• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

115 Other courses in Belfast

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

Networking Microsoft Systems

5.0(3)

By Systems & Network Training

NETWORKING MICROSOFT SYSTEMS COURSE DESCRIPTION A hands-on course covering the network aspects of Microsoft systems. The course progresses from basic TCP/IP tools and configuration settings through to advanced security considerations finishing with an overview of Exchange and IIS. Hands on sessions are based on a choice of Windows Server 2003 or Windows 2000 server and Windows XP or Windows 2000 professional. Customised versions with other Microsoft platforms are also available. WHAT WILL YOU LEARN * Design networks with consideration for Microsoft issues such as logons. * Design, configure and troubleshoot TCP/IP, DNS, WINS and DHCP. * Configure security features such as PKI and IPSec. * Describe the Windows TCP/IP implementation details. NETWORKING MICROSOFT SYSTEMS COURSE DETAILS * Who will benefit: Anyone working with Microsoft systems. * Prerequisites: TCP/IP foundation for engineers Supporting Windows ( XP or 2000 or 2003) * Duration 5 days NETWORKING MICROSOFT SYSTEMS COURSE CONTENTS * Configuring network cards PnP, resources, Ethernet cards, wireless cards, dial up networking, other cards, Ethernet settings, layer 2 QoS. * Configuring and supporting IP Basic IP settings, advanced IP settings, advanced TCP settings, DrTCP and registry settings, security * DHCP DHCP server, authorising the DHCP service, DHCP client, DHCP relays, Address pools, options, lease duration's, Integrating with DNS. * Microsoft networking overview Workgroups and domains, Domain controllers, the logon process in a network, the role of Active Directory, synchronisation, protocol stacks and bindings. * Accessing file and print resources Shared folders, permissions, network printers, browsing, NetBIOS, SMB. * WINS Servers, clients, Client registration, renewing and releasing of names. NetBIOS node types. * DNS1 Overview, Primary and secondary servers, DDNS, zones, resource records. * The browser service Master, backup and other browser roles, elections, announcements, recovery from failure, Inter subnet browsing. * TCP/IP implementation details Dead gateway detection, Multi homing, multicasting, MTU path discovery, registry settings, QOS and RSVP, Windows as a router, performance implications of Microsoft services. * Internet Access Options, NAT, Firewall capabilities and Proxy server, Internet Authentication Service. * Remote Access Installing, RAS servers. RAS process, protocols * Security: PKI PPTP, L2TP, What is IPSec, configuring IPSec. * Security: VPNs PPTP, L2TP, What is IPSec, configuring IPSec. * Other Microsoft networking services & tools Netmeeting, instant messaging, white boarding, document collaboration, video conferencing Microsoft Exchange, IIS, Directory replication, SNMP, Net Monitor, integration with other platforms.

Networking Microsoft Systems
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

UNIX Virtualization and High Availability

5.0(3)

