About this Training Course Gas wells are the most uncertain hence critical component of any gas production system. A successful gas project relies on a reliable forecast of gas well production and on timely implementation of measures that restore, sustain and improve gas well capacity, and maximize reserves. This 5-day course provides the skills to understand and analyze (changes in) gas well performance, and to select and design those remedial measures. It addresses all four gas well components i.e. reservoir performance, inflow performance, outflow performance and surface performance, individually and combined. In depletion-drive reservoirs, the gas well outflow performance becomes inevitably compromised as the reservoir pressure depletes and the gas rate becomes insufficient to lift liquid water and condensate to surface. This condition is referred to as liquid loading and causes significant loss of well capacity and reserves. This 5-day course provides the means to recognize and predict liquid loading, introduces the deliquification techniques that mitigate liquid loading, and then teaches how to select, design, install and operate the optimum suite of deliquification measures. Training Objectives On completion of this course, participants will be able to: Recognize and model gas well reservoir, inflow, outflow and surface performance Understand and model gas well production forecast and reserves Identify and model gas well performance threats and opportunities, specifically liquid loading and deliquification Select and justify remedial measures that mitigate those threats or realize those opportunities, specifically deliquification measures Understand design, installation and operation of those deliquification measures Target Audience This course is intended for production engineer, surveillance engineer, completion engineer, production/process chemist, reservoir engineer, production programmer, production operator, as well as other professionals responsible for selecting, installing, operating, monitoring and optimizing deliquification. Course Level Basic or Foundation Training Methods This course consists of a series of lectures and exercises. The lectures are interactive with field examples to illustrate models and concepts, where participants are encouraged to contribute their own relevant field examples. The exercises make use of a series of Excel worksheets for model calculations. Participants are invited to implement their own field specific well data. When arranged beforehand, PROSPER gas well performance software can be used as well. This course addresses ways and means to monitor and manage gas well performance and deliquification. It covers the purpose, outcome and benefit of gas well surveillance and capacity measures to assist future surveillance and capacity planning. Specifically, it addresses the selection and implementation of deliquification measures. This course introduces the skills and tools required for periodic review of gas well performance in support of critical business processes Trainer Your expert course leader brings with him 38 years of oil and gas field experience largely within Shell of which 25 years as gas well production engineer. He has covered the full spectrum of activities moving from R&D to green field development to brown field surveillance and optimisation, to become a leading gas well performance and deliquification specialist. He likes to capture the complex reality of gas well inflow, outflow and reservoir performance by means of practical data-driven rules and tools that cover a wide range of conditions i.e. shallow-to-deep, prolific-to-tight, dry-to-wet, green-to-brown, 1-1/2'-to-9-5/8' tubing, and depletion-to-aquifer drive. Before his retirement end 2020, He worked for Shell affiliated oil and gas companies including Shell Malaysia, Petroleum Development Oman, NAM Netherlands and Shell R&D in Netherlands and USA. Since then, he has been active as an independent trainer and consultant, amongst others for Cairn India. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices
Beauty Therapy: Beauty Therapy Do you wish to enhance your sense of beauty appreciation? There's no need to search any further—our Level 4 Beauty Therapy and Makeup course is waiting for you. This Beauty Therapy: Level 4 Beauty Therapy and Makeup course covers the most recent cosmetic trends, products, and procedures. The Beauty Therapy: Level 4 Beauty Therapy and Makeup course also covers the physiology, diseases, and types of skin. Furthermore, Beauty Therapy: Level 4 Beauty Therapy and Makeup course explains, sophisticated cosmetic methods like contouring, highlighting, and colour theory are utilised for applying eyelash extensions and sculpting brows. This Beauty Therapy: Level 4 Beauty Therapy and Makeup course also covers body massage, cosmetic skills, hair styling, manicures, and skin care. This Beauty Therapy: Level 4 Beauty Therapy and Makeup course will teach you how to deal with obstacles and enhance your client interactions. Participate in this Beauty Therapy: Level 4 Beauty Therapy and Makeup course on beauty treatment to gain the understanding and expertise needed to create, acquire, and run a business successfully. Learning Outcomes of Level 4 Beauty Therapy and Makeup course After completing this Beauty Therapy: Level 4 Beauty Therapy and Makeup course, the learner will be able to: Understand how to create a healthy workplace environment. The Beauty Therapy: Level 4 Beauty Therapy and Makeup course provides an overview of anatomy and physiology. You will get understanding of