Recruiting Telecoms and IT Convergence Masterclass

The Recruiting IT-Telecoms Convergence Masterclass
Overview and Objectives:
Holistica brings you another world first! This is a course designed specifically for those recruiting in the rapidly evolving telecoms market. Are you finding that your Telecoms Recruiters are now having to speak more fluently in the areas of IT? Are you now discovering that the traditionally telco roles and job specs are starting to fade away and are becoming more and more IT oriented? Then this is the course for your telco teams. In terms of content, this course will give all telecoms recruiters a very clear and detailed understanding of the impact that IT and Digital is having on the telecoms architecture. We go on a journey from a high level overview of planet-changing concepts such as IoT and BYOD, through to the detailed explanation of the type of hardware and applications that might be found in the OSS and BSS. For the telco recruiter to become credible in this arena they need to feel totally comfortable with the IT concepts that come in to play around the architecture and this course will hand hold them through it.
Using clear plain language (as much as is possible), the training will demystify what may appear to be esoteric technology areas, and get you ready to understand the growing interface where IT meets telecoms. This training will teach you everything you need to know in order to confidently discuss converged technologies with candidates and clients alike.
There are no pre-requisites for attending this course, however we prefer that you have had some exposure to telecoms services or products at a recruiting level.
Course Overview:
Session 1: Convergence defined and Understood
- An overview of how and why we got here
The Changing landscape of Telecoms and how IT is involved
- The classic IT three layer model
- The beauty of simplicity
The classic IT three layer model imposed up on OSS, BSS and Networks
- Where IT hardware comes in
- From Mainframes to smartphones to Fridges
- Convergence of IT and Telco
- The beauty of Packet Switching
- The structure of ATM
- IP at the core
- Soft switches and an intro to SDN
- Which OS and why?
- The beauty of Open and Closed systems
- How Open Source is entering telco
Which Applications and where?
- The myriad of application software across the architecture
- The New World. The move towards digital
- The top CIO trends around the world and why Telecoms recruiters need to know
- BYOD
- IoT
- Big Data
- Cyber Security
- Cloud and Virtualisation
Session 2: IT hardware in the telco arena
- Mainframes and Client server architecture,
- Thin versus Fat architecture
- Citrix and Vmware
- Handhelds, tablets, IoT, and BYOD in detail
The routing hardware
- Routers and switches.
- Cisco, Juniper
- The Roles
- Network Administrator
- Network Architect
- Configuration, optimisation specialists
- Ethical Hacker and Cyber Security
- Cisco – CCNA CCNP CCIE
- Juniper – JNCIE JNCIP JNCIS JNCIA JNCES
- Checkpoint CCSE CCSA
Session 3: Software in the telco arena
- Operating Systems
- The strengths of Open versus Closed systems
- Unix versus Windows
- Applications in the BSS
- Billing
- CRM (Siebel)
- Databases
- Data Warehouses
- Big Data and BI
- SQL and the variants
- Application Roles in the BSS
- Business Analyst
- Billings Solutions architect
- Seibel engineer
- Data migration specialists
- Database developer
- Data Analytics
- Data Scientists
- Testers and developers
The companies from IT
- Including Oracle, IBM, Microsoft, Hadoop, Salesforce and Seibel.
- Where the sit and what they do.
Development in the device
- Development Primer
Front End US and UI
Business Logic design - Android, iOS and Windows development
Session 4: IT in the Transmission Medium
- Fibre versus Copper
- The strengths of Fibre versus Copper
- FTTH, FTTP, FTTC, FTTB, and FTTx
- Designing the Fibre architecture
- SONETS, SDH and PDH
- DWDM and the idea of multiplexing
Session 5: The growing need for Cyber Specialists
- Understanding basic Cyber terminology and concepts
- The risks rise with BYOD and IoT
- Attack Vectors
- Tunnelling
- IP Reputation
- Sandboxing
- CnC Designing
- Security Architect and Ethical Hacker
Session 6: Cloud and Virtualisation of the Infrastructure
- Virtualisation in all its forms
- NFV and The path to virtualisation
- SDN in more detail
- Pros and Cons of virtualization
- Datacentre versus Cloud
- Two definitions of virtualisation
- SaaS IaaS DaaS PaaS and TaaS
- VmWare, HyperV, Vsphere
- Why we needed IPv6
Session 7: Planning and Designing the Mobile Network
- Project Manager and Programme Manager
- Understanding the Link Budget
- Lifecycle from Project planning to Integrated systems testing
Workshops and discussion throughout the day.
Content and sequence may vary slightly at the trainer’s discretion.
Download the pdf version of this course outline.
Examples of slides using during this delivery:
Click on slide window to activate (they may take time to load).

Additional questions you may have.
Where is this training delivered?
Where in the world can this be delivered?
What are the timings of the course?
What is given out as course material?
What is the optimum size of the class?
Do the attendees need to prepare or research anything before the event?
Download the pdf version of this course outline.
Additional Info
Additional information
Field | |
---|---|
Format | |
Skill Level |
Reviews
There are no reviews yet.