• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

459 Other courses

Python Machine Learning Course, 1-Days, Online Attendance

By Pcw Courses Ltd

This Python Machine Learning online instructor led course is an excellent introduction to popular machine learning algorithms. -------------------------------------------------------------------------------- Python Machine Learning 2-day Course Prerequisites: Basic knowledge of Python coding is a pre-requisite. Who Should Attend? This course is an overview of machine learning and machine learning algorithms in Python SciKitLearn. Practical: * We cover the below listed algorithms, which is only a small collection of what is available. However, it will give you a good understanding, to plan your Machine Learning project * We create, experiment and run machine learning sample code to implement a short selected but representative list of available the algorithms.  Course Outline: Supervised Machine Learning: * Classification Algorithms: Naive Bayes, Decision Tree, Logistic Regression, K-Nearest Neighbors, Support Vector Machine * Regression Algorithms: Linear, Polynomial Unsupervised Machine Learning: * Clustering Algorithms: K-means clustering, Hierarchical Clustering * Dimension Reduction Algorithms: Principal Component Analysis Latent Dirichlet allocation (LDA) * Association Machine Learning Algorithms: Apriori, Euclat Other machine learning Algorithms: * Ensemble Methods ( Stacking, bagging, boosting ) Algorithms: Random Forest, Gradient Boosting * Reinforcement learning Algorithms: Q-Learning * Neural Networks and Deep Leaning Algorithms: Convolutional Network (CNN) Data Exploration and Preprocessing: * The first part of a Machine Learning project understands the data and the problem at hand. * Data cleaning, data transformation and data pre-processing are covered using Python functions to make data exploration and preprocessing relatively easy. What is included in this Python Machine Learning: * Python Machine Learning Certificate on completion   * Python Machine Learning notes * Practical Python Machine Learning exercises and code examples * After the course, 1 free, online session for questions or revision Python Machine Learning. * Max group size on this Python Machine Learning is 4. -------------------------------------------------------------------------------- REFUND POLICY No Refunds

Python Machine Learning Course, 1-Days, Online Attendance
Delivered Online6 hours, Apr 29th, 10:00 + 20 more
£185

ISO 42001 Artificial Intelligence Lead Implementer Course

By Cognicert Limited

The “ISO 42001:2023 Lead Implementer Course” is designed to provide participants with the knowledge and skills necessary to lead the implementation of an Artificial Intelligence Management System based on ISO 42001:2023. This comprehensive course covers the key principles, requirements, and best practices for establishing and maintaining an effective Artificial Intelligence management system. Participants will learn how to develop, implement, and manage processes that comply with the ISO 42001 standard.

ISO 42001 Artificial Intelligence Lead Implementer Course
Delivered Online & In-Person in East Ham,5 days, May 6th, 08:00 + 1 more
£1200