the analysis of skin and facial skin conditions treatment from this Beauty Therapy: Level 4 Beauty Therapy and Makeup course. From this Beauty Therapy: Level 4 Beauty Therapy and Makeup course, you will learn the process of preparing a work area and the client for the application of makeup. Understand the professional make-up procedures, manicure & pedicure procedures from this Beauty Therapy: Level 4 Beauty Therapy and Makeup course. This Beauty Therapy: Level 4 Beauty Therapy and Makeup course teaches hair care treatment Special Offers of this Beauty Therapy: Beauty Therapy Course This Beauty Therapy: Beauty Therapy Course includes a FREE PDF Certificate Lifetime access to this Beauty Therapy: Beauty Therapy Course Instant access to this Beauty Therapy: Beauty Therapy Course Get FREE Tutor Support to this Beauty Therapy: Beauty Therapy Course Beauty Therapy: Beauty Therapy Elevate your expertise with our Beauty Therapy: Beauty Therapy course, designed to bring you the latest cosmetic trends, products, and procedures. This Beauty Therapy: Beauty Therapy course dives deep into skin physiology, diseases, and skin types to enhance your understanding. Master advanced Beauty Therapy: Beauty Therapy techniques such as contouring, highlighting, and color theory for eyelash extensions and brow sculpting. Our Beauty Therapy: Beauty Therapy course also offers training in body massage, hair styling, manicures, and skin care. Additionally, you’ll learn how to overcome challenges and strengthen client relationships through this comprehensive Beauty Therapy: Beauty Therapy course. Unlock your potential in the world of Beauty Therapy: Beauty Therapy today! Who is this course for? Beauty Therapy: Beauty Therapy Anyone who wants to improve their skills and has an interest in the beauty industry can take our Beauty Therapy: Level 4 Beauty Therapy and Makeup course. Requirements Beauty Therapy: Beauty Therapy To enrol in this Beauty Therapy: Beauty Therapy Course, students must fulfil the following requirements. To join in our Beauty Therapy: Beauty Therapy Course, you must have a strong command of the English language. To successfully complete our Beauty Therapy: Beauty Therapy Course, you must be vivacious and self driven. To complete our Beauty Therapy: Beauty Therapy Course, you must have a basic understanding of computers. A minimum age limit of 15 is required to enrol in this Beauty Therapy: Beauty Therapy Course. Career path Beauty Therapy: Beauty Therapy Candidates may decide to launch their own beauty therapy: beauty therapy companies, work as independent contractors in salons, or work from home as a freelance beauty therapist after completing this Beauty Therapy: Level 4 Beauty Therapy and Makeup course.
Beauty Therapy: Beauty Therapy Do you wish to enhance your sense of beauty appreciation? There's no need to search any further—our Level 4 Beauty Therapy and Makeup course is waiting for you. This Beauty Therapy: Level 4 Beauty Therapy and Makeup course covers the most recent cosmetic trends, products, and procedures. The Beauty Therapy: Level 4 Beauty Therapy and Makeup course also covers the physiology, diseases, and types of skin. Furthermore, Beauty Therapy: Level 4 Beauty Therapy and Makeup course explains, sophisticated cosmetic methods like contouring, highlighting, and colour theory are utilised for applying eyelash extensions and sculpting brows. This Beauty Therapy: Level 4 Beauty Therapy and Makeup course also covers body massage, cosmetic skills, hair styling, manicures, and skin care. This Beauty Therapy: Level 4 Beauty Therapy and Makeup course will teach you how to deal with obstacles and enhance your client interactions. Participate in this Beauty Therapy: Level 4 Beauty Therapy and Makeup course on beauty treatment to gain the understanding and expertise needed to create, acquire, and run a business successfully. Learning Outcomes of Level 4 Beauty Therapy and Makeup course After completing this Beauty Therapy: Level 4 Beauty Therapy and Makeup course, the learner will be able to: Understand how to create a healthy workplace environment. The Beauty Therapy: Level 4 Beauty Therapy and Makeup course provides an overview of anatomy and physiology. You will get understanding of the analysis of skin and facial skin conditions treatment from this Beauty Therapy: Level 4 Beauty Therapy and Makeup course. From this Beauty Therapy: Level 4 Beauty Therapy and Makeup course, you will learn the process of preparing a work area and the client for the application of makeup. Understand the professional make-up procedures, manicure & pedicure procedures from this Beauty Therapy: Level 4 Beauty Therapy and Makeup course. This Beauty Therapy: Level 4 Beauty Therapy and Makeup course teaches hair care treatment Special Offers of this Beauty Therapy: Beauty Therapy Course This Beauty Therapy: Beauty Therapy Course includes a FREE PDF Certificate Lifetime access to this Beauty Therapy: Beauty Therapy Course Instant access to this Beauty Therapy: Beauty Therapy Course Get FREE Tutor Support to this Beauty Therapy: Beauty Therapy Course Beauty Therapy: Beauty Therapy Elevate your expertise with our Beauty Therapy: Beauty Therapy course, designed to bring you the latest cosmetic trends, products, and procedures. This Beauty Therapy: Beauty Therapy course dives deep into skin physiology, diseases, and skin types to enhance your understanding. Master advanced Beauty Therapy: Beauty Therapy techniques such as contouring, highlighting, and color theory for eyelash extensions and brow sculpting. Our Beauty Therapy: Beauty Therapy