• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1968 Concept courses in London delivered Live Online

VMware: Install, Configure, Manage (v8)

5.0(3)

By Systems & Network Training

VMware training course description This five-day VMware course features intensive handson training that focuses on installing, configuring, and managing VMware vSphere 8, which includes VMware ESXi 8 and VMware vCenter 8. This course prepares you to administer a vSphere infrastructure for an organization of any size. This course is the foundation for most VMware technologies in the software-defined data center. What will you learn Install and configure ESXi hosts. Deploy and configure vCenter. Create virtual networks using standard and distributed switches. Configure VMs, templates, clones, and snapshots. Manage virtual machine resource allocation. Migrate virtual machines with vSphere vMotion and vSphere Storage vMotion. VMware training course details Who will benefit: Systems administrators and engineers. Prerequisites: Introduction to data communications & networking. Windows/Linux Administration. Duration 5 days VMware training course contents Course Introduction Introductions and course logistics. Course objectives vSphere and Virtualization Overview Explain basic virtualization concepts, Describe how vSphere fits in the software-defined data center and the cloud infrastructure, Recognize the user interfaces for accessing vSphere, Explain how vSphere interacts with CPUs, memory, networks, storage, and GPUs Installing and Configuring ESXi Install an ESXi host, Recognize ESXi user account best practices, Configure the ESXi host settings using the DCUI and VMware Host Client Deploying and Configuring vCenter Recognize ESXi hosts communication with vCenter, Deploy vCenter Server Appliance, Configure vCenter settings, Use the vSphere Client to add and manage license keys, Create and organize vCenter inventory objects, Recognize the rules for applying vCenter permissions, View vCenter logs and events Configuring vSphere Networking Configure and view standard switch configurations, Configure and view distributed switch configurations, Recognize the difference between standard switches and distributed switches, Explain how to set networking policies on standard and distributed switches Configuring vSphere Storage Recognize vSphere storage technologies, Identify types of vSphere datastores, Describe Fibre Channel components and addressing, Describe iSCSI components and addressing, Configure iSCSI storage on ESXi, Create and manage VMFS datastores, Configure and manage NFS datastores Deploying Virtual Machines Create and provision VMs, Explain the importance of VMware Tools, Identify the files that make up a VM Recognize the components of a VM, Navigate the vSphere, Client and examine VM settings and options, Modify VMs by dynamically increasing resources, Create VM templates and deploy VMs from them, Clone VMs, Create customization specifications for guest operating systems, Create local, published, and subscribed content libraries, Deploy VMs from content libraries, Manage multiple versions of VM templates in content libraries Managing Virtual Machines Recognize the types of VM migrations that you can perform within a vCenter instance and across vCenter instances, Migrate VMs using vSphere vMotion, Describe the role of Enhanced vMotion Compatibility in migrations, Migrate VMs using vSphere Storage vMotion, Take a snapshot of a VM, Manage, consolidate, and delete snapshots, Describe CPU and memory concepts in relation to a virtualized environment, Describe how VMs compete for resources Define CPU and memory shares, reservations, and limits Deploying and Configuring vSphere Clusters Create a vSphere cluster enabled for vSphere DRS and vSphere HA, View information about a vSphere cluster Explain how vSphere DRS determines VM placement on hosts in the cluster, Recognize use cases for vSphere DRS settings, Monitor a vSphere DRS cluster Describe how vSphere HA responds to various types of failures, Identify options for configuring network redundancy in a vSphere HA cluster, Recognize vSphere HA design considerations, Recognize the use cases for various vSphere HA settings, Configure a vSphere HA cluster, Recognize when to use vSphere Fault Tolerance Managing the vSphere Lifecycle Enable vSphere Lifecycle Manager in a vSphere cluster, Describe features of the vCenter Update Planner, Run vCenter upgrade prechecks and interoperability reports, Recognize features of vSphere Lifecycle Manager, Distinguish between managing hosts using baselines and managing hosts using images, Describe how to update hosts using baselines, Describe ESXi images, Validate ESXi host compliance against a cluster image and update ESXi hosts, Update ESXi hosts using vSphere Lifecycle Manager, Describe vSphere Lifecycle Manager automatic recommendations, Use vSphere Lifecycle Manager to upgrade VMware Tools and VM hardware

VMware: Install, Configure, Manage (v8)
Delivered in Internationally or OnlineFlexible Dates
£3,687

Certificate in Intellectual Property (CIP)

By EMG Associates UK Limited

Certificate in Intellectual Property (CIP) Why Attend As international trade and business continues to evolve, the importance of Intellectual Property Rights (IPRs) becomes increasingly vital. With new technologies and products relying heavily on IPRs, governments around the world are competing to offer higher levels of protection in order to attract investments and promote local innovation and production. Due to the complex nature of the scientific, economic, social, and theoretical aspects of IPRs, it is crucial for entities to have a comprehensive understanding of these issues. During this course, through practical workshops, case studies and expert knowledge, participants will gain an understanding of the concepts, theories, legislative and practical elements necessary to develop a successful IP strategy for their organization. Course Methodology In this interactive training course participants will frequently work in pairs as well as in larger groups to complete exercises, and regional and international case studies Course Objectives By the end of the course, participants will be able to: Understand the theoretical background of Intellectual Property (IP) and the various types of IP existence Understand the international and local set of conventions and laws governing IPRs Demonstrate deep knowledge of the conditions that should exist in each type of IPR, their registration, licensing and enforcement Apply knowledge of IPRs in all legal fields including contracts and litigation Participate effectively in building a comprehensive IP strategy for their organization Target Audience This course is suitable for professionals working in the legal and IP filed, including but not limited to; lawyers, in-house counsels, governmental officials, police, customs, health authorities, researchers, university lecturers, publishers, IP agents as well as researchers who are interested in having deeper knowledge about IP in the GCC. It will also highly benefit in-house councils who recently joined their companies in the GCC as it will give them all the knowledge needed to handle all IP issues within the region. Target Competencies General principles of IPRs Trademarks, Patents, Copyright Principles of IP Enforcement Building IP Strategy Note The Dubai Government Legal Affairs Department has introduced a Continuing Legal Professional Development (CLPD) programme to legal consultants authorised to practise through a licensed firm in the Emirate of Dubai. We are proud to announce that the Dubai Government Legal Affairs Department has accredited EMG Associates as a CLPD provider. In addition, all our legal programmes have been approved. This PLUS Specialty Training Legal course qualifies for 4 elective CLPD points. Introduction and basic concepts Types of IPRs Main theories justifying IP protection The role of IP in economic development The Role of IP in innovation and creativity The globalization of IPRs protection International conventions Trade-Related Aspects of Intellectual Property Rights (TRIPS) and the World Trade Organization The GCC Cooperation in the field of IP protection Trademarks and copyright Definition and types of marks Scope of trade marks protection Registration procedures and rights conferred to trade mark owner Legal protection of trade marks Subject matter and conditions of copyright Types of protected works Financial and moral rights Fair use, duration of protection and legal protection for copyright Patents and trade secrets Patentable inventions and types of patents Registration process Ownership and rights conferred to patent owner Employer-employee inventions and legal protection for patents Definition of trade secrets and confidential information Elements of trade secrets Utilization of trade secrets commercially Legal protection of trade secrets Building a strong IP strategy and strategic management of IPRs Overview and basic concepts Understand your business and your IP needs IP audit and building the portfolio Onward licensing (licensing process and contracts) IP commercialization mechanisms and maximizing the benefits Practical steps to building a successful IP strategy IP valuation - your gateway to know how much your IP worth Assessment of the IP strategy for further success

Certificate in Intellectual Property (CIP)
Delivered OnlineFlexible Dates
£3,822

Certified Data Centre Expert (CDCE)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is any IT, facilities or data centre professional, who are involved in the design/build, renovation or relocation of a mission-critical data centre. Overview This 5-day course is designed to prepare participants to analyse a given business case and perform technical evaluation for a project plan and a set of designs for the implementation of a mission critical data centre. The course also engages participants in product evaluations and demonstrates how to select equipment and develop equipment test scripts (IET) and integrated performance and validation testing (IPVT). CDCE© builds upon knowledge gained in CDCP and CDCS courses. Participants who pass the exam will join the industry's elite data centre project design experts. CDCE© is the highest level training in the EPI Design and Build training track under the EPI Data Centre Training Framework. Participants must hold a valid CDCS certificate in order to be able to register for the CDCE class. CDCE© is the premier certification for data centre professionals in the data centre design/build and related fields. Data Centre Life Cycle Data centre lifecycle stages and phases Exercise: Stage/Phase/Milestone/Document mapping Design Preparation Creation of a SON ? Statement Of Need Technology review Conceptual sizing How to calculate for computer room space How to calculate facility space How to calculate incoming power Exercise: Conceptual sizing building and power Analysing capacity of existing facility Analysing investment options Site selection Permits and approvals Exercise: Site selection Conceptual design Budget and project timeline Business case preparation Project delivery structure Project management options Project manager and team Design Planning OSRA?Operational Systems Requirement Analysis TFRA?Technical Facilities Requirement Analysis Operations and maintenance review RFP?Request For Proposal process Vendor selection Design Development Project planning Design development PDR ? Preliminary Design Review Equipment selection FDR/V ? Final Design Review/Validation Exercise: Full design validation of power, cooling, floor plans, fire suppression Design freeze and LLTI Creation of construction documents BOM/BOQ ? Bill Of Material/Bill Of Quantity Exercise: Equipment selection Acquire Requirements of purchase orders Shipping terms FWT/FAT ? Factory Witness Test/Factory Acceptance Test Sequencing Incoming goods inspection and handling Asset management Construct Temporary essential services Erection of the building Permanent essential services Building inspection Snag list COF?Certificate Of Fitness Fit-Out Fit-Out Builders cleaning As-Built Drawings Test & Commissioning IET?Individual Equipment Test IPVT/IST?Integrated Performance Verification Test/Integrated Systems Test Common mistakes with IET/IPVT Deep cleaning Exercise: IET/IPVT scripting Hand-Over Facility hand-over requirements and documents PCC?Practical Completion Certificate DLP?Defect Liability Period Defect Management ICT Systems Installation ICT Systems Testing Hand-Over/DLP Expiry FCC?Final Completion Certificate Retirement Reasons and definitions of retirement Building the business case and project plan Sequencing Transfer of site Demolishing of site Legal matters FCC?Final Completion Certificate Exam: Certified Data Centre Expert (CDCE©) The CDCE© exam is in two parts: Part A is a 90-minute closed book exam, with 60 multiple-choice questions. For Part A, the candidate requires a minimum of 45 correct answers to pass the exam. Part B is a 90-minute closed book exam, with 25 open questions. For Part B the candidate needs to obtain a minimum of 75% to pass. Additional course details: Nexus Humans Certified Data Centre Expert (CDCE) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Data Centre Expert (CDCE) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Certified Data Centre Expert (CDCE)
Delivered OnlineFlexible Dates
£3,500

