About this Training Course This 5 full-day course provides detailed description of all combustion equipment and systems used in pulverized coal boilers and circulating fluidized bed (CFB) boilers including pulverized coal burning systems, coal feeder, pulverizer and classifier, pulverized coal burners, furnace and fans. This course provides also a comprehensive explanation of all boiler combustion control systems including pulverizer control system, combustion control, control of coal and air flow into the boiler, furnace pressure control, oxygen trim control, nitrogen oxides (NOx) and sulfur oxides (SOx) control, control of ammonia injection, flue gas dew point control, purge control, flame monitoring and tripping system as well as their tuning methods. All boiler control systems are covered as well in this course including drum level feedwater control, main steam and reheat steam temperature control, boiler limits and runback, sliding or variable pressure control, heat rate optimization with sliding pressure control, boiler-turbine coordinated control, etc. The course provides also detailed explanation of Boiler NFPA 85 Code (Boiler and Combustion Systems Hazards Codes) and American National Standard Institute/Instrument Society of America Code (ANSI/ISA-77-44-01-2007 Code). The burner management systems (BMS) and examples of boiler permissive starting logic and protective tripping logic will be explained thoroughly. The various methods used to calculate the boiler efficiency are covered in detail in this course including the direct and indirect methods. All the factors which affect the efficiency and emissions of pulverized coal boiler and CFB boiler will be explained thoroughly. The course covers also all the methods used to improve the efficiency of pulverized coal boilers and CFB boilers including improvement to their combustion efficiency and control systems performance. Training Objectives Boiler Combustion Equipment and Systems: Gain an in-depth understanding of all boiler combustion equipment and systems including pulverized coal burning systems, coal feeder, pulverizer and classifier, pulverized coal burners, furnace and fans Boiler Combustion Control Systems: Gain a thorough understanding of all boiler combustion control systems for pulverized coal boilers, and CFB boilers including pulverizer control system, combustion control, control of coal and air flow into the boiler, furnace pressure control, oxygen trim control, nitrogen oxides (NOx) and sulfur oxides (SOx) control, control of ammonia injection, flue gas dew point control, purge control, flame monitoring and tripping system Boiler Conventional Control Systems: Gain an in-depth understanding of all boiler conventional control systems including drum level feedwater control, main steam and reheat steam temperature control, boiler limits and runback, sliding or variable pressure control, heat rate optimization with sliding pressure control, and boiler-turbine coordinated control Boiler NFPA 85 Code (Boiler and Combustion Systems Hazards Codes) and American National Standard Institute/Instrument Society of America Code (ANSI/ISA-77-44-01-2007 Code): Learn about NFPA 85 code and ANSI/ISA-77-44-01-2007 code Burner Management System and Boiler Permissive Starting Logic and Protective Tripping Logic: Gain an in-depth understanding of burner management system and boiler permissive starting logic and protective tripping logic Boiler Efficiency Calculations: Learn how to calculate the boiler efficiency using the direct and indirect methods Factors Affecting the Efficiency and Emissions of Boilers: Understand all the factors which affect the boiler efficiency and emissions Methods Used to Improve the Efficiency of Boilers: Learn about all the methods used to improve the efficiency of pulverized coal boilers, and CFB boilers including improvement to their combustion efficiency and control systems performance Boiler Instrument and Piping Diagrams: Gain an in-depth understanding of all boiler instrument and piping diagrams CFB and Pulverized Coal Boilers Equipment and Systems: Learn about various types of equipment and systems used in CFB and pulverized coal boilers including economizers, steam drum, superheaters, air preheaters, ammonia injection systems, etc. Target Audience Engineers of all disciplines Managers Technicians Maintenance personnel Other technical individuals Course Level Basic or Foundation Training Methods Your specialist course leader relies on a highly interactive training method to enhance the learning process. This method ensures that all participants gain a complete understanding of all topics covered. The training environment is highly stimulating, challenging, and effective because the participants will learn by case