course also offers training in body massage, hair styling, manicures, and skin care. Additionally, you’ll learn how to overcome challenges and strengthen client relationships through this comprehensive Beauty Therapy: Beauty Therapy course. Unlock your potential in the world of Beauty Therapy: Beauty Therapy today! Who is this course for? Beauty Therapy: Beauty Therapy Anyone who wants to improve their skills and has an interest in the beauty industry can take our Beauty Therapy: Level 4 Beauty Therapy and Makeup course. Requirements Beauty Therapy: Beauty Therapy To enrol in this Beauty Therapy: Beauty Therapy Course, students must fulfil the following requirements. To join in our Beauty Therapy: Beauty Therapy Course, you must have a strong command of the English language. To successfully complete our Beauty Therapy: Beauty Therapy Course, you must be vivacious and self driven. To complete our Beauty Therapy: Beauty Therapy Course, you must have a basic understanding of computers. A minimum age limit of 15 is required to enrol in this Beauty Therapy: Beauty Therapy Course. Career path Beauty Therapy: Beauty Therapy Candidates may decide to launch their own beauty therapy: beauty therapy companies, work as independent contractors in salons, or work from home as a freelance beauty therapist after completing this Beauty Therapy: Level 4 Beauty Therapy and Makeup course.
About this Virtual Instructor Led Training (VILT) This 5 half-day Virtual Instructor Led Training (VILT) course covers carbon capture and geological storage of carbon dioxide. Burning fossil fuels for energy is a major source of carbon dioxide emissions to the atmosphere. Most anthropogenic (man-made) carbon dioxide is emitted by coal-fired or gas-fired power plants, and significant quantities of carbon dioxide are emitted through the production and separation of carbon dioxide-rich natural gas and industries such as cement, iron and steel. Carbon Capture Utilization and Storage, or CCUS, involves the long-term storage of captured carbon dioxide emissions in subsurface geologic formations. This VILT course covers all aspects of CCUS including transport, storage and monitoring, economics and community engagement. It explores in detail the challenges of the current technology of geological storage, monitoring and verification including examples from working projects around the world. Many of these technologies are commonly employed by the petroleum industry. Successful deployment of CCUS will also require economic incentives, appropriate regulation, clarity on liability issues and acceptance by the community. These aspects of CCUS, and the corresponding opportunities for appropriately skilled organisations and individuals also will be discussed. Course Content at a Glance Context for CCS/CCUS as An Emissions-reduction Measure Principles of Geological Storage Finding Geological Storage Sites Stationary Sources of Carbon Dioxide for Capture Carbon Dioxide Capture Technologies Compression and Transport of Carbon Dioxide Economics of CCS/CCUS Community, Safety, Legal & Regulatory Issues Risk Assessment Training Objectives Upon completion of this VILT course, participants will be able to: Identify the need for Carbon Capture and Storage (CCS) Outline the key steps in the Carbon Capture and Storage process Distinguish between reservoir rocks and sealing rocks Describe the importance of permeability and porosity to storing carbon dioxide Contrast the geological structures and trapping mechanisms for storing carbon dioxide Describe the changes in geologically stored carbon dioxide over time Outline the monitoring techniques employed to ensure the carbon dioxide is safely stored Appreciate the industrial applications of carbon dioxide capture Recognize the scale of industry required for transporting and storing carbon dioxide Describe economic considerations for CCS/CCUS Outline the economic and environmental opportunities and challenges with using carbon dioxide injection in a range of applications Explain the challenges of regulatory frameworks and public acceptance in a CCS/CCUS project Identify potential risks of a CCS/CCUS project Outline the risk assessment and management process Target Audience This VILT course is ideally suited for a technical audience - geoscientists, petroleum and chemical engineers - as well as for economists, regulators, legal staff and managers wishing to learn more about the details of both the technical, regulatory and socio-economic aspects of carbon capture and storage. Participants should have: Experience with oil and gas, coal or other energy projects Basic understanding of the energy industry Course Level Intermediate Trainer Your first expert course leader spent 18 years in the Petroleum Industry before joining academia, in both technical and managerial roles with Shell, Arco and Vico. He has received numerous awards, including Distinguished Service, Honorary member and Special Commendation awards from the American Association of Petroleum Geologist (AAPG) and was AAPG's International Vice-President and recently chairman of AAPG's House of Delegates (the Associations Parliamentary body). He is an SPE Distinguished Lecturer (DL) and has served as DL for several other professional organisations, including, AAPG, IPA and PESA. He is currently a Professor of Petroleum Geology and Engineering at the Australian School of Petroleum, University of Adelaide. He holds the South Australia State Chair in Carbon Capture & Storage (CCS) and is also presently Distinguished Scientist of the Cooperative Research Centre for Greenhouse Gas