small to medium sized network * Gain a foundation in the essentials of networking, security, and automation * Prepare for the 200-301 CCNA exam, which earns CCNA certification CCNA TRAINING COURSE DETAILS * Who will benefit: Network support help desk technicians involved in the basic installation, operation, and verification of Cisco networks. Anyone seeking CCNA certification. * Prerequisites: Introduction to Data communications & networking * Duration 5 days CCNA TRAINING COURSE CONTENT * After taking this course, you should be able to: Identify the components of a computer network and describe their basic characteristics. Understand the model of host-to-host communication. Describe the Cisco IOS software. Describe LANs and the role of switches within LANs. Describe Ethernet and describe the operation of switches. Install a switch and perform the initial configuration. Describe the TCP/IP Internet layer, IPv4, its addressing scheme, and subnetting. Describe the TCP/IP Transport and Application layers Explore functions of routing. Implement basic configuration on a Cisco router. Explain host-to-host comms across switches and routers. Identify and resolve common switched network issues and common problems associated with IPv4 addressing. Describe IPv6 main features and addresses, and configure and verify basic IPv6 connectivity. Describe static routing. Describe, implement, and verify VLANs and trunks. Describe inter VLAN routing. Explain the basics of dynamic routing protocols and describe components and terms of OSPF. Explain how STP and RSTP work. Configure link aggregation using EtherChannel. Describe the purpose of Layer 3 redundancy protocols. Describe basic WAN and VPN concepts. Describe the operation of access control lists (ACLs) and their applications in the network. Configure Internet access using DHCP clients and explain and configure NAT on Cisco routers. Describe basic QoS concepts. Describe the concepts of wireless networks, which types of wireless networks can be built, and how to use Wireless LAN Controllers (WLCs). Describe network and device architectures, introduce virtualization, network programmability and SDN and describe smart network management solutions such as Cisco DNA Center™, SD-Access, and SD-WAN. Configure basic IOS system monitoring tools. Describe the management of Cisco devices. Describe the current security threat landscape. Describe threat defence technologies. Implement a basic security configuration of the device management plane. Implement basic steps to harden network devices. * Detailed course outline Exploring the Functions of Networking. The Host-to-Host Communications Model. Operating Cisco IOS Software. Introducing LANs. Exploring the TCP/IP Link Layer. Starting a Switch. The TCP/IP IP layer, IPv4 Addressing, and Subnets. The TCP/IP Transport Layer and Application Layer. Exploring the Functions of Routing. Configuring a Cisco Router. Exploring the Packet Delivery Process. Troubleshooting a Simple Network. Introducing Basic IPv6. Configuring Static Routing. Implementing VLANs and Trunks. Routing Between VLANs. Introducing OSPF. Redundant Switched Topologies with EtherChannel. Explaining Basics of ACL. Enabling Internet Connectivity. Explaining the Evolution of Intelligent Networks. Introducing System Monitoring. Managing Cisco Devices. Securing Administrative Access. Implementing Device Hardening. * Self-Study: Building Redundant Switched Topologies. Exploring Layer 3 Redundancy. Introducing WAN Technologies. Introducing QoS. Explaining Wireless Fundamentals. Introducing Architectures and Virtualization. Examining the Security Threat Landscape. Threat Defense Technologies.

CCNA
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2797

Cloud deployment

5.0(3)