CISSP certification training

By IMF Academy

THIS 5-DAY CISSP CERTIFICATION TRAINING WILL PREPARE YOU FOR THE OFFICIAL (ISC)2 CISSP EXAM. GET CERTIFIED NOW FOR CISSP, THE WORLD’S PREMIER (CYBER)SECURITY CERTIFICATION! CISSP (CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL) – MODE OF STUDY Option 1: 5-day training (classroom and live online, up to your choice) Option 2: In-company training (classroom and live online) CISSP IS ONE OF THE TOP-PAYING CERTIFICATIONS IN IT CISSP is an independent and one of the top-paying certifications in IT, year after year. In the list of the highest-paying certifications worldwide, 4 of the top 20 are security-related, including CISSP. Due to its breadth of coverage, CISSP is the de facto certification to show your competence in (cyber)security. The CISSP exam is challenging, but the benefits are immense. In this 5-day CISSP certification training you will gain core knowledge and experience to successfully implement and manage security programs and you will be optimally prepared to take the official (ISC)2 CISSP exam. WHO SHOULD ATTEND? The CISSP certification training is designed for experienced security professionals who want to expand their knowledge and gain an internationally recognized accreditation. This training is a must for network security specialists, IT managers, CISOs, CIOs, security managers, security auditors, security architects, security consultants, network architects, security systems engineers, security analysts, and for anyone interested in a senior career in information security. ABOUT (ISC)2 CISSP was developed and is maintained by (ISC)2. (ISC)2 is the global, non-profit leader in educating and certifying cyber, information, software and infrastructure security professionals throughout their careers. Join this elite network with over 170,000 certified industry professionals worldwide by obtaining the CISSP title. Other highly sought-after titles of (ISC)2 are Certified Cloud Security Professional (CCSP), Certified Cyber Forensics Professional (CCFP), Certified Secure Software Lifecycle Professional (CSSLP) and Systems Security Certified Practitioner (SSCP). WHAT WILL YOU LEARN? The CISSP training is a comprehensive and compact review of information security concepts and industry best practices, and focuses on the 8 domains of the CISSP CBK (Common Body of Knowledge) that are covered in the CISSP exam. You will gain knowledge in information security that will increase your ability to successfully implement and manage security programs in any organization or government entity. Earning the CISSP title proves you have what it takes to effectively design, implement and manage a best-in-class cybersecurity program. The 5-day training provides an intensive and complete preparation to ensure that you will pass the (ISC)2 CISSP exam at the very first attempt. Get ready for the rigorous exam by joining this 5-day CISSP training! HOW TO QUALIFY FOR THE CISSP CERTIFICATION? To qualify for the CISSP certification, you must: * Have a minimum of 5 years of experience in 2 or more of the 8 CBK domains.  You may be able to substitute 1 year of required work experience with a relevant 4-year college degree or an approved credential * Pass the CISSP examination * Complete the endorsement process and subscribe to the (ISC)2 Code of Ethics * Maintain certification through Continuing Professional Education (CPE) credits NOT YET QUALIFIED TO TAKE THE CISSP EXAM? Do you not have enough experience yet to earn the CISSP title? You can still pass the CISSP exam and become an Associate of (ISC)2 while you gain the required work experience. ABOUT THE CISSP DOMAINS OF KNOWLEDGE CISSP covers 8 domains that are technically oriented and address critical security topics in depth. The CISSP exam evaluates your expertise across 8 security domains. The CISSP training provides in-depth coverage of these domains: * Domain 1:   Security and risk management (15%) * Domain 2:   Asset security (10%) * Domain 3:   Security architecture and engineering (13%) * Domain 4:   Communications and network security (14%) * Domain 5:   Identity & Access Management (IAM) (13%) * Domain 6:   Security assessment and testing (12%) * Domain 7:   Security operations (13%) * Domain 8:   Software development and security (10%) ABOUT THE CISSP EXAM The CISSP exam is a 3-hour exam, consisting of 100-150 multiple choice and advanced innovative questions. The pass mark is set at 70% (700 out of 1000 points). You can schedule your exam with Pearson Vue, the leading provider of global, computer-based testing for certification and licensure exams. EXAM SUCCESS GUARANTEE Should you not pass the CISSP exam the first time, you may re-attend the CISSP training for free (within a period of 1 year after this CISSP training). HOW TO MAINTAIN YOUR CISSP CERTIFICATION? The CISSP credential is valid for 3 years. To maintain your certification, you must earn 40 Continuing Professional Education (CPE) credits annually, and 120 credits over the 3-year period. WHY SHOULD YOU GET A CISSP CERTIFICATION? Many employers value the CISSP designation as the 'gold standard' of security qualifications. Becoming a CISSP professional can lead to a higher pay and a more rapid advancement in the security analyst field. This 5-day training is your ticket to achieving this prestigious certification. According to (ISC)2, CISSPs earn a worldwide average of 25% more than their non-certified counterparts. CISSP VERSUS CISM – WHAT ARE THE DIFFERENCES? Both (ISC)2 CISSP and ISACA CISM are highly sought-after IT Security certifications. CISSP and CISM complement rather than directly compete with one another. The CISM (Certified Information Security Manager) certification is solely management-focused, while CISSP is both technical and managerial and