The PRINCE2® Practitioner course provides delegates with in-depth knowledge of project management methodologies. In this 2-day PRINCE2® Practitioner course enables learners to tailor the PRINCE2® methodology to any given project scenario. At the end of this PRINCE2® Practitioner course, delegates will be able to do delegating tolerances Course Overview The PRINCE2® Practitioner course provides delegates with in-depth knowledge of project management methodologies. In this 2-day PRINCE2® Practitioner course enables learners to tailor the PRINCE2® methodology to any given project scenario. They will learn about various essential topics such as communication management approach, tailoring the SU process, giving Ad Hoc direction, setting up the project controls, risk management procedure, PRINCE2® quality requirements, PRINCE2® approach to plan, tailoring SB, and many more. At the end of this PRINCE2® Practitioner course, delegates will be able to do delegating tolerances and report actual and forecast progress effectively. They will also be able to properly prepare the risk management, change control approach, quality management, and communication management approaches. The PRINCE2® Practitioner enables learners to apply their acquired knowledge and obtain highly reputed jobs with upgraded salaries. Concepts covered: • Balance of justification • Create the project plan • Quality audit trail • Quality review technique • Designing a plan • Gantt chart and tailoring • Change control approach Who should attend this PRINCE2® training course? This PRINCE2® Practitioner training course is for anybody interested in the field of project management. This PRINCE2® course is also intended for anyone looking to build their knowledge of how to tailor the PRINCE2® method to workplace scenarios. Other individuals that would benefit from undertaking PRINCE2® certifications include: • Project Managers • Aspiring Project Managers • Project Board Members • Project Support Staff • Office Support and Line Managers • Product Deliver Managers • Senior Responsible Owners • Change Analysts PRINCE2® Practitioner Prerequisites: It is required that delegates provide sufficient evidence of having satisfied the prerequisites before attending the PRINCE2® Practitioner training course. Delegates must hold the 2009 or 2017 version of the PRINCE2® Foundation certification or another valid qualification such as PMP, CAPM, or an IPMA Level A-D qualification. What’s Included in this PRINCE2® Practitioner Training Course? The following is included in this PRINCE2® Practitioner course: • PRINCE2® Practitioner Examination • Pre-course material • Post-course material • PDUs • Experienced PRINCE2® Instructor • Certificate • Refreshments Course Content: Module 1: Organisation Theme: • Four Levels of Management • PRINCE2® Organisation Requirements • Project Management Team • Project Management Team Roles • Project Board • Project Assurance • Change Authority • Project Support • Communication Management Approach Module 2: Starting Up a Project (SU): • Process Overview • Feasibility Study and Mandate • Appoint the Executive and the Project Manager • Capture Previous Lessons • Design and Appoint the Project Management Team • Prepare the Outline Business Case • Project Product Description • Select the Project Approach and Assemble the Project Brief • Plan the Initiation Stage • Tailoring the SU Process Module 3: Directing a Project (DP): • Authorise Initiation • Authorise the Project • Authorise a Stage or Exception Plan • Authorise Project Closure • Give Ad Hoc Direction • Tailoring the DP Process • Theme Overview • Balance of Justification • Continued Business Justification • PRINCE2® Requirements • Contents of a Business Case • Business Case Development • Benefits Management Approach • Key Responsibilities Module 4: Initiating a Project (IP): • Agree the Tailoring Requirements • Prepare the Risk Management Approach • Prepare the Change Control Approach • Prepare the Quality Management Approach • Prepare the Communication Management Approach • Set Up the Project Controls • Create the Project Plan • Prepare the Benefits Management Approach • Assemble the Project Initiation Documentation • Tailoring the IP process Module 5: Risk Theme: • Risk Definition • Effective Risk Management • PRINCE2® Risk Requirements • Risk Management Approach • Probability/Impact Grid • Risk Register • Risk Management Procedure • Identify Step • Risk Budget • Key Responsibilities Module 6: Quality Theme: • Quality Definitions • Quality Management • Quality Planning and Control • What is Quality Assurance? • PRINCE2® Quality Requirements • PRINCE2® Quality Documentation Requirements • Quality Management Approach • Quality Audit Trail • Project Product Description • Product Description • Quality Review Technique • Quality Review Roles/Responsibilities • Quality Review Meeting • Off-Specifications and Concessions • Review Follow-Up • Quality Review Benefits • Key Responsibilities • Communication Management Approach Module 7: Plans Theme: • Dealing with the Planning Horizon • PRINCE2® Planning Requirements • Documentation Requirements • Project and Stage Plans • Team Plans and Work Packages • Plans Relationship • What is