Technologies (CO2CRC), having served earlier as the Storage Program Manager and Chief Scientist. Your second expert course leader has a wide and deep knowledge of major capture technologies: solvent, membrane and adsorption based technologies and has developed pathways for retrofitting CO2 capture and storage (CCS) to fossil fuel-based power plants. He has been actively engaged in Post-combustion capture project management and demonstration projects in Victoria's Latrobe Valley on CO2 capture and hydrogen production, and on CO2 capture using membrane contactor technology. He has led various feasibility studies for the Asian Development Bank on CO2 Capture at Indian Oil Corporation's refineries, for JPOWER on hydrogen production from Victorian brown coal and for Kawasaki on incorporation of CCS in hydrogen production from fossil fuel. He has authored multiple peer reviewed journal articles, co-authored various confidential reports on CO2 capture, utilization and hydrogen production and utility, and has presented his work at various conferences, symposiums and seminars. He has a PhD in Chemical Engineering from Monash University Australia and a Master of Technology in Process Engineering from Indian Institute of Technology Delhi India. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations
CPD Accredited, Interactive Short Course 1½ hr session Would you know how to save someone's life if they were to go into anaphylactic shock? Learn how to do so from the comfort of your own home or workplace Course Contents: What is anaphylaxis The causes of anaphylaxis The immune system How to recognise someone in anaphylactic shock How to treat someone in anaphylactic shock Benefits of this Short Course: Allergy is the most common chronic disease in Europe The UK has some of the highest prevalence rates of allergic conditions in the world, with over 20% of the population affected by one or more allergic disorder A staggering 44% of British adults now suffer from at least one allergy and the number of sufferers is on the rise Up to 20% of patients with allergies struggle daily with the fear of a possible asthma attack, anaphylactic shock, or even death from an allergic reaction Almost a third of allergy sufferers have had to chance their lifestyles to reduce their allergic reactions In 2014, 19.2% of emergency admissions were for anaphylactic reactions and 19.2% were for ‘Other’ allergic reactions With the knowledge you'll pick up from this course, you could potentially save someone's life! Your browser does not support HTML5 video.
Duration 4 Days 24 CPD hours This course is intended for Students in this course are interested in designing and implementing DevOps processes or in passing the Microsoft Azure DevOps Solutions certification exam. This course provides the knowledge and skills to design and implement DevOps processes and practices. Students will learn how to plan for DevOps, use source control, scale Git for an enterprise, consolidate artifacts, design a dependency management strategy, manage secrets, implement continuous integration, implement a container build strategy, design a release strategy, set up a release management workflow, implement a deployment pattern, and optimize feedback mechanisms Prerequisites Successful learners will have prior knowledge and understanding of: Cloud computing concepts, including an understanding of PaaS, SaaS, and IaaS implementations. Both Azure administration and Azure development with proven expertise in at least one of these areas. Version control, Agile software development, and core software development principles. It would be helpful to have experience in an organization that delivers software. AZ-104T00 - Microsoft Azure Administrator AZ-204T00: Developing Solutions for Microsoft Azure 1 - Introduction to DevOps What is DevOps? Explore the DevOps journey Identify transformation teams Explore shared goals and define timelines 2 - Choose the right project Explore greenfield and brownfield projects Decide when to use greenfield and brownfield projects Decide when to use systems of record versus systems of engagement Identify groups to minimize initial resistance Identify project metrics and key performance indicators (KPIs) 3 - Describe team structures Explore agile development practices Explore principles of agile development Define organization structure for agile practices Explore ideal DevOps team members Enable in-team and cross-team collaboration Select tools and processes for agile practices 4 - Choose the DevOps tools What is Azure DevOps? What is GitHub? Explore an authorization and access strategy Migrate or integrate existing work management tools Migrate or integrate existing test management tools Design a license management strategy 5 - Plan Agile with GitHub Projects and Azure Boards Link GitHub to Azure Boards Configure GitHub Projects Manage work with GitHub Project boards Customize Project views Collaborate using team discussions Agile Plan and Portfolio Management with Azure Boards 6 - Introduction to source control Explore DevOps foundational practices What is source control? Explore benefits of source control Explore best practices for source control 7 - Describe types of source control systems Understand centralized source control Understand distributed source control Explore Git and Team Foundation Version Control Examine and choose Git Understand objections to using Git Describe working with Git locally 8 - Work with Azure Repos and GitHub Migrate from TFVC to Git Use GIT-TFS Develop online with GitHub Codespaces 9 - Structure your Git Repo Explore