• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

420 Plane courses

🔥 Limited Time Offer 🔥

Get a 10% discount on your first order when you use this promo code at checkout: MAY24BAN3X

Beginners Woodworking: Make a Bread Board

By The River Shop

The Beginners Woodworking Workshop is a one day course where you will learn to make a bread board in just a few hours!

Beginners Woodworking: Make a Bread Board
Delivered In-Person in London4 hours, May 26th, 11:00 + 4 more
£125

Introduction to Woodworking for beginners

By Woodworker

Nottingham woodworking courses at woodworker in for beginners. Learn more about working with wood and woodworking tools, including chisels, planes and power tools. woodworker.org.uk

Introduction to Woodworking for beginners
Delivered In-Person in Nottingham1 hour, May 27th, 08:00 + 11 more
£189

How To Get All Of Your Plane Tickets For Free!

By iStudy UK

DESCRIPTION This course will not only show you how to get all of your plane tickets for free, but you will also learn how to have the airlines pay you to take those very same free flights!  This is one of the easiest and most overlooked methods that you should be taking advantage of.  After you complete this short course, you will never have to worry about paying for a plane ticket (domestic or international) again. OBJECTIVES: Learn how to get all of your plane tickets for free! Learn how to have the airlines pay you for taking those free flights! How To Get All Of Your Plane Tickets For Free Getting All Of Your Plane Tickets For Free Introduction! 00:09:00 The Company That Will Pay You To Fly For Free! 00:12:00 Exactly How You Will Get Your Free Flights! 00:12:00 Getting Paid To Fly For Free Conclusion & Bonus! 00:03:00

How To Get All Of Your Plane Tickets For Free!
Delivered Online On Demand
£25

Hardening Cisco Devices

5.0(3)

By Systems & Network Training

HARDENING CISCO DEVICES TRAINING COURSE DESCRIPTION A hands on course focusing on how to lock down Cisco IOS routers and switches. WHAT WILL YOU LEARN * Harden Cisco devices. HARDENING CISCO DEVICES TRAINING COURSE DETAILS * Who will benefit: Technical network staff. Technical security staff. * Prerequisites: TCP/IP foundation for engineers. * Duration 5 days HARDENING CISCO DEVICES TRAINING COURSE CONTENT * Introduction Router security, Switch security, Cisco IOS, IOS versions, Cisco advisories, the management plane, control plane, data plane. Hands on Checking IOS versions and advisories. * Access control Infrastructure ACLs, Transit ACLs. Hands on Restricting access to the device, Filtering data traffic. * Management plane: Securing operations Passwords, privilege levels, AAA, TACACS+, RADIUS. Hands on Password management. * Management plane: Other general hardening Logging best practices, secure protocols, encrypting management sessions, configuration management. Hands on Hardening the management plane. * Control plane Disabling reception and transmission of certain messages, Limiting CPU impact of control plane traffic, securing routing protocols. Hands on Hardening the control plane. * Data plane Transit ACLs, disabling unused services, disabling unnecessary protocols, anti spoofing, limiting CPU impact of data plane traffic, identifying and tracing traffic, Netflow, VLANs, port security. Hands on hardening the data plane.

Hardening Cisco Devices
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2477

