EnergyEdge offers a top-notch course on casing and tubing design, providing you with the skills and knowledge to excel in the field. Enroll now.
Embark on a transformative journey with Kranti Yoga's 300-Hour Workshop, a soul-enriching experience designed to deepen your understanding of yoga, nurture self-discovery, and enhance overall well-being. Whether you're a seasoned practitioner or a novice, this immersive workshop invites you to explore the profound teachings of yoga in a supportive and tranquil environment.
IP demystified training course description A concise overview course covering TCP/IP with particular emphasis on the addressing and security issues of TCP/IP networks. What will you learn Describe TCP/IP. List the rules of IP addressing. Recognise the impact of the addressing rules on adds/moves and changes. Recognise the use of subnet masks. Explain how firewalls work. Recognise the role of DNS. IP demystified training course details Who will benefit: Anyone, although the course is particularly aimed at non-technical personnel needing some knowledge of TCP/IP. Prerequisites: Network fundamentals Duration 1 day IP demystified training course contents What is TCP/IP? What is IP? What is TCP? What is TCP/IP? Internetworking, protocols, services. The Internet, RFCs, comparison with OSI 7 layer model. Basic configuration IP addresses, subnet masks, default gateways, DHCP, ping. Addressing IP address format, rules of IP addressing, where to get IP addresses, private addresses, subnet masks, How subnet masks are used to determine network numbers. Ranges of addresses. NAT Private versus public IP addresses, NAT, NAPT. IPv6 What is IPv6, IPv6 usage, Why IPv6, 128bit IPv6 addresses, IPv6 migration, dual stack, tunnelling. Routing What is a router? how routers join networks, benefits and disadvantages of routers, default gateways, routing tables, routing protocols. Traceroute. Firewalls What is a firewall, firewall architectures, filtering, DMZ, Proxy servers, stateful packet inspection. DNS How hostnames are converted to IP addresses.
Network automation training course description This course concentrates on the technical side of tools and languages for network DevOps rather than the soft skills. These tools include Python, Ansible, Git and NAPALM By the end of the course delegates should be able to recognise the tools that they can use to automate their networks and be able to use the knowledge gained to feel confident approaching network automation. What will you learn Describe network DevOps. Choose network automation tools. Explain the role of various network automation technologies including: Python Ansible Git NAPALM Network automation training course details Who will benefit: Those wishing to learn about the tools of network automation. Prerequisites: Introduction to data communications. Duration 1 day Network automation training course contents What is DevOps and network automation Programming and automating networks, networks and clouds, AWS, OpenStack, SDN, DevOps for network operations. Unit testing. Hype vs reality. Benefits and features. Network monitoring and troubleshooting Traditional methods, SNMP. Netflow and xflow. Traditional automation. Streaming telemetry. Event driven automation. gRPC, Protocol buffers. Configuration management Catch 22 and initial configuration. ZTP, POAP. Traditional automation. TFTP. Ansible vs the rest (chef, salt, puppet). Jinja2 and templating. How ansible works. Network programmability Programming languages. Linux, shell scripting. Python vs the rest. Off box vs on box automation. Python network libraries Sockets pysnmp, ncclient, paramiko, netmiko, pyez, NAPALM. APIs Proprietary APIs, CLI, NETCONF, RETCONF. YANG, XML, YAML, JSON. Other tools Git, GitHub, Jenkins, JIRA and others.
VoIP and IP Telephony training course description A concise overview course for management covering voice communications using IP networks. The course focuses on how VoIP works at a simplified level enabling delegates to recognise the key decisions to be made when implementing VoIP. What will you learn Describe the key buzzwords used in the VoIP arena. Explain how VoIP and IPT work (at a simplified level). Describe the issues of providing a converged architecture. Recognise the key decisions to be made when implementing VoIP VoIP and IP Telephony training course details Who will benefit: Anyone, although the course is particularly aimed at non-technical personnel needing some knowledge of VoIP. Prerequisites: Network fundamentals Duration 1 day VoIP and IP Telephony training course contents Introduction What is VoIP, brief review of IP, brief review of telephones, voice and signalling. VoIP issues Bandwidth, Delay, Jitter. Voice coding and compression, packetising voice, comparison of techniques, MOS.IP performance and QoS. The need for QoS, prioritising voice. Architectures Hard phones, soft phones, video phones, desktop, backbone, gateway, integrating analog phones and PCs, carriers, Softswitches. VoIP protocol stack RTP, RTCP. H.323 vs SIP, other signalling protocols. H.323 Architecture, Call setup, Gatekeepers. SIP Comparison with H.323, SIP proxy, proxy servers, redirect servers, location servers. MGCP and MegaCo Carrier networks, PSTN breakout, SS7 gateways, MGCP, Megaco. IP PBXs Integrating IP into 'normal' PBXs, IP PBXs, Asterisk. UM, other telephony applications.
