Employee Engagement 1 Day Training in Cardiff
Employee Engagement 1 Day Training in St Davids
IP addressing and subnetting course description A course focusing purely on IP addressing and subnetting. The course assumes that delegates already have some knowledge of IP addressing. In particular delegates will be able to calculate subnet numbers in seconds without using binary. What will you learn Download and install Wireshark. Calculate subnet numbers in seconds Design IP addressing schemes. Troubleshoot IP address problems. Calculate CIDR prefixes in seconds IP addressing and subnetting course details Who will benefit: Anyone working with TCP/IP. Prerequisites: TCP/IP Foundation for engineers Duration 2 days IP addressing and subnetting course contents IP addressing review What is an IP address? What is a subnet? Classless IP addressing. The rules of IP addressing. Ways IP addresses are used: On hosts, in packets, in routing tables. Hands on Byte boundary subnetting. Configuring IP addresses Interfaces, Static vs. dynamic configuration. DHCP: Scopes, leases, relays, using multiple DHCP servers. Multihoming. Subnetting Default subnet masks, subnet notations. How to subnet without binary. VLSMs. Hands on Bit boundary subnetting. Address ranges and routing Routing tables, IP address spoofing, host specific routing, subnets in routing tables, supernets in routing tables. CIDR. Impact of choice of routing protocol. Hands on IP addressing plans. Allocations and assignments IAB, IANA, RIRs, RIPE, LIRs and ISPs. PI vs. PA addressing. Hands on Querying the RIPE database. Private addressing and NAT NAT, NAPT, NAT terms, private addresses, NAT operation, NAT architecture, NAT and security, why use NAT? NAT-ALG, Types of NAT, RSIP. Special use addresses Unicasts, broadcasts, multicasts, anycasts. Directed broadcasts. Allowing broadcasts through routers.
Employee Engagement 1 Day Training in Newport
CWNA training course description A hands-on course focusing on the technical support of WiFi. Wireless LANs are often seen as simple communications that are simply installed and then left alone to work. This course ensures that delegates will be able to install WiFi networks which work but also enable the delegates to troubleshoot WiFi when it does go wrong. What will you learn Compare 802.11 standards. Configure WiFi networks. Troubleshoot WiFi networks using spectrum analysers, Wireshark and other tools. Implement 802.11 security. Perform RF surveys. CWNA training course details Who will benefit: Technical staff working with WiFi networks. Anyone wishing to pass the CWNA exam. Prerequisites: Intro to data communications & networking Duration 5 days CWNA training course contents Introduction History, standards. RF fundamentals What is RF? Wavelength, Frequency, Amplitude, Phase. Wave behaviour. RF components. Watts, mW, dB, SNR, Link budgets. Hands on Spectrum analysis. Listing WiFi networks. WiFi connection. inSSIDer. Antennas Radiation envelopes, polar charts, gain, Antenna types. Line of Sight, MIMO. Hands on Connecting, installing, changing antennae. RSSI values. 802.11 802.11-2007, 802.11 post 2007, 802.11 drafts. 802.11 b/g/n. Hands on WiFi performance measurement. Spread Spectrum RF frequency bands, FHSS, DSSS, OFDM. Channels. Hands on Configuring channels. Topologies Mesh, Access points, distribution systems, SSID. Hands on AP configuration. Client connection profiles. 802.11 MAC CSMA/CA, Management frames, control frames, data frames. Passive scanning, active scanning. Open system authentication. Shared Key authentication. Association. RTS/CTS. Power management. Hands on Capturing frames, analysing frames. WiFi architecture WiFi client, WLAN architecture: Autonomous, Centralised, distributed. WiFi bridges. WiFi routers. PoE. Hands on WLAN controllers. Troubleshooting RF interference, multipath, adjacent channels, low SNR, mismatched power. Coverage, capacity. 802.11 Security Basics, Legacy security: WEP, MAC filters, SSID cloaking. PSK, 8021.X/EAP, WPA/WPA2. TKIP/ CCMP encryption. Guest WLANs. Wireless attacks, intrusion monitoring. Hands on WEP cracking, WPA2 configuration. RADIUS. RF Site surveys Protocol and spectrum analysis, coverage analysis. Site survey tools. Hands on Performing a site survey.
