• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

46399 AR courses in Bristol delivered Online

SC-100T00 Microsoft Cybersecurity Architect

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). Prerequisites Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.) Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications. Experience with hybrid and cloud implementations. 1 - Introduction to Zero Trust and best practice frameworks Zero Trust initiatives Zero Trust technology pillars part 1 Zero Trust technology pillars part 2 2 - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) Define a security strategy Cloud Adoption Framework secure methodology Design security with Azure Landing Zones The Well-Architected Framework security pillar 3 - Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) Design solutions with best practices for capabilities and controls Design solutions with best practices for attack protection 4 - Design a resiliency strategy for common cyberthreats like ransomware Common cyberthreats and attack patterns Support business resiliency Ransomware protection Configurations for secure backup and restore Security updates 5 - Case study: Design solutions that align with security best practices and priorities Case study description Case study answers Conceptual walkthrough Technical walkthrough 6 - Design solutions for regulatory compliance Translate compliance requirements into a security solution Address compliance requirements with Microsoft Purview Address privacy requirements with Microsoft Priva Address security and compliance requirements with Azure policy Evaluate infrastructure compliance with Defender for Cloud 7 - Design solutions for identity and access management Design cloud, hybrid and multicloud access strategies (including Azure AD) Design a solution for external identities Design modern authentication and authorization strategies Align conditional access and Zero Trust Specify requirements to secure Active Directory Domain Services (AD DS) Design a solution to manage secrets, keys, and certificates 8 - Design solutions for securing privileged access The enterprise access model Design identity governance solutions Design a solution to secure tenant administration Design a solution for cloud infrastructure entitlement management (CIEM) Design a solution for privileged access workstations and bastion services 9 - Design solutions for security operations Design security operations capabilities in hybrid and multicloud environments Design centralized logging and auditing Design security information and event management (SIEM) solutions Design solutions for detection and response Design a solution for security orchestration, automation, and response (SOAR) Design security workflows Design threat detection coverage 10 - Case study: Design security operations, identity and compliance capabilities Case study description Case study answers Conceptual walkthrough Technical walkthrough 11 - Design solutions for securing Microsoft 365 Evaluate security posture for collaboration and productivity workloads Design a Microsoft 365 Defender solution Design configurations and operational practices for Microsoft 365 12 - Design solutions for securing applications Design and implement standards to secure application development Evaluate security posture of existing application portfolios Evaluate application threats with threat modeling Design security lifecycle strategy for applications Secure access for workload identities Design a solution for API management and security Design a solution for secure access to applications 13 - Design solutions for securing an organization's data Design a solution for data discovery and classification using Microsoft Purview Design a solution for data protection Design data security for Azure workloads Design security for Azure Storage Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - Case study: Design security solutions for applications and data Case study description Case study answers Conceptual walkthrough Technical walkthrough 15 - Specify requirements for securing SaaS, PaaS, and IaaS services Specify security baselines for SaaS, PaaS, and IaaS services Specify security requirements for web workloads Specify security requirements for containers and container orchestration 16 - Design solutions for security posture management in hybrid and multicloud environments Evaluate security posture by using Microsoft Cloud Security Benchmark Design integrated posture management and workload protection Evaluate security posture by using Microsoft Defender for Cloud Posture evaluation with Microsoft Defender for Cloud secure score Design cloud workload protection with Microsoft Defender for Cloud Integrate hybrid and multicloud environments with Azure Arc Design a solution for external attack surface management 17 - Design solutions for securing server and client endpoints Specify server security requirements Specify requirements for mobile devices and clients Specify internet of things (IoT) and embedded device security requirements Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT Specify security baselines for server and client endpoints Design a solution for secure remote access 18 - Design solutions for network security Design solutions for network segmentation Design solutions for traffic filtering with network security groups Design solutions for network posture management Design solutions for network monitoring 19 - Case study: Design security solutions for infrastructure Case study description Case study answers Conceptual walkthrough Technical walkthrough Additional course details: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SC-100T00 Microsoft Cybersecurity Architect
Delivered OnlineFlexible Dates
£2,380