By Systems & Network Training

UNIX VIRTUALIZATION AND HIGH AVAILABILITY COURSE DESCRIPTION This course covers administering UNIX enterprise-wide with an emphasis on virtualization and high availability. WHAT WILL YOU LEARN * Manage Virtual Machines. * Manage containers. * Manage HA clusters. * Manage HA cluster storage. UNIX VIRTUALIZATION AND HIGH AVAILABILITY COURSE DETAILS * Who will benefit: Enterprise-level UNIX professional. UNIX professionals working with virtualization and/or High availability. * Prerequisites: Linux network administration 2 (LPIC-2) * Duration 5 days UNIX VIRTUALIZATION AND HIGH AVAILABILITY COURSE CONTENTS * VIRTUALIZATION * Virtualization concepts and theory Terminology, Pros and Cons of virtualization, variations of Virtual Machine monitors, migration of physical to VMs, migration of VMs between host systems, cloud computing. * Xen Xen architecture, networking and storage, Xen configuration, Xen utilities, troubleshooting Xen installations, XAPI, XenStore, Xen Boot Parameters, the xm utility. * KVM KVM architecture, networking and storage, KVM configuration, KVM utilities, troubleshooting KVM installations. * Other virtualization solutions OpenVZ and LXC, other virtualization technologies, virtualization provisioning tools. * Libvirt and Related Tools libvirt architecture, networking and storage, basic technical knowledge of libvirt and virsh, oVirt. * Cloud Management Tools Basic feature knowledge of OpenStack and CloudStack, awareness of Eucalyptus and OpenNebula. * Containers Containers versus VMs, Docker, Kubernetes. * Load balanced clusters of LVS/IPVS, VRRP, configuration of keepalived, configuration of ldirectord, backend server network configuration. HAProxy, configuration of HAProxy. * Failover clusters Pacemaker architecture and components (CIB, CRMd, PEngine, LRMd, DC, STONITHd), Pacemaker cluster configuration, Resource classes (OCF, LSB, Systemd, Upstart, Service, STONITH, Nagios), Resource rules and constraints (location, order, colocation), Advanced resource features (templates, groups, clone resources, multi-state resources), Pacemaker management using pcs, Pacemaker management using crmsh, configuration and management of corosync in conjunction with Pacemaker, other cluster engines (OpenAIS, Heartbeat, CMAN). * HIGH AVAILABILITY CLUSTER STORAGE * DRBD/cLVM DRBD resources, states and replication modes, configuration of DRBD resources, networking, disks and devices, configuration of DRBD automatic recovery and error handling, management of DRBD using drbdadm. drbdsetup and drbdmeta, Integration of DRBD with Pacemaker, cLVM, integration of cLVM with Pacemaker. * Clustered File Systems Principles of cluster file systems. Create, maintain and troubleshoot GFS2 file systems in a cluster, create, maintain and troubleshoot OCFS2 file systems in a cluster, Integration of GFS2 and OCFS2 with Pacemaker, the O2CB cluster stack, other commonly used clustered file systems.

UNIX Virtualization and High Availability
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

Complete Python programming

5.0(3)

By Systems & Network Training

COMPLETE PYTHON TRAINING COURSE DESCRIPTION Python is an agile, robust, expressive, fully objectoriented, extensible, and scalable programming language. It combines the power of compiled languages with the simplicity and rapid development of scripting languages. This course covers Python from the very basics of 'hello world!' through to object oriented programming and advanced topics such as multi threading. Hands on follows all the major sections in order to reinforce the theory. WHAT WILL YOU LEARN * Read Python programs. * Write Python programs. * Debug Python programs. * Use Python's objects and memory model as well as its OOP features. COMPLETE PYTHON PROGRAMMING TRAINING COURSE DETAILS * Who will benefit: Anyone wishing to learn Python. * Prerequisites: None. * Duration 5 days COMPLETE PYTHON PROGRAMMING TRAINING COURSE CONTENTS * Welcome to Python: What is Python? Origins, features. Downloading and installing Python, Python manuals, comparing Python, other implementations. * Getting started: Program output, the print statement, "hello world!", Program input, raw_input(), comments, operators, variables and assignment, numbers, strings, lists and tuples, dictionaries, indentation, if statement, while Loop, for loop. range(), list comprehensions. Files, open() and file() built-in functions. Errors and exceptions. Functions, Classes, Modules, useful functions. * Python basics: Statements and syntax, variable assignment, identifiers, basic style guidelines, memory management, First Python programs, Related modules/developer tools. * Python Objects: Other built-in types, Internal Types, Standard type operators, Standard type built-in functions, Categorizing standard types, Unsupported types. * Numbers: Integers, Double precision floating point numbers, Complex numbers, Operators, Built-in and factory functions, Other numeric types. * Sequences: strings, lists, and tuples: Sequences, Strings, Strings and operators, String-only operators, Built-in functions, String built-in methods, Special features of strings, Unicode, Summary of string highlights, Lists, Operators, Built-in functions, List type built-in methods, Special features of lists, Tuples, Tuple operators and built-in functions, Tuples special features, Copying Python objects and shallow and deep copies. * Mapping and set types: Mapping Type: dictionaries and operators, Mapping type built-in and factory functions, Mapping type built-in methods, Dictionary keys, Set types, Set type operators, Built-in functions, Set type built-in methods. * Conditionals and loops: If, else and elif statements, Conditional expressions, while, for, break, continue and pass statements, else statement . . . take two, Iterators and iter(), List comprehensions, Generator expressions. * Files and input/output: File objects, File built-in functions [open() and file()], File built-in methods and attributes, Standard files, Command-line arguments, File system, File execution, Persistent storage modules. * Errors and exceptions: What are exceptions? Detecting and handling exceptions, Context management, Exceptions as strings, Raising exceptions, Assertions, Standard exceptions, Creating Exceptions, Why exceptions, Exceptions and the sys module. * Functions: Calling, creating and passing functions, formal arguments, variable-length arguments, functional programming, Variable scope, recursion, generators. * Modules: Modules and files, Namespaces, Importing modules, Module import features, Module built-in functions, Packages, Other features of modules. * Object-Oriented Programming (OOP): Classes, Class attributes, Instances, Instance attributes, Binding and method invocation, Static methods and class methods, Composition, Sub-classing and derivation, Inheritance, Built-in functions for classes, and other objects, Customizing classes with special methods, Privacy, Delegation, Advanced features of new-style classes (Python 2.2+), Related modules and documentation. * Execution environment: Callable and code Objects, Executable object statements and built-in functions, Executing other programs. 'Restricted' and 'Terminating' execution, operating system interface. * Regular expressions: Special symbols and characters, REs and Python, Regular expressions example. * Network programming: Sockets: communication endpoints, Network programming in Python, SocketServer module, Twisted framework introduction. * Internet client programming: What are internet clients? Transferring files, Network news, E-mail. * Multithreaded Programming: Threads and processes Python, threads, and the global interpreter lock, The thread and threading Modules. * GUI programming: Tkinter and Python programming, Tkinter Examples, Brief tour of other GUIs. * Web programming: Web surfing with Python: creating simple web clients, Advanced Web clients, CGI: helping web servers process client data, Building CGI applications, Using Unicode with CGI, Advanced CGI, Web (HTTP) Servers. * Database programming: Python database application programmer's interface (DB-API), ORMs. * Miscellaneous Extending Python by writing extensions, Web Services, programming MS Office with Win32 COM, Python and Java programming with Jython.