Total H.248 training course description A course focusing purely on the H.248 protocol. Anyone working through the ITU standards documents can testify to the need of a training course to explain how H.248 really works. This course already assumes knowledge of other VoIP protocols and starts by positioning H.248 in relation to the other protocols. The course then looks at H.248 architectures and concepts before analysing H.248 messages and call flows. What will you learn Describe what H.248 is Recognise where H.248 fits in relation to other VoIP protocols. Explain how H.248 works. Analyse H.248 packets Total H.248 training course details Who will benefit: Technical staff working with H.248 Prerequisites: Voice Over IP. Duration 2 days Total H.248 training course contents What is H.248? Review of VoIP protocols: RTP, RTCP, SIP, SDP, H.323. The PSTN and SS7. Where H.248 fits into the picture. H.248 history. MGCP. The IETF. Megaco. ITU standards. H.248v1, v2, v3. H.248 architectures Media Gateways, Media Gateway Controllers, Gateway Control functions, Signalling Gateways. Reference architectures: IMS/TISPAN: IBCF, IWF, I-BGF, SPDF. MSF: S-SBG-NC, D-SBG-NC. GSMA: IPX Proxy. Softswitches. H.248 concepts The connection model, terminations, streams, contexts. Termination properties: descriptors, context properties. Events, signals, packages. H.248 messages Protocol stack, UDP, TCP. Message structure. Transactions, actions, commands. Requests, replies, acknowledgements. Sample message flows. Binary encoding, ASN syntax, Text encoding. H.248 commands Termination manipulation: Add, Subtract, Move, Modify. Event reporting: Notify. Management: AuditCapability, AuditValue, ServiceChange. H.248 Descriptors What are descriptors? Relationship with messages and commands. Basic descriptors, Descriptors composed of other descriptors. The 19 descriptors. Defaults. H.248 Transactions Groups of commands, transaction Ids, relationship with actions and commands. Requests and replies. H.248 wrap up What is a package? Basic packages. H.248 security. H.248 - SIP interoperation. H.248 interoperation with other protocols.
Intro to SQL training course description A hands on course focusing on the use of SQL. In particular this course does not concentrate on any particular version of SQL but rather enables delegates to recognise the differences found in SQL on different platforms. What will you learn Explain the difference between standard SQL and different flavours. Use SQL statements to query databases. Use SQL statements to define databases. Intro to SQL training course details Who will benefit: Anyone working with databases. Prerequisites: None. Duration 2 days Intro to SQL training course contents What is SQL? What is SQL? History, standards, What is SQL used for? Dialects, ANSI SQL, PL/SQL, Transact SQL, front ends. Database basics RDBMS, Tables. Hands on Investigating a database. Basic SQL commands SQL Overview: SQL DML, SQL DDL, SQL queries. SELECT, WHERE and ORDER BY clauses. Combining conditions. IN, LIKE and BETWEEN. Hands on Querying a database from existing tables. SQL data retrieval Scalar functions. Hands on Selecting data from an existing database. More SQL data retrieval Scalar functions, variations. Aggregate functions, GROUP BY. HAVING. Hands on Selecting data from an existing database. Table joins Multiple tables, joins, keys, inner joins, left joins, right joins. Hands on Selecting data from an existing database. SQL basic data manipulation INSERT, UPDATE, MERGE, DELETE. Transaction controls: COMMIT, ROLLBACK. Hands on Modifying data in tables. SQL Data Definition USE, CREATE, DROP, TRUNCATE, ALTER. Hands on Managing new tables and columns. Data control GRANT, REVOKE. Hands on Defining permissions.