By Systems & Network Training

CLOUD DEPLOYMENT TRAINING COURSE DESCRIPTION This course covers the important topics every cloud professional needs, including, configuration and deployment, security, maintenance, management, and troubleshooting. It covers all aspects of cloud computing infrastructure and administration, with a practical focus on real-world skills. It will help you to master the fundamental concepts, terminology, and characteristics of cloud computing. Deploy and implement cloud solutions, manage the infrastructure, and monitor performance. You will also be able to install, configure, and manage virtual machines. WHAT WILL YOU LEARN * Cloud services, models, and characteristics. * Virtualization components, installation, and configuration. * Infrastructure configurations and optimization. * Resource management and specific allocations. * IT security concepts, tools, and best practices. * Recovery, availability and continuity in the cloud. CLOUD DEPLOYMENT TRAINING COURSE DETAILS * Who will benefit: IT professionals looking to deploy and implement cloud solutions, manage the infrastructure, and monitor performance, Install, configure, and manage virtual machines. * Prerequisites: Introduction to virtualization. * Duration 5 days CLOUD DEPLOYMENT TRAINING COURSE CONTENTS Preparing to Deploy Cloud Solutions Deploying a Pilot Project Testing Pilot Project Deployments Designing a Secure and Compliant Cloud Infrastructure Designing and Implementing a Secure Cloud Environment Planning Identity and Access Management for Cloud Deployments Determining CPU and Memory Sizing for Cloud Deployments Determining Storage Requirements for Cloud Deployments Analysing Workload Characteristics to Ensure Successful Migration Maintaining Cloud Systems Implementing Backup, Restore, Disaster Recovery, and Business Continuity Measures Analysing Cloud Systems for Performance Analysing Cloud Systems for Anomalies and Growth Forecasting Troubleshooting Deployment, Capacity, Automation, and Orchestration Issues Troubleshooting Connectivity Issues Troubleshooting Security Issues

Cloud deployment
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2797

Linux for network engineers

5.0(3)

By Systems & Network Training

LINUX TRAINING COURSE DESCRIPTION A Linux foundation appropriate for all flavours of Linux, focussed on getting network engineers up and running with Linux. The command line is used throughout. The course progresses from the basics of Linux commands onto useful tools such as grep, then shell features such as piping and then onto shell scripting. Administration aspects covered are the tasks network engineers are most likely to encounter such as software installation. Hands on exercises concentrate on network related tasks such as installing net-snmp and using shell scripts to provide network automation. WHAT WILL YOU LEARN * Use Linux commands to perform a variety of tasks from manipulating files to handling processes. * Create and edit files with vi. * Work with permissions. * Write simple shell scripts. * Install software packages. * Configure base networking. LINUX TRAINING COURSE DETAILS * Who will benefit: Network engineers. * Prerequisites: TCP/IP Foundation * Duration 5 days LINUX TRAINING COURSE CONTENTS * What is Linux? Linux distributions, open source software. * Getting started Logging in, changing passwords, logging out. Hands on Basics and root access. * Linux basics Command structure. The Linux manuals, basic commands (who, date, tty, uname, echo, banner...). Hands on Using the CLI. * Connecting to a network IP configuration, DHCP, static addressing, routing, ifconfig, ping, netstat, traceroute, dig. Hands on Network configuration and testing. * Managing Software Package Concepts, Comparison of package formats, RPM, rpm Commands, Yum, Debian Packages, dpkg, apt-cache, apt-get, dselect, aptitude, Converting Between Package Formats, Dependencies and Conflicts, Startup Script Problems, Shared Libraries, Library Management Hands on Installing network packages such as nmap and net-snmp. * Processes and log files ps, kill, background processes, at, exec, priorities. Managing Linux log files. Syslogd. Setting the time. Cron and cronjobs. Managing Processes, the Kernel: The First Process. Hands on Controlling daemons and services. Setting up a TFTP server. * Filesystem commands Home directories, manipulating files and directories, Filesystem layout, Pathnames, hard and symbolic links. Viewing files. Hands on Exploring the filesystem, working with network device configuration files. * The Linux editors ed, vi, shell escapes, .exrc. Hands on Editing network device configuration files. * Extracting data from files grep, find, cut, sort and paste… Hands on Working with syslog files. * Permissions Theory, chmod, chown, newgrp. Hands on Handling permission problems. * The shell Metacharacters, piping and redirection. Hands on Running SNMP commands and working with their output. * Basic shell scripting What are shell scripts? Simple scripts, control structures. Variable. Setting variables, using variables, set, scope, export, sourcing, environmental variables, read. Positional parameters: $0 to $9, $#, $* and others. shift parameter substitution. Control statements: The test command, if , while loops, for loops, the case statement. Hands on Automating network tasks. * Customising your environment Environmental variables, stty, .profile and other startup files. Hands on Customising Linux. * Introduction to administration The root user, su. Managing users and groups. Hands on The power of root. * Archiving files Backups, tar, cpio, dd, gzip. Hands on Working with tar files. * Booting Linux and Editing Files Installing Boot Loaders, GRUB Legacy, GRUB 2, Alternative Boot Loaders, the Boot Process, Boot Messages, Runlevels and the Initialization Process, Runlevel Functions, Runlevel Services, Alternative Boot Systems , Upstart, system. Hands on Installing network services on Linux.