designed for security leaders who design, engineer, implement and manage the overall security posture of an organization. CISSP is more widely known than CISM, with over 140,000 CISSPs globally, compared with about 30,000 CISMs. -------------------------------------------------------------------------------- CERTIFICATE When you successfully pass the official (ISC)2 CISSP exam, you may use the official CISSP title. -------------------------------------------------------------------------------- CONTENT DOMAIN I Security and risk management * Understand and apply concepts of confidentiality, integrity and availability * Evaluate and apply security governance principles * Determine compliance requirements * Understand legal and regulatory issues that pertain to information security in a global context * Understand, adhere to, and promote professional ethics * Develop, document, and implement security policy, standards, procedures, and guidelines * Identify, analyze, and prioritize Business Continuity (BC) requirements * Contribute to and enforce personnel security policies and procedures * Understand and apply risk management concepts * Apply risk-based management concepts to the supply chain * Establish and maintain a security awareness, education, and training program DOMAIN II Asset security * Identify and classify information and assets * Determine and maintain information and asset ownership * Protect privacy * Ensure appropriate asset retention * Determine data security controls * Establish information and asset handling requirements DOMAIN III Security architecture and engineering * Implement and manage engineering processes using secure design principles * Understand the fundamental concepts of security models * Select controls based upon systems security requirements * Understand security capabilities of information systems (e.g., memory protection, Trusted Platform Module (TPM), encryption/decryption) * Assess and mitigate the vulnerabilities of security architectures, designs, and solution elements * Assess and mitigate vulnerabilities in web-based systems, in mobile systems and in embedded devices * Apply cryptography * Apply security principles to site and facility design * Implement site and facility security controls DOMAIN IV Communications and network security * Implement secure design principles in network architectures * Secure network components * Implement secure communication channels according to design DOMAIN V Identity and Access Management (IAM) * Control physical and logical access to assets * Manage identification and authentication of people, devices, and services * Integrate identity as a third-party service * Implement and manage authorization mechanisms * Manage the identity and access provisioning lifecycle DOMAIN VI Security assessment and testing * Design and validate assessment, test and audit strategies * Conduct security control testing * Collect security process data (e.g., technical and administrative) * Analyze test output and generate report * Conduct or facilitate security audits DOMAIN VII Security operations * Understand and support investigations * Understand requirements for investigation types * Conduct logging and monitoring activities * Securely provisioning resources * Understand and apply foundational security operations concepts * Apply resource protection techniques * Conduct incident management * Operate and maintain detective and preventative measures * Implement and support patch and vulnerability management * Understand and participate in change management processes * Implement recovery strategies * Implement Disaster Recovery (DR) processes * Test Disaster Recovery Plans (DRP) * Participate in Business Continuity (BC) planning and exercises * Implement and manage physicial security * Address personnel safety and security concerns DOMAIN VIII Software development security * Understand and integrate security in the Software Development Life Cycle (SDLC) * Identify and apply security controls in development environments * Assess the effectiveness of software security * Assess security impact of acquired software * Define and apply secure coding guidelines and standards -------------------------------------------------------------------------------- TRAINER(S) The trainer of this 5-day CISSP training is a very experienced CISSP instructor. -------------------------------------------------------------------------------- START DATE(S) The CISSP training lasts 5 days. Each day starts at 09.00 hrs and ends around 17.00 hrs. The training will take place near Amsterdam (the Netherlands) in-class and live online, up to your choice, on the following dates: * 10 - 14 June 2024 * 2 - 6 September 2024 * 21 - 25 October 2024 * 9 - 13 December 2024 -------------------------------------------------------------------------------- FEE / REGISTRATION The fee of the 5-day CISSP training is € 4,480 (VAT excl.) per person. The fee includes all lunches, coffee/tea, training materials, the CISSP Official Study Guide, and the exam success guarantee. The cost of the CISSP exam is not included in the fee. -------------------------------------------------------------------------------- IN-COMPANY With at least 5 participants, an in-house training could be your best choice. An in-company training, customized to the needs of your organization, has many advantages and: * saves you and your colleagues time * enables you to train in the comfort of your own working environment * saves travel and accommodation expenses * can be arranged at a date and time convenient for you * sensitive issues can be discussed openly since no outsiders are present Do you prefer an in-company training?  Please contact us for more information. We are more than happy to discuss the various possibilities with you.