Complete Python programming
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

Linux virtualization and High Availability

5.0(3)

By Systems & Network Training

LINUX VIRTUALIZATION AND HA TRAINING COURSE DESCRIPTION The LPIC-3 certification is the culmination of LPI's multi -level professional certification program. LPIC-3 is designed for the enterprise-level Linux professional and represents the highest level of professional, distribution neutral Linux certification within the industry. LPIC-3 304 covers administering Linux enterprise-wide with an emphasis on virtualization and high availability. At SNT we have enhanced the contents of the course by covering containers. WHAT WILL YOU LEARN * Manage Virtual Machines. * Manage containers. * Manage HA clusters. * Manage HA cluster storage. LINUX VIRTUALIZATION AND HA TRAINING COURSE DETAILS * Who will benefit: Linux professionals working with virtualization and/or High availability. * Prerequisites: Linux network administration 2 (LPIC-2) * Duration 5 days LINUX VIRTUALIZATION AND HA TRAINING COURSE CONTENTS * VIRTUALIZATION * Virtualization concepts and theory Terminology, Pros and Cons of virtualization, variations of Virtual Machine monitors, migration of physical to VMs, migration of VMs between host systems, cloud computing. * Xen Xen architecture, networking and storage, Xen configuration, Xen utilities, troubleshooting Xen installations, XAPI, XenStore, Xen Boot Parameters, the xm utility. * KVM KVM architecture, networking and storage, KVM configuration, KVM utilities, troubleshooting KVM installations. * Other virtualization solutions OpenVZ and LXC, other virtualization technologies, virtualization provisioning tools. * Libvirt and Related Tools libvirt architecture, networking and storage, basic technical knowledge of libvirt and virsh, oVirt. * Cloud Management Tools Basic feature knowledge of OpenStack and CloudStack, awareness of Eucalyptus and OpenNebula. * Containers Containers versus VMs, Docker, Kubernetes. * Load balanced clusters of LVS/IPVS, VRRP, configuration of keepalived, configuration of ldirectord, backend server network configuration. HAProxy, configuration of HAProxy. * Failover clusters Pacemaker architecture and components (CIB, CRMd, PEngine, LRMd, DC, STONITHd), Pacemaker cluster configuration, Resource classes (OCF, LSB, Systemd, Upstart, Service, STONITH, Nagios), Resource rules and constraints (location, order, colocation), Advanced resource features (templates, groups, clone resources, multi-state resources), Pacemaker management using pcs, Pacemaker management using crmsh, configuration and management of corosync in conjunction with Pacemaker, other cluster engines (OpenAIS, Heartbeat, CMAN). * HIGH AVAILABILITY CLUSTER STORAGE * DRBD/cLVM DRBD resources, states and replication modes, configuration of DRBD resources, networking, disks and devices, configuration of DRBD automatic recovery and error handling, management of DRBD using drbdadm. drbdsetup and drbdmeta, Integration of DRBD with Pacemaker, cLVM, integration of cLVM with Pacemaker. * Clustered File Systems Principles of cluster file systems. Create, maintain and troubleshoot GFS2 file systems in a cluster, create, maintain and troubleshoot OCFS2 file systems in a cluster, Integration of GFS2 and OCFS2 with Pacemaker, the O2CB cluster stack, other commonly used clustered file systems.

