Duration 1 Days 6 CPD hours This course is intended for The Azure AI Fundamentals course is designed for anyone interested in learning about the types of solution artificial intelligence (AI) makes possible, and the services on Microsoft Azure that you can use to create them. You don?t need to have any experience of using Microsoft Azure before taking this course, but a basic level of familiarity with computer technology and the Internet is assumed. Some of the concepts covered in the course require a basic understanding of mathematics, such as the ability to interpret charts. The course includes hands-on activities that involve working with data and running code, so a knowledge of fundamental programming principles will be helpful. This course introduces fundamentals concepts related to artificial intelligence (AI), and the services in Microsoft Azure that can be used to create AI solutions. The course is not designed to teach students to become professional data scientists or software developers, but rather to build awareness of common AI workloads and the ability to identify Azure services to support them. Prerequisites Prerequisite certification is not required before taking this course. Successful Azure AI Fundamental students start with some basic awareness of computing and internet concepts, and an interest in using Azure AI services. Specifically: Experience using computers and the internet. Interest in use cases for AI applications and machine learning models. A willingness to learn through hands-on exp... 1 - Fundamental AI Concepts Understand machine learning Understand computer vision Understand natural language processing Understand document intelligence and knowledge mining Understand generative AI Challenges and risks with AI Understand Responsible AI 2 - Fundamentals of machine learning What is machine learning? Types of machine learning Regression Binary classification Multiclass classification Clustering Deep learning Azure Machine Learning 3 - Fundamentals of Azure AI services AI services on the Azure platform Create Azure AI service resources Use Azure AI services Understand authentication for Azure AI services 4 - Fundamentals of Computer Vision Images and image processing Machine learning for computer vision Azure AI Vision 5 - Fundamentals of Facial Recognition Understand Face analysis Get started with Face analysis on Azure 6 - Fundamentals of optical character recognition Get started with Vision Studio on Azure 7 - Fundamentals of Text Analysis with the Language Service Understand Text Analytics Get started with text analysis 8 - Fundamentals of question answering with the Language Service Understand question answering Get started with the Language service and Azure Bot Service 9 - Fundamentals of conversational language understanding Describe conversational language understanding Get started with conversational language understanding in Azure 10 - Fundamentals of Azure AI Speech Understand speech recognition and synthesis Get started with speech on Azure 11 - Fundamentals of Azure AI Document Intelligence Explore capabilities of document intelligence Get started with receipt analysis on Azure 12 - Fundamentals of Knowledge Mining with Azure Cognitive Search What is Azure Cognitive Search? Identify elements of a search solution Use a skillset to define an enrichment pipeline Understand indexes Use an indexer to build an index Persist enriched data in a knowledge store Create an index in the Azure portal Query data in an Azure Cognitive Search index 13 - Fundamentals of Generative AI What is generative AI? Large language models What is Azure OpenAI? What are copilots? Improve generative AI responses with prompt engineering 14 - Fundamentals of Azure OpenAI Service What is generative AI Describe Azure OpenAI How to use Azure OpenAI Understand OpenAI's natural language capabilities Understand OpenAI code generation capabilities Understand OpenAI's image generation capabilities Describe Azure OpenAI's access and responsible AI policies 15 - Fundamentals of Responsible Generative AI Plan a responsible generative AI solution Identify potential harms Measure potential harms Mitigate potential harms Operate a responsible generative AI solution Additional course details: Nexus Humans AI-900T00 - Microsoft Azure AI Fundamentals training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AI-900T00 - Microsoft Azure AI Fundamentals course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
About this Virtual Instructor Led Training (VILT) This 3 half-day Virtual Instructor Led Training (VILT) course highlights the impact of the introduction of renewable energy, digital technologies and new operational flexibility solutions in the electricity trading market. These advancements facilitate unique opportunities and challenges for cross border trading of electricity. Most countries in Asia, have designed their own portfolio of climate actions with an accelerated penetration of renewable energy (or by importing renewable energy into their local grids). These changes are taking place at unprecedented speed and add further complexity to the operation of electricity trading markets, while presenting new opportunities. The Asian market, can tap into its vast potential of solar, wind and geothermal energy sources. A global, unified vision is emerging to support each of countries' energy needs and decarbonization goals. This VILT course will highlight priorities of each country to achieve its energy goals. The main operational flexibilities of each type of renewable resource are discussed in detail. The course also discusses the main components of Power Purchase Agreements and advancements in digitalization and how digital technologies can influence the energy market and cross border electricity trading. Key Takeaways: New Energy Market Design Cross Border Trading PPAs Mechanisms and Examples of PPAs The Increased Penetration of Renewable Resources