CISSP certification training
Delivered Online & In-PersonFull day, Jun 10th, 09:30 + 19 more
£3852

Networking Microsoft Systems

5.0(3)

By Systems & Network Training

NETWORKING MICROSOFT SYSTEMS COURSE DESCRIPTION A hands-on course covering the network aspects of Microsoft systems. The course progresses from basic TCP/IP tools and configuration settings through to advanced security considerations finishing with an overview of Exchange and IIS. Hands on sessions are based on a choice of Windows Server 2003 or Windows 2000 server and Windows XP or Windows 2000 professional. Customised versions with other Microsoft platforms are also available. WHAT WILL YOU LEARN * Design networks with consideration for Microsoft issues such as logons. * Design, configure and troubleshoot TCP/IP, DNS, WINS and DHCP. * Configure security features such as PKI and IPSec. * Describe the Windows TCP/IP implementation details. NETWORKING MICROSOFT SYSTEMS COURSE DETAILS * Who will benefit: Anyone working with Microsoft systems. * Prerequisites: TCP/IP foundation for engineers Supporting Windows ( XP or 2000 or 2003) * Duration 5 days NETWORKING MICROSOFT SYSTEMS COURSE CONTENTS * Configuring network cards PnP, resources, Ethernet cards, wireless cards, dial up networking, other cards, Ethernet settings, layer 2 QoS. * Configuring and supporting IP Basic IP settings, advanced IP settings, advanced TCP settings, DrTCP and registry settings, security * DHCP DHCP server, authorising the DHCP service, DHCP client, DHCP relays, Address pools, options, lease duration's, Integrating with DNS. * Microsoft networking overview Workgroups and domains, Domain controllers, the logon process in a network, the role of Active Directory, synchronisation, protocol stacks and bindings. * Accessing file and print resources Shared folders, permissions, network printers, browsing, NetBIOS, SMB. * WINS Servers, clients, Client registration, renewing and releasing of names. NetBIOS node types. * DNS1 Overview, Primary and secondary servers, DDNS, zones, resource records. * The browser service Master, backup and other browser roles, elections, announcements, recovery from failure, Inter subnet browsing. * TCP/IP implementation details Dead gateway detection, Multi homing, multicasting, MTU path discovery, registry settings, QOS and RSVP, Windows as a router, performance implications of Microsoft services. * Internet Access Options, NAT, Firewall capabilities and Proxy server, Internet Authentication Service. * Remote Access Installing, RAS servers. RAS process, protocols * Security: PKI PPTP, L2TP, What is IPSec, configuring IPSec. * Security: VPNs PPTP, L2TP, What is IPSec, configuring IPSec. * Other Microsoft networking services & tools Netmeeting, instant messaging, white boarding, document collaboration, video conferencing Microsoft Exchange, IIS, Directory replication, SNMP, Net Monitor, integration with other platforms.

Networking Microsoft Systems
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

Bitesize Masterclass on AI with Fiona Young

5.0(1)

By Own Your Success

Bitesize Masterclass on AI - facilitated by Fiona Young, Leading Expert and Trainer.    Are you a total beginner to AI? Or maybe you've dabbled but found it all overwhelming...or underwhelming?  Then this bitesize masterclass on AI is for you!    We'll be covering AI fundamentals, what AI means for exec support roles, and practically how to use AI chatbots (like ChatGPT and Copilot) to shortcut admin drudgery.    You’ll come away from this session with the confidence and skills to start using AI in your workflow right away, making you more efficient and giving you time back to do more of the human work you love.    Note that this is NOT a passive webinar — we'll have demos, discussions and breakouts. You'll get a chance to practice using AI chatbots in the room for real world projects with other forward-thinking assistants like you.  Here's a detailed breakdown of session content: AI fundamentals  •    Defining AI, gen AI and other need to know terms  •    Key AI risks to be aware of  •    Exciting tools for assistants right now How AI will change the assistant role  •    Explore our feelings about AI right now  •    Some predictions on what AI means for the future of exec support  •    What you can do to win in the age of AI A practical guide to using ChatGPT and LLMs at work  •    How to use AI chatbots in your workflow  •    How to craft great prompts to optimise outputs  •    A chance to practice & workshop prompting in the room   Fiona Young is founder of Carve, a series of live digital courses for executive assistants to learn AI, create capacity and develop into a strategic assistant — carving out their career growth in the process. Before launching Carve, Fiona spent five years leading learning programs at Hive Learning, the b2b peer learning app. She previously ran Learning & Development for Blenheim Chalcot, one of the world’s most successful venture builders, overseeing group learning strategy and programs for 3,000 people across 25 ventures.  Fiona started her career as an executive assistant in entrepreneurial businesses. 

Bitesize Masterclass on AI with Fiona Young
Delivered Online1 hour 30 minutes, Jun 12th, 16:00
£100

UNIX Virtualization and High Availability

5.0(3)