Linux virtualization and High Availability
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

Python for network engineers

5.0(3)

By Systems & Network Training

PYTHON TRAINING COURSE DESCRIPTION This Python course focusses on teaching Python for use in network automation and network DevOps. We focus on getting delegates up and running with Python and network automation as quickly as possible rather than making them great programmers. In other words we concentrate on enabling delegates to use network automation libraries such as netmiko, NAPALM and Nornir, and APIs such as NETCONF and RESTCONF rather than enabling delegates to produce object oriented programs. Hands on sessions use Cisco and Juniper devices. WHAT WILL YOU LEARN * Run Python programs. * Read Python programs. * Write Python programs. * Debug Python programs. * Automate network tasks with Python programs. * Configure network devices with Python. * Collect data from network devices with Python. PYTHON TRAINING COURSE DETAILS * Who will benefit: Network engineers. * Prerequisites: TCP/IP Foundation * Duration 5 days PYTHON TRAINING COURSE CONTENTS * What is Python? Programming languages, Why Python? Python in interactive mode, Python scripts, ipython, Python version 2 versus version 3. A simple Python script. Comments. Hands on Installing Python, Hello world. * A network example On box vs off box Python. telnet, ssh, NETCONF, HTTP, APIs, manufacturers and API support, analysis of a simple telnetlib program. Hands on Using Python to retrieve the configuration from a network device. Using wireshark to analyse the actions. * Python basics I/O, operators, variables and assignment, types, indentation, loops and conditionals. Hands on Modifying the telnet program, changing configurations on a network devices. * Functions, classes and methods What are functions, calling functions, builtin functions, useful builtin functions, file handling, classes, objects, creating instances. Hands on Storing configurations in files, configuring devices from files, using an inventory file to work on multiple devices. * Libraries and modules Modules, files and packages, import, from-import, Python standard library, other packages, pip install, executing other programs. Managing python libraries. Hands on Using pip, installing and using ipaddress, subprocess to access netsnmp. For the more advanced, using the sockets library. * Paramiko and netmiko SSH, enabling SSH on devices, keys. Paramiko versus netmiko, example scripts. pexpect. Hands on Configuring VLANs from Python. * pySNMP Gathering facts using previous methods, SNMP review, pySNMP GET, pySNMP and SNMPv3. easySNMP library. Hands on Walking a MIB from Python. * NETCONF What is NETCONF? Enabling NETCONF on devices, A first ncclient script, device handlers, get_config, edit_config, copy_config, delete_config, commit, validate, pyEZ, utils_config, utils.sw. Hands on Configuration using ncclient and PyEZ. This session is expanded for those interesting in JunOS automation. * Manipulating configuration files Builtin functions, string handling. Unicode. Sequences, strings, lists, tuples. Dictionaries. TextFSM. Regular expressions. JSON, YAML, XML, YANG, Jinja2, templates. Hands on Jinja2 templating with Python to configure network devices. * NAPALM Getters, configuration operations, supported devices, NAPALM transport, Config-replace, Config-merge, Compare config, Atomic changes, rollback. Example NAPLAM scripts. Hands on Using NAPALM to gather facts, Using NAPALM for configuration management * REST and RESTCONF What is REST, HTTP methods, GET, POST, cURL, Postman, Python requests library. RESTCONF, a RESTCONF example. Hands on Modifying a configuration using RESTCONF. * Scapy What is scapy, Scapy in interactive mode, Scapy as a module. Hands on Packet crafting from Python. * Warning Errors and exceptions, Exception handling, try, except. Memory management. Garbage collection. Context management, With. Hands on Improving Python code. * Nornir What is Nornir? A network automation framework, inventories, connection management and parallelization. Nornir architecture and other libraires. Hands on Setting up nornir, nornir fact gathering, nornir tasks. * Optional Writing your own functions, Writing your own classes. pyntc. Hands on Writing reusable code.