monorepo versus multiple repos Implement a change log 10 - Manage Git branches and workflows Explore branch workflow types Explore feature branch workflow Explore Git branch model for continuous delivery Explore GitHub flow Explore fork workflow Version Control with Git in Azure Repos 11 - Collaborate with pull requests in Azure Repos Collaborate with pull requests Examine GitHub mobile for pull request approvals 12 - Identify technical debt Examine code quality Examine complexity and quality metrics Measure and manage technical debt Integrate other code quality tools Plan effective code reviews 13 - Explore Git hooks Implement Git hooks 14 - Plan foster inner source Explore foster inner source Implement the fork workflow Describe inner source with forks 15 - Manage Git repositories Work with large repositories Purge repository data Manage releases with GitHub Repos Automate release notes with GitHub 16 - Explore Azure Pipelines Explore the concept of pipelines in DevOps Describe Azure Pipelines Understand Azure Pipelines key terms 17 - Manage Azure Pipeline agents and pools Choose between Microsoft-hosted versus self-hosted agents Explore job types Explore predefined agent pool Understand typical situations for agent pools Communicate with Azure Pipelines Communicate to deploy to target servers Examine other considerations Describe security of agent pools Configure agent pools and understanding pipeline styles 18 - Describe pipelines and concurrency Understand parallel jobs Estimate parallel jobs Describe Azure Pipelines and open-source projects Explore Azure Pipelines and Visual Designer Describe Azure Pipelines and YAML 19 - Explore continuous integration Learn the four pillars of continuous integration Explore benefits of continuous integration Describe build properties Enable Continuous Integration with Azure Pipelines 20 - Implement a pipeline strategy Configure agent demands Implement multi-agent builds Explore source control types supported by Azure Pipelines 21 - Integrate with Azure Pipelines Describe the anatomy of a pipeline Understand the pipeline structure Detail templates Explore YAML resources Use multiple repositories in your pipeline 22 - Introduction to GitHub Actions What are Actions? Explore Actions flow Understand workflows Describe standard workflow syntax elements Explore events Explore jobs Explore runners Examine release and test an action 23 - Learn continuous integration with GitHub Actions Describe continuous integration with actions Examine environment variables Share artifacts between jobs Examine Workflow badges Describe best practices for creating actions Mark releases with Git tags Create encrypted secrets Use secrets in a workflow Implement GitHub Actions for CI/CD 24 - Design a container build strategy Examine structure of containers Work with Docker containers Understand Dockerfile core concepts Examine multi-stage dockerfiles Examine considerations for multiple stage builds Explore Azure container-related services Deploy Docker containers to Azure App Service web apps 25 - Introduction to continuous delivery Explore traditional IT development cycle What is continuous delivery? Move to continuous delivery Understand releases and deployments Understand release process versus release 26 - Create a release pipeline Describe Azure DevOps release pipeline capabilities Explore release pipelines Explore artifact sources Choose the appropriate artifact source Examine considerations for deployment to stages Explore build and release tasks Explore custom build and release tasks Explore release jobs Configure Pipelines as Code with YAML 27 - Explore release recommendations Understand the delivery cadence and three types of triggers Explore release approvals Explore release gates Use release gates to protect quality Control Deployments using Release Gates 28 - Provision and test environments Provision and configure target environments Configure automated integration and functional test automation Understand Shift-left Set up and run availability tests Explore Azure Load Testing Set up and run functional tests 29 - Manage and modularize tasks and templates Examine task groups Explore variables in release pipelines Understand variable groups 30 - Automate inspection of health Automate inspection of health Explore events and notifications Explore service hooks Configure Azure DevOps notifications Configure GitHub notifications Explore how to measure quality of your release process Examine release notes and documentation Examine considerations for choosing release management tools Explore common release management tools 31 - Introduction to deployment patterns Explore microservices architecture Examine classical deployment patterns Understand modern deployment patterns 32 - Implement blue-green deployment and feature toggles What is blue-green deployment? Explore deployment slots Describe feature toggle maintenance 33 - Implement canary releases and dark launching Explore canary releases Examine Traffic Manager Understand dark launching 34 - Implement A/B testing and progressive exposure deployment What is A/B testing? Explore CI-CD with deployment rings 35 - Integrate with identity management systems Integrate GitHub with single sign-on (SSO) Explore service principals Explore Managed Identity 36 - Manage application configuration data Rethink application configuration data Explore separation of concerns Understand external configuration store patterns Examine Key-value pairs Examine App configuration feature management Integrate Azure Key Vault with Azure Pipelines Manage secrets, tokens