By Systems & Network Training

UNIX VIRTUALIZATION AND HIGH AVAILABILITY COURSE DESCRIPTION This course covers administering UNIX enterprise-wide with an emphasis on virtualization and high availability. WHAT WILL YOU LEARN * Manage Virtual Machines. * Manage containers. * Manage HA clusters. * Manage HA cluster storage. UNIX VIRTUALIZATION AND HIGH AVAILABILITY COURSE DETAILS * Who will benefit: Enterprise-level UNIX professional. UNIX professionals working with virtualization and/or High availability. * Prerequisites: Linux network administration 2 (LPIC-2) * Duration 5 days UNIX VIRTUALIZATION AND HIGH AVAILABILITY COURSE CONTENTS * VIRTUALIZATION * Virtualization concepts and theory Terminology, Pros and Cons of virtualization, variations of Virtual Machine monitors, migration of physical to VMs, migration of VMs between host systems, cloud computing. * Xen Xen architecture, networking and storage, Xen configuration, Xen utilities, troubleshooting Xen installations, XAPI, XenStore, Xen Boot Parameters, the xm utility. * KVM KVM architecture, networking and storage, KVM configuration, KVM utilities, troubleshooting KVM installations. * Other virtualization solutions OpenVZ and LXC, other virtualization technologies, virtualization provisioning tools. * Libvirt and Related Tools libvirt architecture, networking and storage, basic technical knowledge of libvirt and virsh, oVirt. * Cloud Management Tools Basic feature knowledge of OpenStack and CloudStack, awareness of Eucalyptus and OpenNebula. * Containers Containers versus VMs, Docker, Kubernetes. * Load balanced clusters of LVS/IPVS, VRRP, configuration of keepalived, configuration of ldirectord, backend server network configuration. HAProxy, configuration of HAProxy. * Failover clusters Pacemaker architecture and components (CIB, CRMd, PEngine, LRMd, DC, STONITHd), Pacemaker cluster configuration, Resource classes (OCF, LSB, Systemd, Upstart, Service, STONITH, Nagios), Resource rules and constraints (location, order, colocation), Advanced resource features (templates, groups, clone resources, multi-state resources), Pacemaker management using pcs, Pacemaker management using crmsh, configuration and management of corosync in conjunction with Pacemaker, other cluster engines (OpenAIS, Heartbeat, CMAN). * HIGH AVAILABILITY CLUSTER STORAGE * DRBD/cLVM DRBD resources, states and replication modes, configuration of DRBD resources, networking, disks and devices, configuration of DRBD automatic recovery and error handling, management of DRBD using drbdadm. drbdsetup and drbdmeta, Integration of DRBD with Pacemaker, cLVM, integration of cLVM with Pacemaker. * Clustered File Systems Principles of cluster file systems. Create, maintain and troubleshoot GFS2 file systems in a cluster, create, maintain and troubleshoot OCFS2 file systems in a cluster, Integration of GFS2 and OCFS2 with Pacemaker, the O2CB cluster stack, other commonly used clustered file systems.

UNIX Virtualization and High Availability
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

Linux virtualization and High Availability

5.0(3)

By Systems & Network Training

LINUX VIRTUALIZATION AND HA TRAINING COURSE DESCRIPTION The LPIC-3 certification is the culmination of LPI's multi -level professional certification program. LPIC-3 is designed for the enterprise-level Linux professional and represents the highest level of professional, distribution neutral Linux certification within the industry. LPIC-3 304 covers administering Linux enterprise-wide with an emphasis on virtualization and high availability. At SNT we have enhanced the contents of the course by covering containers. WHAT WILL YOU LEARN * Manage Virtual Machines. * Manage containers. * Manage HA clusters. * Manage HA cluster storage. LINUX VIRTUALIZATION AND HA TRAINING COURSE DETAILS * Who will benefit: Linux professionals working with virtualization and/or High availability. * Prerequisites: Linux network administration 2 (LPIC-2) * Duration 5 days LINUX VIRTUALIZATION AND HA TRAINING COURSE CONTENTS * VIRTUALIZATION * Virtualization concepts and theory Terminology, Pros and Cons of virtualization, variations of Virtual Machine monitors, migration of physical to VMs, migration of VMs between host systems, cloud computing. * Xen Xen architecture, networking and storage, Xen configuration, Xen utilities, troubleshooting Xen installations, XAPI, XenStore, Xen Boot Parameters, the xm utility. * KVM KVM architecture, networking and storage, KVM configuration, KVM utilities, troubleshooting KVM installations. * Other virtualization solutions OpenVZ and LXC, other virtualization technologies, virtualization provisioning tools. * Libvirt and Related Tools libvirt architecture, networking and storage, basic technical knowledge of libvirt and virsh, oVirt. * Cloud Management Tools Basic feature knowledge of OpenStack and CloudStack, awareness of Eucalyptus and OpenNebula. * Containers Containers versus VMs, Docker, Kubernetes. * Load balanced clusters of LVS/IPVS, VRRP, configuration of keepalived, configuration of ldirectord, backend server network configuration. HAProxy, configuration of HAProxy. * Failover clusters Pacemaker architecture and components (CIB, CRMd, PEngine, LRMd, DC, STONITHd), Pacemaker cluster configuration, Resource classes (OCF, LSB, Systemd, Upstart, Service, STONITH, Nagios), Resource rules and constraints (location, order, colocation), Advanced resource features (templates, groups, clone resources, multi-state resources), Pacemaker management using pcs, Pacemaker management using crmsh, configuration and management of corosync in conjunction with Pacemaker, other cluster engines (OpenAIS, Heartbeat, CMAN). * HIGH AVAILABILITY CLUSTER STORAGE * DRBD/cLVM DRBD resources, states and replication modes, configuration of DRBD resources, networking, disks and devices, configuration of DRBD automatic recovery and error handling, management of DRBD using drbdadm. drbdsetup and drbdmeta, Integration of DRBD with Pacemaker, cLVM, integration of cLVM with Pacemaker. * Clustered File Systems Principles of cluster file systems. Create, maintain and troubleshoot GFS2 file systems in a cluster, create, maintain and troubleshoot OCFS2 file systems in a cluster, Integration of GFS2 and OCFS2 with Pacemaker, the O2CB cluster stack, other commonly used clustered file systems.