in a Plan? • PRINCE2® Approach to Plans • Designing a Plan • Delivery Approaches • Defining and Analysing the Products • Product Breakdown Structures • Product Description • Product Flow Diagram • Identify the Activities and Dependencies • Preparing Estimates • Preparing a Schedule • Documenting the Plan • Analysing Risks to a Plan • Gantt Chart and Tailoring • Key Responsibilities Module 8: Progress Theme: • Progress Definition • PRINCE2® Requirements • Progress Control • Management by Exception • Delegating Tolerances and Reporting Actual and Forecast Progress • Types of Control • Management Products and Progress Control Module 9: Change Theme: • Issue Definition • PRINCE2® Approach to Change • PRINCE2® Change Documentation • Issue Register • Change Control Approach • Change Budget • Issue and Change Control Procedure • Issue Report • Exception Report Module 10: Controlling a Stage (CS): • Activity Breakdown • Authorise a Work Package • Work Package • Review Work Package Status • Receive Completed Work Packages • Review the Management Stage Status • Report Highlights • Highlight Report • Capture and Assess Issues and Risks • Escalate Issues and Risks • Take Corrective Action • Tailoring CS Module 11: Managing Product Delivery (MP): • Accept a Work Package • Execute a Work Package • Checkpoint Report • Deliver a Work Package • Tailoring MP Module 12: Managing a Stage Boundary (SB) : • Plan the Next Management Stage • What is in a Plan? • Update the Project Plan • Update the Business Case • Report the Management Stage End • End-Stage Report • Produce an Exception Plan • Tailoring SB Module 13: Closing a Project (CP): • Prepare Planned Closure • Hand Over Products • Evaluate the Project • End Project Report • Recommend Project Closure • Tailoring CP DURATION 2 Days WHATS INCLUDED Course Material Case Study Experienced Lecturer Refreshments Certificate
Microsoft Access training course description A hands on course providing a solid grounding in Microsoft Access. What will you learn Use and customise the Microsoft Access environment. Select, use and customise queries. Define tables. Design forms and reports. Recognise the use of macros. Microsoft Access training course details Who will benefit: Anyone wishing to work with Microsoft Access. Prerequisites: Database fundamentals Duration 3 days Microsoft Access training course contents Introducing databases Flat file databases, Relational databases, the objects defined in an Access database, planning a simple relational database. Open Access and create a database The database wizards, tables, creating and amending tables, using field properties to improve the quality of data entry and system performance, the primary key. Working in datasheet view View, add, modify and delete records, find records. Advantages and disadvantages of entering data directly into a table. Queries Sort and select records form a single table, advantages and disadvantages of entering data via a query, define simple calculated expressions, use 'Totals' queries. Forms Use the form wizards, basic editing of objects created using the form wizards, Data-entry in form view. Reports Use the report wizard, basic editing of objects created using the report wizard, print reports. The multi table environment Plan and create a related table, define a one-to-many relationship, write multi-table queries and use the 'AutoLookup' feature, use the form wizard to create a subform and carry out data-entry in a main/subform, print and amend reports, use the report wizard to create reports based on multi-table. Relationships Working with one-to-one and one-to-many relationships, recognising and handling many-to-many relationships, referential integrity. Select queries Select queries based on related tables, parameter queries, Crosstab, find unmatched queries and Find Duplicate, the implications of the Join properties in a relational query, conditional expressions, and working with the expression builder. Action queries Make table queries, append queries, update queries, delete queries. Customising forms. Using the Toolbox, calculated controls, Combo and List boxes, query by form, working with form and control properties, domain aggregate functions. Reports Report and control properties, customising sorting and grouping, calculated controls on reports, Sub-reports, editing and altering a report's source. Macros Introduction to macros.
Course Objectives The delegates are able to demonstrate: knowledge of hazards and risks associated with working at heights, specific to WTG (Wind Turbine Generator). understanding of current national legislation regarding working at heights. correct identification of PPE, including identification of European/Global standard markings e.g. harness, hard hat, lanyards, etc. knowledge and skills to correctly inspect, service, store and don the relevant PPE, e.g. harness, lanyards, fall arresters and work positioning equipment. correct use of the relevant PPE, e.g.harness lanyards, fall arresters and work positioning equipment. This includes correct identification of anchor points and correct ladder conduct. correct use of evacuation devices. how to approach rescue situations in WTGs and use rescue equipment efficiently.
About this Virtual Instructor Led Training (VILT) Electrical machines, mainly power transformers and electric motors are critical equipment that run production, and it must operate without any abnormalities. A wide variety of tests and standards have been developed to assist manufacturers and users of motors and transformer winding, assess the condition of the electrical insulation. The objective of this training course is to provide an understanding of power transformers and electric motors, their materials, components, and how they operate. It will also emphasize the importance of transformer life management, especially for those transformers and electric motors which have been in operation for than 10 years. The course will address in detail all aspects related to transformer principles, calculations, operation, testing and maintenance. Training Objectives This course aims to provide participants with the understanding of the fundamentals and constructional features of power transformers and electric motors, with particular reference to the design, testing, operation and maintenance of transformers in power systems. Delegates will gain a detailed appreciation of the following: Practical solutions for specifying, operating and maintaining power transformers and electric motors in a utility or plant environment Comprehensive understanding of principles, protection, maintenance and troubleshooting of power transformers and electric motors The necessary safe procedures relating to transformer operation and related circuitry Understand the principles of operation of the transformer and electric motors Identify the different features of power transformers and electric motors Appreciate the principles of transformer design, ratings, winding, core structure and materials, insulation and cooling methods, insulation and lifetime Utilize thermal limits and loading guides of transformers Analyze transformer and electric motors failure modes Target Audience Engineers of all disciplines Managers Technicians Maintenance personnel Other technical individuals Course Level Basic or Foundation Training Methods The VILT will be delivered online in 4 half-day sessions comprising 4 hours per day, with 1 x 10 minutes break per day, including time for lectures, discussion, quizzes and short classroom exercises. Additionally, some self-study will be requested. Participants are invited but not obliged to bring a short presentation (10 mins max) on a practical problem they encountered in their work. This will then be explained and discussed during the VILT. A short test or quiz will be held at the end the course. Trainer Our key expert is actively involved in electrical inspections, energy audits, energy efficiency and technical consultation for M&E activities for industrial and commercial sectors. He is involved in testing and commissioning works of factory substations of up to 132kV system. He previously worked for Jimah coal-fired power plant in Port Dickson for 9 years with his last position being Electrical Maintenance Section Head. He was involved in the commissioning of coal-fired power plant mainly with 500kV generator transformer, 934 MVA generator, and up to 33kV MV motors and switchgear panels. Our key expert has managed the maintenance team to perform routine maintenance activities (together with supporting tools such as motor lube oil analysis, infrared thermography analysis, transformer oil analysis) & electrical troubleshooting and plant outages for critical and non-critical equipment. Besides that, our key expert has published several IEEE conference papers and journals such as: (2009). Effectiveness of auxiliary system monitoring & continuous hydrogen scavenging operation on hydrogen-cooled generator at power plant. In Energy and Environment, 2009. ICEE 2009. 3rd International Conference on (pp. 151-160). IEEE. (2010). Study on electric motor mass unbalance based on vibration monitoring analysis technique. In Mechanical and Electrical Technology (ICMET), 2010 2nd International Conference on (pp. 539-542). IEEE. (2012). Re-Design of AC Excitation Busduct based on Infrared (IR) Thermography: Condition-Based Monitoring (CBM) data analysis. eMaintenance, 101. (2016). Energy Saving Studies for a University Campus: An Educational-Based Approach, 3rd International Conference on Language, Education, Humanities and Innovation 2016. 'Grid-tied photovoltaic and battery storage systems with Malaysian electrcity tariff - A review on maximum demand shaving.' Energies 10.11 (2017): 1884 'Techno-Economic Optimization of Grid-Connected Photovoltaic (PV) and Battery Systems Based on Maximum Demand Reduction (MDRed) Modelling in Malaysia.' Energies 12.18 (2019): 3531 POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations
COURSES EVERY WEEK THROUGHOUT EVERY YEAR COURSE OVERVIEW. DURATION: 4 DAY (09:00 - 18:00) COST: £1500 PER PERSON LOCATION: HAMPSHIRE THIS 4 DAY HEFAT COURSE IS WITHOUT DOUBT THE HIGHEST LEVEL OF HOSTILE ENVIRONMENT TRAINING AVAILABLE Hostile Environment First Aid Training (HEFAT) has been designed for those operating or working in hostile or elevated risk environments who require an advanced level of medical training. The skills taught on the HEAT course are taken to the next level by training delegates how to deal with more complex levels of medical conditions and trauma first aid training coupled with practical training in the use of advanced medical equipment and techniques. In line with all of our benchmark courses HEFAT ensures that travellers from all backgrounds are prepared for the widest possible threat levels across the widest field of environments and situations. Delegates leave aware of potential risks and confident that they have the skills and knowledge to deal with immediate and developing situations. No previous training or qualifications are required to attend this course. Unsure if this is the right course for you? Get in touch with our team to help you choose the best course for your needs. COURSE ELEMENTS. THREAT RISK ASSESSMENT AND MITIGATION ADVANCED TRAUMA AND FIRST AID TRAINING KIDNAP AND HOSTAGE VEHICLE SAFETY AND SECURITY POST TRAUMATIC AND ENVIRONMENTAL STRESS LANDMINE AND IED’S NAVIGATION TECHNIQUES WEAPON FAMILIARISATION CONFLICT MANAGEMENT RADIO AND VOICE COMMUNICATION
