Businesses that don't control their costs don't stay in business. How well are you doing? Is everyone in your organisation sufficiently aware of costs, managing them effectively and maximising opportunities to reduce them? If there is scope for improvement, this course will help get you back on track. It will demonstrate that cost reduction is so much more than cost control and cost cutting. True cost management is about being aware of costs, seeking to reduce them through good design and efficient operating practices whilst taking continuing action on overspending. This course will develop the participants' skills in: Being aware of costs at all times Seeking cost reduction from the start (including life-cycle costing) Appraising projects / production to identify and take out risk Understanding real budgeting Using techniques such as ZBB and ABC where appropriate Ensuring cost reports lead to action Managing a cost reduction process that delivers Benefits to the organisation will include: Identification of cost reduction and business improvement opportunities Better reporting and ownership of costs Greater awareness and control of everyday costs 1 Introduction - the cost management process The risks of poor cost control Capital and revenue costs The importance of cost awareness The importance of cost reduction Cost management - the key aspects How to build a cost management and control process checklist for your areas of responsibility 2 Cost removal - taking out costs Cost awareness Costs of poor design / poor processes Value engineering Removing redundant costs 3 The need for commercial, technical and financial appraisals Understand the problems before cash is committed and costs incurred Making the effort to identify commercial and technical risk The time value of money - DCF techniques for long term projects Cost models for production processes and projects Costing models - project appraisals The use of spreadsheets to identify sensitivity and risk How to focus on risk management 4 Budgeting - proper budgeting challenges costs The philosophy of the business - are costs an issue? The importance of having the right culture The need for detailed business objectives Budgetary control measures Designing budget reports - for action 5 Zero-based budgeting (ZBB) - the principles Much more than starting with a clean sheet of paper What ZBB can achieve The concept of decision packages - to challenge business methods and costs Only necessary costs should be incurred A review of an operating budget - demonstrating what ZBB challenges and the costs it may lead to being taken out 6 Awareness of overheads and other costs Definitions of cost - direct and indirect Dealing with overheads - what is meant by allocation, absorption or apportionment? The apparent and real problems with overheads Different ways of dealing with overheads Review of overhead allocation methods and accounting and reporting issues 7 Overheads and product costing Activity-based costing (ABC) - the principles Where and how the ABC approach may be helpful Know the 'true' cost of a product or a project Should you be in business? Will you stay in business? Identifying weaknesses in a traditional overhead allocation How ABC will help improve product or service costing Identifying which products and activities should be developed and which abandoned 8 Cost reduction culture The need for cost reports What measures can be used to identify over-spends as early as possible Cost control performance measures and ratios 9 Design of cost control reports Reports should lead to action and deliver Selecting cost control measures which can be acted upon Practice in designing action reports 10 Course summary - developing your own cost action plan Group and individual action plans will be prepared with a view to participants identifying their cost risks areas and the techniques which can be immediately applied to improve costing and reduce costs