Linux virtualization and High Availability
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

Complete Python programming

5.0(3)

By Systems & Network Training

COMPLETE PYTHON TRAINING COURSE DESCRIPTION Python is an agile, robust, expressive, fully objectoriented, extensible, and scalable programming language. It combines the power of compiled languages with the simplicity and rapid development of scripting languages. This course covers Python from the very basics of 'hello world!' through to object oriented programming and advanced topics such as multi threading. Hands on follows all the major sections in order to reinforce the theory. WHAT WILL YOU LEARN * Read Python programs. * Write Python programs. * Debug Python programs. * Use Python's objects and memory model as well as its OOP features. COMPLETE PYTHON PROGRAMMING TRAINING COURSE DETAILS * Who will benefit: Anyone wishing to learn Python. * Prerequisites: None. * Duration 5 days COMPLETE PYTHON PROGRAMMING TRAINING COURSE CONTENTS * Welcome to Python: What is Python? Origins, features. Downloading and installing Python, Python manuals, comparing Python, other implementations. * Getting started: Program output, the print statement, "hello world!", Program input, raw_input(), comments, operators, variables and assignment, numbers, strings, lists and tuples, dictionaries, indentation, if statement, while Loop, for loop. range(), list comprehensions. Files, open() and file() built-in functions. Errors and exceptions. Functions, Classes, Modules, useful functions. * Python basics: Statements and syntax, variable assignment, identifiers, basic style guidelines, memory management, First Python programs, Related modules/developer tools. * Python Objects: Other built-in types, Internal Types, Standard type operators, Standard type built-in functions, Categorizing standard types, Unsupported types. * Numbers: Integers, Double precision floating point numbers, Complex numbers, Operators, Built-in and factory functions, Other numeric types. * Sequences: strings, lists, and tuples: Sequences, Strings, Strings and operators, String-only operators, Built-in functions, String built-in methods, Special features of strings, Unicode, Summary of string highlights, Lists, Operators, Built-in functions, List type built-in methods, Special features of lists, Tuples, Tuple operators and built-in functions, Tuples special features, Copying Python objects and shallow and deep copies. * Mapping and set types: Mapping Type: dictionaries and operators, Mapping type built-in and factory functions, Mapping type built-in methods, Dictionary keys, Set types, Set type operators, Built-in functions, Set type built-in methods. * Conditionals and loops: If, else and elif statements, Conditional expressions, while, for, break, continue and pass statements, else statement . . . take two, Iterators and iter(), List comprehensions, Generator expressions. * Files and input/output: File objects, File built-in functions [open() and file()], File built-in methods and attributes, Standard files, Command-line arguments, File system, File execution, Persistent storage modules. * Errors and exceptions: What are exceptions? Detecting and handling exceptions, Context management, Exceptions as strings, Raising exceptions, Assertions, Standard exceptions, Creating Exceptions, Why exceptions, Exceptions and the sys module. * Functions: Calling, creating and passing functions, formal arguments, variable-length arguments, functional programming, Variable scope, recursion, generators. * Modules: Modules and files, Namespaces, Importing modules, Module import features, Module built-in functions, Packages, Other features of modules. * Object-Oriented Programming (OOP): Classes, Class attributes, Instances, Instance attributes, Binding and method invocation, Static methods and class methods, Composition, Sub-classing and derivation, Inheritance, Built-in functions for classes, and other objects, Customizing classes with special methods, Privacy, Delegation, Advanced features of new-style classes (Python 2.2+), Related modules and documentation. * Execution environment: Callable and code Objects, Executable object statements and built-in functions, Executing other programs. 'Restricted' and 'Terminating' execution, operating system interface. * Regular expressions: Special symbols and characters, REs and Python, Regular expressions example. * Network programming: Sockets: communication endpoints, Network programming in Python, SocketServer module, Twisted framework introduction. * Internet client programming: What are internet clients? Transferring files, Network news, E-mail. * Multithreaded Programming: Threads and processes Python, threads, and the global interpreter lock, The thread and threading Modules. * GUI programming: Tkinter and Python programming, Tkinter Examples, Brief tour of other GUIs. * Web programming: Web surfing with Python: creating simple web clients, Advanced Web clients, CGI: helping web servers process client data, Building CGI applications, Using Unicode with CGI, Advanced CGI, Web (HTTP) Servers. * Database programming: Python database application programmer's interface (DB-API), ORMs. * Miscellaneous Extending Python by writing extensions, Web Services, programming MS Office with Win32 COM, Python and Java programming with Jython.