Supporting Microsoft SharePoint course description A concise hands on course enabling delegates to manage and administer a SharePoint site. What will you learn Perform initial farm configuration. Use stsadm commands. Manage content. Secure SharePoint. Customise SharePoint search. Monitor and performance tune SharePoint. Supporting Microsoft SharePoint server course details Who will benefit: Anyone working with Microsoft SQL server Prerequisites: SharePoint Administrators. Duration 2 days Supporting Microsoft SharePoint course contents SharePoint Introduction A SharePoint installation. Initial farm configuration. Creating a site collection. Administering SharePoint Stsadm commands, automation with PowerShell. Managing content Lists, libraries, items and documents Security SecureStore, Users and groups, roles and role assignments. Permission levels. SharePoint search Configure search, refine search. SharePoint performance Diagnostic logging, logging levels, Health anaylzer, performance bottlenecks.
Securing Kubernetes training course description This course introduces concepts, procedures, and best practices to harden Kubernetes based systems and container-based applications against security threats. It deals with the main areas of cloud-native security: Kubernetes cluster setup, Kubernetes cluster hardening, hardening the underlying operating system and networks, minimizing microservices vulnerabilities, obtaining supply chain security as well as monitoring, logging, and runtime security. What will you learn Harden Kubernetes systems and clusters. Harden containers. Configure and use Kubernetes audit logs. Securing Kubernetes training course details Who will benefit: Technical staff working with Kubernetes Prerequisites: Kubernetes_for_engineers_course.htm Definitive Docker for engineers Duration 2 days Securing Kubernetes training course contents This course does not only deal with the daily security administration of Kubernetes-based systems but also prepares delegates for the official Certified Kubernetes Security Specialist (CKS) exams of the Cloud Native Computing Foundation (CNCF). Structure: 50% theory 50% hands on lab exercise Module 1: User and authorization management Users and service accounts in Kubernetes Authenticating users Managing authorizations with RBAC Module 2: Supply chain security Vulnerabilit checking for images Image validation in Kubernetes Reducing image footprint Secure image registries Module 3: Validating cluster setup and penetration testing Use CIS benchmark to review the security configuration of Kubernetes components. Modify the cluster components' configuration to match the CIS Benchmark. Penetration testing Kubernetes for known vulnerabilities. Module 4: System hardening Use kernel hardening tools Setup appropriate OS level security domains Container runtime sandboxes Limit network access Module 5: Monitoring and logging Configure Kubernetes audit logs Configure Audit Policies Monitor applications behaviour with Falco
LTE training course description This course is designed to give the delegate an understanding of the technologies used within a 3G UMTS mobile network. During the course we will investigate the UMTS air interface and the use of Wideband-Code Division Multiple Access (WCDMA) to facilitate high speed data access, together with HSPA to offer mobile broadband services. We will describe the use of soft handover rather than hard handover procedures and soft capacity sharing. The course includes a brief exploration of the UMTS protocol stack and the use of PDP Context and QoS support features. What will you learn Explain the 3G UMTS architecture. Describe the role of a Drifting & Serving RNC. Explain the use of ARQ & HARQ for mobile broadband. Describe how IMS integrates into the architecture. Describe the use of Media Gateway Controllers. Identify the temporary identities used within 3G UMTS. LTE training course details Who will benefit: Anyone working within the telecommunications area, especially within the mobile environment. Prerequisites: Mobile communications demystified Telecommunications Introduction Duration 2 days LTE training course contents LTE Introduction The path to LTE, 3GPP. LTE to LTE advanced. LTE Architecture The core, Access, roaming. Protocols: User plane, Control plane. Example information flows. Bearer management. Spectrum allocation. LTE technologies Transmission, reception, OFDMA, multiple antenna, MIMO. LTE Air interface Air interface protocol stack. Channels, Resource Grid, cell acquisition. Up and downlink controls. Layer 2 protocols. Cell acquisition Power on, selecting networks and cells. RRC connection. Attach procedure. Mobility management Roaming, RRC_IDLE, RRC_CONNECTED, cell reselection, handover, interoperation with UMTS and GSM networks. Voice and text IMS, QoS, policy and charging.
SIP security training course description A hands-on course covering SIP security. It is assumed that delegates already know SIP as this course focuses purely on the security issues in SIP IP telephony networks. Hands-on practicals follow each major theory session and include use of various SIP security tools such as vomit, sipp, sipsak and sivus amongst others. What will you learn Secure SIP networks Use various SIP security tools SIP security training course details Who will benefit: Technical staff working with SIP. Technical security staff. Prerequisites: SIP for engineers Duration 2 days SIP security training course contents SIP review SIP infrastructure and entities, example SIP session. Hands on Simple SIP network with and without authentication. SIP security attacks DOS attacks, infrastructure attacks, eavesdropping, spoofing, replay, message integrity. Hands on Basic SIP packet capture, infrastructure attacks. SIP tools SIP packet creation: Sivus, SIPsak, PROTOS, SFTF, SIP bomber, SIPp, Seagull, Nastysip. SIP packet generators: SIPNess, NetDude. Monitoring: Wireshark, Cain & Abel, Vomit, Oreka, VoiPong. Scripts and tools: SIP-Fun, Skora.net, kphone-ddos, sip-scan, sip-kill, sip-redirectrtp. Health of different tools. Hands on Generating SIP packets, rebuilding conversations from captured packets, password cracking. VPNs and SIP IPSec, AH, ESP, transport mode, tunnel mode, Pre Shared Keys, Public keys. Hands on SIP calls over IPSec. Secure SIP signaling SIP relationship with HTTP, Deprecated HTTP 1.0 basic authentication, HTTP 1.1 Digest authentication, S/MIME, SIPS, SIPS URI, TLS, DTLS, PKI infrastructures. Hands on SIP with TLS. Secure media streams SRTP, features, packet format, default encryption, default authentication, key distribution. S/MIME, MIKEY, SDP security descriptions. SIP security agreements. Hands on Analysing SRTP packets. Firewalls NAT traversal. Impact of firewall on infrastructure attacks. TLS and firewalls. SIP specific firewalls. Hands on SIP calls through a firewall.
Definitive Puppet training course description Puppet is a framework and toolset for configuration management. This course covers Puppet to enable delegates to manage configurations. Hands on sessions follow all the major sections. What will you learn Deploy Puppet. Manage configurations with Puppet. Build hosts with Puppet. Produce reports with Puppet. Definitive Puppet training course details Who will benefit: Anyone working with Puppet. Prerequisites: Linux fundamentals. Duration 2 days Definitive Puppet training course contents Getting started with Puppet What is Puppet, Selecting the right version of Puppet, Installing Puppet, Configuring Puppet. Developing and deploying Puppet The puppet apply command and modes of operation, Foreground Puppet master, Developing Puppet with Vagrant, Environments, Making changes to the development environment, Testing the new environments with the Puppet agent, Environment branching and merging, Dynamic Puppet environments with Git branches, Summary, Resources. Scaling Puppet Identifying the challenges, Running the Puppet master with Apache and Passenger, Testing the Puppet master in Apache, Load balancing multiple Puppet masters, Scaling further, Load balancing alternatives. Measuring performance, Splay time, Summary, Going further, Resources. Externalizing Puppet configuration External node classification, Storing node configuration in LDAP, Summary, Resources. Exporting and storing configuration Virtual resources, Getting started with exported and stored configurations, Using exported resources, Expiring state resources, Summary, Resources. Puppet consoles The foreman, Puppet enterprise console, Puppetboard, Summary, Resources. Tools and integration Puppet forge and the module tool, Searching and installing a module from the forge, Generating a module, Managing module dependencies, Testing the modules, Developing Puppet modules with Geppetto, Summary, Resources. Reporting with Puppet Getting started, Configuring reporting, Report processors, Custom reporting, Other Puppet reporters, Summary, Resources. Extending Facter and Puppet Writing and distributing custom facts, Developing custom types, providers and functions, Summary, Resources, Complex data structures, Additional backends, Hiera functions in depth, Module data bindings, Hiera examples. Jiera-2, Summary, Resources. Mcollective Installing and configuring Mcollective, testing, Mcollective plugins, accessing hosts with Metadata. Hiera Lists, initial Hiera configuration, Hiera command line utility, complex data structures, additional backends, Hiera functions in depth, module data bindings. Hiera-2.