SC-300T00 Microsoft Identity and Access Administrator

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for the Identity and Access Administrators who are planning to take the associated certification exam, or who are performing identity and access administration tasks in their day-to-day job. This course would also be helpful to an administrator or engineer that wants to specialize in providing identity solutions and access management systems for Azure-based solutions; playing an integral role in protecting an organization. The Microsoft Identity and Access Administrator course explores how to design, implement, and operate an organization?s identity and access management systems by using Microsoft Entra ID. Learn to manage tasks such as providing secure authentication and authorization access to enterprise applications. You will also learn to provide seamless experiences and self-service management capabilities for all users. Finally, learn to create adaptive access and governance of your identity and access management solutions ensuring you can troubleshoot, monitor, and report on your environment. The Identity and Access Administrator may be a single individual or a member of a larger team. Learn how this role collaborates with many other roles in the organization to drive strategic identity projects. The end goal is to provide you knowledge to modernize identity solutions, to implement hybrid identity solutions, and to implement identity governance. Prerequisites * SC-900T00: Microsoft Security, Compliance, and Identity Fundamentals * AZ-104T00 - Microsoft Azure Administrator 1 - EXPLORE IDENTITY IN MICROSOFT ENTRA ID * Explain the identity landscape * Explore zero trust with identity * Discuss identity as a control plane * Explore why we have identity * Define identity administration * Contrast decentralized identity with central identity systems * Discuss identity management solutions * Explain Microsoft Entra Business to Business * Compare Microsoft identity providers * Define identity licensing * Explore authentication * Discuss authorization * Explain auditing in identity 2 - IMPLEMENT INITIAL CONFIGURATION OF MICROSOFT ENTRA ID * Configure company brand * Configure and manage Microsoft Entra roles * Configure delegation by using administrative units * Analyze Microsoft Entra role permissions * Configure and manage custom domains * Configure tenant-wide setting 3 - CREATE, CONFIGURE, AND MANAGE IDENTITIES * Create, configure, and manage users * Create, configure, and manage groups * Configure and manage device registration * Manage licenses * Create custom security attributes * Explore automatic user creation 4 - IMPLEMENT AND MANAGE EXTERNAL IDENTITIES * Describe guest access and Business to Business accounts * Manage external collaboration * Invite external users - individually and in bulk * Demo - manage guest users in Microsoft Entra ID * Manage external user accounts in Microsoft Entra ID * Manage external users in Microsoft 365 workloads * Implement and manage Microsoft Entra Verified ID * Configure identity providers * Implement cross-tenant access controls 5 - IMPLEMENT AND MANAGE HYBRID IDENTITY * Plan, design, and implement Microsoft Entra Connect * Implement manage password hash synchronization (PHS) * Implement manage pass-through authentication (PTA) * Demo - Manage pass-through authentication and seamless single sign-on (SSO) * Implement and manage federation * Trouble-shoot synchronization errors * Implement Microsoft Entra Connect Health * Manage Microsoft Entra Health 6 - SECURE MICROSOFT ENTRA USERS WITH MULTIFACTOR AUTHENTICATION * What is Microsoft Entra multifactor authentication? * Plan your multifactor authentication deployment * Configure multi-factor authentication methods 7 - MANAGE USER AUTHENTICATION * Administer FIDO2 and passwordless authentication methods * Explore Authenticator app and OATH tokens * Implement an authentication solution based on Windows Hello for Business * Deploy and manage password protection * Configure smart lockout thresholds * Implement Kerberos and certificate-based authentication in Microsoft Entra ID * Configure Microsoft Entra user authentication for virtual machines 8 - PLAN, IMPLEMENT, AND ADMINISTER CONDITIONAL ACCESS * Plan security defaults * Plan Conditional Access policies * Implement Conditional Access policy controls and assignments * Test and troubleshoot Conditional Access policies * Implement application controls * Implement session management * Implement continuous access evaluation 9 - MANAGE MICROSOFT ENTRA IDENTITY PROTECTION * Review identity protection basics * Implement and manage user risk policy * Monitor, investigate, and remediate elevated risky users * Implement security for workload identities * Explore Microsoft Defender for Identity 10 - IMPLEMENT ACCESS MANAGEMENT FOR AZURE RESOURCES * Assign Azure roles * Configure custom Azure roles * Create and configure managed identities * Access Azure resources with managed identities * Analyze Azure role permissions * Configure Azure Key Vault RBAC policies * Retrieve objects from Azure Key Vault * Explore Microsoft Entra Permissions Management 11 - PLAN AND DESIGN THE INTEGRATION OF ENTERPRISE APPS FOR SSO * Discover apps by using Microsoft Defender for Cloud Apps and Active Directory Federation Services app report * Configure connectors to apps * Design and implement app management roles * Configure preintegrated gallery SaaS apps * Implement and manage policies for OAuth apps 12 - IMPLEMENT AND MONITOR THE INTEGRATION OF ENTERPRISE APPS FOR SSO * Implement token customizations * Implement and configure consent settings * Integrate on-premises apps with Microsoft Entra application proxy * Integrate custom SaaS apps for single sign-on * Implement application-based user provisioning * Monitor and audit access to Microsoft Entra integrated enterprise applications * Create and manage application collections 13 - IMPLEMENT APP REGISTRATION * Plan your line of business application registration strategy * Implement application registration * Register an application * Configure permission for an application * Grant tenant-wide admin consent to applications * Implement application authorization * Manage and monitor application by using app governance 14 - PLAN AND IMPLEMENT ENTITLEMENT MANAGEMENT * Define access packages * Configure entitlement management * Configure and manage connected organizations * Review per-user entitlements 15 - PLAN, IMPLEMENT, AND MANAGE ACCESS REVIEW * Plan for access reviews * Create access reviews for groups and apps * Create and configure access review programs * Monitor access review findings * Automate access review management tasks * Configure recurring access reviews 16 - PLAN AND IMPLEMENT PRIVILEGED ACCESS * Define a privileged access strategy for administrative users * Configure Privileged Identity Management for Azure resources * Plan and configure Privileged Access Groups * Analyze Privileged Identity Management audit history and reports * Create and manage emergency access accounts 17 - MONITOR AND MAINTAIN MICROSOFT ENTRA ID * Analyze and investigate sign-in logs to troubleshoot access issues * Review and monitor Microsoft Entra audit logs * Export logs to third-party security information and event management system * Analyze Microsoft Entra workbooks and reporting * Monitor security posture with Identity Secure Score