Complete Python programming
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

Python for network engineers

5.0(3)

By Systems & Network Training

PYTHON TRAINING COURSE DESCRIPTION This Python course focusses on teaching Python for use in network automation and network DevOps. We focus on getting delegates up and running with Python and network automation as quickly as possible rather than making them great programmers. In other words we concentrate on enabling delegates to use network automation libraries such as netmiko, NAPALM and Nornir, and APIs such as NETCONF and RESTCONF rather than enabling delegates to produce object oriented programs. Hands on sessions use Cisco and Juniper devices. WHAT WILL YOU LEARN * Run Python programs. * Read Python programs. * Write Python programs. * Debug Python programs. * Automate network tasks with Python programs. * Configure network devices with Python. * Collect data from network devices with Python. PYTHON TRAINING COURSE DETAILS * Who will benefit: Network engineers. * Prerequisites: TCP/IP Foundation * Duration 5 days PYTHON TRAINING COURSE CONTENTS * What is Python? Programming languages, Why Python? Python in interactive mode, Python scripts, ipython, Python version 2 versus version 3. A simple Python script. Comments. Hands on Installing Python, Hello world. * A network example On box vs off box Python. telnet, ssh, NETCONF, HTTP, APIs, manufacturers and API support, analysis of a simple telnetlib program. Hands on Using Python to retrieve the configuration from a network device. Using wireshark to analyse the actions. * Python basics I/O, operators, variables and assignment, types, indentation, loops and conditionals. Hands on Modifying the telnet program, changing configurations on a network devices. * Functions, classes and methods What are functions, calling functions, builtin functions, useful builtin functions, file handling, classes, objects, creating instances. Hands on Storing configurations in files, configuring devices from files, using an inventory file to work on multiple devices. * Libraries and modules Modules, files and packages, import, from-import, Python standard library, other packages, pip install, executing other programs. Managing python libraries. Hands on Using pip, installing and using ipaddress, subprocess to access netsnmp. For the more advanced, using the sockets library. * Paramiko and netmiko SSH, enabling SSH on devices, keys. Paramiko versus netmiko, example scripts. pexpect. Hands on Configuring VLANs from Python. * pySNMP Gathering facts using previous methods, SNMP review, pySNMP GET, pySNMP and SNMPv3. easySNMP library. Hands on Walking a MIB from Python. * NETCONF What is NETCONF? Enabling NETCONF on devices, A first ncclient script, device handlers, get_config, edit_config, copy_config, delete_config, commit, validate, pyEZ, utils_config, utils.sw. Hands on Configuration using ncclient and PyEZ. This session is expanded for those interesting in JunOS automation. * Manipulating configuration files Builtin functions, string handling. Unicode. Sequences, strings, lists, tuples. Dictionaries. TextFSM. Regular expressions. JSON, YAML, XML, YANG, Jinja2, templates. Hands on Jinja2 templating with Python to configure network devices. * NAPALM Getters, configuration operations, supported devices, NAPALM transport, Config-replace, Config-merge, Compare config, Atomic changes, rollback. Example NAPLAM scripts. Hands on Using NAPALM to gather facts, Using NAPALM for configuration management * REST and RESTCONF What is REST, HTTP methods, GET, POST, cURL, Postman, Python requests library. RESTCONF, a RESTCONF example. Hands on Modifying a configuration using RESTCONF. * Scapy What is scapy, Scapy in interactive mode, Scapy as a module. Hands on Packet crafting from Python. * Warning Errors and exceptions, Exception handling, try, except. Memory management. Garbage collection. Context management, With. Hands on Improving Python code. * Nornir What is Nornir? A network automation framework, inventories, connection management and parallelization. Nornir architecture and other libraires. Hands on Setting up nornir, nornir fact gathering, nornir tasks. * Optional Writing your own functions, Writing your own classes. pyntc. Hands on Writing reusable code.