About this training This 5-day training course enables participants to learn and understand the fundamental concepts of well test analysis. The methodology described in the course, which has become the standard of the industry, presents a systematic way of interpreting well tests in homogeneous and heterogeneous reservoirs, including fissured and multilayered systems. Recommendations for designing tests in such formations, examples, and problem-solving sessions for practical experience and immediate application are included in the course. Training Objectives Upon completion of this course, participants will be able to: Understand the well test analysis methodology Present the straight line, log-log pressure, derivative and deconvolution analysis methods Learn the most common reservoir behaviours and boundary effects Carry out the gas and multiphase analysis Target Audience The course is intended for individuals who involved with the design and interpretation of well tests. The following personnel will benefit from the knowledge shared in this course: Petroleum Production Engineers Production and Wellsite Geologist Geophysicist Reservoir Engineer Drilling Engineer Trainer Your expert course leader has taught numerous well test interpretation industry courses around the world and has been involved in many consulting projects. He is a member of the Society of Petroleum Engineers (SPE) since 1969, and he was elected a Distinguished Member in 2002 and an Honorary Member in 2009. He has chaired or organized many SPE Advanced Technology Workshops. He is a recognized expert in well test analysis and has published over one hundred technical papers and was responsible for many advances in well test interpretation, including: the use of Greens functions; wellbore storage and skin, fractured wells, and wells with double porosity behavior; the first major commercial computer-aided interpretation software; single-well and multi-well deconvolution; and a well test interpretation methodology which has become standard in the oil industry. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
About this Training Course Seismic interpretation requires an understanding of structural development and its interrelation with the stratigraphic system. Bias and misunderstanding have unfortunately resulted in countless dry holes. So go beyond tracing horizons and understand their context within the structural system by extracting key information from seismic surveys and other datasets. In this 5 full-day training course, participants will learn a variety of modern structural concepts and techniques and their role in the interpretation of seismic data. Using an applied 'hands-on' approach, participants will be exposed to a diversity of worldwide case examples with complementary exercises - both of an individual and group nature. The course is designed from an applied standpoint, with numerous examples and hands-on exercises from the petroleum industry. This course can also be offered through Virtual Instructor Led Training (VILT) format. Training Objectives By the end of this course, the participants will be able to: Go beyond tracing horizons and marking faults and truly understand the structural and stratigraphic system. Understand the role of tectonics and deformation in the formation of various types and orientations of geologic structures. Understand the interaction of the structural system with the stratigraphic and sedimentologic environment for better prediction of reservoir formation. Integrate data from the large seismic scale to subseismic scale, including seismic anisotropy, to understand better the overall petroleum system. Learn about the common pitfalls of interpretation. Target Audience This course is intended for geologists, geophysicists, reservoir engineers, and exploration/production managers. Course Level Intermediate Trainer Your expert course leader received his B.S. and M.S. degrees in Geology from the now University of Louisiana-Lafayette in 1989 and 1990 respectively, and his Ph.D. as a National Science Foundation fellow at Baylor University, Waco, Texas, in 1993. From 1994 - 1996, he studied planetary tectonics as a NASA-funded postdoctoral fellow at Southern Methodist University. In 1996, he returned to UL-Lafayette, where he was awarded in 1997 the Hensarling-Chapman Endowed Professorship in Geology. He began independent consulting activities in 1991, and in 2001, he left academia for full-time consulting for clients ranging from one-man shops to supermajors. He rejoined UL-Lafayette as an adjunct professor from 2011 - 2018. He is an active researcher, receiving several million dollars in grants from federal, state, and industry sources, presenting numerous talks, including a 2019 AAPG Levorsen award, and publishing on a diversity of geoscience topics, including a Grover E. Murray Best Published Paper award in 2017. He is co-author of the inaugural GCAGS/GCSSEPM Transactions Best Student Paper award in 2018. He served as the GCAGS Publisher since 2006 and in various GCAGS/GCSSEPM Transactions editing capacities since 2006, including the 2014 and 2017 - 2022 Editor (named Permanent Transactions Editor in 2017), and Managing Editor since 2011, receiving a GCAGS Distinguished Service Award in 2018. He served as the General Chair for GeoGulf 2020 (70th GCAGS/GCSSEPM Convention), the 1st hybrid geoscience conference in the world. He is a Past President of the Lafayette Geological Society and served as its Editor and Publisher from 2002 - 2018. In 2018, he founded the Willis School of Applied Geoscience, reformulating decades of industry-training experience to provide alternative opportunities for graduate-level education. In 2020, he received an Honorary Membership from GCSSEPM. He also joined the LSU faculty as an adjunct professor in 2020. In 2021, he co-founded the Society of Applied Geoscientists and Engineers, serving as its President, General Chair for the SAGE 2022 Convention & Exposition, and Vice-Chair for the Benghazi International Geoscience & Engineering Conference 2022 (BIGEC 2022). POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations
About this Course This 5 full-day course presents the most modern statistical and mathematical forecasting frameworks used by practitioners to tackle the load forecasting problem across short time and long time scales. The course presents practical applications to solving forecasting challenges, supported by real life examples from large control areas. It presents the weather impacts on the load forecasts and the methodologies employed to quantify the weather effect and building a repository of weather normal data. A good load forecast methodology must improve its forecasting accuracy and support a consistent load forecasting process. The load forecasting widely used in the power industry has evolved significantly with the advancement and adoption of Artificial Intelligence techniques such as Machine Learning. With the increased penetration of inverter-based resources, the operation of electric grids grew in complexity, leading to load forecasts that are updated more frequently than once a day. Furthermore, several jurisdictions adopted a smaller granularity than the hourly load forecasts in the effort to reduce the forecasting uncertainties. On the generation side, fuel forecasting professionals must meet energy requirements while making allowance for the uncertainty on both the demand and the supply side. This training course will also feature a guest speaker, who is a Ph.D candidate to provide insights into the most modern aspects of Artificial Intelligence in the context of load forecasting. Training Objectives This course offers a comprehensive approach to all aspects of load forecasting: Gain a perspective of load forecasting from both operators in the generating plant and system operators. Understand and review the advanced load forecasting concepts and forecasting methodologies Learn the application of Artificial Neural Networks and Probabilistic Forecasting methods to manage forecasting uncertainties in short time frames Appreciate market segmentation and econometric framework for long term forecasts Find out the most recent practical application of load forecasting as examples from large power companies Get access to recent industry reports and developments Target Audience Energy load forecasting professionals from power plant and system operators Energy planners and energy outlook forecasters and plant operators Fuel procurement professionals Planners and schedulers of thermal generating units Course Level Intermediate Trainer Your expert course instructor is a Utility Executive with extensive global experience in power system operation and planning, energy markets, enterprise risk and regulatory oversight. She consults on energy markets integrating renewable resources from planning to operation. She led complex projects in operations and conducted long term planning studies to support planning and operational reliability standards. Specializing in Smart Grids, Operational flexibilities, Renewable generation, Reliability, Financial Engineering, Energy Markets and Power System Integration, she was recently engaged by the Inter-American Development Bank/MHI in Guyana. She was the Operations Expert in the regulatory assessment in Oman. She is a registered member of the Professional Engineers of Ontario, Canada. She is also a contributing member to the IEEE Standards Association, WG Blockchain P2418.5. With over 25 years with Ontario Power Generation (Revenue $1.2 Billion CAD, I/S 16 GW), she served as Canadian representative in CIGRE, committee member in NSERC (Natural Sciences and Engineering Research Council of Canada), and Senior Member IEEE and Elsevier since the 90ties. Our key expert chaired international conferences, lectured on several continents, published a book on Reliability and Security of Nuclear Power Plants, contributed to IEEE and PMAPS and published in the Ontario Journal for Public Policy, Canada. She delivered seminars organized by the Power Engineering Society, IEEE plus seminars to power companies worldwide, including Oman, Thailand, Saudi Arabia, Malaysia, Indonesia, Portugal, South Africa, Japan, Romania, and Guyana. Our Key expert delivered over 60 specialized seminars to executives and engineers from Canada, Europe, South and North America, Middle East, South East Asia and Japan. Few examples are: Modern Power System in Digital Utilities - The Energy Commission, Malaysia and utilities in the Middle East, GCCIA, June 2020 Assessment of OETC Control Centre, Oman, December 2019 Demand Side management, Load Forecasting in a Smart Grid, Oman, 2019 Renewable Resources in a Smart Grid (Malaysia, Thailand, Indonesia, GCCIA, Saudi Arabia) The Modern Power System: Impact of the Power Electronics on the Power System The Digital Utility, AI and Blockchain Smart Grid and Reliability of Distribution Systems, Cyme, Montreal, Canada Economic Dispatch in the context of an Energy Market (TNB, Sarawak Energy, Malaysia) Energy Markets, Risk Assessment and Financial Management, PES, IEEE: Chicago, San Francisco, New York, Portugal, South Africa, Japan. Provided training at CEO and CRO level. Enterprise Risk methodology, EDP, Portugal Energy Markets: Saudi Electricity Company, Tenaga National Berhad, Malaysia Reliability Centre Maintenance (South East Asia, Saudi Electricity Company, KSA) EUSN, ENERGY & UTILITIES SECTOR NETWORK, Government of Canada, 2016 Connected+, IOT, Toronto, Canada September 2016 and 2015 Smart Grid, Smart Home HomeConnect, Toronto, Canada November 2014 Wind Power: a Cautionary Tale, Ontario Centre for Public Policy, 2010 POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
About this Virtual Instructor Led Training (VILT) This 4 half-day Virtual Instructor Led Training (VILT) course presents the principles and best practices of portfolio management in the upstream (E&P) oil and gas industry. The VILT course is equally valuable for small independents, large integrated international companies and national oil companies. The VILT course consists of presentations, case studies, illustrative practical exercises and syndicate discussions. Particular emphasis is given to pragmatic portfolio management approaches and solutions which can be implemented swiftly without recourse to major investments in planning and portfolio management software. The VILT course will draw on examples from your expert course leader's 35+ years' experience in the oil and gas industry as an explorationist, upstream vice-president and management consultant. The VILT course handout will comprise softcopy slides used in the presentation and a softcopy workbook for the exercises. Participants will gain proficiency in portfolio management techniques, understand how and why to undertake this activity and be able to apply key concepts directly in the business of their teams / divisions. The VILT course will be presented over 4 half-days, using Microsoft Teams or Zoom and a proprietary set of VILT tools. Participants will be asked to complete a pre course questionnaire (PCQ) addressing their objectives and experience, and attend a session to familiarise themselves with VILT tools before course commencement. Training Objectives To present the tools, concepts and principles of portfolio management To define the quantitative metrics which are used to describe projects in a portfolio To understand the benefits of portfolio management at different stages of the upstream business: in strategy development, opportunity screening, business development, drilling prospects, conducting appraisal of discoveries and developing fields To put portfolio management in the organisational context by describing the role of the portfolio management team and examining how value assurance (quality control) is best conducted on portfolio data for projects and assets To demonstrate how portfolio management contributes to improved business performance By the end of the VILT course, participants will understand: Key concepts and principles of portfolio management How to design a simple portfolio database and describe complex projects in a small number of objective metrics How to segment the portfolio into meaningful units How to use portfolio data in making business choices and decisions at the strategic and tactical levels The extent to which it is meaningful and reasonable to make comparisons across different portfolio segments How the portfolio management team can support the wider business in decision-making Target