SC-300T00 Microsoft Identity and Access Administrator
Delivered Online5 days, Jun 18th, 13:00 + 3 more
£2380

Essential SDN for engineers

5.0(3)

By Systems & Network Training

ESSENTIAL SDN TRAINING COURSE DESCRIPTION Software Defined Networking (SDN) has become one of the industries most talked technologies. This training course cuts through the hype and looks at the technology, architecture and products available for SDN along with looking at the impact it may have on your network. WHAT WILL YOU LEARN * Explain how SDN works. * Describe the architecture of SDN. * Explain the relationship between SDN and OpenFlow. * Recognise the impact SDN will have on existing networks. ESSENTIAL SDN TRAINING COURSE DETAILS * Who will benefit: Anyone wishing to know more about SDN. * Prerequisites: None. * Duration 2 days ESSENTIAL SDN TRAINING COURSE CONTENTS * Introduction What is SDN? What is OpenFlow? SDN benefits. The SDN stack and architecture. * SDN architecture SDN applications, SDN switches, SDN controllers, Network Operating Systems. Control plane, data plane. Control to Data Plane Interface (CDPI), Northbound interfaces. SDN components, control and data plane abstractions. * Network Operating Systems Finding the topology, Global view, control program, configuration based on views, graph algorithm. * OpenFlow Just one part of SDN. Open Networking Foundation, OpenFlow ports, Flow tables, OpenFlow Channels. The OpenFlow protocol, OpenFlow header, OpenFlow operations. OpenFlow versus OpFlex. * SDN and open source OpenDaylight, OpenVSwitch, Open Networking Forum, Open Network Operating System. OpenStack Neutron. * SDN implications Separation of control and data plane, NOS running on servers, Emphasis on edge complexity, core simplicity, OpenvSwitch, Incremental migration, importance of software. SDN vs NVF.