studies which will allow them to apply the material taught to their own organization. Each delegate will receive a copy of the following materials written by the instructor: Excerpt of the relevant chapters from the 'POWER GENERATION HANDBOOK' second edition published by McGraw-Hill in 2012 (800 pages) Excerpt of the relevant chapters from the 'POWER PLANT EQUIPMENT OPERATION AND MAINTENANCE GUIDE' published by McGraw-Hill in 2012 (800 pages) COMBUSTION ENGINEERING FOR COAL FIRED POWER PLANTS MANUAL (includes practical information about combustion engineering for coal fired power plants - 550 pages) Trainer Your specialist course leader has more than 32 years of practical engineering experience with Ontario Power Generation (OPG), one of the largest electric utility in North America. He was previously involved in research on power generation equipment with Atomic Energy of Canada Limited at their Chalk River and Whiteshell Nuclear Research Laboratories. While working at OPG, he acted as a Training Manager, Engineering Supervisor, System Responsible Engineer and Design Engineer. During the period of time, he worked as a Field Engineer and Design Engineer, he was responsible for the operation, maintenance, diagnostics, and testing of gas turbines, steam turbines, generators, motors, transformers, inverters, valves, pumps, compressors, instrumentation and control systems. Further, his responsibilities included designing, engineering, diagnosing equipment problems and recommending solutions to repair deficiencies and improve system performance, supervising engineers, setting up preventive maintenance programs, writing Operating and Design Manuals, and commissioning new equipment. Later, he worked as the manager of a section dedicated to providing training for the staff at the power stations. The training provided by him covered in detail the various equipment and systems used in power stations. In addition, he has taught courses and seminars to more than four thousand working engineers and professionals around the world, specifically Europe and North America. He has been consistently ranked as 'Excellent' or 'Very Good' by the delegates who attended his seminars and lectures. He written 5 books for working engineers from which 3 have been published by McGraw-Hill, New York. Below is a list of the books authored by him; Power Generation Handbook: Gas Turbines, Steam Power Plants, Co-generation, and Combined Cycles, second edition, (800 pages), McGraw-Hill, New York, October 2011. Electrical Equipment Handbook (600 pages), McGraw-Hill, New York, March 2003. Power Plant Equipment Operation and Maintenance Guide (800 pages), McGraw-Hill, New York, January 2012. Industrial Instrumentation and Modern Control Systems (400 pages), Custom Publishing, University of Toronto, University of Toronto Custom Publishing (1999). Industrial Equipment (600 pages), Custom Publishing, University of Toronto, University of Toronto, University of Toronto Custom Publishing (1999). Furthermore, he has received the following awards: The first 'Excellence in Teaching' award offered by PowerEdge, Singapore, in December 2016 The first 'Excellence in Teaching' award offered by the Professional Development Center at University of Toronto (May, 1996). The 'Excellence in Teaching Award' in April 2007 offered by TUV Akademie (TUV Akademie is one of the largest Professional Development centre in world, it is based in Germany and the United Arab Emirates, and provides engineering training to engineers and managers across Europe and the Middle East). Awarded graduation 'With Distinction' from Dalhousie University when completed Bachelor of Engineering degree (1983). Lastly, he was awarded his Bachelor of Engineering Degree 'with distinction' from Dalhousie University, Halifax, Nova Scotia, Canada. He also received a Master of Applied Science in Engineering (M.A.Sc.) from the University of Ottawa, Canada. He is also a member of the Association of Professional Engineers in the province of Ontario, Canada. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