EC-Council Certified Cybersecurity Technician (C|CT)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The C|CT is ideal for anyone looking to start their career in cybersecurity or add a strong foundational understanding of the cybersecurity concepts and techniques required to be effective on the job. The course is especially well suited to: Early-career IT professionals, IT managers, career changers, and career advancers Students and recent graduates Overview After completing this course, you will understand: Key concepts in cybersecurity, including information security and network security Information security threats, vulnerabilities, and attacks The different types of malware Identification, authentication, and authorization Network security controls Network security assessment techniques and tools (threat hunting, threat intelligence, vulnerability assessment, ethical hacking, penetration testing, configuration and asset management) Application security design and testing techniques Fundamentals of virtualization, cloud computing, and cloud security Wireless network fundamentals, wireless encryption, and related security measures Fundamentals of mobile, IoT, and OT devices and related security measures Cryptography and public-key infrastructure Data security controls, data backup and retention methods, and data loss prevention techniques Network troubleshooting, traffic and log monitoring, and analysis of suspicious traffic The incident handling and response process Computer forensics and digital evidence fundamentals, including the phases of a forensic investigation Concepts in business continuity and disaster recovery Risk management concepts, phases, and frameworks EC-Council?s C|CT certification immerses students in well-constructed knowledge transfer. Training is accompanied by critical thinking challenges and immersive lab experiences that allow candidates to apply their knowledge and move into the skill development phase in the class itself. Upon completing the program, C|CT-certified professionals will have a strong foundation in cybersecurity principles and techniques as well as hands-on exposure to the tasks required in real-world jobs. Course Outline Information Security Threats and Vulnerabilities Information Security Attacks Network Security Fundamentals Identification, Authentication, and Authorization Network Security Controls: Administrative Controls Network Security Controls: Physical Controls Network Security Controls: Technical Controls Network Security Assessment Techniques and Tools Application Security Virtualization and Cloud Computing Wireless Network Security Mobile Device Security Internet of Things (IoT) and Operational Technology (OT) Security Cryptography Data Security Network Troubleshooting Network Traffic Monitoring Network Log Monitoring and Analysis Incident Response Computer Forensics Business Continuity and Disaster Recovery Risk Management

EC-Council Certified Cybersecurity Technician (C|CT)
Delivered OnlineFlexible Dates
£3,495