Audience This VILT course is specially designed for exploration and development geoscientists, E&P economists and finance staff, and E&P managers. Both technical and non-technical staff will benefit from the concepts presented. Companies are encouraged to send participants from different functions and seniority levels to gain great benefits especially those which would like to implement the concepts presented in this VILT course. Course Level Basic or Foundation Training Methods The VILT course will be delivered online in 4 half-day sessions comprising 4 hours per day, with 2 breaks of 10 minutes per day. The VILT course will be presented in an interactive workshop format that allows for discussion. Course Duration: 4 half-day sessions, 4 hours per session (16 hours in total). Trainer Your expert course leader draws on more than 35 years of experience managing, reviewing and directing projects in all aspects of the exploration business: from exploration business development (new ventures), through prospect maturation and drilling, to the appraisal of discoveries. He has more than 30 years' experience with Shell International, followed by 10 years consulting to NOCs in Asia Pacific, Africa and South America and independent oil companies in the United Kingdom, continental Europe and North America. Other than delivering industry training, he has worked on projects for oil & gas companies of all sizes, including independents, national oil companies and (super)-majors, private equity firms, hedge funds and investment banks, and leading management consulting firms. He is an alumnus of Cambridge University. He has M.A and Ph.D. degrees in geology and is a Fellow of the Geological Society of London as well as a respected speaker on management panels at international conferences. Professional Experience Management consultancy & executive education: Advice to investment banks, businesses and major consulting firms. Specialist expertise in upstream oil & gas, with in depth experience in exploration strategy, portfolio valuation and risk assessment. Leadership: Managed and led teams and departments ranging from 3 - 60 in size. Provided technical leadership to a cadre of 800 explorationists in Shell worldwide. Member of the 12-person VP team leading global exploration in Shell, a $3 bln p.a. business and recognised as the most effective and successful among its industry peers. Accountability & decision-making: Accountable for bottom-line results: in a range of successful exploration ventures with budgets ranging from $10's million to $100's million. Made, or contributed to, complex business decisions / investments, taking into account strategic, technical, commercial, organisational and political considerations. Corporate governance: Served as non-executive director on the Boards of the South Rub al Khali Company (oversight of gas exploration studies and drilling in Saudi Arabia) and SEAPOS B.V. (exploration deep-water drilling and facilities management). Technical & operations: Skilled in exploration opportunity evaluation, the technical de risking of prospects, portfolio analysis and managing the interface between exploration and well engineering activities. Unparalleled knowledge of the oil and gas basins of the world, and of different operating regimes and contractual structures, ranging from Alaska, Gulf of Mexico and Brazil, through to the Middle East, former Soviet Union, Far East and Australia. Safety: Following an unsatisfactory audit, became accountable for safety performance in Shell's exploration new ventures. Through personal advocacy and leadership of a small team, delivered pragmatic and effective HSE systems, tools and staff training / engagement and a dramatically improved safety record. R&D: Experience in the 3 key roles in R&D: scientific researcher, research manager, and 'customer' for R&D products. After re-defining Shell's exploration R&D strategy, led the re-structuring of the R&D organization, its interface with 'the business' and approaches to deployment and commercialization. Strategy: Accomplished at formulating competitive strategies in business, R&D and technology deployment, translating them into actionable tactics and results. Defined the exploration strategy of PDO (a Shell subsidiary in Oman) and latterly of Shell's global exploration programme. Professional education, behavioural/motivational coaching: Experienced in organisational re-design, change management, leadership education and talent development. Commercial skills: Personally negotiated drilling compensation claims, educational contracts and E&P contracts, with values of $5 million to $100+ million. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations
Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.
LPIC-1 training course description This five day hands on course provides a comprehensive coverage of core Linux administration tasks. The course covers generic Linux and is available for any Linux distribution required. It closely follows the LPIC curriculum allowing delegates to achieve the relevant certification if required. What will you learn Administer & configure Linux systems. Maintain Linux by handling disk space and taking regular backups. Manage software packages. Perform basic troubleshooting. Maintain a secure Linux system. Describe the organisation and implementation of the filesystem. LPIC-1 training course details Who will benefit: System administrators. Network administrators. Prerequisites: Linux fundamentals (LPI 010) Duration 5 days LPIC-1 training course contents Part I Exam 101 Exploring Linux Command-Line Tools Using a Shell, Shell Configuration, Environment Variables, Getting Help, Streams, Redirection and Pipes, Processing Text Using Filters, Manipulating files, Regular Expressions, grep,sed. Managing Software Package Concepts, Comparison of package formats, RPM, rpm Commands, Yum, Debian Packages, dpkg, apt-cache, apt-get, dselect, aptitude, Converting Between Package Formats, Dependencies and Conflicts, Startup Script Problems, Shared Libraries, Library Management, Managing Processes, the Kernel: The First Process, Process Lists, Foreground & Background Processes, Process Priorities, Killing Processes. Configuring Hardware Configuring Firmware and Hardware, IRQs, I/O Addresses, DMA Addresses, Boot Disks, Coldplug and Hotplug Devices, Configuring Expansion Cards and PCI Cards, Kernel Modules, USB Devices, Linux USB Drivers, Configuring Hard Disks, Partitioning Systems, LVM, Common Layouts, Creating Partitions and Filesystems, Maintaining Filesystem Health, Tuning, Journals, Checking Filesystems, Monitoring Disk Use, Mounting and Unmounting Filesystems. Managing Files File Management Commands, File Naming and Wildcards, File Archiving, Links, Directory Commands, File Ownership and Group, File access control, Permissions, chmod, Defaults, File Attributes, Disk Quotas, Enabling and setting Quotas, Locating Files, The FHS. Booting Linux and Editing Files Installing Boot Loaders, GRUB Legacy, GRUB 2, Alternative Boot Loaders, the Boot Process, Boot Messages, Runlevels and the Initialization Process, Runlevel Functions, Runlevel Services, Alternative Boot Systems , Upstart, system. Part II Exam 102 265 Securing the X Window System Localization, Configuring Basic X Features, X Server Options, Methods of Configuring X, X Display Information, X Fonts, The X GUI Login System, XDMCP Server, Using X for Remote Access, Screen Display Settings, Setting Your Time Zone, Your Locale, Configuring Printing, Conceptualizing the Linux Printing Architecture, Understanding PostScript and Ghostscript, Running a Printing System, Configuring CUPS, Monitoring and Controlling the Print Queue. Administering the System Managing Users and Groups, Tuning User and System Environments, Using System Log Files, Understanding syslogd , Setting Logging Options, Manually Logging Data, Rotating Log Files, Reviewing Log File Contents, Maintaining the System Time, Linux Time Concepts, Manually Setting the Time, Using NTP, Running Jobs in the Future, Understanding the Role of cron, Creating System cron Jobs, Creating User cron Jobs, Using anacron, Using at. Configuring Basic Networking TCP/IP, Network Hardware, Network Addresses, Hostnames, Network Ports, Configuring Linux for a Local Network, Configuring with DHCP, Static IP Address, Configuring Routing, Using GUI Configuration Tools, ifup and ifdown, Diagnosing Network Connections, Testing Connectivity, Tracing a Route, Checking Network Status , Examining Network Traffic, Additional Tools. Writing Scripts, Configuring Email, and Using Databases The Shell Environment, Aliases, Shell Configuration Files, Writing Scripts, Commands, Variables, Conditional Expressions, Loops, Functions, Managing Email, Choosing Email Software, Securing Your Email Server, Managing Data with SQL, Picking a SQL Package, Understanding SQL Basics, Using MySQL Securing Your System Administering Network Security, Super Server Restrictions, Disabling Unused Servers, Administering Local Security, Securing Passwords, Limiting root Access, Setting Login, Process, SUID/SGID Files, Configuring SSH, Using GPG, Generating, Importing and Revoking Keys, Encrypting and Decrypting Data, Signing Messages and Verifying Signatures.