Python for network engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

Total H.248 for Engineers

5.0(3)

By Systems & Network Training

TOTAL H.248 TRAINING COURSE DESCRIPTION A course focusing purely on the H.248 protocol. Anyone working through the ITU standards documents can testify to the need of a training course to explain how H.248 really works. This course already assumes knowledge of other VoIP protocols and starts by positioning H.248 in relation to the other protocols. The course then looks at H.248 architectures and concepts before analysing H.248 messages and call flows. WHAT WILL YOU LEARN * Describe what H.248 is * Recognise where H.248 fits in relation to other VoIP protocols. * Explain how H.248 works. * Analyse H.248 packets TOTAL H.248 TRAINING COURSE DETAILS * Who will benefit: Technical staff working with H.248 * Prerequisites: Voice Over IP. * Duration 2 days TOTAL H.248 TRAINING COURSE CONTENTS * What is H.248? Review of VoIP protocols: RTP, RTCP, SIP, SDP, H.323. The PSTN and SS7. Where H.248 fits into the picture. H.248 history. MGCP. The IETF. Megaco. ITU standards. H.248v1, v2, v3. * H.248 architectures Media Gateways, Media Gateway Controllers, Gateway Control functions, Signalling Gateways. Reference architectures: IMS/TISPAN: IBCF, IWF, I-BGF, SPDF. MSF: S-SBG-NC, D-SBG-NC. GSMA: IPX Proxy. Softswitches. * H.248 concepts The connection model, terminations, streams, contexts. Termination properties: descriptors, context properties. Events, signals, packages. * H.248 messages Protocol stack, UDP, TCP. Message structure. Transactions, actions, commands. Requests, replies, acknowledgements. Sample message flows. Binary encoding, ASN syntax, Text encoding. * H.248 commands Termination manipulation: Add, Subtract, Move, Modify. Event reporting: Notify. Management: AuditCapability, AuditValue, ServiceChange. * H.248 Descriptors What are descriptors? Relationship with messages and commands. Basic descriptors, Descriptors composed of other descriptors. The 19 descriptors. Defaults. * H.248 Transactions Groups of commands, transaction Ids, relationship with actions and commands. Requests and replies. * H.248 wrap up What is a package? Basic packages. H.248 security. H.248 - SIP interoperation. H.248 interoperation with other protocols.

Total H.248 for Engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2477

Definitive network forensics for engineers

5.0(3)

By Systems & Network Training

NETWORK FORENSICS TRAINING COURSE DESCRIPTION This course studies network forensics-monitoring and analysis of network traffic for information gathering, intrusion detection and legal evidence. We focus on the technical aspects of network forensics rather than other skills such as incident response procedures etc.. Hands on sessions follow all the major sections. WHAT WILL YOU LEARN * Recognise network forensic data sources. * Perform network forensics using: Wireshark NetFlow Log analysis * Describe issues such as encryption. NETWORK FORENSICS TRAINING COURSE DETAILS * Who will benefit: Technical network and/or security staff. * Prerequisites: TCP/IP foundation for engineers. * Duration 3 days NETWORK FORENSICS TRAINING COURSE CONTENTS * What is network forensics? What it is, host vs network forensics, purposes, legal implications, network devices, network data sources, investigation tools. Hands on whois, DNS queries. * Host side network forensics Services, connections tools. Hands on Windows services, Linux daemons, netstat, ifoconfig/ipconfig, ps and Process explorer, ntop, arp, resource monitor. * Packet capture and analysis Network forensics with Wireshark, Taps, NetworkMiner. Hands on Performing Network Traffic Analysis using NetworkMiner and Wireshark. * Attacks DOS attacks, SYN floods, vulnerability exploits, ARP and DNS poisoning, application attacks, DNS ANY requests, buffer overflow attacks, SQL injection attack, attack evasion with fragmentation. Hands on Detecting scans, using nmap, identifying attack tools. * Calculating location Timezones, whois, traceroute, geolocation. Wifi positioning. Hands on Wireshark with GeoIP lookup. * Data collection NetFlow, sflow, logging, splunk, splunk patterns, GRR. HTTP proxies. Hands on NetFlow configuration, NetFlow analysis. * The role of IDS, firewalls and logs Host based vs network based, IDS detection styles, IDS architectures, alerting. Snort. syslog-ng. Microsoft log parser. Hands on syslog, Windows Event viewer. * Correlation Time synchronisation, capture times, log aggregation and management, timelines. Hands on Wireshark conversations. * Other considerations Tunnelling, encryption, cloud computing, TOR. Hands on TLS handshake in Wireshark.