Python for network engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

Total H.248 for Engineers

5.0(3)

By Systems & Network Training

TOTAL H.248 TRAINING COURSE DESCRIPTION A course focusing purely on the H.248 protocol. Anyone working through the ITU standards documents can testify to the need of a training course to explain how H.248 really works. This course already assumes knowledge of other VoIP protocols and starts by positioning H.248 in relation to the other protocols. The course then looks at H.248 architectures and concepts before analysing H.248 messages and call flows. WHAT WILL YOU LEARN * Describe what H.248 is * Recognise where H.248 fits in relation to other VoIP protocols. * Explain how H.248 works. * Analyse H.248 packets TOTAL H.248 TRAINING COURSE DETAILS * Who will benefit: Technical staff working with H.248 * Prerequisites: Voice Over IP. * Duration 2 days TOTAL H.248 TRAINING COURSE CONTENTS * What is H.248? Review of VoIP protocols: RTP, RTCP, SIP, SDP, H.323. The PSTN and SS7. Where H.248 fits into the picture. H.248 history. MGCP. The IETF. Megaco. ITU standards. H.248v1, v2, v3. * H.248 architectures Media Gateways, Media Gateway Controllers, Gateway Control functions, Signalling Gateways. Reference architectures: IMS/TISPAN: IBCF, IWF, I-BGF, SPDF. MSF: S-SBG-NC, D-SBG-NC. GSMA: IPX Proxy. Softswitches. * H.248 concepts The connection model, terminations, streams, contexts. Termination properties: descriptors, context properties. Events, signals, packages. * H.248 messages Protocol stack, UDP, TCP. Message structure. Transactions, actions, commands. Requests, replies, acknowledgements. Sample message flows. Binary encoding, ASN syntax, Text encoding. * H.248 commands Termination manipulation: Add, Subtract, Move, Modify. Event reporting: Notify. Management: AuditCapability, AuditValue, ServiceChange. * H.248 Descriptors What are descriptors? Relationship with messages and commands. Basic descriptors, Descriptors composed of other descriptors. The 19 descriptors. Defaults. * H.248 Transactions Groups of commands, transaction Ids, relationship with actions and commands. Requests and replies. * H.248 wrap up What is a package? Basic packages. H.248 security. H.248 - SIP interoperation. H.248 interoperation with other protocols.

Total H.248 for Engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2477

Educators matching "Other"

Show all 1536
David Thomas Media

david thomas media

Wells Kent

David Thomas Media Ltd David Thomas Media was set up in January 2005. We draw on a network of experienced professionals to carry out our training. Our stated vision links communication, understanding and quality of life. We also have a guiding principle which expresses the importance of our clients’ interests. About David Thomas David is a highly experienced broadcaster, trainer and manager, with a special interest in communication and organisational skills. He has trained freelancers and other creative people at the BBC, ITV, Channel 4, as well as the entertainment and theatre unions BECTU, Equity, NUJ and the Musician’s Union. He also trains other trainers in how to get the best out of remote learning using Zoom and other online tools. His media training is focussed on charities and NGOs. Clients include Age UK, Mencap, MEND, the Disasters Emergency Committee, the King’s Fund and the Electoral Commission, as well as a range of NGOs at the United Nations. He has been involved in radio and online production for more than 30 years, mostly with the BBC World Service and local radio. His expertise has taken him all around the world, working with broadcasters from Eastern Europe, the Far East, Africa and the Caribbean. He has a keen interest in personal development and professional motivation of others, honed through years as a team leader and trainer. David is a member of the BFI. He is also an Affiliate Member of the Chartered Institute of Personnel and Development. His interests are film (especially obscure East German movies), music, and travelling the world with his family.