Essential SDN for engineers
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1727

STP alternatives

5.0(3)

By Systems & Network Training

STP ALTERNATIVES TRAINING COURSE DESCRIPTION The Spanning Tree Protocol (STP) dates from 1985. This course explores the technologies that can be used as an alternative to STP, including FabricPath, SPB and TRILL. WHAT WILL YOU LEARN * Explain how STP and RSTP work. * Explain how TRILL works. * Explain how SPB works. * Explain how FabricPath works. STP ALTERNATIVES TRAINING COURSE DETAILS * Who will benefit: Technical network staff. * Prerequisites: Definitive Ethernet switching for engineers * Duration 1 day STP ALTERNATIVES TRAINING COURSE CONTENTS * Introduction Layer 2 versus Layer 3, STP problems: One path, convergence, MAC explosion, STP alternatives. * STP 802.1D, how STP works, root bridge, convergence times, single path. * RSTP 802.1w, Improvements, convergence times. * Link aggregation 802.3ad, Multi system Link aggregation. * IS-IS Concepts, Discovery, topology exchange, flooding. Changes for TRILL, FabricPath and SPB. * FabricPath Overview, architecture, control plane protocols, DRAP, STP interactions, packet forwarding, configuration. * TRILL Concepts, RBridge, TRILL frames, control plane, data plane, learning MAC addresses. * SPB 802.1aq, Node ID, Backbone Edge Bridges, Backbone MAC address, customer MACs, I-SID, forwarding database.

STP alternatives
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2477

CCNP core

5.0(3)

By Systems & Network Training

CCNP TRAINING COURSE DESCRIPTION The Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.2 course provides the knowledge and skills needed to configure, troubleshoot, and manage enterprise wired and wireless networks. You'll learn to implement security principles within an enterprise network and how to overlay network design using solutions such as SDAccess and SD-WAN. Course content includes 3 days of self-study material. This course helps you prepare for the 350-401 Implementing Cisco Enterprise Network Core Technologies (ENCOR) exam WHAT WILL YOU LEARN * Configure, troubleshoot, and manage enterprise wired and wireless networks * Implement security principles within an enterprise network * Prepare you prepare to take the 350-401 Implementing Cisco Enterprise Network Core Technologies (ENCOR) exam CCNP TRAINING COURSE DETAILS * Who will benefit: Mid-level network engineers, Network administrators, Network support technicians, Help desk technicians. * Prerequisites: Implementation of Enterprise LAN networks. Basic understanding of Enterprise routing and wireless connectivity, and Python scripting * Duration 5 days CCNP TRAINING COURSE CONTENT * Cisco Enterprise Network Architecture: Access, distribution, core in the hierarchical network. Cisco Switching Paths: Switching mechanisms, TCAM, CAM, process switching, fast switching, and CEF. * Implementing Campus LAN Connectivity: Troubleshoot L2 connectivity using VLANs and trunking Building Redundant Switched Topology: STP Implementing Layer 2 Port Aggregation Troubleshoot link aggregation using Etherchannel EIGRP Implement and optimize OSPFv2/v3, including adjacencies, packet types, and areas, summarization, and route filtering for IPv4/v6 Implement EBGP interdomain routing, path selection, and single and dual-homed networking Implementing Network Redundancy: HSRP and VRRP Implement static and dynamic NAT Virtualization Protocols and Techniques VPNs and Interfaces: Overlay technologies such as VRF, GRE, VPN, and LISP Wireless Principles: RF, antenna characteristics, and wireless standards. Wireless Deployment: Models available, autonomous AP deployments and cloud-based designs within the centralized Cisco WLC architecture Wireless Roaming and Location Services Wireless AP Operation: How APs communicate with WLCs to obtain software, configurations, and centralized management Wireless Client Authentication: EAP, WebAuth, and PSK wireless client authentication on a WLC. Troubleshoot wireless client connectivity issues using various available tools Troubleshoot networks using services such as NTP, SNMP, Cisco IP SLAs, NetFlow, and Cisco IOS EEM Explain network analysis and troubleshooting tools, which include show and debug commands, as well as best practices in troubleshooting Multicast Protocols: IGMP v2/v3, PIM DM/SM and RPs Introducing QoS: Concepts and features. Implementing Network Services: Secure administrative access for Cisco IOS devices using CLI access, RBAC, ACL, and SSH, and device hardening concepts to secure devices from less secure applications Using Network Analysis Tools Infrastructure Security: Scalable administration using AAA and the local database, features and benefits Enterprise Network Security Architecture: VPNs, content security, logging, endpoint security, personal firewalls, and other security features. Automation and Assurance with Cisco DNA Center: Purpose, function, features, and workflow. Intent-Based Networking, for network visibility, proactive monitoring, and application experience Cisco SD-Access Solution: Nodes, fabric control plane, and data plane, VXLAN gateways Cisco SD-WAN Solution: Components and features of Cisco SD-WAN solutions, including the orchestration, management, control, and data planes Basics of Python Programming: Python components and conditionals with script writing and analysis Network Programmability: NETCONF and RESTCONF APIs in Cisco DNA Center and vManage * Labs: Investigate the CAM. Analyze CEF. Troubleshoot VLAN and Trunk Issues. Tuning STP and Configuring RSTP. Configure MSTP. Troubleshoot EtherChannel. Implement Multi-area OSPF. Implement OSPF Tuning. Apply OSPF Optimization. Implement OSPFv3. Configure and Verify Single-Homed EBGP. Implementing HSRP. Configure VRRP. Implement NAT. Configure and Verify VRF. Configure and Verify a GRE Tunnel. Configure Static VTI Point-to-Point Tunnels. Configure Wireless Client Authentication in a Centralized Deployment. Troubleshoot Wireless Client Connectivity Issues. Configure Syslog. Configure and Verify Flexible NetFlow. Configuring Cisco IOS EEM. Troubleshoot Connectivity and Analyze Traffic with Ping, Traceroute, and Debug. Configure and Verify Cisco IP SLAs. Configure Standard and Extended ACLs. Configure Control Plane Policing. Implement Local and Server-Based AAA. Writing and Troubleshooting Python Scripts. Explore JSON Objects and Scripts in Python. Use NETCONF Via SSH. Use RESTCONF with Cisco IOS XE.