About this training course This 5 full-day course will provide a comprehensive understanding of the design of circulating fluidized bed (CFB) boilers. The design of all CFB boiler components and equipment including furnace, cyclones, economizers, superheaters, reheaters, loop seals, expansion joints, refractory, and L-valves will be covered in detail. All potential operating problems and major operating problems, corrective actions and maintenance required for CFB boilers will be covered thoroughly. This course will focus on designing CFB boilers that have the highest efficiency, and maximum longevity and capacity factor. All the common problems encountered in CFB Boilers will be discussed in detail.This includes thermally induced failures, anchor system induced failures, water walls tube failures, NMEJ damages, clinker formation, refractory damages, APH tube chock-up, erosion and corrosion. The solutions to each of these problems will be presented. All repair and refurbishment methods, preventive and predictive maintenance required for CFB boilers will be covered in-depth. Several studies have confirmed that CFB boilers are the best method for power generation.This is due to their fuel flexibility, and lowest electricity cost among all types of boilers. This technology is in great demand due to various other advantages such as lower emissions as compared to other types of boilers and has a carbon footprint well below the norms laid down by the World Bank emission requirements. This course is a MUST for anyone who is involved in the design, operation or maintenance of circulating fluidized bed boilers, because it covers how these boilers are designed and provides guidelines and rules that ensure the CFB boilers have great performance. This course will also provide up-dated information in respect to the design of supercritical once-through CFB boilers and ultra supercritical CFB boilers. Training Objectives Circulating Fluidized Bed Boiler Design: Gain a thorough understanding of the best design methods of circulating fluidized bed boilers. Design of Circulating Fluidized Bed Boiler: Components and Systems: Learn all the techniques used to design CFB boiler equipment and systems including furnace, cyclones, economizers, superheaters, reheaters, loop seals, expansion joints, refractory, and L-valves. Design of Circulating Fluidized Bed Boiler to Achieve Highest Efficiency, and Best Performance and Economics: Gain a thorough understanding of all the methods used to design CFB boilers having the highest efficiency, longevity and capacity factor as well as best economics. Circulating Fluidized Bed Boiler Equipment: Learn about various equipment of circulating fluidized bed boilers including: furnaces, cyclones, economizers, superheaters, reheaters, ammonia injection systems, electrostatic precipitators, polishing dry scrubbers, fuel and sorbent feeding systems, bottom ash handling and extraction systems and materials. Circulating Fluidized Bed Boiler Environmental Emissions: Learn about the monitoring and control of environmental emissions from circulating fluidized boilers. Circulating Fluidized Bed Boiler Instrumentation and Control Systems: Learn about the latest instrumentation and control systems of circulating fluidized bed boilers. Circulating Fluidized Bed Boiler Reliability and Testing: Increase your knowledge of predictive and preventive maintenance, reliability and testing of circulating fluidized bed boilers. Circulating Fluidized Bed Boiler Selection and Applications: Gain a detailed understanding of the selection considerations and applications of circulating fluidized bed boilers. Circulating Fluidized Bed Boiler Maintenance: Learn all the maintenance activities required for circulating fluidized bed boilers, to minimize their operating cost and maximize their efficiency, reliability, and longevity. Circulating Fluidized Bed Boiler Refurbishment, and Life Extension Methods: Learn about life cycle cost, profitability, refurbishment, and life extension methods for all types of circulating fluidized bed boilers. Circulating Fluidized Bed Boiler Commissioning: Understand all the commissioning requirements of circulating fluidized bed boilers. Circulating Fluidized Bed Boiler Codes and Standards: Learn all the codes and standards applicable for circulating fluidized bed boilers. Target Audience Engineers of all disciplines Managers Technicians Maintenance personnel Other technical individuals Training Methods Your specialist course leader relies on a highly interactive training method to enhance the learning process. This method ensures that all participants gain a complete understanding of all topics covered. The training environment is highly stimulating, challenging, and effective because the participants will learn by case studies which will allow them to apply the material taught to their own organization. Each delegate will receive a copy of the following materials written by the instructor: 'POWER GENERATION HANDBOOK' published by McGraw-Hill in 2012 (800 pages) Design of Circulating Fluidized Bed Boiler manual (600 pages) Trainer Your specialist course leader has more than 32 years of practical engineering experience with Ontario Power Generation (OPG), one of the largest electric utility in North America. He was previously involved in research on power generation equipment with Atomic Energy of Canada Limited at their Chalk River and Whiteshell Nuclear Research