About this Training Course This 5 full-day training course looks at the setup of economic analysis cases, including the estimation of recoverable reserves, production profiles, commodity prices, and project costs - CAPEX, OPEX, taxes, royalties, transportation, depreciation, before-tax (BTAX) cash-flow, after-tax (ATAX) cash-flow and international fiscal regimes (production sharing agreement and concessionary system). The course begins from the basic required parameters of inflation, interest and time value of money. These concepts are then transformed into profitability indicators. Last but not the least, the profitability indicators are then used to make investment decisions. The emphasis of this course is to bridge the gap between theoretical concepts and their practical limitations. The participants will be able to appreciate the amount of information that they never thought of. Another emphasis of this course is also on the use of Excel's financial functions. This understanding is very critical when it comes to building economic cash-flow models. Over the years, we have seen that participants really struggle with using the Excel functions correctly and this leads to mistakes that can be easily avoided. In each session, multiple choice problems are provided to participants to reinforce their understanding of the concepts covered in the course. Many quick or tips not widely known, are also shared with the participants. The concepts covered in this course are not restricted to downstream, upstream or petrochemical projects. These concepts can be used to evaluate any type of investment under consideration. Participants will require access to computers/laptops with Excel to solve problems during the course. Training Objectives Upon completion of this course, participants will be able to fully understand the gas market dynamics and Investment Evaluation. They will be able to: Learn how to reduce exposure and mitigate risks in projects by handling uncertainty Clarify concepts such as time value of money, cash-flow models, capital budgeting, IRR, NPV, income producing investments Maximise the return on investments through good decision-making processes based on the commercial viability of projects Improve their decision process, investment and opportunity analysis Acquire the hands-on experience in building their own economic evaluation models and solving case study-based examples Target Audience The following oil & gas company personnel will benefit from the knowledge shared in this course: Facilities and Planning engineers Project and procurement personnel Oil & gas engineers Geologists Financial Analysts Commercial managers Economists Government officials Business advisors Asset managers E&P managers Product and business development personnel Course Level Basic or Foundation Training Methods Organisational Impact Trainer Your expert course leader is a globally recognised subject matter expert in petroleum/project economics and international gas market analysis. He is a recipient of the 2021 Society of Petroleum Engineers (SPE) International Management Award, an award that recognises individuals who make significant technical and professional contributions to the petroleum engineering profession and to the worldwide oil and gas industry. He has 40 years of diversified experience in petroleum engineering, reservoir engineering, project economics and decision analysis. He had been involved in evaluating multi-billion-dollar oil and gas field development, NGL, LNG, GTL, Aluminum smelter, refinery, petrochemical, power and production sharing projects. He has worked with major oil companies such as Saudi Aramco, ZADCO, Qatar Petroleum and companies in USA. He is a registered professional Engineer in the state of Colorado, USA. He is the author of six books: Petroleum Engineering Handbook for the Practicing Engineer, Vol. I and Vol. II, published by PennWell Books, Tulsa, Oklahoma, USA. Project Economics and Decision Analysis, Vol. I and Vol. II, published by PennWell Books, Tulsa, Oklahoma, USA. These books are used as textbooks in universities worldwide to teach petroleum economics to undergraduates and graduate students. Tip & Tricks in Excel based Financial Modeling, Vol. 1 & 2, published by Business Expert Press, New York, USA. He has also authored several papers in the Oil & Gas Journal, The Log Analyst, World Oil, SPE Journals, and Oil & Gas Financial Journal. He has delivered lectures in more than 25 countries around the globe. He has always received excellent feedback, as an expert presenter, from the participants of his courses. Daily daily_agenda POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
Feather Stone is a beautiful practice rooted in the shamanic energy healing tradition. It combines the power of unconditional love with the healing energies of nature. The power of unconditional love is the force of the creator, the purest energy of all. When love and compassion flow through our hearts, we become a channel for healing. Within a space of love, we can transform, release and restore energy.
The Level 3 International Foundation Diploma for Higher Education Studies (L3IFDHES) is usually a one-year pre-university qualification that provides students with an entry route to an overseas university. The L3IFDHES prepares students with the essential English language skills, key transferable study skills, cultural knowledge, and chosen specialisms that universities feel bridges the gap between high school and undergraduate study. In January 2023 we offer pathways in business and higher finance. With agreements in place with over 70 universities across the globe, students’ can progress with confidence to a higher education course for further study. Entry Requirements For entry onto the NCC Education Level 3 International Foundation Diploma for Higher Education Studies (L3IFDHES) qualification students must have successfully completed secondary school education. Students must also meet the English language entry requirements of: • IELTS minimum score of 4.5 or above OR • GCE ‘O’ Level English D7 or above Alternatively, a student can take the free NCC Education Higher English Placement Test which is administered by our Accredited Partner Centre’s.
Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.
Ethernet LANS training course description This course has been replaced as part of our continuous curriculum development. Please see our Definitive Ethernet switching course What will you learn Describe what Ethernet is and how it works. Install Ethernet networks Troubleshoot Ethernet networks Analyse Ethernet packets Design Ethernet networks Recognise the uses of Hubs, Bridges, switches and routers. Ethernet LANS training course details Who will benefit: Those wishing to find out more about how their LAN works. Prerequisites: Intro to Data comms & networking. Duration 3 days Ethernet LANS training course contents What is Ethernet? LANS, What is Ethernet?, history, standards, the OSI reference model, how Ethernet works, CSMA/CD. Ethernet Cabling UTP, cat 3,4,5, Cat 5e, Cat 6, Cat 7, fibre optic cable, MMF, SMF. Hands on Making a cable. 802.3 physical specifications Distance limitations, hubs and repeaters, 5-4-3-2-1 rule, 10BaseT, 10BaseF, 100BaseTX, 100BaseFX, 1000BaseSX, 1000BaseT, 10gbe. Hands on Working with hubs. Ethernet layer 2 Overview, NICS, device drivers, MAC addresses, broadcasts, multicasts, frame formats, Ether II, 802.3, 802.2, SNAP, compatibility, Ethernet type numbers, Ethernet multicast addresses, Ethernet vendor codes. Hands on Installing Ethernet components, analysing MAC headers. IP and Ethernet ARP Hands on Analysing ARP packets. Ethernet extensions Full/half duplex, auto negotiation, flow control methods, 802.3ad, 802.3af, 802.3ah. Hands on Configuration of full/half duplex. Ethernet speed enhancements Encoding, Carrier extension, packet bursting, jumbo frames. Prioritisation 802.1P, 802.1Q, TOS, WRR, QOS, VLANs. Hands on 802.1p testing Interconnecting LANS Broadcast domains, Collision domains, What are bridges, transparent bridging, What are switches? STP, VLANS, What are routers? Layer 3 switches, Connecting Ethernet to the WAN. Hands on STP, Analysing Ethernet frames in a routed architecture. Troubleshooting and maintaining Ethernet Utilisation, performance, TDR and other testers, bottlenecks, statistics, RMON. Hands on Monitoring performance, troubleshooting tools.
Securing Linux systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure Linux accounts. Secure Linux file systems. Secure Linux access through the network. Securing Linux systems training course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing Linux systems training course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.
CWNA training course description A hands-on course focusing on the technical support of WiFi. Wireless LANs are often seen as simple communications that are simply installed and then left alone to work. This course ensures that delegates will be able to install WiFi networks which work but also enable the delegates to troubleshoot WiFi when it does go wrong. What will you learn Compare 802.11 standards. Configure WiFi networks. Troubleshoot WiFi networks using spectrum analysers, Wireshark and other tools. Implement 802.11 security. Perform RF surveys. CWNA training course details Who will benefit: Technical staff working with WiFi networks. Anyone wishing to pass the CWNA exam. Prerequisites: Intro to data communications & networking Duration 5 days CWNA training course contents Introduction History, standards. RF fundamentals What is RF? Wavelength, Frequency, Amplitude, Phase. Wave behaviour. RF components. Watts, mW, dB, SNR, Link budgets. Hands on Spectrum analysis. Listing WiFi networks. WiFi connection. inSSIDer. Antennas Radiation envelopes, polar charts, gain, Antenna types. Line of Sight, MIMO. Hands on Connecting, installing, changing antennae. RSSI values. 802.11 802.11-2007, 802.11 post 2007, 802.11 drafts. 802.11 b/g/n. Hands on WiFi performance measurement. Spread Spectrum RF frequency bands, FHSS, DSSS, OFDM. Channels. Hands on Configuring channels. Topologies Mesh, Access points, distribution systems, SSID. Hands on AP configuration. Client connection profiles. 802.11 MAC CSMA/CA, Management frames, control frames, data frames. Passive scanning, active scanning. Open system authentication. Shared Key authentication. Association. RTS/CTS. Power management. Hands on Capturing frames, analysing frames. WiFi architecture WiFi client, WLAN architecture: Autonomous, Centralised, distributed. WiFi bridges. WiFi routers. PoE. Hands on WLAN controllers. Troubleshooting RF interference, multipath, adjacent channels, low SNR, mismatched power. Coverage, capacity. 802.11 Security Basics, Legacy security: WEP, MAC filters, SSID cloaking. PSK, 8021.X/EAP, WPA/WPA2. TKIP/ CCMP encryption. Guest WLANs. Wireless attacks, intrusion monitoring. Hands on WEP cracking, WPA2 configuration. RADIUS. RF Site surveys Protocol and spectrum analysis, coverage analysis. Site survey tools. Hands on Performing a site survey.