Effecting Business Process Improvement: In-House Training Business analysts facilitate the solution of business problems. The solutions are put into practice as changes to the way people perform in their organizations and the tools they use. The business analyst is a change agent who must understand the basic principles of quality management. This course covers the key role that business analysts play in organizational change management. What you will Learn You will learn how to: Define and document a business process Work with various business modeling techniques Perform an enterprise analysis in preparation for determining requirements Analyze business processes to discern problems Foundation Concepts Overview of business analysis and process improvement Defining the business process Introducing the proactive business analyst Focusing on business process improvement for business analysts Launching a Successful Business Process Improvement Project Overview of the launch phase Understanding and creating organizational strategy Selecting the target process Aligning the business process improvement project's goals and objectives with organizational strategy Defining the Current Process Overview of current process phase Documenting the business process Business modeling options: work-flow models Business modeling options: Unified Modeling Language (UML) model adaptations for business processes Analyzing the Current Process Process analysis overview Evaluation: establishing the control group Opportunity techniques: multi-discipline problem-solving Opportunity techniques: matrices Building and Sustaining a Recommended Process Overview of the recommended process and beyond Impact analysis Recommended process Transition to the business case Return to proactive state
Advanced TCP/IP training course description An intensive advanced TCP/IP course focusing on the details of the protocols according to the RFCs. This course is designed to go into the technical details of the protocols and is not for those that are new to TCP/IP. A particular focus is on TCP and performance. Those more interested in routing protocols should see our Definitive IP routing for engineers course. It is expected that delegates are totally familiar with configuration addressing. Hands on sessions consist of protocol analysis using Wireshark. What will you learn Analyse packets and protocols in detail. Troubleshoot networks using Wireshark. Find performance problems using Wireshark. Perform network forensics. Advanced TCP/IP training course details Who will benefit: Advanced technical staff. Prerequisites: TCP/IP Foundation for engineers Duration 5 days Advanced TCP/IP training course contents IP Fragmentation and MTU issues, Path MTU discovery, Geolocation, unusual IP addresses, forwarding broadcasts, DiffServ, DSCP, ECN, assured and expedited forwarding. TTL usage in traceroute, Protocol field. Sanitising IP addresses in trace files. Wireshark and checksum errors. IPv6 The header. Extension headers. Traffic class and flow labels. Tunnelling. IPv6 and fragmentation. ARP Requests, responses, gratuitous ARP, Proxy ARP, ARP poisoning. ICMP ping, Round Trip Times, ICMP redirect, ICMP router advertisement and solicitation, Time Exceeded, Destination unreachable. ICMPv6: Similarity to ICMPv4, Neighbor discovery and the replacement of ARP. MLD. First hop redundancy ICMP discovery, HSRP, VRRP, GLBP. IGMP Multicast overview, multicast architecture, multicast addresses, IGMP v1, IGMPv2, IGMPv3. UDP Use in broadcasts and multicasts. Port numbers. TCP Connections, RST, FIN, sequence numbering, packet loss recovery, Fast recovery, RTO timeout, SACK, TCP flow control, receive window, congestion window, van Jacobsen, nagle, delayed ACKs, PSH, URG, TCP options, MSS, Window scaling, TCP timestamps. Congestion notification. Hands on Troubleshooting with sequence numbers, Wireshark IO and TCP graphs to analyse performance. Window size issues. DHCP DHCP header. Relationship to BOOTP. Discover, offer, request, decline, ACK, release. Lease, renewal and rebind times. Relay agents. DHCPv6 DNS Names and addresses, Resource Records, queries, responses, problems. MDNS. HTTP Requests, methods, request modifiers, response codes. HTTPS. SSL, TLS. Proxies. Hands on Redirects, recreating pages from packets. FTP Commands, responses, passive/active mode. Email SMTP, POP3, IMAP, commands responses. Voice and Video RTP, RTCP, SIP. IP PBXs. Traffic flows. Hands on Voice playback. SNMP MIBs, GET, TRAP, polling. Performance Baselining, high latency, Wireshark and timings, packet loss, redirections, small packets, congestion, name resolution. Security Network forensics, scanning and discovery, suspect traffic. IPsec, SSH.