PL-600T00 Power Platform Solution Architect

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for Senior Consultants (both functional and technical) that aspire to be Solution Architects, or current Solution Architects that are new to the role. The Solution Architect is responsible for the successful design, implementation, deployment and adoption of an overall solution. The Solution Architect ensures that the solution meets the customer?s needs now and in the future. In this course, students will learn about decisions a Solution Architect makes during an implementation, covering security, integrations, Power Apps architecture, Power Automate architecture, and more. This course is designed to give you an introduction to the Solution Architect role. Becoming a Solution Architect/Getting to know your customer Define a Solution Architect Role of a Solution Architect on projects Project Methodology Getting to know your customer Group exercise - Getting to know your customer Conceptualizing the design from requirements How to lead the requirement collection effort Using fit gap analysis Pillars of good architecture Blueprinting the solution architecture Group exercise - Design from requirements Project governance and working as a team Solution Architect's role in project governance Techniques for keeping a project on track Scenarios that could cause a project to fail Group exercise - Project governance and working as a team Power Platform Architecture Key Power Platform architecture components Understand how platform design and limits influence solution architectures Updates and feature releases Understand how to communicate how the platform meets customer needs Data Modeling Data model influences Data model strategy Data types Data relationships Group exercise - Data modeling Analytics and artificial intelligence Planning and evaluating requirements Operational reporting Power BI Enterprise BI Pre-built insights and custom AI Power Apps Architecture Discuss options for apps and how to choose where to start Discuss app composition options Using components as part of your app architecture Considerations for including Portals as an app in your architecture Group exercise - Power Apps Architecture topics Application Lifecycle Management (ALM) Microsoft vision and Solution Architect's role in ALM Environment strategies Defning a solution structure for your deliverable Power Automate Architecture Discuss options for automation and custom logic Review considerations for using triggers and common actions Explore using Business Process Flows (BPF) to guide users through business processes Group Exercise - Evaluate scenarios for Power Automate usage Security Modeling Solution Architect's role in security modeling Discovery and learning your client's environment Controlling access to environments and resources Controlling access to CDS Data Group Exercise - Security Modeling Integration Solution Architects role in Integrations What is an integration and why do we need it Platform features that enable integration CDS Event Publishing Scenarios for group discussion Dynamics 365 Applications Architecture Solution Architect's role when deploying Dynamics 365 apps Architecture Considerations for primary apps Group Exercise - App specific working groups evaluate requirements Power Virtual Agents architecture Introduction Chatbot options Chatbot concepts Best practices Integrate chatbots Power Virtual Agents in Microsoft Teams Robotic Process Automation Introduction Power Automate Desktop Recording and editing tasks Running desktop flows Process advisor Testing and Go Live Solution Architect's role with testing and go live Planning for testing Planning for go live

PL-600T00 Power Platform Solution Architect
Delivered OnlineFlexible Dates
£2,380

BA (Hons.) Business Management - 24 Months

4.0(2)

By London School Of Business And Research

Its no secret the world has been changing before our eyes ! In order to confront the rapidly-evolving world around us, businesses need highly trained, adaptable and creative individuals to keep pace and stay innovative. BA (Hons) Business Management course is designed to train you for the jobs of the future; you'll be taught the fundamentals of business management in the wider context of the contemporary business landscape, ensuring your skills will remain flexible and adaptable as the world changes. The programme aims to develop pro-active decision makers, managers and leaders for a variety of careers in business sectors in a global context. The course combines practical professional experience with creative approaches to enterprise and innovation that will develop your entrepreneurial spirit. Program OverviewKey Highlights Program Duration: 24 Months (18 Months Option also available) Program Credits: 120 Designed for working Professionals 100% Online Global programme: Study anywhere, anytime on your laptop, phone or tablet. Study material: Comprehensive study materials and e-library support. No Written Exam. The Assessment is done via Submission of Assignment Online Lectures Timely Doubt Resolution Dedicated Student Success Manager Regular Networking Events with Industry Professionals LSBR Alumni Status Payment Plan: No Cost EMI Option

BA (Hons.) Business Management - 24 Months
Delivered Online On Demand
£7,200

ICA Professional Postgraduate Diploma in Financial Crime Compliance (FCC)