and certificates Examine DevOps inner and outer loop Integrate Azure Key Vault with Azure DevOps Enable Dynamic Configuration and Feature Flags 37 - Explore infrastructure as code and configuration management Explore environment deployment Examine environment configuration Understand imperative versus declarative configuration Understand idempotent configuration 38 - Create Azure resources using Azure Resource Manager templates Why use Azure Resource Manager templates? Explore template components Manage dependencies Modularize templates Manage secrets in templates Deployments using Azure Bicep templates 39 - Create Azure resources by using Azure CLI What is Azure CLI? Work with Azure CLI 40 - Explore Azure Automation with DevOps Create automation accounts What is a runbook? Understand automation shared resources Explore runbook gallery Examine webhooks Explore source control integration Explore PowerShell workflows Create a workflow Examine checkpoint and parallel processing 41 - Implement Desired State Configuration (DSC) Understand configuration drift Explore Desired State Configuration (DSC) Explore Azure Automation State configuration (DSC) Examine DSC configuration file Explore hybrid management Implement DSC and Linux Automation on Azure 42 - Implement Bicep What is Bicep? Install Bicep Understand Bicep file structure and syntax 43 - Introduction to Secure DevOps Describe SQL injection attack Understand DevSecOps Explore Secure DevOps Pipeline Explore key validation points Explore continuous security validation Understand threat modeling 44 - Implement open-source software Explore how software is built What is open-source software Explore corporate concerns with open-source software components Explore common open-source licenses Examine license implications and ratings 45 - Software Composition Analysis Inspect and validate code bases for compliance Explore software composition analysis (SCA) Integrate Mend with Azure Pipelines Implement GitHub Dependabot alerts and security updates Integrate software composition analysis checks into pipelines Examine tools for assess package security and license rate Interpret alerts from scanner tools Implement security and compliance in an Azure Pipeline 46 - Static analyzers Explore SonarCloud Explore CodeQL in GitHub Manage technical debt with SonarCloud and Azure DevOps 47 - OWASP and Dynamic Analyzers Plan Implement OWASP Secure Coding Practices Explore OWASP ZAP penetration test Explore OWASP ZAP results and bugs 48 - Security Monitoring and Governance Implement pipeline security Explore Microsoft Defender for Cloud Examine Microsoft Defender for Cloud usage scenarios Explore Azure Policy Understand policies Explore initiatives Explore resource locks Explore Azure Blueprints Understand Microsoft Defender for Identity 49 - Explore package dependencies What is dependency management? Describe elements of a dependency management strategy Identify dependencies Understand source and package componentization Decompose your system Scan your codebase for dependencies 50 - Understand package management Explore packages Understand package feeds Explore package feed managers Explore common public package sources Explore self-hosted and SaaS based package sources Consume packages Publish packages Package management with Azure Artifacts 51 - Migrate consolidating and secure artifacts Identify existing artifact repositories Migrate and integrating artifact repositories Secure access to package feeds Examine roles Examine permissions Examine authentication 52 - Implement a versioning strategy Understand versioning of artifacts Explore semantic versioning Examine release views Promote packages Explore best practices for versioning 53 - Introduction to GitHub Packages Publish packages Install a package Delete and restore a package Explore package access control and visibility 54 - Implement tools to track usage and flow Understand the inner loop Explore Azure Monitor and Log Analytics Examine Kusto Query Language (KQL) Explore Application Insights Implement Application Insights Monitor application performance with Application Insights 55 - Develop monitor and status dashboards Explore Azure Dashboards Examine view designer in Azure Monitor Explore Azure Monitor workbooks Explore Power BI Build your own custom application 56 - Share knowledge within teams Share acquired knowledge within development teams Integrate with Azure Boards Share team knowledge using Azure Project Wiki 57 - Design processes to automate application analytics Explore rapid responses and augmented search Integrate telemetry Examine monitoring tools and technologies 58 - Manage alerts, blameless retrospectives and a just culture Examine when get a notification Explore how to fix it Explore smart detection notifications Improve performance Understand server response time degradation Reduce meaningless and non-actionable alerts Examine blameless retrospective Develop a just culture