Artificial Lift and Real-Time Production Optimization in Digital Oilfield

By EnergyEdge - Training for a Sustainable Energy Future

About this training course Artificial lift systems are an important part of production operations for the entire lifecycle of an asset. Often, oil and gas wells require artificial lift for most of the life cycle. This 5-day training course offers a thorough treatment of artificial lift techniques including design and operation for production optimization. With the increasing need to optimize dynamic production in highly constrained cost environments, opportunities and issues related to real-time measurements and optimization techniques needs to be discussed and understood. Artificial lift selection and life cycle analysis are covered. These concepts are discussed and reinforced using case studies, quizzing tools, and exercises with software. Participants solve examples and class problems throughout the course. Animations and videos reinforce the concepts under discussion. Understanding of these important production concepts is a must have to exploit the existing assets profitably. Unique Features: Hands-on usage of SNAP Software to solve gas-lift exercises Discussion on digital oil field Machine learning applications in gas-lift optimization Training Objectives After the completion of this training course, participants will be able to: Understand the basics and advanced concepts of each form of artificial lift systems including application envelope, relative strengths, and weaknesses Easily recognize the different components from downhole to the surface and their basic structural and operational features Design and analyze different components using appropriate software tools Understand challenges facing artificial lift applications and the mitigation of these challenges during selection, design, and operation Learn about the role of digital oilfield tools and techniques and their applications in artificial lift and production optimization Learn about use cases of Machine learning and artificial intelligence in the artificial lift Target Audience This training course is suitable and will greatly benefit the following specific groups: Production, reservoir, completion, drilling and facilities engineers, analysts, and operators Anyone interested in learning about selection, design, analysis and optimum operation of artificial lift and related production systems will benefit from this course. Course Level Intermediate Advanced Training Methods The training instructor relies on a highly interactive training method to enhance the learning process. This method ensures that all participants gain a complete understanding of all the topics covered. The training environment is highly stimulating, challenging, and effective because the participants will learn by case studies which will allow them to apply the material taught in their own organization. Course Duration: 5 days in total (35 hours). Training Schedule 0830 - Registration 0900 - Start of training 1030 - Morning Break 1045 - Training recommences 1230 - Lunch Break 1330 - Training recommences 1515 - Evening break 1530 - Training recommences 1700 - End of Training The maximum number of participants allowed for this training course is 20. This course is also available through our Virtual Instructor Led Training (VILT) format. Prerequisites: Understanding of petroleum production concepts. Each participant needs a laptop/PC for solving class examples using software to be provided during class. Laptop/PC needs to have a current Windows operating system and at least 500 MB free disk space. Participants should have administrator rights to install software. Trainer Your expert course leader has over 35 years' work-experience in multiphase flow, artificial lift, real-time production optimization and software development/management. His current work is focused on a variety of use cases like failure prediction, virtual flow rate determination, wellhead integrity surveillance, corrosion, equipment maintenance, DTS/DAS interpretation. He has worked for national oil companies, majors, independents, and service providers globally. He has multiple patents and has delivered a multitude of industry presentations. Twice selected as an SPE distinguished lecturer, he also volunteers on SPE committees. He holds a Bachelor's and Master's in chemical engineering from the Gujarat University and IIT-Kanpur, India; and a Ph.D. in Petroleum Engineering from the University of Tulsa, USA. Highlighted Work Experience: At Weatherford, consulted with clients as well as directed teams on digital oilfield solutions including LOWIS - a solution that was underneath the production operations of Chevron and Occidental Petroleum across the globe. Worked with and consulted on equipment's like field controllers, VSDs, downhole permanent gauges, multiphase flow meters, fibre optics-based measurements. Shepherded an enterprise-class solution that is being deployed at a major oil and gas producer for production management including artificial lift optimization using real time data and deep-learning data analytics. Developed a workshop on digital oilfield approaches for production engineers. Patents: Principal inventor: 'Smarter Slug Flow Conditioning and Control' Co-inventor: 'Technique for Production Enhancement with Downhole Monitoring of Artificially Lifted Wells' Co-inventor: 'Wellbore real-time monitoring and analysis of fracture contribution' Worldwide Experience in Training / Seminar / Workshop Deliveries: Besides delivering several SPE webinars, ALRDC and SPE trainings globally, he has taught artificial lift at Texas Tech, Missouri S&T, Louisiana State, U of Southern California, and U of Houston. He has conducted seminars, bespoke trainings / workshops globally for practicing professionals: Companies: Basra Oil Company, ConocoPhillips, Chevron, EcoPetrol, Equinor, KOC, ONGC, LukOil, PDO, PDVSA, PEMEX, Petronas, Repsol, , Saudi Aramco, Shell, Sonatrech, QP, Tatneft, YPF, and others. Countries: USA, Algeria, Argentina, Bahrain, Brazil, Canada, China, Croatia, Congo, Ghana, India, Indonesia, Iraq, Kazakhstan, Kenya, Kuwait, Libya, Malaysia, Oman, Mexico, Norway, Qatar, Romania, Russia, Serbia, Saudi Arabia, S Korea, Tanzania, Thailand, Tunisia, Turkmenistan, UAE, Ukraine, Uzbekistan, Venezuela. Virtual training provided for PetroEdge, ALRDC, School of Mines, Repsol, UEP-Pakistan, and others since pandemic. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Artificial Lift and Real-Time Production Optimization in Digital Oilfield
Delivered in Internationally or OnlineFlexible Dates
£3,947 to £4,590

About this Training Course This course aims to help geologists, geophysicists, stratigraphers and reservoir engineers gain a thorough understanding of the concepts and practical applications of sequence stratigraphy through integration of seismic sequence stratigraphy with well log sequence stratigraphy and the application of biostratigraphy to sequence stratigraphy. The course examines the geological principles, processes and terminology related to the interpretation and use of seismic sequence stratigraphy and its integration with well log sequence stratigraphy and biostratigraphy. Concepts are illustrated with field examples of seismic, well-log, core, and outcrop data and reinforced with practical exercises using real data. Course Content in Summary: Introduction to concepts, eustatic controls, seismic stratigraphy and definition of key terms. Controls - eustatic and basinal controls, accommodation and equilibrium types, systems tracts and systems tract boundaries. Sequences and systems tracts - highstand, falling stage, lowstand, transgressive and shelf margin systems tracts. Key surfaces and their identification from well logs, core, outcrop and seismic reflections. Sequence expression in well logs - log characters of parasequences, maximum flooding surfaces and criteria for picking sequence boundaries. Interpretation of systems tracts from well logs - integration of well log sequence stratigraphy with seismic sequence stratigraphy. Seismic expression of sequences - Interpretation of seismic reflections in depositional sequences - seismic sequence; seismic facies. Clastic and carbonate depositional environments - depositional responses to changes in relative sea level. Mixed systems and evaporites. Variations on the model. A review of application and exploration significance. Training Objectives By the end of this course, participants will be able to: Gain an understanding of sequence stratigraphic controls and concepts. Recognise sequence stratigraphic surfaces, systems tracts and stratigraphic sequences on well-log cross-sections, seismic lines, and outcrop profiles and depositional facies. Construct a sequence stratigraphic model by integrating lithological, biostratigraphical, seismic and well data. Apply sequence stratigraphy effectively for facies predictions in exploration and production. Target Audience This course will benefit explorationists, geologists, stratigraphers and geophysicists who wish to extend their knowledge through integration of seismic sequence stratigraphy with well log sequence stratigraphy. Trainer Your expert course leader is the Geosciences Technical Director for PetroEdge. She was previously, the manager of Robertson Petroleum Training Centre and a Senior Project Scientist at Robertson CGG. She has over 20 years of experience in teaching geology and leading field trips. Prior to her 8 years at Robertson, she was in academia as a lecturer for 6 years and a Research Fellow for 3 years. She has conducted fieldwork and led field trips in the US and many areas in the UK. In addition, she has led university regional geology day schools and has comprehensive experience in course and study programme writing. She has extensive experience in delivering courses and in Clastic and Carbonate Reservoir Geology, Deepwater Turbidites, Sandstone Reservoirs, Wireline Log Interpretation, Integrated Sequence Stratigraphy, Basin Analysis and Exploration & Appraisal workshops globally. In delivering the Exploration Team Management Workshop, she has project managed and taught key principles and modules on project planning, data collection/collation, geophysical assessment, stratigraphy and facies mapping, source rock facies and hydrocarbon generation, play fairway mapping, risking and prospect evaluation. Her knowledge and enthusiasm for instructing is reflected in consistently being rated as excellent by trainees, and clients specifically requesting her participation in courses. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Applied Sequence Stratigraphy
Delivered in Internationally or OnlineFlexible Dates
£3,955 to £4,599

November 2025 Fundamentals Organisation & Relationship Systems Coaching Training

By CRR UK

CRRUK equips professionals with the concepts, skills and tools to build conscious, intentional relationships, and to coach relationship systems of any size.

November 2025 Fundamentals Organisation & Relationship Systems Coaching Training
Delivered Online
£695

Lean Six Sigma Black Belt Certification Program: Virtual In-House Training

By IIL Europe Ltd

Lean Six Sigma Black Belt Certification Program: Virtual In-House Training This course is specifically for people wanting to become Lean Six Sigma Black Belts, who are already Lean Six Sigma practitioners. If advanced statistical analysis is needed to identify root causes and optimal process improvements, (Lean) Six Sigma Green Belts typically ask Black Belts or Master Black Belts to conduct these analyses. This course will change that. Green Belts wanting to advance their statistical abilities will have a considerable amount of hands-on practice in techniques such as Statistical Process Control, MSA, Hypothesis Testing, Correlation and Regression, Design of Experiments, and many others. Participants will also work throughout the course on a real-world improvement project from their own business environment. This provides participants with hands-on learning and provides the organization with an immediate ROI once the project is completed. IIL instructors will provide free project coaching throughout the course. What you Will Learn At the end of this program, you will be able to: Use Minitab for advanced data analysis Develop appropriate sampling strategies Analyze differences between samples using Hypothesis Tests Apply Statistical Process Control to differentiate common cause and special cause variation Explain and apply various process capability metrics Conduct Measurement System Analysis and Gage R&R studies for both discrete and continuous data Conduct and analyze simple and multiple regression analysis Plan, execute, and analyze designed experiments Drive sustainable change efforts through leadership, change management, and stakeholder management Successfully incorporate advanced analysis techniques while moving projects through the DMAIC steps Explain the main concepts of Design for Six Sigma including QFD Introduction: DMAIC Review IIL Black Belt Certification Requirements Review Project Selection Review Define Review Measure Review Analyze Review Improve Review Control Introduction: Minitab Tool Introduction to Minitab Minitab basic statistics and graphs Special features Overview of Minitab menus Introduction: Sampling The Central Limit Theorem Confidence Interval of the mean Sample size for continuous data (mean) Confidence Interval for proportions Sample size for discrete data (proportions) Sampling strategies (review) Appendix: CI and sample size for confidence levels other than 95% Hypothesis Testing: Introduction Why use advanced stat tools? What are hypothesis tests? The seven steps of hypothesis tests P value errors and hypothesis tests Hypothesis Testing: Tests for Averages 1 factor ANOVA and ANOM Main Effect Plots, Interaction Plots, and Multi-Vari Charts 2 factor ANOVA and ANOM Hypothesis Testing: Tests for Standard Deviations Testing for equal variance Testing for normality Choosing the right hypothesis test Hypothesis Testing: Chi Square and Other Hypothesis Test Chi-square test for 1 factor ANOM test for 1 factor Chi-square test for 2 factors Exercise hypothesis tests - shipping Non-parametric tests Analysis: Advanced Control Charts Review of Common Cause and Special Cause Variation Review of the Individuals Control Charts How to calculate Control Limits Four additional tests for Special Causes Control Limits after Process Change Discrete Data Control Charts Control Charts for Discrete Proportion Data Control Charts for Discrete Count Data Control Charts for High Volume Processes with Continuous Data Analysis: Non-Normal Data Test for normal distribution Box-Cox Transformation Box-Cox Transformation for Individuals Control Charts Analysis: Time Series Analysis Introduction to Time Series Analysis Decomposition Smoothing: Moving Average Smoothing: EWMA Analysis: Process Capability Process capability Discrete Data: Defect metrics Discrete Data: Yield metrics Process Capability for Continuous Data: Sigma Value Short- and long-term capabilities Cp, Cpk, Pp, Ppk capability indices Analysis: Measurement System Analysis What is Measurement System Analysis? What defines a good measurement system? Gage R&R Studies Attribute / Discrete Gage R&R Continuous Gage R&R Regression Analysis: Simple Correlation Correlation Coefficient Simple linear regression Checking the fit of the Regression Model Leverage and influence analysis Correlation and regression pitfalls Regression Analysis: Multiple Regression Analysis Introduction to Multiple Regression Multicollinearity Multiple Regression vs. Simple Linear Regression Regression Analysis: Multiple Regression Analysis with Discrete Xs Introduction Creating indicator variables Method 1: Going straight to the intercepts Method 2: Testing for differences in intercepts Logistic Regression: Logistic Regression Introduction to Logistic Regression Logistic Regression - Adding a Discrete X Design of Experiments: Introduction Design of Experiment OFAT experimentation Full factorial design Fractional factorial design DOE road map, hints, and suggestions Design of Experiments: Full Factorial Designs Creating 2k Full Factorial designs in Minitab Randomization Replicates and repetitions Analysis of results: Factorial plots Analysis of results: Factorial design Analysis of results: Fits and Residuals Analysis of results: Response Optimizer Analysis of results: Review Design of Experiments: Pragmatic Approaches Designs with no replication Fractional factorial designs Screening Design of Experiment Case Study Repair Time Blocking Closing: Organizational Change Management Organizational change management Assuring project sponsorship Emphasizing shared need for change Mobilizing stakeholder commitment Closing: Project Management for Lean Six Sigma Introduction to project management Project management for Lean Six Sigma The project baseline plan Work Breakdown Structure (WBS) Resource planning Project budget Project risk Project schedule Project executing Project monitoring and controlling and Closing Closing: Design for Lean Six Sigma Introduction to Design for Lean Six Sigma (DMADV) Introduction to Quality Function Deployment (QFD) Summary and Next Steps IIL's Lean Six Sigma Black Belt Certification Program also prepares you to pass the IASSC Certified Black Belt Exam (optional)

Lean Six Sigma Black Belt Certification Program: Virtual In-House Training
Delivered OnlineFlexible Dates
£4,750