CCNP core
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£3697

4G demystified

5.0(3)

By Systems & Network Training

4G TRAINING COURSE DESCRIPTION This course is designed to give the delegate an understanding of the technologies used within a 3G UMTS mobile network. During the course we will investigate the UMTS air interface and the use of Wideband-Code Division Multiple Access (WCDMA) to facilitate high speed data access, together with HSPA to offer mobile broadband services. We will describe the use of soft handover rather than hard handover procedures and soft capacity sharing. The course includes a brief exploration of the UMTS protocol stack and the use of PDP Context and QoS support features. WHAT WILL YOU LEARN * Explain the 3G UMTS architecture. * Describe the role of a Drifting & Serving RNC. * Explain the use of ARQ & HARQ for mobile broadband. * Describe how IMS integrates into the architecture. * Describe the use of Media Gateway Controllers. * Identify the temporary identities used within 3G UMTS. 4G TRAINING COURSE DETAILS * Who will benefit: Anyone working within the telecommunications area, especially within the mobile environment. * Prerequisites: Mobile communications demystified Telecommunications Introduction * Duration 2 days 4G TRAINING COURSE CONTENTS * LTE Introduction The path to LTE, 3GPP. LTE to LTE advanced. * LTE Architecture The core, Access, roaming. Protocols: User plane, Control plane. Example information flows. Bearer management. Spectrum allocation. * LTE technologies Transmission, reception, OFDMA, multiple antenna, MIMO. * LTE Air interface Air interface protocol stack. Channels, Resource Grid, cell acquisition. Up and downlink controls. Layer 2 protocols. * Cell acquisition Power on, selecting networks and cells. RRC connection. Attach procedure. * Mobility management Roaming, RRC_IDLE, RRC_CONNECTED, cell reselection, handover, interoperation with UMTS and GSM networks. * Voice and text IMS, QoS, policy and charging.