MySQL server admins training course description This MySQL Server administration course is designed for MySQL Server administrators who have a basic understanding of a MySQL database and a good working knowledge of SQL commands. The course provides an understanding of MySQL Architecture and practical experience in setting up, configuring and maintaining a MySQL server, backing up and recovering data and optimising query performance. This MySQL Server administration course also covers MySQL replication and its role in high availability and scalability. What will you learn Use MySQL Workbench. Install and configure a MySQL Server . Administer and tune a MySQL server. Configure log files and interpret error messages.. Secure the Server. Administer a replication topology. MySQL server admin training course details Who will benefit: Database administrators, Database developers and Technical consultants. Prerequisites: Introduction to MySQL Duration 5 days MySQL server admin training course contents Introduction to Oracle Application Express APEX concepts APEX main components Workspaces, database applications and websheet applications Creating a workspace The Workspace Administrator Upgrading APEX Logging into APEX Running an application SWL Workshop Use APEX to browse, create and modify objects Process ad hoc SQL statements Manage scripts in APEX Create, run and save SQL queries Build a database application Application components Create an application Create an application from a spreadsheet Create reports Create reports using wizards Edit report attributes Add links to reports Create a link to a printer-friendly version of a report Save and print reports in different formats Using files Uploading images Creating cascading stylesheet files Uploading static files Adding an Image as an application logo Adding a reference to a Javascript file Pages and regions Web form behaviour in APEX Create a form based on a table Create a form based on a procedure Create a form with a report Create a tabular form Format a form Locking in APEX forms Creating lists of values Overview of application express shared Components Dynamic and static lists of values Create a dynamic list of values Create a static list of values Use a list of values to control data in a report Create a cascading list of values Items and buttons Understand the different Types of items Create items Understand and edit item attributes Use Javascript with item Manipulate items in tabular forms Add dynamic items to a report Create and edit buttons Page Processing Page rendering and page processing Create computations Validate input data Process Data Understand application branching Create conditional branches Shared components Overview of application express navigation components Manage parent and standard tabs Create navigation bar entries Create and use lists and list items Manage breadcrumbs Create shortcuts Shared component subscription User interface defaults Display dynamic content Filter reports with dynamic queries Create charts with a wizard Format charts Create calendars Add links to calendars Create hierarchical trees State and debugging Understand session state Set a session state value Clear the session state Review the session state Review the messages in debug mode Enabling feedback Managing feedback and team development Themes and templates Switch to a different theme View existing templates Understand and manage templates Create a new template Add references to cascading stylesheet and Javascript files Dynamic actions and plug-in components Identify plug-in components and their types Plug In a component Create dynamic actions Use a plug-in in a dynamic action Building website applications Websheet applications and their components Create a websheet application Enable SQL and PL/SQL in a websheet application Add sections and pages to a websheet application Add links on a websheet page Add a data grid to a websheet application Create SQL reports ion websheet applications Add annotations to a websheet application Implementing security Authentication and authorization Provide an authentication scheme Create an authorization scheme using access control Enable and configure session state protection Deploy an appliction Define supporting objects Package an application Export an application Import an application Install supporting objects Administer Apex workspaces Manage workspaces and users Request a schema or storage Purge session state Monitor developer activity log Monitor workspace activity View activity reports Import a workspace Utility programs Import and export data Generate DDL statements View objects reports
Samba training course description Samba enables UNIX/Linux machines to act as Microsoft File and Print servers. This two day hands on training course progresses from the basics of installing samba and simple configurations through to authentication issues and troubleshooting. What will you learn Install and configure Samba. Administrate file and printer sharing. Secure Samba servers. Troubleshoot Samba Samba training course details Who will benefit: Technical staff working with Samba. Prerequisites: Intro to UNIX Systems Administration TCP/IP Foundation. Duration 2 days Samba training course contents What is Samba? File and print servers, Samba server roles, Windows networking, NetBIOS, SMB. Hands on Microsoft File and Print shares, analysing the network traffic. Installing Samba Source, binaries, where to find samba, building and compiling Samba. Hands on Download and install Samba. Controlling Samba Samba daemons, starting and stopping Samba, smbcontrol, Samba net command, smb.conf. Viewing Samba status, smbclient. Hands on Starting and stopping Samba, testing the server. Samba configuration Simple shares, smb.conf variables, configuration from a web browser, swat, enabling access to swat. Hands on Configuring samba servers and clients. File sharing Basic shares, [homes], locking options, UNIX file permissions, controlling user access, Windows ACLs, virtual samba servers, browsing. Hands on File sharing and browsing. Print sharing Sharing printers, UNIX printing, CUPS, printer drivers, [printers], PRINT$. Hands on Samba print server. Authentication Workgroups, domains, users and passwords, Samba domain security, Samba password backends: smbpasswd, tdbsam, nisplus, mysql, Active Directory. Hands on Securing samba shares. Troubleshooting Logging options, controlling logs, Samba utilities, network protocols, .SMB/CIFS. Performance tuning. Hands on Troubleshooting Samba