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The CHFI course will benefit: Police and other laws enforcement personnel Defense and Military personnel e-Business Security professionals Systems administrators Legal professionals Banking, Insurance and other professionals Government agencies Overview At the end of this course, you will possess the skills needed to: Understand the fundamentals of computer forensics Understand the computer forensic investigation process Describe in detail different types of hard disks and file systems Understand data acquisition and duplication Counteract anti-forensic techniques Leverage forensic skills in Windows, Linux, and Mac Investigate web attacks Understand dark web forensics Deploy forensic techniques for databases, cloud, and networks Investigate email crimes including malware Perform forensics in mobile and IoT environments Every crime leaves a digital footprint, and you need the skills to track those footprints. In this course, students will learn to unravel these pieces of evidence, decode them and report them. From decoding a hack to taking legal action against the perpetrators, they will become an active respondent in times of cyber-breaches. Computer Forensics in Today?s World 1.1. Understand the Fundamentals of Computer Forensics 1.2. Understand Cybercrimes and their Investigation Procedures 1.3. Understand Digital Evidence 1.4. Understand Forensic Readiness, Incident Response and the Role of SOC (Security Operations Center) in Computer Forensics 1.5. Identify the Roles and Responsibilities of a Forensic Investigator 1.6. Understand the Challenges Faced in Investigating Cybercrimes 1.7. Understand Legal Compliance in Computer Forensics Computer Forensics Investigation Process 2.1. Understand the Forensic Investigation Process and its Importance 2.2. Understand the Pre-investigation Phase 2.3. Understand First Response 2.4. Understand the Investigation Phase 2.5. Understand the Post-investigation Phase Understanding Hard Disks and File Systems 3.1. Describe Different Types of Disk Drives and their Characteristics 3.2. Explain the Logical Structure of a Disk 3.3. Understand Booting Process of Windows, Linux and Mac Operating Systems 3.4. Understand Various File Systems of Windows, Linux and Mac Operating Systems 3.5. Examine File System Using Autopsy and The Sleuth Kit Tools 3.6 Understand Storage Systems 3.7. Understand Encoding Standards and Hex Editors 3.8. Analyze Popular File Formats Using Hex Editor Data Acquisition and Duplication 4.1. Understand Data Acquisition Fundamentals 4.2. Understand Data Acquisition Methodology 4.3. Prepare an Image File for Examination Defeating Anti-forensics Techniques 5.1. Understand Anti-forensics Techniques 5.2. Discuss Data Deletion and Recycle Bin Forensics 5.3. Illustrate File Carving Techniques and Ways to Recover Evidence from Deleted Partitions 5.4. Explore Password Cracking/Bypassing Techniques 5.5. Detect Steganography, Hidden Data in File System Structures, Trail Obfuscation, and File Extension Mismatch 5.6. Understand Techniques of Artifact Wiping, Overwritten Data/Metadata Detection, and Encryption 5.7. Detect Program Packers and Footprint Minimizing Techniques 5.8. Understand Anti-forensics Countermeasures Windows Forensics 6.1. Collect Volatile and Non-volatile Information 6.2. Perform Windows Memory and Registry Analysis 6.3. Examine the Cache, Cookie and History Recorded in Web Browsers 6.4. Examine Windows Files and Metadata 6.5. Understand ShellBags, LNK Files, and Jump Lists 6.6. Understand Text-based Logs and Windows Event Logs Linux and Mac Forensics 7.1. Understand Volatile and Non-volatile Data in Linux 7.2. Analyze Filesystem Images Using The Sleuth Kit 7.3. Demonstrate Memory Forensics Using Volatility & PhotoRec 7.4. Understand Mac Forensics Network Forensics 8.1. Understand Network Forensics 8.2. Explain Logging Fundamentals and Network Forensic Readiness 8.3. Summarize Event Correlation Concepts 8.4. Identify Indicators of Compromise (IoCs) from Network Logs 8.5. Investigate Network Traffic 8.6. Perform Incident Detection and Examination with SIEM Tools 8.7. Monitor and Detect Wireless Network Attacks Investigating Web Attacks 9.1. Understand Web Application Forensics 9.2. Understand Internet Information Services (IIS) Logs 9.3. Understand Apache Web Server Logs 9.4. Understand the Functionality of Intrusion Detection System (IDS) 9.5. Understand the Functionality of Web Application Firewall (WAF) 9.6. Investigate Web Attacks on Windows-based Servers 9.7. Detect and Investigate Various Attacks on Web Applications Dark Web Forensics 10.1. Understand the Dark Web 10.2. Determine How to Identify the Traces of Tor Browser during Investigation 10.3. Perform Tor Browser Forensics Database Forensics 11.1. Understand Database Forensics and its Importance 11.2. Determine Data Storage and Database Evidence Repositories in MSSQL Server 11.3. Collect Evidence Files on MSSQL Server 11.4. Perform MSSQL Forensics 11.5. Understand Internal Architecture of MySQL and Structure of Data Directory 11.6. Understand Information Schema and List MySQL Utilities for Performing Forensic Analysis 11.7. Perform MySQL Forensics on WordPress Web Application Database Cloud Forensics 12.1. Understand the Basic Cloud Computing Concepts 12.2. Understand Cloud Forensics 12.3. Understand the Fundamentals of Amazon Web Services (AWS) 12.4. Determine How to Investigate Security Incidents in AWS 12.5. Understand the Fundamentals of Microsoft Azure 12.6. Determine How to Investigate Security Incidents in Azure 12.7. Understand Forensic Methodologies for Containers and Microservices Investigating Email Crimes 13.1. Understand Email Basics 13.2. Understand Email Crime Investigation and its Steps 13.3. U.S. Laws Against Email Crime Malware Forensics 14.1. Define Malware and Identify the Common Techniques Attackers Use to Spread Malware 14.2. Understand Malware Forensics Fundamentals and Recognize Types of Malware Analysis 14.3. Understand and Perform Static Analysis of Malware 14.4. Analyze Suspicious Word and PDF Documents 14.5. Understand Dynamic Malware Analysis Fundamentals and Approaches 14.6. Analyze Malware Behavior on System Properties in Real-time 14.7. Analyze Malware Behavior on Network in Real-time 14.8. Describe Fileless Malware Attacks and How they Happen 14.9. Perform Fileless Malware Analysis - Emotet Mobile Forensics 15.1. Understand the Importance of Mobile Device Forensics 15.2. Illustrate Architectural Layers and Boot Processes of Android and iOS Devices 15.3. Explain the Steps Involved in Mobile Forensics Process 15.4. Investigate Cellular Network Data 15.5. Understand SIM File System and its Data Acquisition Method 15.6. Illustrate Phone Locks and Discuss Rooting of Android and Jailbreaking of iOS Devices 15.7. Perform Logical Acquisition on Android and iOS Devices 15.8. Perform Physical Acquisition on Android and iOS Devices 15.9. Discuss Mobile Forensics Challenges and Prepare Investigation Report IoT Forensics 16.1. Understand IoT and IoT Security Problems 16.2. Recognize Different Types of IoT Threats 16.3. Understand IoT Forensics 16.4. Perform Forensics on IoT Devices