Carrier Ethernet training course description Ethernet is now the interface of choice for nearly all networking. This comprehensive course looks at the ways carriers can provide this Ethernet interface for their WANs and MANs. The course assumes delegates already have a solid foundation in Ethernet switching and so concentrates on just the Ethernet technologies for Carrier Ethernet. What will you learn Describe the main Carrier Ethernet services. Evaluate transports for Carrier Ethernet. Explain how Ethernet can work over MPLS and SDH. Explain the Ethernet technologies used to enable Carrier Ethernet. Carrier Ethernet training course details Who will benefit: Network engineers. Staff working for carriers. Prerequisites: Definitive Ethernet switching for engineers. Duration 2 days Carrier Ethernet training course contents Introduction What is Ethernet? LANs, MANs, WANs, Ethernet and switches in the LAN. Traditional LAN/WAN integration, routers. The Ethernet interface for the WAN. Standards: IEEE, MEF, OIF, Ethernet Alliance. Carrier Ethernet Services E-line: EPL, EVPL. E-LAN: EP-LAN, EVP-LAN. E-Tree: EP-Tree, EVP-Tree. Ethernet Services attributes. Applications: Carrier Ethernet for businesses, Mobile backhaul. Multicasting. Service attributes Bandwidth profiles, bandwidth parameters, Class of Service, QoS, MTU, Protection mechanisms: STP, RSTP, MSTP, Link aggregation, G.8031, G.8032. Transporting Carrier Ethernet The main options. 'Pure' Ethernet, Ethernet over SDH, Ethernet over WDM, Ethernet over MPLS. Ethernet switching, addresses and MAC address tables. Carrier Ethernet access technologies. EFM. Ethernet over MPLS What is MPLS, MPLS-TE, MPLS-VPN, L2 VPNs, VPLS, VPWS. MPLS Fast Reroute. CET 'Pure' Ethernet, Provider bridging 802.1d, Provider Backbone Bridges 802.1ah. Traffic engineering 802.1Qay. Carrier Ethernet technologies 802.1ad VLAN stacking, 802.1AX Link aggregation. 802.1Q QoS. OAM Standards, layers, interworking
IP CCTV training course description This hands on course covers the technologies used in IP CCTV systems. The focus is not on operating or cabling but more advanced configuration and troubleshooting. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. What will you learn Install IP CCTV. Configure IP CCTV. Explain how IP CCTV protocols work. Troubleshoot IP CCTV. IP CCTV training course details Who will benefit: Technical staff working with IP CCTV. Prerequisites: None. Duration 2 days IP CCTV training course contents Introduction What is IP CCTV? Camera types, Video, Audio, two way audio, IP CCTV software. Hands on Installing IP CCTV. CCTV architecture Components, servers, storage, LANs, WANs. Centralised versus decentralised. Hands on Using IP CCTV. Ethernet What is Ethernet? Ethernet cabling, Inside versus outside, hubs, switches, PoE, VLANs. Hands on Ethernet connectivity. Wireless WiFi, other wireless solutions, 802.11, variations, frequencies, Access Points, bridges, repeaters. WEP, WPA, WPA2, Hands on WiFi Configuration Ways to configure, IP addresses, subnet mask, default gateway, DHCP, NAT, access from the Internet. Hands on CCTV configuration. How IP CCTV works TCP, UDP, IP, RTP, RTSP, SIP, PTZ, NTP, Wireshark. Port numbers. Hands on Using Wireshark to troubleshoot IP CCTV. Network issues with IP CCTV Bandwidth, video resolution, compressions, codecs, frame rates, audio. QoS. One way versus two way traffic. Hands on Analysing CCTV traffic. Security VPNs, Firewalls. Hands on CCTV through a firewall. Troubleshooting ping, tracert, arp, ipconfig, pathping, tracert. Cable issues, switch issues, WiFi issues.CCTV issues. Hands on CCTV troubleshooting. Miscellaneous Design issues, multicasting, gateways. DVR technology. Calculating storage requirements.