Complete JavaScript training course description A hands on course covering JavaScript programming. Core JavaScript is covered first, including the basics, arrays, functions, classes, modules and Regular expressions. Client side JavaScript is then covered including JavaScript in browsers, Scripting CSS, the jQuery library and HTML APIs. What will you learn Read JavaScript. Write JavaScript. Debug JavaScript. Complete JavaScript training course details Who will benefit: Anyone wishing to learn JavaScript. Prerequisites: None. Duration 3 days Complete JavaScript training course contents CORE JAVASCRIPT Lexical structure: Character set, comments, literals, identifiers, and reserved words, optional semicolons.. Types, values and variables: Numbers, text, boolean values, null and undefines, the global object, wrapper objects, immutable primitive values and mutable object references, type conversions, variable declaration, variable scope. Expressions and operators: Primary expressions, object and array initializers, function definition expressions, property access expressions, invocation expressions, object creation expressions, operator overview, arithmetic expressions, relational expressions, logical expressions, assignment expressions, evaluation expressions, miscellaneous operators. Statements: Expression statements, compound and empty statements, declaration statements, conditionals, loops, jumps, miscellaneous statements, summary of JavaScript statements. Objects: Creating objects, querying and setting properties, deleting properties, testing properties, enumerating properties, property getters and setters, property attributes, object attributes, serializing objects, object methods. Arrays: Creating arrays, reading and writing array elements, sparse arrays, array length, adding and deleting array elements, iterating arrays, multi-dimensional arrays, array methods, FCMAScript 5 array methods, array type, array-like objects, strings as arrays. Functions: Defining functions, invoking functions, function arguments and parameters, functions as values, functions as namespaces, closures, function properties, methods and constructor, functional programming. Classes and modules: Classes and prototypes, classes and constructors, Java-style classes in JavaScript, augmenting classes, classes and types, object oriented techniques in JavaScript, subclasses, classes in ECMAScript 5, modules. Pattern matching and regular expressions: Defining regular expressions, string methods for pattern matching, the RegExp object. JavaScript subsets and extensions: JavaScript subsets, constants and scoped variables, destructuring assignment, iteration, shorthand functions, multiple catch clauses, E4X: ECMAScript for XML. Server-side JavaScript: Scripting Java with Rhino, asynchronous I/O with node. CLIENT SIDE JAVASCRIPT JavaScript in web browsers: Client side JavaScript, embedding JavaScript in HTML, execution of JavaScript programs, compatibility and interoperability, accessibility, security, client side frameworks. The Window object: Timers, browser location and navigation, browsing history, browser screen information, dialog boxes, error handling, document elements as window properties, multiple windows and frames. Scripting Documents: Overview of the DOM, selecting document elements, document structure and traversal, attributes, element content, creating, inserting and deleting nodes. Example: generating a table of contents, document and element geometry and scrolling, HTML forms, other document features. Scripting CSS: Overview of CSS, important CSS properties, scripting inline styles, querying computed styles, scripting CSS classes, scripting stylesheets. Handling events: Types of events, registering event handlers, event handler invocation, document load events, mouse events, mousewheel events, drag and drop events, text events, keyboard events. Scripted HTTP: Using XMLHttpRequest, HTTP by <script>: JSOMP, Comet with server-sent events. The jQuery library: jQuery basics, jQuery getters and setters, altering document structure, handling events with jQuery, Animated effects, Ajax with jQuery, Utility functions, jQuery selectors and selection methods, Extending jQuery with plug-ins. The jQuery UI library. Client side storage: localStorage and sessionStorage, Cookies, IE usingData persistence, Applicatioin storage and offline webapps. Scripted media and graphics: Scripting images, Scripting audio and video, SCG:scalable vector graphics, Graphics in a <canvas>. Scripted HTTP: Using XMLHttpRequest, HTTP by <script>: JSOMP, Comet with server-sent events. The jQuery library: jQuery basics, jQuery getters and setters, altering document structure, handling events with jQuery, Animated effects, Ajax with jQuery, Utility functions, jQuery selectors and selection methods, Extending jQuery with plug-ins. The jQuery UI library. Client side storage: localStorage and sessionStorage, Cookies, IE usingData persistence, Applicatioin storage and offline webapps. Scripted media and graphics: Scripting images, Scripting audio and video, SCG:scalable vector graphics, Graphics in a <canvas>. HTMLS APIs: Geolocation, history management, cross-origin messaging, web workers, type arrays and ArrayBuffers, blobs, the filesystem API, client side databases, web sockets.