Definitive network forensics for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3497

Definitive Nagios for engineers

5.0(1)

By Systems & Network Training

DEFINITIVE NAGIOS TRAINING COURSE DESCRIPTION Nagios is an open source application designed to provide system and network monitoring. This hands on course gives a comprehensive coverage of using Nagios to provide monitoring of Linux, Windows and network devices. The course is based on Nagios core but contact us if you would like Nagios XI. WHAT WILL YOU LEARN * Install Nagios. * Configure Nagios. * Monitor Windows, Linux and Cisco (and other network equipment) using Nagios. * Configure notifications DEFINITIVE NAGIOS TRAINING COURSE DETAILS * Who will benefit: Technical staff working with Nagios. * Prerequisites: None. * Duration 2 days DEFINITIVE NAGIOS FOR ENGINEERS * Nagios architecture Downloading Nagios, Installing Nagios, Nagios core, plugins, frontends, addons. Nagios XI. Nagios Fusion. Hands on Installing Nagios. * Getting started with Nagios Nagios files, nagios.cfg, minimal.cfg. Starting and stopping Nagios. Hands on Controlling Nagios. * Using Nagios Nagios web interface. Maps, Hosts, host groups, services, service groups, problems. Reports. Configuration. Hands on Using the web interface. * Monitoring Linux systems SSH, NRPE. Hands on Monitoring Linux system health. * Monitoring Windows systems Installing NSClient++, Configuring NSClient++, check_nt plugin, monitoring uptime, CPU, memory, disks, services, processes. Hands on Monitoring Windows system health. * Monitoring network devices SNMP architecture, MIBs. Polling. Hands on Configuring Nagios for SNMP. * Agents Configuring Cisco devices for SNMP support, communities, traps, syslog. Hands on Monitoring network devices. * Nagios alerts and notifications SNMP traps. Email notifications, SMS alerts other messaging

Definitive Nagios for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2477

Object Oriented Analysis & Design

5.0(3)

By Systems & Network Training

OOAD TRAINING COURSE DESCRIPTION A workshop course providing thorough practical knowledge of object oriented analysis and design methods. WHAT WILL YOU LEARN * Perform Systems Analysis with Object Oriented methods. * Identify key classes and objects. * Expand and refine OO problem domain models. * Design Class hierarchies using inheritance and polymorphism. * Design programs with Object Oriented methods. OOAD TRAINING COURSE DETAILS * Who will benefit: System analysts, designers, programmers and project managers. * Prerequisites: It is desirable that delegates have experience of programming in C++/Java or some other OOP language. * Duration 5 days OOAD TRAINING COURSE CONTENTS * What is OO? Classes, objects, messages, encapsulation, associations, inheritance, polymorphism, reusability. * What is Systems Analysis and design? Data flow diagrams, structure diagrams. The OO approach. * OOA The problem domain and object modelling. Identifying classes and objects. Generalisation and inheritance. Defining attributes and methods. * OOD Refining the OOA results. Designing the User Interface. Designing the algorithms and data structures using objects. Designing the methods. * OOP Prototyping. Implementing OOD with OOPs and OOPLs.