By International Compliance Association

ICA Professional Postgraduate Diploma in Financial Crime Compliance (FCC) Course This leadership programme has been designed to sharpen the strategic skills of senior practitioners and those aspiring to hold the highest anti-money laundering/financial crime position within a firm. This expert qualification offers: Specialist knowledge - the highest level in the field Strategic thinking - helps your leadership ambitions Innovation - explores new ideas, best practice, and future developments from a global perspective Fellowship of ICA - become automatically eligible for the highest grade of membership Networking - grow with other like-minded, senior professionals. With a focus on anti-money laundering, managing fraud and anti-bribery, and corruption, this qualification has helped hundreds of senior financial crime compliance professionals from all over the world unlock career growth opportunities. This course is awarded in association with Alliance Manchester Business School, the University of Manchester. How will the course be delivered This course is delivered online with materials delivered for you to study in your own time and at your own pace. There will be eight 3-hour virtual masterclasses over four weekends and seven live virtual classrooms spread over the duration of the course. Upon successful completion of the course, course materials and assessment, you will be awarded the ICA Professional Postgraduate Diploma in Financial Crime Compliance (FCC). This qualification is awarded in association with Alliance Manchester Business School, the University of Manchester. Assessment This course will be assessed via: The production of 8 x 1000-1500 word masterclass commentaries: these are summaries of the key learning points outlined in the masterclasses and its impact on your own practice, which forms the reflective journal. A three hour competency-based interview, using information describing your career to date and other evidence you wish to submit to map your knowledge, skills and experience against the National Occupational Standards The syllabus covers a variety of key issues relevant at a senior level and is designed to provide an insight into risks and potential hurdles faced by your organisation. The syllabus is delivered by an exclusive series of high-profile masterclasses covering relevant topics. Standards, research and assessment Financial crime risks: science or art? Ethics, corporate governance & responsibility Managing the internal AML enemy Cyber security: threats to the organisation FinTech and financial crime compliance Fraud and internal threat Risk based approach: too busy or too afraid Sanctions: a changing landscape.

ICA Professional Postgraduate Diploma in Financial Crime Compliance (FCC)
Delivered Online On Demand12 months
£8,000

ICA Professional Postgraduate Diploma in Governance, Risk & Compliance

By International Compliance Association

ICA Professional Postgraduate Diploma in Governance, Risk & Compliance This leadership programme has been designed to sharpen the strategic skills of senior managers and those aspiring to hold the highest compliance positions within an organisation. This expert qualification offers: Specialist knowledge - the highest level in the field Strategic thinking - helps your leadership ambitions Innovation - explores new ideas, best practice, and future developments from a global perspective Fellowship of ICA - become automatically eligible for the highest grade of membership Networking - grow with other like-minded, senior professionals. Join hundreds of senior compliance professionals from over 50 countries who unlocked their leadership potential and improved their career growth opportunities with this qualification. This course is awarded in association with Alliance Manchester Business School, the University of Manchester. How and where can you study The course takes 9-12 months to complete. It is a blend of online self-study, research, attendance at masterclasses and interaction with other like-minded, senior practitioners. Attendance at eight virtual masterclasses Seven virtual classrooms Oral assessment. Delivered online This course is delivered online with materials delivered for you to study in your own time and at your own pace. There will be eight 3-hour virtual masterclasses over four weekends and seven live virtual classrooms spread over the duration of the course. Certification Practitioners who successfully complete the programme will be certificated as follows: ICA Certified Professional designation awarded by the ICA Professional Postgraduate Diploma in Governance, Risk and Compliance awarded by ICA in association with University of Manchester Business School Fellowship of the ICA (upon application) Designation, ICA Professional Postgraduate Diploma in Governance, Risk and Compliance: PG Dip (G.R.C.) Fellowship of ICA:FICA [E.g. Angela Watts PG Dip (G.R.C.), Certified Professional; FICA] National Occupational Standards of Competence Your performance on the programme will be measured, against the National Occupational Standards of Competence (2011 version) produced originally by the Financial Services Skills Council (FSSC) and the ICA and revised recently by the Financial Skills Partnership. The Standards are statements of competence which articulate the requirements for effective performance in the workplace. Competence is defined as a combination of skills as well as knowledge and understanding. The syllabus covers a variety of key issues relevant at a senior level and is designed to provide an insight into risks and potential hurdles faced by your organisation. The syllabus is delivered by an exclusive series of high profile masterclasses covering relevant topics. Building and leading a world class compliance team Strategic risk management for leaders Behavioural compliance: the role of psychology in culture and ethical behaviour Keeping up with emerging regulatory developments Governance, risk and compliance in the digital world Applying governance, conduct and outcomes for the benefit of the organisation Leading change in governance, risk and compliance Financial crime risk in the digital age.

ICA Professional Postgraduate Diploma in Governance, Risk & Compliance
Delivered Online On Demand12 months
£8,000

Introduction to Social Media Marketing

5.0(1)

By Let’s Do Business Group

Want learn how to use social media to market your business effectively? Join this short course from Let’s Do Marketing to learn how to create your social media strategy for success – and come away with the knowledge, skills and confidence to start connecting with your customers online!