4G demystified
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£2477

Essential LTE

5.0(3)

By Systems & Network Training

LTE TRAINING COURSE DESCRIPTION This course is designed to give the delegate an understanding of the technologies used within a 3G UMTS mobile network. During the course we will investigate the UMTS air interface and the use of Wideband-Code Division Multiple Access (WCDMA) to facilitate high speed data access, together with HSPA to offer mobile broadband services. We will describe the use of soft handover rather than hard handover procedures and soft capacity sharing. The course includes a brief exploration of the UMTS protocol stack and the use of PDP Context and QoS support features. WHAT WILL YOU LEARN * Explain the 3G UMTS architecture. * Describe the role of a Drifting & Serving RNC. * Explain the use of ARQ & HARQ for mobile broadband. * Describe how IMS integrates into the architecture. * Describe the use of Media Gateway Controllers. * Identify the temporary identities used within 3G UMTS. LTE TRAINING COURSE DETAILS * Who will benefit: Anyone working within the telecommunications area, especially within the mobile environment. * Prerequisites: Mobile communications demystified Telecommunications Introduction * Duration 2 days LTE TRAINING COURSE CONTENTS * LTE Introduction The path to LTE, 3GPP. LTE to LTE advanced. * LTE Architecture The core, Access, roaming. Protocols: User plane, Control plane. Example information flows. Bearer management. Spectrum allocation. * LTE technologies Transmission, reception, OFDMA, multiple antenna, MIMO. * LTE Air interface Air interface protocol stack. Channels, Resource Grid, cell acquisition. Up and downlink controls. Layer 2 protocols. * Cell acquisition Power on, selecting networks and cells. RRC connection. Attach procedure. * Mobility management Roaming, RRC_IDLE, RRC_CONNECTED, cell reselection, handover, interoperation with UMTS and GSM networks. * Voice and text IMS, QoS, policy and charging.

Essential LTE
Delivered in-person, on-request, onlineDelivered Online & In-Person in Internationally
£1727

Educators matching "Plane"

Show all 102
Higher Plane Health Coaching

higher plane health coaching

As a teenage gymnast, my weight was constantly being monitored by well-intentioned coaches and I started to develop a very unhealthy relationship with food; periods of eating very little, followed by uncontrolled binge eating. It took nearly a decade for me to completely heal my relationship with food. This long and arduous struggle is what inspired me to study clinical nutrition at Cornell University. As a dietician in a hospital setting 30+ years ago, I cared for many very sick patients who were often unwittingly sabotaging their health with their lifestyle choices. Now, thankfully, we know the monumental impact of nutrition on the prevention and reversal of chronic disease, but at the time, medical nutrition therapy was not considered an evidenced based science. lt was terribly frustrating to witness the patient disconnect with regard to their own lifestyle choices and their health. Consequently, I left the field and returned to school to study pharmacy. During my 20 years of hospital pharmacy practice, I have observed an incredible rise in the rates of obesity, diabetes, heart disease and cancer, and I was again feeling frustrated and dissatisfied. I really wanted and needed to put health into my practice as a healthcare professional! My final wake-up call came a couple of years ago, when two of my colleagues (very close to my age) tragically died of cancer. They were only 58 and 62. It really forced me to look at my life and ask the questions-- What really matters to me and what do I want my life to stand for? During this same period, I completed a pharmacy continuing education module in health coaching, and I knew I had found the path to fulfill my potential as a true health advocate. I then applied to one of the best programs in the country, and completed my certification in Integrative Health Coaching at Duke Integrative Medicine.