Laboratories. While working at OPG, he acted as a Training Manager, Engineering Supervisor, System Responsible Engineer and Design Engineer. During the period of time, he worked as a Field Engineer and Design Engineer, he was responsible for the operation, maintenance, diagnostics, and testing of gas turbines, steam turbines, generators, motors, transformers, inverters, valves, pumps, compressors, instrumentation and control systems. Further, his responsibilities included designing, engineering, diagnosing equipment problems and recommending solutions to repair deficiencies and improve system performance, supervising engineers, setting up preventive maintenance programs, writing Operating and Design Manuals, and commissioning new equipment. Later, he worked as the manager of a section dedicated to providing training for the staff at the power stations. The training provided by him covered in detail the various equipment and systems used in power stations. In addition, he has taught courses and seminars to more than four thousand working engineers and professionals around the world, specifically Europe and North America. He has been consistently ranked as 'Excellent' or 'Very Good' by the delegates who attended his seminars and lectures. He written 5 books for working engineers from which 3 have been published by McGraw-Hill, New York. Below is a list of the books authored by him; Power Generation Handbook: Gas Turbines, Steam Power Plants, Co-generation, and Combined Cycles, second edition, (800 pages), McGraw-Hill, New York, October 2011. Electrical Equipment Handbook (600 pages), McGraw-Hill, New York, March 2003. Power Plant Equipment Operation and Maintenance Guide (800 pages), McGraw-Hill, New York, January 2012. Industrial Instrumentation and Modern Control Systems (400 pages), Custom Publishing, University of Toronto, University of Toronto Custom Publishing (1999). Industrial Equipment (600 pages), Custom Publishing, University of Toronto, University of Toronto, University of Toronto Custom Publishing (1999). Furthermore, he has received the following awards: The first 'Excellence in Teaching' award offered by PowerEdge, Singapore, in December 2016 The first 'Excellence in Teaching' award offered by the Professional Development Center at University of Toronto (May, 1996). The 'Excellence in Teaching Award' in April 2007 offered by TUV Akademie (TUV Akademie is one of the largest Professional Development centre in world, it is based in Germany and the United Arab Emirates, and provides engineering training to engineers and managers across Europe and the Middle East). Awarded graduation 'With Distinction' from Dalhousie University when completed Bachelor of Engineering degree (1983). Lastly, he was awarded his Bachelor of Engineering Degree 'with distinction' from Dalhousie University, Halifax, Nova Scotia, Canada. He also received a Master of Applied Science in Engineering (M.A.Sc.) from the University of Ottawa, Canada. He is also a member of the Association of Professional Engineers in the province of Ontario, Canada. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
Overview The course introduces the participants to the importance of personnel in any organisation, and the systematic processes of handling personnel to bring out the best in them in order to achieve the objectives of the organisation is the responsibility of the holder of this certificate. The course curriculum covers human resource planning; recruitment and selection; employee training and development; employee health and safety etc.
About this Training Course This 5 full-day course will focus on geological fundamentals: how different basin types differ in subsidence mechanisms, basin cycles, heat flow through time, depositional systems, structural styles and their type of petroleum systems. This will allow participants to make realistic interpretations in new areas; interpretations that are consistent with the specific basin type and to be expected depositional systems and structural styles. In addition, through simple paper-based exercises, the course will provide background and understanding of how some of the typical PBE products are made: creaming curves, Field-size plots and Yet-to-find. Finally, the essentials of commercial assessments will be covered. Training Objectives To provide participants with a sound understanding how, and under which conditions different basin types develop, and what the impact of their development is on the typical petroleum systems of these different basin types. To teach evaluation techniques that assist in the regional understanding and illustration of sedimentary basins and their development. While some of these techniques can be done using computers, in the course these will be done 'by hand' for maximum understanding. Target Audience This course is designed in the first place for geoscientists working in exploration and their direct supervisors. The course is also very instructive for specialist staff working closely with exploration staff such as (bio)stratigraphers, geochemists, basin modelers, structural geologists, geophysicists, reservoir engineers and petrophysicists. Course Level Intermediate Training Methods Each topic is introduced by a lecture, and leaning is re-enforced by practical exercises (on paper). There is ample time for discussions of general issues and any specific questions participants may have. For several exercises participants will be invited to do exercises on a basin of their choice, which will make the course more impactful for the participants. Participants will be provided with the following pre-read material: Concepts of Conventional Petroleum Systems. De Jager, J. (2020). Invited contribution for Regional Geology and Tectonics Volume 1: Global Concepts, Techniques and Methodology (eds: Adam, J., Chiarelly, D. & Scarselli, N. Play-Based Exploration of the petroleum potential of the Tremp-Graus, Ainsa and eastern Jaca Sub-basins in the southern De Jager, J & van Winden, M. (2020). invited contribution for Digital Learning - Multi-scale analysis of depositional systems and their subsurface workflows (eds: Grötsch, J. & Pöppelreiter, M.), EAGE. Trainer Your expert course leader has a PhD in Geology from the University of Utrecht. He worked for 31 years (1979 -2010) with Shell as an exploration geologist in a variety of functions across the globe. As Principle Technical Expert, he was responsible for ensuring that Risk & Volume assessments were carried out consistently and correctly in all of Shell's exploration units. In this capacity, he led and participated in countless prospect review sessions and developed and conducted a successful in-house course on Risks & Volume assessment. As manager of the Exploration Excellence Team, he performed in depth analysis of basins and plays and provided advice on exploration opportunities to senior management. Together with his team, he visited most of Shell's exploration offices, working hands-on with Shell's local exploration teams to generate new play and prospect ideas and to suggest evaluation techniques and technologies to apply. In 2010, he was appointed as extraordinary professor Regional and Petroleum Geology at the VU university of Amsterdam and in 2012 also at the University of Utrecht. He was visiting professor at the University of Malaya (Malaysia). Through his own consultancy, as of 2010, he provides advice on exploration activities to several companies and is regularly invited to carry out technical reviews. Activities cover all continents and include Portfolio Reviews, Prospect assessment, Play-based Exploration, and Geothermal activities. He conducts courses on several topics including Risk & Volume Assessment, Prospect Maturation, Basin Analysis, Play-based Exploration, Trap & Seal Analysis, Petroleum Geology for Non-geologists. Some of his recent publications include: De Jager, J. & van Winden, M. (2020): Play-Based Exploration of the petroleum potential of the Tremp-Graus, AÃnsa and eastern Jaca Sub-basins in the southern Pyrenees. Invited contribution for Digital Geology, EAGE special publication (eds: Grötsch, J. & Pöppelreiter, M.) De Jager, J. (2020). Concepts of Conventional Petroleum Systems. Invited contribution for Regional Geology and Tectonics Volume 1: Global Concepts, Techniques and Methodology (eds: Adam, J., Chiarelly, D. & Scarselli, N.) De Jager, J. (2021): Handbook Risk & Volume Assessment. Self-published De Jager, J., Van Ojik, K & Smit, R. (2023 - in preparation): Geological Development of The Netherlands. In: Geology of The Netherlands (eds: Ten Veen, J., Vis, G-J., De Jager, J. @ Wong, T.) POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
Enhance your knowledge in applied EP economics and commercial decisions with EnergyEdge course. Enroll now to secure a spot in our course.
Overview This course provides participants with the chance to focus on relevant project management tools and skills required to run successful projects in research and beyond. The course has been designed to help researchers and project managers enhance their project management skills in the context of their research and develop their knowledge of broader project management principles. The training course is highly participative and includes a peer learning session where participants will get the chance to tackle specific issues and challenges related to their research projects, find innovative solutions and share best practices.
Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.