Introduction to Social Media Marketing
Delivered Online
£35

23rd May Lucy Brownridge #Agent121. Looking for: PICTURE BOOKS

5.0(2)

By I Am In Print

LOOKING FOR: PICTURE BOOK TEXTS / ILLUSTRATIONS Lucy Brownridge is Editorial Director at Wide Eyed Editions and Frances Lincoln Children’s Books, and formerly Thames & Hudson where she helped to establish the Children’s list. She has developed and edited books for children with Alan Ahlberg, Quentin Blake, Mariajo Ilustrajo, Kristjana S Williams, Bob & Roberta Smith, Yuval Zommer and Joe Coelho among others. She is the author of The Cat Family series, and many non-fiction titles for children. She is interested in the history of picture books and is always looking for innovative ways to use the book format. Her favourite books are funny, deceptively simple, thoughtfully written, distinctively illustrated and encourage a love for reading both words and pictures. Lucy would like you to submit the following depending on whether you are a picture book writer / illustrator or both. ABOUT YOU Include a covering letter, in a word document, telling Lucy about yourself and your sources of inspiration. If you have one, include a link to your website. She is keen to read stories she hasn't seen before or see artwork with a distinctive style rather than something that fits with trends. She has particular experience with picture books and illustrated narrative non-fiction. AUTHORS Please send a full manuscript (or 3), in a word document, starting with a short summary/blurb. Make the summary punchy and engaging. Remember that the best picture book stories are simple and every word should count. Do you see this book as part of a series? ILLUSTRATORS If you have a picture book idea please send a story board and a summary of the story. Please send a diverse selection of artworks from your portfolio. It is useful to see examples of the following: people of different ages and ethnicities, character studies showing a range of clothes and expressions, animals, a selection of everyday objects, wide-angle vistas, an example of a book cover (i.e. a classic book reimagined). Please send these in PDF where possible. (In addition to the paid sessions, Lucy is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Thursday 15th May 2025

23rd May Lucy Brownridge #Agent121. Looking for: PICTURE BOOKS
Delivered Online + more
£72

Climate science workshop - Climate Fresk

By The C Collective

Join a Climate Fresk Climate science workshop to learn about the causes and effects of climate change through a fun and collaborative experience.

Climate science workshop - Climate Fresk
Delivered in London or UK Wide or OnlineFlexible Dates
£1,500 to £5,000

Architecting on AWS

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is intended for solutions architects, solution-design engineers, developers seeking an understanding of AWS architecting and individuals seeking the AWS Solutions Architect-Associate certification. Overview Identify AWS architecting basic practices. Explore using the AWS management tools: The AWS Console, Command Line Interface (CLI), and CloudFormation in a lab environment. Examine the enforcement of accounts security using policies. Identify the elements that build an elastic, secure, virtual network that includes private and public subnets. Practice building an AWS core networking infrastructure. Determine strategies for a layered security approach to Virtual Private Cloud (VPC) subnets. Identify strategies to select the appropriate compute resources based on business use-cases. Practice building a VPC and adding an Elastic Cloud Compute (EC2) instance in a lab environment. Practice installing an Amazon Relational Database Service (RDS) instance and an Application Load Balancer (ALB) in the VPC you created. Compare and contrast AWS storage products and services, based on business scenarios. Compare and contrast the different types of AWS database services based on business needs. Practice building a highly available, auto-scaling database layer in a lab. Explore the business value of AWS monitoring solutions. Identify the role of monitoring, event driven load balancing, and auto scaling responses, based on usage and needs. Identify and discuss AWS automation tools that will help you build, maintain and evolve your infrastructure. Discuss network peering, VPC endpoints, gateway and routing solutions based on use-cases. Discuss hybrid networking configurations to extend and secure your infrastructure. Discuss the benefits of microservices as an effective decoupling strategy to power highly available applications at scale. Explore AWS container services for the rapid implementation of an infrastructure-agnostic, portable application environment. Identify the business and security benefits of AWS serverless services based on business examples. Practice building a serverless infrastructure in a lab environment. Discuss the ways in which AWS edge services address latency and security. Practice building a CloudFront deployment with an S3 backend in a lab environment. Explore AWS backup, recovery solutions, and best practices to ensure resiliency and business continuity. Build a highly available and secure cloud architecture based on a business problem, in a project-based facilitator-guided lab. Architecting on AWS is for solutions architects, solution-design engineers, and developers seeking an understanding of AWS architecting. In this course, you will learn to identify services and features to build resilient, secure and highly available IT solutions on the AWS Cloud. Architectural solutions differ depending on industry, types of applications, and business size. AWS Authorized Instructors emphasize best practices using the AWS Well-Architected Framework, and guide you through the process of designing optimal IT solutions, based on real-life scenarios. The modules focus on account security, networking, compute, storage, databases, monitoring, automation, containers, serverless architecture, edge services, and backup and recovery. At the end of the course, you will practice building a solution and apply what you have learned with confidence. Prerequisites AWS Cloud Practitioner Essentials classroom or digital training, or Working knowledge of distributed systems Familiarity with general networking concepts Familiarity with IP addressing Working knowledge of multi-tier architectures Familiarity with cloud computing concepts 0 - Introductions & Course Map review Welcome and course outcomes 1 - Architecting Fundamentals Review AWS Services and Infrastructure Infrastructure Models AWS API Tools Securing your infrastructure The Well-Architected Framework Hands-on lab: Explore Using the AWS API Tools to Deploy an EC2 Instance 2 - Account Security Security Principals Identity and Resource-Based Policies Account Federation Introduction to Managing Multiple Accounts 3 - Networking, Part 1 IP Addressing Amazon Virtual Private Cloud (VPC), Patterns and Quotas Routing Internet Access Network Access Control Lists (NACLs) Security Groups 4 - Compute Amazon Elastic Cloud Compute (EC2) EC2 Instances and Instance Selection High Performance Computing on AWS Lambda and EC2, When to Use Which Hands-On Lab: Build Your Amazon VPC Infrastructure 5 - Storage Amazon S3, Security, Versioning and Storage Classes Shared File Systems Data Migration Tools 6 - Database Services AWS Database Solutions Amazon Relational Database Services (RDS) DynamoDB, Features and Use Cases Redshift, Features, Use Cases and Comparison with RDS Caching and Migrating Data Hands-on Lab: Create a Database Layer in Your Amazon VPC Infrastructure 7 - Monitoring and Scaling Monitoring: CloudWatch, CloudTrail, and VPC Flow Logs Invoking Events 8 - Automation CloudFormation AWS Systems Manager 9 - Containers Microservices Monitoring Microservices with X-Ray Containers 10 - Networking Part 2 VPC Peering & Endpoints Transit Gateway Hybrid Networking Route 53 11 - Serverless Architecture Amazon API Gateway Amazon SQS, Amazon SNS Amazon Kinesis Data Streams & Kinesis Firehose Step Functions Hands-on Lab: Build a Serverless Architecture 12 - Edge Services Edge Fundamentals Amazon CloudFront AWS Global Accelerator AWS Web Application Firewall (WAF), DDoS and Firewall Manager AWS Outposts Hands-On Lab: Configure an Amazon CloudFront Distribution with an Amazon S3 Origin 13 - Backup and Recovery Planning for Disaster Recovery AWS Backup Recovery Strategie Additional course details: Nexus Humans Architecting on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Architecting on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Architecting on AWS
Delivered OnlineFlexible Dates
£2,025