in the Power Systems and How It Stimulates Cross Border Trading How Digital Innovation Drives Energy Markets and Cross Border Trading Training Objectives Upon completion of this VILT course, participants will be able to: Be familiar with the global vision of One Sun, One World, One Grid Understand the major trends reshaping the energy markets Learn how innovative digital technologies change the energy markets Understand why sustainable energy markets require a tighter coordination between transmission and distribution system operators Engage with each other to design the energy market of the future Target Audience This VILT course will benefit policy makers and regulators from energy agencies, transmission companies and utilities as well as power system engineers and power system operators from control centre and ISO. Training Methods The VILT will be delivered online in 3 half-day sessions comprising 4 hours per day, including time for lectures, discussion, quizzes and short classroom exercises. Course Duration: 3 half-day sessions, 4 hours per session (12 hours in total). Trainer Your expert course leader is a Utility Executive with extensive global experience in power system operation and planning, energy markets, enterprise risk and regulatory oversight. She consults on energy markets integrating renewable resources from planning to operation. She led complex projects in operations and conducted long term planning studies to support planning and operational reliability standards. Specializing in Smart Grids, Operational flexibilities, Renewable generation, Reliability, Financial Engineering, Energy Markets and Power System Integration, she was recently engaged by the Inter-American Development Bank/MHI in Guyana. She was the Operations Expert in the regulatory assessment in Oman. She is a registered member of the Professional Engineers of Ontario, Canada. She is also a contributing member to the IEEE Standards Association, WG Blockchain P2418.5. With over 25 years with Ontario Power Generation (Revenue $1.2 Billion CAD, I/S 16 GW), she served as Canadian representative in CIGRE, committee member in NSERC (Natural Sciences and Engineering Research Council of Canada), and Senior Member IEEE and Elsevier since the 90ties. Our key expert chaired international conferences, lectured on several continents, published a book on Reliability and Security of Nuclear Power Plants, contributed to IEEE and PMAPS and published in the Ontario Journal for Public Policy, Canada. She delivered seminars organized by the Power Engineering Society, IEEE plus seminars to power companies worldwide, including Oman, Thailand, Saudi Arabia, Malaysia, Indonesia, Portugal, South Africa, Japan, Romania, and Guyana. Our Key expert delivered over 60 specialized seminars to executives and engineers from Canada, Europe, South and North America, Middle East, South East Asia and Japan. Few examples are: Modern Power System in Digital Utilities - The Energy Commission, Malaysia and utilities in the Middle East, GCCIA, June 2020 Assessment of OETC Control Centre, Oman, December 2019 Demand Side management, Load Forecasting in a Smart Grid, Oman, 2019 Renewable Resources in a Smart Grid (Malaysia, Thailand, Indonesia, GCCIA, Saudi Arabia) The Modern Power System: Impact of the Power Electronics on the Power System The Digital Utility, AI and Blockchain Smart Grid and Reliability of Distribution Systems, Cyme, Montreal, Canada Economic Dispatch in the context of an Energy Market (TNB, Sarawak Energy, Malaysia) Energy Markets, Risk Assessment and Financial Management, PES, IEEE: Chicago, San Francisco, New York, Portugal, South Africa, Japan. Provided training at CEO and CRO level. Enterprise Risk methodology, EDP, Portugal Energy Markets: Saudi Electricity Company, Tenaga National Berhad, Malaysia Reliability Centre Maintenance (South East Asia, Saudi Electricity Company, KSA) EUSN, ENERGY & UTILITIES SECTOR NETWORK, Government of Canada, 2016 Connected+, IOT, Toronto, Canada September 2016 and 2015 Smart Grid, Smart Home HomeConnect, Toronto, Canada November 2014 Wind Power: a Cautionary Tale, Ontario Centre for Public Policy, 2010 POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations
Essential optical transmission course description Transmission is the process of sending information along a medium of, copper, fibre or wireless. This course looks at transmission techniques for fibre networks. The course aims to demystify the technologies involved by explaining all the buzzwords used in optical transmission. What will you learn Describe various optical transmission technologies. Explain how SDH and OTN work. Explain how WDM, CWDM and DWDM work. Explain PON, GPON and GEPON. Essential optical transmission course details Who will benefit: Anyone working in telecommunications. Prerequisites: None. Duration 2 days Essential optical transmission course contents Transmission basics nsmission basics Systems, media, signals. Signal degradation, noise, distortion, attenuation. Digital, analogue. Modulation, encoding. Fibre transmission Fibre vs copper, optical transmission, fibre characteristics, fibre component parts. Multi Mode Fibre (MMF). Single Mode Fibre (SMF). Fibre connections. Lasers. Attenuations, dispersion, optical signal noise ratios (OSNR) and their effects. Channel Spacing and Signal Direction. Limiting factors to single wavelength. SDH Timing and synchronisation of digital signals, the plesiochronous digital hierarchy (PDH), the synchronous digital hierarchy (SDH), service protection with SDH. TDM. Standards, basic units, frames, STM1 frame, bit rates, STM0, STM1, STM4, STM16, STM64, STM256, SDH architecture, rings, Add drop multiplexors. SDH network topologies, structure of SDH equipment, SDH synchronisation, protection switching in SDH networks, SDH alarm structure, testing of SDH, equipment and systems, Ethernet over SDH. OTN G.709, OTN interface structure, Optical transport modules, ONNI, OCh, OUT, ODU, OPU. G.709 amendments. WDM overview Multiplexing, TDM, WDM benefits. WDM standards. CWDM vs. DWDM. Four Wave Mixing (FWM). Impact and countermeasures to FWM on WDM. DWDM ITU G.694.1, channel and spacing. Optical Terminal Multiplexers (OTM). Optical Add/Drop Multiplexers (OADM). Adding versus dropping. Optical Amplifiers. Erbium Doped Fibre Amplifiers (EDFA). Transponders and Combiners. Optical and Electrical Cross Connects (OXCs/DXCs). Cross Connect types (Transparent/Opaque). Advantages and disadvantages of various Optical cross connects. FTTx Fibre installation and air blown fibre, FTTH, FTTC, FTTN, FTTD, FFTH topologies and wavelengths, active or passive optical network. PON variants Gigabit passive optical network (GPON), Gigabit Ethernet passive optical network (GEPON), Time division PON (TDM-PON), XG-PON, Wave Division Multiplexing PON (WDM-PON), 1Gbps, 10Gbps, 40Ggps, 100Gbps FSAN (Full Service Access Network) NGA (Next Generation Access), Strategies for TDM-PON to WDM-PON migration, Architecture of NG-PON (hybrid WDM/TDM PON), Additional services than triple play.
Enhance your knowledge of natural gas and LNG sales agreements with EnergyEdge course. Enroll now to gain valuable industry knowledge and skills.
Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.
About this Training Course This 5 full-day course has been designed to develop skills in understanding the geometry and petrophysical characteristics of carbonate reservoirs. Depositional fabric, grain type and size and subsequent diagenetic modifications are the major controls on carbonate reservoir behaviour. The complex inter-relationship of the depositional and burial history can be unravelled to allow prediction of reservoir facies and reconstruction of three-dimensional reservoir models. This course will demonstrate the value of the reservoir model in volumetric assessment and development of carbonate reservoirs. *Previous knowledge of carbonate sedimentology is not required. Course Content in Summary: Carbonate reservoirs: Basic principles; depositional concepts; grain types; textures and fabrics; environmental reconstruction. The reservoir model - depositional and diagenetic characteristics: Sabkha/tidal flat; lagoon; shelf; reef (rudist and coral/algal); barrier/shoal; slope and redeposited; aeolian and lacustrine; karst plays. Carbonate diagenesis: Primary and secondary porosity; compaction; pressure solution; cementation; dolomitisation; porosity generation and destruction; fractures. Carbonate sequence stratigraphy Log response in carbonate rocks: Gamma; sonic; neutron; density; FMS. Reservoir assessment: Fracture reservoirs; reservoir modelling; volumetric assessment in correlation and mapping; effects of capillary pressure; interface with engineering. Training Objectives By attending this course, participants will be able to: Understand carbonate depositional systems and controls. Recognise and model controls on reservoir quality and pore systems, including diagenesis and fracturing. Understand and apply carbonate seismic stratigraphy and sequence stratigraphy. Interpret log responses. Target Audience This course is intended for petroleum geologists, explorationists, petrophysicists, geophysicists and engineers involved with exploration of carbonate plays and development of carbonate reservoirs. Trainer Your expert course leader is a Director and Senior Consultant Geologist who has worked on various carbonate consultancy projects, conducted detailed sedimentological, sequence stratigraphic and diagenetic technical studies and delivered training programmes. He was formerly Managing Director of Robertson UK Limited and was responsible for the integration between different disciplines, recognition, and encouragement of technical innovation and research and development programmes across all oil and gas divisions in the company. He was also responsible for all aspects of the performance of the main Geological, Geophysical and Reservoir Engineering Services in the company. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
Duration 5 Days 30 CPD hours This course is intended for Security Engineers, Security Administrators, Security Operations Specialists, Security Analysts, and Support Staff Overview The Palo Alto Networks Firewall 10.2 Essentials: Configuration and Management (EDU-210) course is five days of instructor-led training that will help you to: Configure and manage the essential features of Palo Alto Networks next-generation firewalls Configure and manage Security and NAT policies to enable approved traffic to and from zones Configure and manage Threat Prevention strategies to block traffic from known and unknown IP addresses, domains, and URLs Monitor network traffic using the interactive web interface and firewall reports Palo Alto Networks next-generation firewalls are architected to safely enable applications and prevent modern threats. Their approach identifies all network traffic based on applications, users, content and devices, and lets you express your business policies in the form of easy-to-understand security rules. Flexible deployment options and native integration with their next-generation security platform extend the policy enforcement and cyberthreat prevention to everywhere your users and data are located: in your network, on your endpoints and in the cloud. Palo Alto Networks next-generation firewalls are architected to safely enable applications and prevent modern threats. Their approach identifies all network traffic based on applications, users, content and devices, and lets you express your business policies in the form of easy-to-understand security rules. Flexible deployment options and native integration with their next-generation security platform extend the policy enforcement and cyberthreat prevention to everywhere your users and data are located: in your network, on your endpoints and in the cloud.
Build a rent to rent business using a proven system
Critical Thinking and Creative Problem Solving: In-House Training Two critical skillsets for the future of work are critical thinking and creative problem solving. These modes of working and thinking intersect and overlap; both are necessary and both can be taught. Having the ability to exercise creativity while at the same time applying structure and discipline to the thinking process is a key competency in the twenty-first century workplace. This course explores the interplay between critical and creative thinking, and the necessity of each to effective problem solving and decision making. Participants will learn a variety of techniques to apply critical thinking to real-life scenarios. They will experiment with different problem-solving approaches and will learn about cognitive influences on our decisions and choices. The course delves into the business value of creativity and involves participants in actively integrating criticality, creativity, and problem solving. What you will Learn At the end of this program, you will be able to: Explain basic concepts of problem solving Infer types of cognitive biases that impact decision making Utilize types of root cause analysis Differentiate among obstacles to sound decision making Apply a variety of problem-solving approaches / processes to existing challenges Evaluate alternative solution methods using various techniques Analyze real world problem scenarios to determine the lateral thinking type needed to address them Foundation Concepts Definitions Thinking modes and cognitive bias Basic problem-solving framework Problem Definition and Solution Generation Root cause analysis Basic problem-solving obstacles Generating alternative solutions Evaluating Alternatives Critical thinking guidelines Obstacles to sound decision making Tools for evaluating alternatives Exploring Lateral Thinking Problem-solving challenge Workplace application
Duration 3 Days 18 CPD hours This course is intended for Participants must possess a valid data centre training certificate such as CDCP or any other approved equivalent. Please submit a copy of your certificate for verification upon registration for the CTDC course. Overview After completion of the course the participant will be able to:1. Learn to properly comprehend and apply the ANSI/TIA-942 Standard requirements and guidelines2. Understand the proper intent of the ANSI/TIA-942 Standard to avoid both over- and/or under-investment3. Align the selection of redundancy levels and infrastructure investments to the business requirements.4. Understand the criteria and requirements for a high-availability data centre design and how to effectively establish the data centre from the perspective of the ANSI/TIA-942 Standard5. Understand how the ANSI/TIA-942 Standard relates to various worldwide standards This course, the participant will learn how to design an ANSI/TIA-942 compliant data centre. It will provide a clear understanding of the requirements of the ANSI/TIA-942 Standard and possible implementation variations. Introduction to Data Centre Facilities About the ANSI/TIA-942 Life of the ANSI/TIA-942 Standard Relation to other standards Architectural Electrical Mechanical Telecommunication Areas under scope High level redundancy definitions Redundancy options (N, N+1 etc.) Fault tolerant Concurrent maintainability Compartmentalisation Examples of redundancy levels Data Centre Space PlanningData Centre TopologiesRecommendations for Energy EfficiencyArchitectural Site selection Parking Multi-tenant building Building construction Vapor barrier Roofing Floor loading Raised flooring Suspended/drop ceiling Hanging load Seismic Building Security & Safety Security CCTV Staffing Bullet/ballistic proofing Lighting Safety - Signage Building and Room Access Security checkpoints Entry lobby Doors and windows Exit corridors Shipping and receiving areas Room/Area Design Requirements Administrative offices Security offce Operations centre Restroom and break room UPS/Battery rooms Generator and fuel storage area Computer room Electrical Utility power - Substation - Feed requirements - Self-generation HT/HV switch gear Generator and fuel supply LT/LV switch gear - ATS - Alternatives to ATS UPS and batteries PDU STS Grounding Surge protection EPO Central power monitoring Load banks Testing Equipment maintenance - Preventive maintenance - Facility training programs Mechanical Environmental design - Temperature and humidity requirements - Contamination - Sources - Clean air - Pressurisation - Radio sources - Vibration - Water ingress Water cooled systems - Heat rejection - Chilled water system - Condenser water? - Make up water Air cooled systems HVAC control systems Plumbing - Pipe routing Fire suppression Water leak detection Telecommunications Network topology Redundancy level design Media and connectors Cabling pathways Detailed cabling design considerations Administration and labeling Cable testing Data centre fabrics Exam: Certified TIA-942 Design Consultant Actual course outline may vary depending on offering center. Contact your sales representative for more information.