Object Oriented Analysis & Design
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£4637

XML primer

5.0(3)

By Systems & Network Training

XML PRIMER TRAINING COURSE DESCRIPTION This course has been designed for web and intranet developers who want to accelerate their learning of XML and its applications without the grind of book learning. Although a basic knowledge of HTML and JavaScript is assumed, it is also assumed you know very little about XML and how to use it. On completion of this course you should understand the benefits of using XML and be able to design XML solutions where applicable to your company's Internet/intranet requirements. The course will be particularly beneficial if you want to know how to communicate data to diverse applications over the Internet or company intranet. WHAT WILL YOU LEARN * Write XML. * Debug XML. * Examine existing code and determine its function. XML PRIMER TRAINING COURSE DETAILS * Who will benefit: Anyone working with XML. * Prerequisites: HTML5 development fundamentals * Duration 3 days XML PRIMER TRAINING COURSE CONTENTS * The origins of XML Markup languages, SGML, document type definitions and validity, introducing XML, IE and XML, accessing content and adding style. * Basic XML XML document structure, elements and attributes, grammar, well formed documents, other XML elements and references. * Document Type Definition (DTDs) Creating a DTD, basic declaration, declaring elements, content definitions, entities, entity declarations, notations, defining attributes, attribute types, forcing inclusion or exclusion of DTD sections, validation. * Namespaces Declaring namespaces, scoping, removing and changing namespaces, qualified names, attribute namespaces. * An introduction to schemas Constructing schemas, defining the root element and its contents,<ELEMENTTYPE>, defining root element contents, adding attributes definitions, <ATTRIBUTETYPE>, <ELEMENT>, <ATTRIBUTE>. * XML & the Document Object Model (DOM) What the DOM offers, DOM and W3C. * Basic DOM concepts XML documents as trees, terminology of tree elements. Key DOM Objects: The document object and its creation, base objects, IE specifics, the XML node hierarchy. * Programming DOM Viewing a DOM model as XML, getting the root element of a document, iterating nodes of a DOM, basic node properties, collection objects, searching for specific values, filtering a nodelist by tagname, more filtering methods, selecting nodes from their attributes. * Amending Content and Structure Creating/saving a DOM as XML, changing content/structure, dynamically building a DOM. * Using ASP and other techniques ASP techniques, HTTPREQUEST object, XSL, transforming and formatting XML. Formatting Using CSS. CSS And XML. * XSL Transformations - XSLT Introduction, the XSL root element, applying XSL stylesheets to XML, XSL elements and operations, instructions - creating text nodes and applying templates, a 'drill-down' approach, simple output formatting, pattern filters - patterns based on position, the Match and Select attributes and their patterns, formatting output, creating new XML in output.

XML primer
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3497

Educators matching "Other"

Show all 9
Kilcooley Women's Centre

kilcooley women's centre

4.7(58)

Bangor

Kilcooley Women's Centre, is currently based in Balloo, Bangor and has provided services for women in North Down since 1995. KWC adopts the principles of COMMUNITY WEALTH BUILDING to improve the economic outcomes for the borough of Ards North Down through collaboration. The Women's Centre is a key player within the wider Kilcooley area and works collaboratively with other agencies towards improved outcomes for all residents of the estate, with a particular focus on early intervention programmes and projects to address educational underachievement and poor health and wellbeing outcomes. As the only women's centre serving Ards/North Down and unique in Co Down, where possible we offer outreach training to smaller towns and villages in the Borough. On 2nd June 2017, HM Queen Elizabeth announced in the London Gazette that she had awarded the centre the 'Queens Award for Voluntary Service' in recognition of the service to the community from 1995. The Centre has been acknowledged as a valuable asset within the community and has developed a diverse range of services to meet the identified needs of women, children and their families living within the Kilcooley and wider Ards & North Down area. Local women are involved in the staffing and management of the centre. Kilcooley Women's Centre is a key provider of training, health awareness, childcare and young women's activities and leads on community based education in the area. The Centre currently operates out of various sites, each one offering a welcoming environment, where local women can engage in a wide portfolio of activities, including training and education, programmes for young women aged 16-24, employability skills, health and wellbeing programs, peace and reconciliation activities, arts programs and personal development programs to build skills, confidence and self-esteem. To work towards self sustainability in a climate of austerity and reduced grants and funding, KWC is working towards a social economy business model as a trading arm. The centre operates a regional programme across the Ards North Down and Peninsula area, working from Holywood, the gateway to Co Down to the tip of Portaferry at the most distant part of the peninsula. This work links urban and rural, crosses the different community and social divides and has developed a positive proactive working partnership with the Co Down Rural Network linking towns and villages. The partnership considers collaboration and transfer of innovation, experience and sharing of resources, skills and expertise is the way forward for women, children and families residing or working in the Ards North Down region. Within the centre, we operate a childcare project called Ladybirds Childcare Services, which is registered with the South Eastern Trust Early Years Team for full-time day care. We offer 'Jellie Tots' baby room for the 0-2 year olds and 'Smarties' pre-nursery for 2-4 year olds preparing for their nursery year or transition to P1. Ladybirds Childcare offers affordable childcare to assist women engaged in training or in the transitional period into employment, respite as crisis intervention for vulnerable families and a not-for-profit affordable childcare programe. The centre links with 14 regional women's centres in Northern Ireland through a close working relationship with Women's Support Network (WSN) the umbrella group for Women's Centres NI, who represent our views on the Department for Communities sponsored 'Women's Regional Consortium' which provides a one stop shop information and policy service for women in disadvantaged communities across NI. KWC also co-operates with other regional, national and European partners. KWC are keen to form collaborative and partnership approaches to service delivery to share services and support to deliver value for money and maximise any funding the centre is awarded. We welcome and encourage any woman to contact us or call into the centre and speak to one of our staff about how we could assist you. Opening hours to the public are 9.00am - 4pm Monday to Thursday and 2pm on Fridays, but the phones are manned from 8.15 a.m. We are closed public holidays and for staff training on occasion.