Everyone has what it takes to become an effective leader, but first you must learn the skills needed to succeed in a position of responsibility. Our program will help people nurture the talent within and allow managers to lead confidently. Sometimes, working longer hours isn’t the right approach, as you risk burning out and abandoning the task at hand. Instead, effective leadership teaches you how to organise your workload, practice better time management and learn the power of delegation.
Peering demystified training course description A concise overview course covering The Internet and peering. Particular emphasis is placed on the structure of the Internet, how IXs benefit the Internet, IX architectures, peering and the technical buzzwords behind the IX services. What will you learn Describe the structure of the Internet Explain the role of RIPE, ARIN and IXs in the Internet Explain how IXs connect ISPs and the benefits of using IXs. Describe peering from a technical perspective including the role of BGP and AS's. Peering demystified training course details Who will benefit: Non technical staff working for Internet companies. Prerequisites: None. Duration 1 day Peering demystified training course contents IP and routers IP as glue. What is a router? How routers join networks, benefits and disadvantages of routers, default gateways, routing tables, routing protocols. Addressing IP address format, rules of IP addressing, where to get IP addresses. Subnetting and groups of IP addresses. The Internet What is the Internet? The big picture, IP basics, registering IP addresses, DNS and registering domain names, whois, The IAB, IANA, ICANN, RIPE and other Internet organisations. ISPs Top ISPs, Tier 1, Tier 2 and Tier 3 ISPs, backbone providers, circuit providers, content providers, virtual ISPs, the internal network of ISPs. Customer connections to ISPs (DSL, Leased lines, MPLSâ¦) ISP to ISP connections: Peering points Public peering versus private peering, NAPs, Internet Exchanges, Metropolitan Area Exchanges, LINX, other major peering points, the geography of the Internet. BGP and ASNs. How to peer. IRRs. IX architecture Ethernet switching.
Dive deep into seismic stratigraphic interpretation in various basin settings with EnergyEdge's specialized course. Enroll in our classroom training today!
About this Training Course The prospect maturation process, from a lead to a drillable prospect, is at the heart of the exploration business. This 5 full day course will cover all aspects of the prospect maturation process: play understanding in the context of regional geological understanding, detailed prospect evaluation; realistic risk & volume assessment consistent with the play understanding and prospect details, and an introduction to exploration economics. Throughout the course, there is a strong focus on pragmatic (geo)logical approach for assessing those aspects that are input parameters for a meaningful assessment of prospect risks and volumes, with emphasis on a balanced integration of contributions from different sub-surface disciplines. Many examples from basins from around the world are used to illustrate how traps, reservoirs, seals and charge occur in different basin settings. Specifics topics that will be discussed include the following: The statistical fundamentals for risk and volume assessment will be presented, with practical exercises for understanding the results of a risk & volume assessment as they are displayed in expectation curves. The difference between risk and uncertainty. A full discussion of the essential requirements for a working petroleum system: Trap, reservoir, seal and charge. Examples of how traps, reservoirs, seals and charge work in different basin types around the globe and in Australian basins. Exercises and guidelines for estimating uncertainties for prospect parameters, including advice for deciding which distribution type to use, and how to constrain those distributions for meaningful uncertainty ranges (setting minimum most likely and maximum values). Particular emphasis will be given to estimating hydrocarbon column lengths with their associated uncertainties in undrilled prospects. Prospects and plays: The value of play maps and how these should be used for assessment of prospect risks and for ranking of prospects within a play. Calculating volume ranges for prospects. Calculating volumes for groups of prospects; how to add risked prospect volumes for a statistically correct representation of the volume promise of a portfolio of prospects. Geophysical evidence: Incorporating geophysical evidence (DHIs) consistently and realistically in a risk assessment. An understandable and geology-based workflow, consistent with Bayes theorem, will be presented. Exploration economics. Training Objectives What this course will cover in 5 days: This course describes the various aspects that need to be considered in the prospect maturation process, including: Play development in the context of a sound understanding of the regional geology Detailed prospect evaluation and understanding of the critical aspects of traps, reservoirs, seals and charge Examples from plays and prospects in different basin settings from around the globe Realistic and pragmatic risk and volume assessment, based on the geological understanding of plays and prospects An introduction to exploration economics Examples of plays, oil and gas fields and prospects from basins from around the world, including the Far East, will