EC-Council Computer Hacking Forensic Investigator (CHFI) v10.0
Delivered OnlineFlexible Dates
£3,495

UNIX Virtualization and High Availability

5.0(3)

By Systems & Network Training

UNIX Virtualization and High Availability course description This course covers administering UNIX enterprise-wide with an emphasis on virtualization and high availability. What will you learn Manage Virtual Machines. Manage containers. Manage HA clusters. Manage HA cluster storage. UNIX Virtualization and High Availability course details Who will benefit: Enterprise-level UNIX professional. UNIX professionals working with virtualization and/or High availability. Prerequisites: Linux network administration 2 (LPIC-2) Duration 5 days UNIX Virtualization and High Availability course contents VIRTUALIZATION Virtualization concepts and theory Terminology, Pros and Cons of virtualization, variations of Virtual Machine monitors, migration of physical to VMs, migration of VMs between host systems, cloud computing. Xen Xen architecture, networking and storage, Xen configuration, Xen utilities, troubleshooting Xen installations, XAPI, XenStore, Xen Boot Parameters, the xm utility. KVM KVM architecture, networking and storage, KVM configuration, KVM utilities, troubleshooting KVM installations. Other virtualization solutions OpenVZ and LXC, other virtualization technologies, virtualization provisioning tools. Libvirt and Related Tools libvirt architecture, networking and storage, basic technical knowledge of libvirt and virsh, oVirt. Cloud Management Tools Basic feature knowledge of OpenStack and CloudStack, awareness of Eucalyptus and OpenNebula. Containers Containers versus VMs, Docker, Kubernetes. Load balanced clusters of LVS/IPVS, VRRP, configuration of keepalived, configuration of ldirectord, backend server network configuration. HAProxy, configuration of HAProxy. Failover clusters Pacemaker architecture and components (CIB, CRMd, PEngine, LRMd, DC, STONITHd), Pacemaker cluster configuration, Resource classes (OCF, LSB, Systemd, Upstart, Service, STONITH, Nagios), Resource rules and constraints (location, order, colocation), Advanced resource features (templates, groups, clone resources, multi-state resources), Pacemaker management using pcs, Pacemaker management using crmsh, configuration and management of corosync in conjunction with Pacemaker, other cluster engines (OpenAIS, Heartbeat, CMAN). HIGH AVAILABILITY CLUSTER STORAGE DRBD/cLVM DRBD resources, states and replication modes, configuration of DRBD resources, networking, disks and devices, configuration of DRBD automatic recovery and error handling, management of DRBD using drbdadm. drbdsetup and drbdmeta, Integration of DRBD with Pacemaker, cLVM, integration of cLVM with Pacemaker. Clustered File Systems Principles of cluster file systems. Create, maintain and troubleshoot GFS2 file systems in a cluster, create, maintain and troubleshoot OCFS2 file systems in a cluster, Integration of GFS2 and OCFS2 with Pacemaker, the O2CB cluster stack, other commonly used clustered file systems.

UNIX Virtualization and High Availability
Delivered in Internationally or OnlineFlexible Dates
£3,697