About the technique: The Kusum Modak Method, previously referred to as Ayurvedic Yoga Massage (AYM), Traditional Ayurvedic Massage, or simply Ayurvedic Massage, is now named in honor of its creator. This change was introduced with the establishment of the Modak Institute, founded by Kusum Modak to preserve her legacy with integrity and authenticity for future generations. This contemporary method combines traditional Ayurvedic Massage with Yoga, developed through Kusum Modak’s studies with her teachers, Limaye and B. K. S. Iyengar, in Pune, India. The therapy focuses on activating breath, circulation, and vital energy through deep touch using hands and feet, along with tractions and stretching maneuvers. Treatments are conducted on an orthopedic mat using vegetable oil and a natural powder called Vekhand, derived from a root known in the West as Calamus. Course Information: Course Structure: Over 10 days, students will gain the knowledge and skills to practice the Kusum Modak MethodSM and become officially certified as bodywork therapists by the Modak Institute. The program includes: Students will cultivate a therapeutic perspective and build confidence in applying the technique. This course follows the updated guidelines set forth by Kusum Modak through the Modak Institute. Content: Total Hours: 80 hours of practical classes + 4 hours online + 12 hours assessment Duration: 10 days (in person classes) Dates: June 3rd to 7th and June 10th to 14th, 2025 Schedule: 9:00 AM to 1:00 PM and 2:00 PM to 6:00 PM Course Location: Roots of Respect, 16 Blenheim Terrace Woodhouse LS2 9HN United Kingdom Hands-on practical exercises Detailed technical understanding of the 118 maneuvers Dedicated time for questions, reviews, and session exchanges Introduction to the basics of the technique (structure & practice); Kusum Modak MethodSM history and influential contributors; Introduction of Ayurveda Principles; The elements of the Kusum Modak MethodSM - AYTM The steps of the therapy sequence; Learning to warm up the muscles; Use of hands and feet (walking on the back); Understanding the quality of the touch to perform Kusum Modak MethodSM; Using therapy props (why and when to use them); Manoeuvres and stretching – how to apply and its variations; Synchronisation of the pressure and breath; Learning to set up a 1-hour sequence (which is the original duration) that will serve the needs of each client; Applied anatomy to the technique and subtle anatomy, pathology and application of the studied content; Client Assessment protocols. Why the medical history form is essential?; Contraindications; Postural correction and student welfare practices (preparing the body for delivery) Assessment: We offer complementary activities designed to provide a deeper understanding of the Method and to help you develop a more precise approach to your practice. To be approved and certified, you must: You will receive clear instructions and guidance to help you succeed, as well as detailed information about the evaluation criteria. The 4 hours of online activities include complementary lectures and related assignments. - Anatomy - Demystifying the Kusum Modak Method - Holistic Medical Systems - SOAP notes and Health History form Certification: You have two options: Review with Q&A Supervised Practice (individual correction, gaining accuracy) How to maintain health + wellbeing as a bodywork therapist. Attend 100% of the in person classes. Submit 10 case studies on the same person, including reports for 10 SOAP notes. Provide a video recording of the final session. MODAK INSTITUTE CERTIFICATE: The Modak Institute certificate is awarded to students upon successful completion of the course, which includes final assessment activities to be submitted within 60 days after the in person training. This certificate is issued by the Modak Institute, the only institute officially authorized and endorsed by Master Kusum Modak to represent her method. It validates that students are fully qualified to work professionally with Prerequisites: While no formal prerequisites are required, physical, mental, and emotional health are essential to participate in the intensive activities. Students will also develop awareness to their clients’ needs and enhance their own mindfulness during practice. Training Price: Modak Institute Certificate: 1650 GBP Level 3 Diploma Kusum Modak Method: + 295 GBP Payment Plan 1 - 100% Payment upfront with discount (50 GBP off) until March 15th 2 - 50% deposit - 50% until May 20th 3 - 4x (Feb, Mar, Apr, May) 4 - 5x (Feb, Mar, Apr, May, Jun) Please feel free to reach out if you need to arrange your payments differently. Cancellation Policy the Kusum Modak MethodSM and ensures their eligibility to obtain therapist insurance, providing recognition and support to practice as certified therapists. Once your final assessment is evaluated and approved, your certificate will be issued and sent directly to your email. Each certificate includes a unique digital code, enabling easy verification of your credentials and affiliation worldwide through Modak Institute website. MODAK INSTITUTE CERTIFICATE + LEVEL 3 DIPLOMA KUSUM MODAK METHOD: Same process as described above + Students may request the UK Level 3 Diploma Kusum Modak Method Certificate for an additional fee of 295 GBP, which requires completing three additional online courses (150 hours) to meet accreditation requirements. The student must request this certificate option at the time of registration. What’s Included: About the teachers: Purnima Full refundable with in two months in advance Partial refundable 50% in a month before starting the training After that is a non-refundable payment. 84 hours of structured and methodically designed training (80 in person + 4 online). Note: the student need to reserve plus 12 hours for assessment. Modak Manual, including photos of all maneuvers and additional insights into the method’s history and references. Official Modak Institute Certification. Access to video lectures. Oil and powder for use during the course. One year of membership in the Modak Institute, including: Participation in an online plataform Access to official graphic materials for promotional use Inclusion in the Modak Institute’s agenda for work promotion Exclusive Q&A WhatsApp group moderate by Purnima and Julia.
Securing Linux systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure Linux accounts. Secure Linux file systems. Secure Linux access through the network. Securing Linux systems training course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing Linux systems training course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.
Python training course description This Python course focusses on teaching Python for use in network automation and network DevOps. We focus on getting delegates up and running with Python and network automation as quickly as possible rather than making them great programmers. In other words we concentrate on enabling delegates to use network automation libraries such as netmiko, NAPALM and Nornir, and APIs such as NETCONF and RESTCONF rather than enabling delegates to produce object oriented programs. Hands on sessions use Cisco and Juniper devices. What will you learn Run Python programs. Read Python programs. Write Python programs. Debug Python programs. Automate network tasks with Python programs. Configure network devices with Python. Collect data from network devices with Python. Python training course details Who will benefit: Network engineers. Prerequisites: TCP/IP Foundation Duration 5 days Python training course contents What is Python? Programming languages, Why Python? Python in interactive mode, Python scripts, ipython, Python version 2 versus version 3. A simple Python script. Comments. Hands on Installing Python, Hello world. A network example On box vs off box Python. telnet, ssh, NETCONF, HTTP, APIs, manufacturers and API support, analysis of a simple telnetlib program. Hands on Using Python to retrieve the configuration from a network device. Using wireshark to analyse the actions. Python basics I/O, operators, variables and assignment, types, indentation, loops and conditionals. Hands on Modifying the telnet program, changing configurations on a network devices. Functions, classes and methods What are functions, calling functions, builtin functions, useful builtin functions, file handling, classes, objects, creating instances. Hands on Storing configurations in files, configuring devices from files, using an inventory file to work on multiple devices. Libraries and modules Modules, files and packages, import, from-import, Python standard library, other packages, pip install, executing other programs. Managing python libraries. Hands on Using pip, installing and using ipaddress, subprocess to access netsnmp. For the more advanced, using the sockets library. Paramiko and netmiko SSH, enabling SSH on devices, keys. Paramiko versus netmiko, example scripts. pexpect. Hands on Configuring VLANs from Python. pySNMP Gathering facts using previous methods, SNMP review, pySNMP GET, pySNMP and SNMPv3. easySNMP library. Hands on Walking a MIB from Python. NETCONF What is NETCONF? Enabling NETCONF on devices, A first ncclient script, device handlers, get_config, edit_config, copy_config, delete_config, commit, validate, pyEZ, utils_config, utils.sw. Hands on Configuration using ncclient and PyEZ. This session is expanded for those interesting in JunOS automation. Manipulating configuration files Builtin functions, string handling. Unicode. Sequences, strings, lists, tuples. Dictionaries. TextFSM. Regular expressions. JSON, YAML, XML, YANG, Jinja2, templates. Hands on Jinja2 templating with Python to configure network devices. NAPALM Getters, configuration operations, supported devices, NAPALM transport, Config-replace, Config-merge, Compare config, Atomic changes, rollback. Example NAPLAM scripts. Hands on Using NAPALM to gather facts, Using NAPALM for configuration management REST and RESTCONF What is REST, HTTP methods, GET, POST, cURL, Postman, Python requests library. RESTCONF, a RESTCONF example. Hands on Modifying a configuration using RESTCONF. Scapy What is scapy, Scapy in interactive mode, Scapy as a module. Hands on Packet crafting from Python. Warning Errors and exceptions, Exception handling, try, except. Memory management. Garbage collection. Context management, With. Hands on Improving Python code. Nornir What is Nornir? A network automation framework, inventories, connection management and parallelization. Nornir architecture and other libraires. Hands on Setting up nornir, nornir fact gathering, nornir tasks. Optional Writing your own functions, Writing your own classes. pyntc. Hands on Writing reusable code.