Linux for network engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2797

CWISA Wireless IoT Solutions Administrator

5.0(3)

By Systems & Network Training

CWISA TRAINING COURSE DESCRIPTION This CWISA course covers wireless technologies with reference to IoT. It examines from an IoT perspective how wireless works, and is an excellent introduction to IoT for the wireless engineer. Topics range from wireless technologies, RF, to mobile networks, IoT, and security. WHAT WILL YOU LEARN * Describe wireless networking and IoT technologies. * Explain basic RF communications. * Plan wireless solutions. * Describe how to implement wireless solutions. * Use best practices in implementing wireless solutions. CWISA TRAINING COURSE DETAILS * Who will benefit: Anyone working with IoT technologies. * Prerequisites: RF fundamentals. * Duration 4 days CWISA TRAINING COURSE CONTENTS * Introduction to wireless technologies History of wireless, radio waves and frequencies, wireless technologies and related components, common components of wireless solutions, LAN networking requirements, Network security, Implementing wireless solutions, staging, documentation, security updates, Industry organizations, IEEE, compatibility and certification groups. * Wireless network use cases Wireless BANs, Wireless PANs, Wireless LANs, Wireless MANs, Wireless WANs, Wireless sensor networks, New network driver-Internet of Things, IoT for industry (IIoT), IoT for connected vehicles, Residential environments, Retail, Education (K12), Higher education, Agriculture, Smart cities / Public access, Health care, Office buildings, Hospitality, Industry, Stadiums, arenas, and large public venues. * Planning wireless solutions Identifying use cases and applications, common wireless requirements and constraints, performing a wireless system design, selecting and evaluating design parameters. * RF communications RF wave characteristics, RF propagation behaviours, RF signal metrics, fundamentals of wireless modulation. other wireless carriers, common frequency bands. * Radio frequency hardware Hardware levels, basic RF hardware components (circuit board level), RF link types (use category). RF device types. * Mobile communications networks Mobile networks, LTE, 5G, Use cases. * Short-range, low-rate, and low-power networks RF and speed, RF and range, RF and power, 802.11, 802.15.4, Bluetooth, LoRa (Long range) / LoRaWAN, ZigBee, 6LoWPAN, NB-IoT and LTE-M. * Wireless sensor networks What is a Wireless Sensor Network (WSN)? WSN applications, Sensors and actuators, WSN architectures, Planning a WSN. * Internet of Things (IoT) Internet of Things (IoT) defined, IoT history and its definition revisited, one more comment on the definition of IoT, IoT verticals, Oil & Gas, IoT structure/ architecture basics, IoT connected objects. * Securing wireless networks Confidentiality, integrity and availability, Privacy, non-repudiation, authenticity & safety, Importance of authentication in wireless networks, Key cryptographic technologies & concepts, Authentication methods, Authorisation, OAuth 2.0 authorisation framework, monitoring. * Troubleshooting wireless solutions Proper solutions design, designing and implementing wireless solutions, basic installation procedures, general configuration considerations, troubleshooting and remediation, troubleshoot common problems in wireless solutions. * Programming, scripting and automation What is an API? categories of APIs, common API communication methods, choosing a language, why are we integrating systems? Application & integration architectures. Data structures & types, XML, YAML, API types.

CWISA Wireless IoT Solutions Administrator
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2797