be given. Target Audience This course is designed primarily for Geoscientists in exploration who would like to improve their expertise of the prospect maturation process and risk and volume assessment. The course has proven to be of value for explorers in the early phase of their career, seasoned explorers and team leaders. It will also benefit staff from disciplines working closely with exploration staff including Prospect Portfolio Analysts, Petrophysicists, Geophysicists and Reservoir Engineers. Course Level Intermediate Training Methods At the end of the course, the participants will have a good understanding of the essentials for realistic risk and volume assessments of exploration prospects. The course should allow participants to produce well-considered and realistic assessments for prospects they may be working on, and to understand and constructively challenge risk and volume assessments of colleagues and/ or partners/ competitors. Each topic is introduced by a lecture, and learning is re-inforced by practical exercises and discussions. Hand-out materials in paper and/or electronic format will be provided. Time will be made available to discuss aspects of prospects that may be brought in by course participants. Trainer Your expert course leader has a PhD in Geology from the University of Utrecht. He worked for 31 years (1979 -2010) with Shell as an exploration geologist in a variety of functions across the globe. As Principle Technical Expert, he was responsible for ensuring that Risk & Volume assessments were carried out consistently and correctly in all of Shell's exploration units. In this capacity, he led and participated in countless prospect review sessions and developed and conducted a successful in-house course on Risks & Volume assessment. As manager of the Exploration Excellence Team, he performed in depth analysis of basins and plays and provided advice on exploration opportunities to senior management. Together with his team, he visited most of Shell's exploration offices, working hands-on with Shell's local exploration teams to generate new play and prospect ideas and to suggest evaluation techniques and technologies to apply. In 2010, he was appointed as extraordinary professor Regional and Petroleum Geology at the VU university of Amsterdam and in 2012 also at the University of Utrecht. He was visiting professor at the University of Malaya (Malaysia). Through his own consultancy, as of 2010, he provides advice on exploration activities to several companies and is regularly invited to carry out technical reviews. Activities cover all continents and include Portfolio Reviews, Prospect assessment, Play-based Exploration, and Geothermal activities. He conducts courses on several topics including Risk & Volume Assessment, Prospect Maturation, Basin Analysis, Play-based Exploration, Trap & Seal Analysis, Petroleum Geology for Non-geologists. Some of his recent publications include: De Jager, J. & van Winden, M. (2020): Play-Based Exploration of the petroleum potential of the Tremp-Graus, AÃnsa and eastern Jaca Sub-basins in the southern Pyrenees. Invited contribution for Digital Geology, EAGE special publication (eds: Grötsch, J. & Pöppelreiter, M.) De Jager, J. (2020). Concepts of Conventional Petroleum Systems. Invited contribution for Regional Geology and Tectonics Volume 1: Global Concepts, Techniques and Methodology (eds: Adam, J., Chiarelly, D. & Scarselli, N.) De Jager, J. (2021): Handbook Risk & Volume Assessment. Self-published De Jager, J., Van Ojik, K & Smit, R. (2023 - in preparation): Geological Development of The Netherlands. In: Geology of The Netherlands (eds: Ten Veen, J., Vis, G-J., De Jager, J. @ Wong, T.) POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations
WANs training course description A concise overview course covering Wide Area Networks with particular emphasis on the WAN options available including the use of the Internet. What will you learn Choose and evaluate WAN technologies. Recognise the role of service providers. Describe the benefits of VPNs. Describe how the Internet can be used as a WAN. Describe the equipment needed to connect LANS to WANS. List the speeds of various WAN technologies. WANs training course details Who will benefit: Anyone, although the course is particularly aimed at non-technical personnel needing some knowledge of WANS. Prerequisites: Network fundamentals Duration 1 day WANs training course contents WANS WAN architecture, Common WAN terms, Core vs access, service providers, relationship with 7 layer model, WAN equipment, how to choose a WAN. Layer 1 Copper, phone lines, fibre, coaxial, satellite, wireless. Cabling to the building, CPE cabling, interfaces. Layer 2 Dial up vs. Dedicated vs. packet switched networks and when to use them. Packet switching vs. circuit switching. Point to point and point to multipoint. Dialup access technologies Modems, ISDN, BRI, PRI. Access with dedicated lines XDSL, leased lines. WAN services X.25, SMDS, Frame Relay, CIR, ATM, Internet, MANS, dark fibre and other services. Case study: Selecting WAN technologies. Service provider technologies MPLS, SDH, WDM, DWDM. Routers Network addressing, default gateways, routing tables, routing protocols. Internet architecture Service providers, ISPs, private peering, public peering, core WANs in the Internet. VPNs Private networks, public networks, What are VPNs?, benefits of VPNs, tunnelling, encryption, IPSec. Case study: Specifying WAN connectivity.