CCNA training course description The Implementing and Administering Cisco Solutions (CCNA) course gives you a broad range of fundamental knowledge for all IT careers. Through a combination of lecture, hands-on labs, and self-study, you will learn how to install, operate, configure, and verify basic IPv4 and IPv6 networks. The course covers configuring network components such as switches, routers, and wireless LAN controllers; managing network devices; and identifying basic security threats. It also gives a foundation in network programmability, and software-defined networking What will you learn Install, configure, and operate a small to medium sized network Gain a foundation in the essentials of networking, security, and automation Prepare for the 200-301 CCNA exam, which earns CCNA certification CCNA training course details Who will benefit: Network support help desk technicians involved in the basic installation, operation, and verification of Cisco networks. Anyone seeking CCNA certification. Prerequisites: Introduction to Data communications & networking Duration 5 days CCNA training course content After taking this course, you should be able to: Identify the components of a computer network and describe their basic characteristics. Understand the model of host-to-host communication. Describe the Cisco IOS software. Describe LANs and the role of switches within LANs. Describe Ethernet and describe the operation of switches. Install a switch and perform the initial configuration. Describe the TCP/IP Internet layer, IPv4, its addressing scheme, and subnetting. Describe the TCP/IP Transport and Application layers Explore functions of routing. Implement basic configuration on a Cisco router. Explain host-to-host comms across switches and routers. Identify and resolve common switched network issues and common problems associated with IPv4 addressing. Describe IPv6 main features and addresses, and configure and verify basic IPv6 connectivity. Describe static routing. Describe, implement, and verify VLANs and trunks. Describe inter VLAN routing. Explain the basics of dynamic routing protocols and describe components and terms of OSPF. Explain how STP and RSTP work. Configure link aggregation using EtherChannel. Describe the purpose of Layer 3 redundancy protocols. Describe basic WAN and VPN concepts. Describe the operation of access control lists (ACLs) and their applications in the network. Configure Internet access using DHCP clients and explain and configure NAT on Cisco routers. Describe basic QoS concepts. Describe the concepts of wireless networks, which types of wireless networks can be built, and how to use Wireless LAN Controllers (WLCs). Describe network and device architectures, introduce virtualization, network programmability and SDN and describe smart network management solutions such as Cisco DNA Centerâ¢, SD-Access, and SD-WAN. Configure basic IOS system monitoring tools. Describe the management of Cisco devices. Describe the current security threat landscape. Describe threat defence technologies. Implement a basic security configuration of the device management plane. Implement basic steps to harden network devices. Detailed course outline Exploring the Functions of Networking. The Host-to-Host Communications Model. Operating Cisco IOS Software. Introducing LANs. Exploring the TCP/IP Link Layer. Starting a Switch. The TCP/IP IP layer, IPv4 Addressing, and Subnets. The TCP/IP Transport Layer and Application Layer. Exploring the Functions of Routing. Configuring a Cisco Router. Exploring the Packet Delivery Process. Troubleshooting a Simple Network. Introducing Basic IPv6. Configuring Static Routing. Implementing VLANs and Trunks. Routing Between VLANs. Introducing OSPF. Redundant Switched Topologies with EtherChannel. Explaining Basics of ACL. Enabling Internet Connectivity. Explaining the Evolution of Intelligent Networks. Introducing System Monitoring. Managing Cisco Devices. Securing Administrative Access. Implementing Device Hardening. Self-Study: Building Redundant Switched Topologies. Exploring Layer 3 Redundancy. Introducing WAN Technologies. Introducing QoS. Explaining Wireless Fundamentals. Introducing Architectures and Virtualization. Examining the Security Threat Landscape. Threat Defense Technologies.
UNIX system administration training course description This five day hands on course provides a comprehensive coverage of core UNIX administration tasks. The course covers generic UNIX and is available for any UNIX distribution required. What will you learn Administer & configure UNIX systems. Maintain UNIX by handling disk space and taking regular backups. Manage software packages. Perform basic troubleshooting. Maintain a secure UNIX system. Describe the organisation and implementation of the filesystem. UNIX system administration training course details Who will benefit: System administrators Network administrators. Prerequisites: UNIX fundamentals. Duration 5 days UNIX system administration training course contents Part 1 Exploring UNIX command-line tools Using a shell, shell configuration, environment variables, getting help, streams, redirection and pipes, processing text using filters, manipulating files, regular expressions, grep, sed. Managing software Package concepts, comparison of package formats, RPM, rpm commands, yum, dpkg, apt-cache, apt-get, dselect, aptitude, converting