Mobile technology training special offer
March 30th, 2017
We all take for granted our ability to make a call and access the Internet from most places on our travels. But sophisticated technologies are employed to make high speed data communications and voice calls on the move possible.
PTT offers two online courses that together introduce mobile communications technologies for those who are, or will be, responsible for the installation and maintenance of mobile systems.
These courses can be studied individually as preparation for PTT’s more advanced courses covering mobile technology. Alternatively, they can be studied as part of PTT’s Level 3 Award in principles of telecommunications.
Special offer
Study MBA: “Introduction to mobile systems” and MIB: “Mobile radio communications” together and benefit from a 30% discount.
Comments Off on Mobile technology training special offer
Protecting IP route discovery
February 23rd, 2017
One of the key features of the Internet is its ability to dynamically adjust to network changes, ensuring messages reach their destination even when link failures occur.
Even though route discovery is a critical facility of IP networks, the subject is often regarded as wizardry with its secrets closely guarded by a select few.
Yet understanding the role and operation of route discovery protocols is necessary for all those who are responsible for ensuring the reliability and security of IP networks.
One often neglected aspect of the route discovery process is its vulnerability to misuse by those with malicious or fraudulent intent.
PTT’s online course covering “IP routing” provides a clear yet detailed guide to the operation and facilities of route discovery protocols. This interactive course has recently been updated and expanded to explain how the security of the routing process can be improved.
Comments Off on Protecting IP route discovery
Considering security
October 19th, 2016
The cost of cyber-crime to individuals and businesses is increasing year on year. The UK insurance company Lloyds has estimated the costs of cyber-attacks to businesses worldwide at $400 billion a year.
Telecoms companies are not immune to online theft of customers’ personal information and the risk of disabling attacks on their infrastructure.
The provision of cloud services that store customers’ data has amplified the risks as have the inclusion of software driven elements in telecoms networks. The use of nomadic telecoms services further increases the potential for malicious activity.
Protecting the integrity of data and the infrastructure has many strands, beginning with increasing staff awareness to best practice regarding protecting data.
There are also, of course, technological measures that can impede hacking attempts. The consideration of the potential vulnerabilities of any particular technology to attack should be integral to its implementation.
With this in mind, PTT’s online course covering “IP networks” has been revised to include reference to the security aspects of the various protocols and systems that transport data over the Internet, local area networks and telecoms networks.
And the recently released PTT courses covering “Ethernet networks” and “Advanced Ethernet networks” include explanations of security measures in both wired and wireless local area networks.
Comments Off on Considering security