Imagine! Belfast Festival of Ideas & Politics

imagine! belfast festival of ideas & politics

Belfast

The 8th Imagine! Belfast Festival proved to be a successful offering involving 147 events and 359 speakers & performers during 21-27 March 2022. The eclectic week of talks, workshops, theatre, poetry, comedy, music, exhibitions, film and tours attracted an audience of 9,210 online and in-person attendees. Most of the events (82%) were free as the festival returned to live events after two years operating online. Although Covid continued to impact on our programme with 17 events cancelled due to illness, we were still able to roll out a huge range of events including headliners such as Michael Ignatieff, Tom Robinson, Helen Thompson, Michael Longley, Ece Temelkuran, Bill Neely and a host of exciting arts and cultural events – with many sold out or oversubscribed. We have conducted a comprehensive evaluation of the festival through an audience survey(3.5% sample). Our survey found that 95% of respondents felt the festival satisfied their expectations. It was particularly pleasing to find that 60% of audience members were attending a festival event for the first time and 37% of the sample had never been to a festival venue before, which suggests that we were able to reach new audiences and introduce them to new venues and partners. Other outcomes included: 12% of attendees came from outside Northern Ireland. Of these, 13% stated the festival was the main reason they were visiting Belfast. Audience spend: Our sample spent an average of £35 attending our events Number of festival partners: 52 Number of international participants: 40 with 27 events organised by participants from outside UK & Ireland Number of free events: 121 – 82% of total events Average ticket price: £7.8 Number of workshops: 14 Number of venues used: 35 Media coverage: Total number of items: 98. Reach: 4,022,796. AVE: £181,881. PR value: £545,644 Positive feedback was also elicited from survey respondents, detailed as follows: 95% of respondents felt the festival satisfied their expectations with only 1% reporting dissatisfaction (increased from 94% in 2021) 95.3% of people answered the question ‘after attending the festival, would you be more likely to attend other politics-related events’ (88% last year) 97.8 of respondents stated they were more likely to recommend the festival to family and friends after attending one of our events with 1.6% stating they felt the same When asked whether the festival promotes Belfast and Northern Ireland in a positive way, 98.4% said yes, with 1.6% responding as ‘don’t know’ People appeared to be reasonably well informed about the festival. 92% of the sample stated they were either well or somewhat informed about the festival prior to attending an event Respondents overwhelmingly found the subject matter of the event/performance as the main reason for attending the festival. However, familiarity with the speaker/performer was also cited as a factor. We also asked whether respondents considered themselves to be disadvantaged and found that 21% of the sample considered themselves to fall into this category which suggests were able to significantly engage with vulnerable and less well-off sections of the community. We invited the public to suggest and organise events in November 2021 and received a record 98 proposals, most of which we were able to support. This was a higher than expected level of public participation in the festival which resulted in more events than planned taking place in the 2022 programme. We also had a greater variety of events with more place-making events, exhibitions, music and discussions/workshop events compared to previous years.