between package formats, dependencies and conflicts, startup script problems, shared libraries, library management, managing processes, the kernel: the first process, process lists, foreground & background processes, process priorities, killing processes. Configuring hardware Configuring firmware and hardware, RQs, I/O addresses, DMA addresses, Boot disks, coldplug and hotplug devices, configuring expansion cards and PCI cards, kernel modules, USB devices, UNIX USB crivers, configuring hard disks, partitioning systems, LVM, common layouts, creating partitions and filesystems, maintaining filesystem health, tuning, journals, checking filesystems, monitoring disk use, mounting and unmounting filesystems. Managing files File management commands, file naming and wildcards, file archiving, links, directory commands, file ownership and group, file access control, permissions, chmod, defaults, file attributes, disk quotas, enabling and setting quotas, locating files, the FHS. Booting UNIX and editing files Installing boot loaders, GRUB legacy, GRUB 2, alternative boot loaders, the boot process, boot messages, runlevels and the initialization process, runlevel functions, runlevel services, alternative boot systems, upstart, system. Part 2 Configuring the X window system Localization, configuring basic X features, X server options, methods of configuring X, X display information, X fonts, the X GUI login system, XDMCP server, using X for remote access, screen display settings, setting your time zone, your locale, configuring printing, conceptualizing the UNIX printing architecture, understanding PostScript and ghostscript, running a printing system, configuring CUPS, monitoring and controlling the print queue. Administering the system Managing users and groups, tuning user and system environments, using system log files, understanding syslogd, setting logging options, manually logging data, rotating l;og files, reviewing log file contents, maintaining the system time, UNIX time concepts, manually setting the time, using NTP, running jobs in the future, understanding the role of cron, creating system cron jobs, creating user cron jobs, using anacron, using at. Configuring basic networking TCP/IP, network hardware, network addresses, hostnames, network ports, configuring UNIX for a local network, configuring with DHCP, static IP address, configuring routing, using GUI configuration tools, ifup and ifdown, diagnosing network connections, testing connectivity, tracing a route, checking network status , examining network traffic, additional tools. Writing scripts, configuring email, and using databases The shell environment, aliases, shell configuration files, writing scripts, commands, variables, conditional expressions, loops, functions, managing email, choosing email software, securing your email server, managing data with SQL, picking a SQL package, understanding SQL basics, using MySQL. Securing your system Administering network security, super server restrictions, disabling unused servers, administering local security, securing passwords, limiting root access, setting login, process, SUID/SGID files, configuring SSH, using GPG, generating, importing and revoking keys, encrypting and decrypting data, signing messages and verifying signatures.
Cloud deployment training course description This course covers the important topics every cloud professional needs, including, configuration and deployment, security, maintenance, management, and troubleshooting. It covers all aspects of cloud computing infrastructure and administration, with a practical focus on real-world skills. It will help you to master the fundamental concepts, terminology, and characteristics of cloud computing. Deploy and implement cloud solutions, manage the infrastructure, and monitor performance. You will also be able to install, configure, and manage virtual machines. What will you learn Cloud services, models, and characteristics. Virtualization components, installation, and configuration. Infrastructure configurations and optimization. Resource management and specific allocations. IT security concepts, tools, and best practices. Recovery, availability and continuity in the cloud. Cloud deployment training course details Who will benefit: IT professionals looking to deploy and implement cloud solutions, manage the infrastructure, and monitor performance, Install, configure, and manage virtual machines. Prerequisites: Introduction to virtualization. Duration 5 days Cloud deployment training course contents Preparing to Deploy Cloud Solutions Deploying a Pilot Project Testing Pilot Project Deployments Designing a Secure and Compliant Cloud Infrastructure Designing and Implementing a Secure Cloud Environment Planning Identity and Access Management for Cloud Deployments Determining CPU and Memory Sizing for Cloud Deployments Determining Storage Requirements for Cloud Deployments Analysing Workload Characteristics to Ensure Successful Migration Maintaining Cloud Systems Implementing Backup, Restore, Disaster Recovery, and Business Continuity Measures Analysing Cloud Systems for Performance Analysing Cloud Systems for Anomalies and Growth Forecasting Troubleshooting Deployment, Capacity, Automation, and Orchestration Issues Troubleshooting Connectivity Issues Troubleshooting Security Issues