About this Training Course  The prospect maturation process, from a lead to a drillable prospect, is at the heart of the exploration business. This 5 full day course will cover all aspects of the prospect maturation process: play understanding in the context of regional geological understanding, detailed prospect evaluation; realistic risk & volume assessment consistent with the play understanding and prospect details, and an introduction to exploration economics. Throughout the course, there is a strong focus on pragmatic (geo)logical approach for assessing those aspects that are input parameters for a meaningful assessment of prospect risks and volumes, with emphasis on a balanced integration of contributions from different sub-surface disciplines. Many examples from basins from around the world are used to illustrate how traps, reservoirs, seals and charge occur in different basin settings. Specifics topics that will be discussed include the following: The statistical fundamentals for risk and volume assessment will be presented, with practical exercises for understanding the results of a risk & volume assessment as they are displayed in expectation curves. The difference between risk and uncertainty. A full discussion of the essential requirements for a working petroleum system: Trap, reservoir, seal and charge. Examples of how traps, reservoirs, seals and charge work in different basin types around the globe and in Australian basins. Exercises and guidelines for estimating uncertainties for prospect parameters, including advice for deciding which distribution type to use, and how to constrain those distributions for meaningful uncertainty ranges (setting minimum most likely and maximum values). Particular emphasis will be given to estimating hydrocarbon column lengths with their associated uncertainties in undrilled prospects. Prospects and plays: The value of play maps and how these should be used for assessment of prospect risks and for ranking of prospects within a play. Calculating volume ranges for prospects. Calculating volumes for groups of prospects; how to add risked prospect volumes for a statistically correct representation of the volume promise of a portfolio of prospects. Geophysical evidence: Incorporating geophysical evidence (DHIs) consistently and realistically in a risk assessment. An understandable and geology-based workflow, consistent with Bayes theorem, will be presented. Exploration economics. Training Objectives What this course will cover in 5 days: This course describes the various aspects that need to be considered in the prospect maturation process, including: Play development in the context of a sound understanding of the regional geology Detailed prospect evaluation and understanding of the critical aspects of traps, reservoirs, seals and charge Examples from plays and prospects in different basin settings from around the globe Realistic and pragmatic risk and volume assessment, based on the geological understanding of plays and prospects An introduction to exploration economics Examples of plays, oil and gas fields and prospects from basins from around the world, including the Far East, will be given. Target Audience This course is designed primarily for Geoscientists in exploration who would like to improve their expertise of the prospect maturation process and risk and volume assessment. The course has proven to be of value for explorers in the early phase of their career, seasoned explorers and team leaders. It will also benefit staff from disciplines working closely with exploration staff including Prospect Portfolio Analysts, Petrophysicists, Geophysicists and Reservoir Engineers. Course Level Intermediate Training Methods At the end of the course, the participants will have a good understanding of the essentials for realistic risk and volume assessments of exploration prospects. The course should allow participants to produce well-considered and realistic assessments for prospects they may be working on, and to understand and constructively challenge risk and volume assessments of colleagues and/ or partners/ competitors. Each topic is introduced by a lecture, and learning is re-inforced by practical exercises and discussions. Hand-out materials in paper and/or electronic format will be provided. Time will be made available to discuss aspects of prospects that may be brought in by course participants. Trainer Your expert course leader has a PhD in Geology from the University of Utrecht. He worked for 31 years (1979 -2010) with Shell as an exploration geologist in a variety of functions across the globe. As Principle Technical Expert, he was responsible for ensuring that Risk & Volume assessments were carried out consistently and correctly in all of Shell's exploration units. In this capacity, he led and participated in countless prospect review sessions and developed and conducted a successful in-house course on Risks & Volume assessment. As manager of the Exploration Excellence Team, he performed in depth analysis of basins and plays and provided advice on exploration opportunities to senior management. Together with his team, he visited most of Shell's exploration offices, working hands-on with Shell's local exploration teams to generate new play and prospect ideas and to suggest evaluation techniques and technologies to apply. In 2010, he was appointed as extraordinary professor Regional and Petroleum Geology at the VU university of Amsterdam and in 2012 also at the University of Utrecht. He was visiting professor at the University of Malaya (Malaysia). Through his own consultancy, as of 2010, he provides advice on exploration activities to several companies and is regularly invited to carry out technical reviews. Activities cover all continents and include Portfolio Reviews, Prospect assessment, Play-based Exploration, and Geothermal activities. He conducts courses on several topics including Risk & Volume Assessment, Prospect Maturation, Basin Analysis, Play-based Exploration, Trap & Seal Analysis, Petroleum Geology for Non-geologists. Some of his recent publications include: De Jager, J. & van Winden, M. (2020): Play-Based Exploration of the petroleum potential of the Tremp-Graus, Aínsa and eastern Jaca Sub-basins in the southern Pyrenees. Invited contribution for Digital Geology, EAGE special publication (eds: Grötsch, J. & Pöppelreiter, M.) De Jager, J. (2020). Concepts of Conventional Petroleum Systems. Invited contribution for Regional Geology and Tectonics Volume 1: Global Concepts, Techniques and Methodology (eds: Adam, J., Chiarelly, D. & Scarselli, N.) De Jager, J. (2021): Handbook Risk & Volume Assessment. Self-published De Jager, J., Van Ojik, K & Smit, R. (2023 - in preparation): Geological Development of The Netherlands. In: Geology of The Netherlands (eds: Ten Veen, J., Vis, G-J., De Jager, J. @ Wong, T.) POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Prospect Maturation
Delivered in Internationally or OnlineFlexible Dates
£4,385 to £5,099