About this Training Course This intensive 5 full-day has been designed as a separately bookable course comprising 3 days of Well Integrity (Basic) and 2 days of Advanced Well Integrity. The intensive 3 full-day course will equip the participants with a thorough knowledge of well integrity management and risk assessment in producing assets. Based on the regulatory requirements and using real examples and exercises from around the world, this represents best practice integrity management within the oil and gas industry. When to take action with a well is a critical decision, both from a safety and economic perspective. A consistent approach to decision-making provides certainty within the organisation, focusing effort, and spending wisely. The decision-making steps will be set out to ensure all critical aspects are captured consistently. Risk analysis approaches used by different organisations and examples of risk management and risk-ranking methods will be discussed. The 2 full-day course will deepen the participants' knowledge of well integrity management, and skills for designing, operating, and maintaining well equipment. The ultimate goal is to optimise productivity at the lowest Unit Operating Cost (UOC) and to maintain mechanical integrity throughout well life cycle. Well Integrity management is looked at in three distinct stages. The first stage is during the well design which includes material selection, engineering design, cement design, coating and inhibitors and cathodic protection. The second stage is monitoring the well during the life of the well, locating possible leaks and / or loss of metal. The last stage is to manage and control any well integrity issues using specialised products, services and techniques. Training Objectives 1. Well Integrity Training: Upon completion of this course, the participants will be able to: Define the building blocks of a successful well integrity management system Develop an approach to risk management, understand risk analysis and methods applied across the industry How do we 'Make Wells Safer', learn about emerging technologies for well integrity problem diagnosis and new techniques available to 'repair' the issues Execute the basic elements of well integrity management training for field operators Evaluate well design elements that enhance or hinder well integrity status definition during the operating phase of the well life-cycle Gain the demonstrable benefits of well integrity management from field experience Review cases studies and discuss them to enhance knowledge and take on board lessons learned 2. Advanced Well Integrity: Define well integrity well categorization based on compliance to the barrier policy outlined in the regulations and develop an approach to risk management Discuss well-completion design and construction to create a 'integer' well with the lowest life cycle maintenance cost from a WIM perspective Monitoring and surveillance of well integrity, focusing on barrier competence such as cementing and corrosion Investigate and manage well integrity issues, causes & potential solutions Understand repairs needed to address 'Loss of Well Operating Envelope' Gain an overview understanding of Well Suspension & Well Abandonment Discuss further case studies as well as conduct a post course test Target Audience Invaluable for production, operations, and integrity professionals involved in implementing & managing well integrity and seeking to improve performance. It is also essential for those who need to develop and implement such systems, or who have a general need to know and understand more about well integrity management. The course will also provide a fresh approach for senior professionals and managers. Designed for professionals in the oil and gas industry who are involved in the design, construction and operation of wells from the following disciplines: Production Maintenance Production Operations Drilling Engineering Safety engineering Well Intervention Well Integrity Engineering Asset Management Course Level Intermediate Advanced Trainer Gordon Duncan has over 40 years of experience in the Oil & Gas industry. During that time, he has worked exclusively in well intervention and completions. After a number of years working for intervention service companies (completions, slickline & workovers), he joined Shell as a well service supervisor. He was responsible for the day-to-day supervision of all well intervention work on Shell's Persian/Arabian Gulf platforms. This included completion running, coil tubing, e-line, slickline, hydraulic workovers, well testing and stimulation operations. An office-based role as a senior well engineer followed. He was responsible for planning, programming and organising of all the well engineering and intervention work on a number of fields in the Middle East. He had a brief spell as a Site Representative for Santos in Australia before joining Petro-Canada as Completions Superintendent in Syria, then moved to Australia as Completions Operations Superintendent for Santos, before returning to Shell as Field Supervisor Completions and Well Interventions in Iraq where he carried out the first ever formal abandonment of a well in the Majnoon Field. While working on rotation, he regularly taught Completion Practices, Well Intervention, Well Integrity and Reporting & Planning courses all over the world. In 2014, he started to focus 100% on training and became the Technical Director for PetroEDGE. Since commencing delivering training courses in 2008, he has taught over 300 courses in 31 cities in 16 countries to in excess of 3,500 participants. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations