• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2176 Courses delivered Live Online

Essential OTN

5.0(3)

By Systems & Network Training

Essential OTN training course description An In-depth introduction to the terminology and technology that will comprise tomorrow's Optical Transport Networks. What will you learn Describe the problems with old technologies. Identify the purpose of new technologies. Describe the functionality of the various transmission mediums available Identify OTN features and functionality. Define the issues involved in equipment and application rollout. Essential OTN training course details Who will benefit: Anyone wishing to learn OTN. Prerequisites: SDH foundation or Essential DWDM Duration 2 days Essential OTN training course contents Scope, References Terms and definitions, Abbreviations and Conventions Optical transport network interface structure Multiplexing/mapping principles and bit rates Optical transport module (OTM-n.m, OTM-nr.m, OTM-0.m and OTN 0.mvn) Physical specification of the ONNI Optical channel (OCh) Optical channel transport unit (OTU) Optical channel data unit (ODU) Optical channel payload unit (OPU) OTM overhead signal (OOS) Overhead description and maintenance signals Mapping of client signals and concatenation Mapping ODUk signals into the ODTUjk signal Forward error correction using 16-byte interleaved RS (255,239) codecs ODUk tandem connection monitoring (TCM) overhead OPUk Multiplex Overhead Amendment 2 including: OTN Multiplexing and Mapping, Basic signal structure, ODTU12, ODTU13, ODTU23, OPUk Multiplex Overhead, OPUk Multiplex Structure Identifier (MSI). OPU2 Multiplex Structure Identifier (MSI), OPU3 Multiplex Structure Identifier (MSI), OPUk Payload Structure Identifier Reserved overhead (RES), ODU1 into ODU2 multiplexing, ODU2 into ODU3 multiplexing, ODU1 into ODU3 multiplexing Amendment 3 including: 40 Gbit/s ODU3/OTU3 and 100 Gbit/s ODU4/OTU4, Support of gigabit Ethernet services via ODU0, ODU2e, ODU3 and ODU4, ODU0 and ODUFlex, Multi-lane OTU3 and OTU4 interfaces, Support for InfiniBand Amendment 4 including: OTSn OTN synchronization messaging channel (OSMC) overhead, FC-1600 Amendment 5 Including: ODUk.ts, OTU0LL (OTU0 low latency), OTSiA (optical tributary signal assembly). OTSiG (optical tributary signal group), OTSiG-O (optical tributary signal overhead), CMEP (connection monitoring end- point), CMOH (connection monitoring overhead), MOTU (Multi-OUT), MOTUm (Multi-OTU with management), OTUCn-M (Optical Transport Unit-Cn, with n OxUC overhead instances and 5G tributary slots). SOTU (Single-OUT). SOTUm (Single-OTU with management). Modified bit rates and capacity for OTU1/2/3/4 OTM.nr.m, OTM.n.m, OTM.0.3v4, OTM 0.4v4 Mapping of CBR2G5, CBR10G, CBR10G3 and CBR40G signals into OPUk 64B/66B and 513B block code format PCS lane alignment marker for 40GBASE-R and 100GBASE-R PT=20/PT=21 and AMP/GMP options OTL 4.10 to OTL 4.4 gearbox ODU switching and Line protection Schemes 10 x 10 MSA Overview of current and future coherent and noncoherent technologies 40Gbit and 100Gbit compliant ROADM's Implementers Guide including replacement terms. Differing vendor's equipment and their implementations Individual and group planning exercises: Upgrade a customer STM-64/10G network to a 40G/ OTN network. Upgrade a customer old 16 Wavelength WDM network to be OTN compliant. Implement a new customer 40 wavelength OTU3 OTN compliant MSPP (DWDM) network. Design a cost-effective solution where we can hand over circuits using 'Optical Transport Lanes'.

Essential OTN
Delivered in Internationally or OnlineFlexible Dates
£1,727

Suicide First Aid

5.0(2)

By Changing Minds Training

This one-day Suicide First Aid training course gives learners the knowledge and tools to understand that suicide is one of the most preventable deaths and some basic skills can help someone with thoughts of suicide stay safe from their thoughts and stay alive.

Suicide First Aid
Delivered in London or UK Wide or OnlineFlexible Dates
£2,495

SC-200T00 Microsoft Security Operations Analyst

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The Microsoft Security Operations Analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders. Responsibilities include threat management, monitoring, and response by using a variety of security solutions across their environment. The role primarily investigates, responds to, and hunts for threats using Microsoft Sentinel, Microsoft Defender for Cloud, Microsoft 365 Defender, and third-party security products. Since the Security Operations Analyst consumes the operational output of these tools, they are also a critical stakeholder in the configuration and deployment of these technologies. Learn how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Microsoft Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst. Prerequisites Basic understanding of Microsoft 365 Fundamental understanding of Microsoft security, compliance, and identity products Intermediate understanding of Windows 10 Familiarity with Azure services, specifically Azure SQL Database and Azure Storage Familiarity with Azure virtual machines and virtual networking Basic understanding of scripting concepts. 1 - Introduction to Microsoft 365 threat protection Explore Extended Detection & Response (XDR) response use cases Understand Microsoft Defender XDR in a Security Operations Center (SOC) Explore Microsoft Security Graph Investigate security incidents in Microsoft Defender XDR 2 - Mitigate incidents using Microsoft 365 Defender Use the Microsoft Defender portal Manage incidents Investigate incidents Manage and investigate alerts Manage automated investigations Use the action center Explore advanced hunting Investigate Microsoft Entra sign-in logs Understand Microsoft Secure Score Analyze threat analytics Analyze reports Configure the Microsoft Defender portal 3 - Protect your identities with Microsoft Entra ID Protection Microsoft Entra ID Protection overview Detect risks with Microsoft Entra ID Protection policies Investigate and remediate risks detected by Microsoft Entra ID Protection 4 - Remediate risks with Microsoft Defender for Office 365 Automate, investigate, and remediate Configure, protect, and detect Simulate attacks 5 - Safeguard your environment with Microsoft Defender for Identity Configure Microsoft Defender for Identity sensors Review compromised accounts or data Integrate with other Microsoft tools 6 - Secure your cloud apps and services with Microsoft Defender for Cloud Apps Understand the Defender for Cloud Apps Framework Explore your cloud apps with Cloud Discovery Protect your data and apps with Conditional Access App Control Walk through discovery and access control with Microsoft Defender for Cloud Apps Classify and protect sensitive information Detect Threats 7 - Respond to data loss prevention alerts using Microsoft 365 Describe data loss prevention alerts Investigate data loss prevention alerts in Microsoft Purview Investigate data loss prevention alerts in Microsoft Defender for Cloud Apps 8 - Manage insider risk in Microsoft Purview Insider risk management overview Create and manage insider risk policies Investigate insider risk alerts Take action on insider risk alerts through cases Manage insider risk management forensic evidence Create insider risk management notice templates 9 - Investigate threats by using audit features in Microsoft Defender XDR and Microsoft Purview Standard Explore Microsoft Purview Audit solutions Implement Microsoft Purview Audit (Standard) Start recording activity in the Unified Audit Log Search the Unified Audit Log (UAL) Export, configure, and view audit log records Use audit log searching to investigate common support issues 10 - Investigate threats using audit in Microsoft Defender XDR and Microsoft Purview (Premium) Explore Microsoft Purview Audit (Premium) Implement Microsoft Purview Audit (Premium) Manage audit log retention policies Investigate compromised email accounts using Purview Audit (Premium) 11 - Investigate threats with Content search in Microsoft Purview Explore Microsoft Purview eDiscovery solutions Create a content search View the search results and statistics Export the search results and search report Configure search permissions filtering Search for and delete email messages 12 - Protect against threats with Microsoft Defender for Endpoint Practice security administration Hunt threats within your network 13 - Deploy the Microsoft Defender for Endpoint environment Create your environment Understand operating systems compatibility and features Onboard devices Manage access Create and manage roles for role-based access control Configure device groups Configure environment advanced features 14 - Implement Windows security enhancements with Microsoft Defender for Endpoint Understand attack surface reduction Enable attack surface reduction rules 15 - Perform device investigations in Microsoft Defender for Endpoint Use the device inventory list Investigate the device Use behavioral blocking Detect devices with device discovery 16 - Perform actions on a device using Microsoft Defender for Endpoint Explain device actions Run Microsoft Defender antivirus scan on devices Collect investigation package from devices Initiate live response session 17 - Perform evidence and entities investigations using Microsoft Defender for Endpoint Investigate a file Investigate a user account Investigate an IP address Investigate a domain 18 - Configure and manage automation using Microsoft Defender for Endpoint Configure advanced features Manage automation upload and folder settings Configure automated investigation and remediation capabilities Block at risk devices 19 - Configure for alerts and detections in Microsoft Defender for Endpoint Configure advanced features Configure alert notifications Manage alert suppression Manage indicators 20 - Utilize Vulnerability Management in Microsoft Defender for Endpoint Understand vulnerability management Explore vulnerabilities on your devices Manage remediation 21 - Plan for cloud workload protections using Microsoft Defender for Cloud Explain Microsoft Defender for Cloud Describe Microsoft Defender for Cloud workload protections Enable Microsoft Defender for Cloud 22 - Connect Azure assets to Microsoft Defender for Cloud Explore and manage your resources with asset inventory Configure auto provisioning Manual log analytics agent provisioning 23 - Connect non-Azure resources to Microsoft Defender for Cloud Protect non-Azure resources Connect non-Azure machines Connect your AWS accounts Connect your GCP accounts 24 - Manage your cloud security posture management? Explore Secure Score Explore Recommendations Measure and enforce regulatory compliance Understand Workbooks 25 - Explain cloud workload protections in Microsoft Defender for Cloud Understand Microsoft Defender for servers Understand Microsoft Defender for App Service Understand Microsoft Defender for Storage Understand Microsoft Defender for SQL Understand Microsoft Defender for open-source databases Understand Microsoft Defender for Key Vault Understand Microsoft Defender for Resource Manager Understand Microsoft Defender for DNS Understand Microsoft Defender for Containers Understand Microsoft Defender additional protections 26 - Remediate security alerts using Microsoft Defender for Cloud Understand security alerts Remediate alerts and automate responses Suppress alerts from Defender for Cloud Generate threat intelligence reports Respond to alerts from Azure resources 27 - Construct KQL statements for Microsoft Sentinel Understand the Kusto Query Language statement structure Use the search operator Use the where operator Use the let statement Use the extend operator Use the order by operator Use the project operators 28 - Analyze query results using KQL Use the summarize operator Use the summarize operator to filter results Use the summarize operator to prepare data Use the render operator to create visualizations 29 - Build multi-table statements using KQL Use the union operator Use the join operator 30 - Work with data in Microsoft Sentinel using Kusto Query Language Extract data from unstructured string fields Extract data from structured string data Integrate external data Create parsers with functions 31 - Introduction to Microsoft Sentinel What is Microsoft Sentinel? How Microsoft Sentinel works When to use Microsoft Sentinel 32 - Create and manage Microsoft Sentinel workspaces Plan for the Microsoft Sentinel workspace Create a Microsoft Sentinel workspace Manage workspaces across tenants using Azure Lighthouse Understand Microsoft Sentinel permissions and roles Manage Microsoft Sentinel settings Configure logs 33 - Query logs in Microsoft Sentinel Query logs in the logs page Understand Microsoft Sentinel tables Understand common tables Understand Microsoft Defender XDR tables 34 - Use watchlists in Microsoft Sentinel Plan for watchlists Create a watchlist Manage watchlists 35 - Utilize threat intelligence in Microsoft Sentinel Define threat intelligence Manage your threat indicators View your threat indicators with KQL 36 - Connect data to Microsoft Sentinel using data connectors Ingest log data with data connectors Understand data connector providers View connected hosts 37 - Connect Microsoft services to Microsoft Sentinel Plan for Microsoft services connectors Connect the Microsoft Office 365 connector Connect the Microsoft Entra connector Connect the Microsoft Entra ID Protection connector Connect the Azure Activity connector 38 - Connect Microsoft Defender XDR to Microsoft Sentinel Plan for Microsoft Defender XDR connectors Connect the Microsoft Defender XDR connector Connect Microsoft Defender for Cloud connector Connect Microsoft Defender for IoT Connect Microsoft Defender legacy connectors 39 - Connect Windows hosts to Microsoft Sentinel Plan for Windows hosts security events connector Connect using the Windows Security Events via AMA Connector Connect using the Security Events via Legacy Agent Connector Collect Sysmon event logs 40 - Connect Common Event Format logs to Microsoft Sentinel Plan for Common Event Format connector Connect your external solution using the Common Event Format connector 41 - Connect syslog data sources to Microsoft Sentinel Plan for syslog data collection Collect data from Linux-based sources using syslog Configure the Data Collection Rule for Syslog Data Sources Parse syslog data with KQL 42 - Connect threat indicators to Microsoft Sentinel Plan for threat intelligence connectors Connect the threat intelligence TAXII connector Connect the threat intelligence platforms connector View your threat indicators with KQL 43 - Threat detection with Microsoft Sentinel analytics What is Microsoft Sentinel Analytics? Types of analytics rules Create an analytics rule from templates Create an analytics rule from wizard Manage analytics rules 44 - Automation in Microsoft Sentinel Understand automation options Create automation rules 45 - Threat response with Microsoft Sentinel playbooks What are Microsoft Sentinel playbooks? Trigger a playbook in real-time Run playbooks on demand 46 - Security incident management in Microsoft Sentinel Understand incidents Incident evidence and entities Incident management 47 - Identify threats with Behavioral Analytics Understand behavioral analytics Explore entities Display entity behavior information Use Anomaly detection analytical rule templates 48 - Data normalization in Microsoft Sentinel Understand data normalization Use ASIM Parsers Understand parameterized KQL functions Create an ASIM Parser Configure Azure Monitor Data Collection Rules 49 - Query, visualize, and monitor data in Microsoft Sentinel Monitor and visualize data Query data using Kusto Query Language Use default Microsoft Sentinel Workbooks Create a new Microsoft Sentinel Workbook 50 - Manage content in Microsoft Sentinel Use solutions from the content hub Use repositories for deployment 51 - Explain threat hunting concepts in Microsoft Sentinel Understand cybersecurity threat hunts Develop a hypothesis Explore MITRE ATT&CK 52 - Threat hunting with Microsoft Sentinel Explore creation and management of threat-hunting queries Save key findings with bookmarks Observe threats over time with livestream 53 - Use Search jobs in Microsoft Sentinel Hunt with a Search Job Restore historical data 54 - Hunt for threats using notebooks in Microsoft Sentinel Access Azure Sentinel data with external tools Hunt with notebooks Create a notebook Explore notebook code

SC-200T00 Microsoft Security Operations Analyst
Delivered OnlineFlexible Dates
£2,380

Assuring Quality Through Acceptance Testing: Virtual In-House Training

By IIL Europe Ltd

Assuring Quality Through Acceptance Testing: Virtual In-House Training It is also the business analyst's responsibility to confirm that the resulting solution developed by IT does, in fact, solve the defined problem. This is done first through testing, especially acceptance testing, and then through monitoring of the installed solution in the user community. It is the business analyst's job to define the business problem to be solved by IT. It is also the business analyst's responsibility to confirm that the resulting solution developed by IT does, in fact, solve the defined problem. This is done first through testing, especially acceptance testing, and then through monitoring of the installed solution in the user community. The business analyst is not only concerned with the testing itself, but also with the management and monitoring of the users doing the acceptance testing, and recording, analyzing, and evaluating the results. What you will Learn Upon completion, participants will be able to: Create a set of acceptance test cases Manage and monitor an acceptance test stage where users perform the testing Work with the development team in the systems testing stage Assess the solution once it is in the business environment Foundation Concepts The role of the business analyst An introduction to the BABOK® Guide BA roles and relationships through the project life cycle Introduction to assuring software quality through acceptance testing The Scope of IT Testing Overview of testing stages The testing process Testing documentation Pre-Acceptance Testing The BA's role in testing Early development testing stages (unit and integration) Late development testing stage (system) The Acceptance Test Stage - Part I (Planning, Design, and Development) Overview of user acceptance testing Acceptance test planning Designing user acceptance tests Developing individual user acceptance test cases Building effective user acceptance test scenarios The Acceptance Test Stage - Part II (Execution and Reporting) Operating guidelines Execution Reporting Post-Acceptance Testing Overview Project implementation Project transition (project closure) Production through retirement Testing Commercial Off-the-Shelf (COTS) Software Overview Selecting the software Implementing the software Summary What did we learn and how can we implement this in our work environments?

Assuring Quality Through Acceptance Testing: Virtual In-House Training
Delivered OnlineFlexible Dates
£850

ONE PAGE PLANS

By Inclusive Solutions

Learn how to create easy to read accessible person centred profiles for children of all ages and young adults. Course Category Person Centred Planning Inclusion Description Person centred planning is a way of expressing a set of inclusive values through a unique range of tools and techniques. The most easily used approach is called creating a one page plan or a person centred profile. All person centred planning tools and processes are driven by a commitment to achieve inclusive outcomes for the person whose plan it is, and the young people involved are always present throughout their planning session. The focus of all person centred approaches is the whole person irrespective of the label they carry. Two people, a process facilitator and a graphic facilitator, typically facilitate plans. The role of the support service staff in this work is as a facilitator not as an expert participant, problem solver, assessor or provider of consultation. One Page Plans are especially effective tools in planning and supporting children and young people with additional support needs and for through-care planning for young people who are looked after or accommodated. Over time person centred working will reveal areas of unmet need in current provision and thereby inform the ongoing strategic planning within any particular region. Testimonials Be the first… Learning Objectives To Explore the values underpinning person centred working To show how One Page Plans naturally capture young people’s strengths and capacities A demonstration of how person centred planning encourages meaningful consultation and participation with young people (particularly for those who cannot make their views known in typical ways To show how Person Centred Planning leads to the building of stronger parent/school partnerships To indicate how person centred planning can promote multi-agency teamwork and shared responsibilities To increase understanding the how of process and graphic facilitation in person centred work. Who Is It For ? Teachers and School Staff Education Services Social Care Staff Health Professionals Transition Coordinators Family Support Workers Link Workers Course Content An introduction to the person centred planning tool of creating a One Page Plan We would stress that this is an introductory day and that participants will be expected to make plans for their own follow up and further practice of the tools covered in the course of the day. If you liked this course you may well like: PERSON CENTRED REVIEWS

ONE PAGE PLANS
Delivered in UK Wide Travel Costs or OnlineFlexible Dates
£1,800 to £2,500

Exploration & Production (E&P) Accounting Level 1

By EnergyEdge - Training for a Sustainable Energy Future

About this training course This 3-day introductory-level course provides a comprehensive overview of international accounting and finance practices in the E&P industry. It is particularly suitable for finance personnel who are new to the oil and gas industry, or want to gain a broader understanding of oil and gas financial policy, joint venture and cost-control topic areas. Training Objectives After the completion of this training course, participants will be able to: Comprehend an overview of accounting policies and practices in the oil and gas industry Manage project development and operating costs Understand the accounting and financial management implications of exploring for and producing oil and gas Review the background to financial issues like joint ventures that are unique to the E&P industry, and their accounting treatment Target Audience This training course is suitable and will greatly benefit the following specific groups: Finance staff new to the industry who require a grounding in the various specialist discipline areas that typically comprise an oil and gas company finance function Finance personnel who are being developed for broader accounting and financial management responsibilities Audit and information systems staff who have frequent dealings with financial controls and systems Treasury and tax specialists who require a better understanding of E&P finance and accounting Course Level Basic or Foundation Training Methods The training instructor relies on a highly interactive training method to enhance the learning process. This method ensures that all participants gain a complete understanding of all the topics covered. The training environment is highly stimulating, challenging, and effective because the participants will learn by case studies which will allow them to apply the material taught in their own organization. Course Duration: 3 days in total (21 hours). Training Schedule 0830 - Registration 0900 - Start of training 1030 - Morning Break 1045 - Training recommences 1230 - Lunch Break 1330 - Training recommences 1515 - Evening break 1530 - Training recommences 1700 - End of Training The maximum number of participants allowed for this training course is 25. This course is also available through our Virtual Instructor Led Training (VILT) format. Trainer Your expert course leader has more than 30 years of experience in the international oil and gas industry, covering all areas of Finance and Audit, including involvement in Commercial roles. During her 19 years with ENI she worked in Italy, Netherlands, Egypt and UK and was CFO for 2 major ENI subsidiaries. She has delivered training courses in Accounting, Audit, Economics and Commercial topics in many Countries. She has a Degree in Economics & Accounting and is a Certified Chartered Accountant. She is also a Chartered Auditor and an International Petroleum Negotiator. Outside of work, she is inspired by the beauty of nature and art, helping disadvantaged people, sports (football, golf) and her cat. Courses Delivered Internationally: E&P Accounting, Auditing in the Oil & Gas Industry Cost Control & Budgeting Introduction to the Oil & Gas Industry Petroleum Project Economics Contracts Strategy International O&G Exploitation Contracts POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Exploration & Production (E&P) Accounting Level 1
Delivered in Internationally or OnlineFlexible Dates
£2,339 to £2,720

Exploration & Production (E&P) Cost Control, Budgeting & Cost Estimation

By EnergyEdge - Training for a Sustainable Energy Future

About this training course This 3-day training will provide a comprehensive understanding on the nature of costs and cost drivers in the E&P industry providing in-depth understanding on the budgeting process, proactive management, effective control and optimization of costs together with focused and relevant performance reporting. Training Objectives After the completion of this training course, participants will learn: Understand the nature of costs and cost drivers in the E&P industry through the Field Life Cycle Purpose of the Budget. Planning and Budgeting models. The Strategic and Medium-term plan Using budgets to make effective decisions. Prepare and understand costs in planning, budgeting & forecasting processes e.g. fixed / variable, capex / opex and routine / non-routine. Cost Accounting. Importance of timely cost capture and accurate recording e.g. VOWD / accruals, consistency of coding and clarity on accountability Strategic solutions in delivering cost optimization - 'do more for less' Management of costs in PSC and JV environments. Avoiding cost leakage and ensuring audit preparedness Cost Control Framework - budgets, AFEs, progress reports and variance analysis. Understanding key components and ensuring seamless interaction Cost Performance Reporting - use of KPI's, variance analysis and trend analysis. Tracking and monitoring cost optimization initiatives and targets Target Audience This training course is suitable and will greatly benefit the following specific groups: Finance staff with accounting and financial management responsibilities Those responsible for devising budgets, managing and controlling budgets Professionals engaged in planning, budgeting and management reporting Finance & Audit staff engaged on cost and financial controls Business unit managers and personnel whose responsibilities include cost management, controlling budgets and performance reporting Course Level Basic or Foundation Training Methods The training instructor relies on a highly interactive training method to enhance the learning process. This method ensures that all participants gain a complete understanding of all the topics covered. The training environment is highly stimulating, challenging, and effective because the participants will learn by case studies which will allow them to apply the material taught in their own organization. Course Duration: 3 days in total (21 hours). Training Schedule 0830 - Registration 0900 - Start of training 1030 - Morning Break 1045 - Training recommences 1230 - Lunch Break 1330 - Training recommences 1515 - Evening break 1530 - Training recommences 1700 - End of Training The maximum number of participants allowed for this training course is 25. This course is also available through our Virtual Instructor Led Training (VILT) format. Trainer Your expert course leader has more than 30 years of experience in the international oil and gas industry, covering all areas of Finance and Audit, including involvement in Commercial roles. During her 19 years with ENI she worked in Italy, Netherlands, Egypt and UK and was CFO for 2 major ENI subsidiaries. She has delivered training courses in Accounting, Audit, Economics and Commercial topics in many Countries. She has a Degree in Economics & Accounting and is a Certified Chartered Accountant. She is also a Chartered Auditor and an International Petroleum Negotiator. Outside of work, she is inspired by the beauty of nature and art, helping disadvantaged people, sports (football, golf) and her cat. Courses Delivered Internationally: E&P Accounting, Auditing in the Oil & Gas Industry Cost Control & Budgeting Introduction to the Oil & Gas Industry Petroleum Project Economics Contracts Strategy International O&G Exploitation Contracts POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Exploration & Production (E&P) Cost Control, Budgeting & Cost Estimation
Delivered in Internationally or OnlineFlexible Dates
£2,339 to £2,720

Regular expressions for engineers

5.0(3)

By Systems & Network Training

Regular expressions training course description Regular expressions are an extremely powerful tool for manipulating text and data. They are now standard features in a wide range of languages and popular tools, including Python and MySQL. Regular expressions allow you to code complex and subtle text processing that you never imagined could be automated. Once you've mastered regular expressions, they'll become an invaluable part of your toolkit. You will wonder how you ever got by without them. What will you learn Use Regular Expressions. Troubleshoot Regular Expressions. Compare RE features among different versions. Explain how the regular expression engine works. Optimize REs. Match what you want, not what you don't want. Regular expressions training course details Who will benefit: Anyone looking to use regular expressions. Prerequisites: None. Duration 1 day Regular expressions training course contents Introduction to Regular Expressions Solving real problems, REs as a language, the filename analogy, language analogy, RE frame of mind, searching text files: egrep, egrep metacharacters, start and end of the line, character classes, matching any character with dot, alternation, ignoring differences in capitalization, word boundaries, optional items, other quantifiers: repetition, parentheses and backreferences, the great escape, expanding the foundation, linguistic diversification, the goal of a RE, more examples, RE nomenclature, Improving on the status quo. Extended introductory examples A short introduction to Perl, matching text with regular expressions, toward a more real-world example, side effects of a successful match, Intertwined regular expression, intermission, modifying text with regular expressions, example: form letter, example: prettifying a stock price, automated editing, a small mail utility, adding commas to a number with lookaround, text-to-HTML conversion, that doubled-word thing. Regular expression features and flavours The regex landscape, origins of REs, care and handling of REs, Integrated handling, procedural and object-oriented handling, search-and-replace example. strings character encodings and modes, strings as REs, character-encoding issues, unicode, regex modes and match modes, common metacharacters and features, character representations, character classes and class-like constructs, anchors and other 'zero-width assertions', comments and mode modifiers, grouping capturing conditionals and control. The mechanics of expression processing Two kinds of engines, new standards, regex engine types, from the department of redundancy department, testing the engine type, match basics, about the examples, rule 1: the match that begins earliest wins, engine pieces and parts, rule 2: the standard quantifiers are greedy, regex-directed versus text-directed, NFA engine: regex-directed, DFA engine: text-directed, first thoughts: NFA and DFA in comparison, backtracking, two important points on backtracking, saved states, backtracking and greediness, more about greediness and backtracking, problems of greediness, multi-character 'quotes', lazy quantifiers, greediness and laziness, laziness and backtracking, possessive quantifiers and atomic grouping, possessive quantifiers ?, +, *+, ++ and {m,n}+, the backtracking of lookaround, is alternation greedy? taking advantage of ordered alternation, NFA DFA and posix, the longest-leftmost', posix and the longest-leftmost rule, speed and efficiency. Practical regex techniques Continuation lines, matching an IP address, working with filenames, matching balanced sets of parentheses, watching out for unwanted matches, matching delimited text, knowing your data and making assumptions, stripping leading and trailing whitespace, matching and HTML tag, matching an HTML link, examining an HTTP URL, validating a hostname, plucking a hostname, plucking a URL, parsing CSV files. Crafting an efficient expression Efficiency vs. correctness, localizing greediness, global view of backtracking, more work for POSIX NFA, work required during a non-match, being more specific, alternation can be expensive, benchmarking, know what you re measuring, benchmarking with Python, common optimisations, the mechanics of regex application, pre-application optimizations, optimizations with the transmission, optimization of the regex itself, techniques for faster expressions, common sense techniques, expose literal text, expose anchors, lazy versus greedy: be specific, split into multiple REs, mimic initial-character discrimination, use atomic grouping and possessive quantifiers, lead the engine to a match, unrolling the loop, observations, using atomic grouping and possessive quantifiers, short unrolling examples, unrolling C comments, the free flowing regex, a helping hand to guide the match, a well-guided regex is a fast regex.

Regular expressions for engineers
Delivered in Internationally or OnlineFlexible Dates
£967

Change Management Foundation: In-House Training

By IIL Europe Ltd

Change Management Foundation: In-House Training: In-House Training This course provides practical knowledge on Change Management techniques and the Foundation certification. You will examine various Change Management techniques and explore which could be effectively implemented in your organization. The structured approach helps you understand how you deal with change as an individual, as a member of a team or organization, and as a leader. The program design explores the impact that change has on these four major areas: Change and the Individual Change and the Organization Communications and Stakeholder Engagement Change Management Practice This course also prepares you for the APMG Change Management Foundation exam. Given that a primary course goal is to achieve the Foundation Certification, the course text will be provided in advance of the workshop so the participant may begin studying. In addition, daily homework assignments and practice exams will be provided. The Foundation-level exam is taken at the end of the third day of the Traditional Classroom course. Virtual Classroom participants must make separate arrangements to schedule their exam following course completion (See 'Important Note for Virtual Course Participants'). What You Will Learn You'll learn how to: Explain how individuals learn and why many may resist change Illustrate how to build an effective change team Describe the stakeholder engagement process and relate this to appropriate communication Differentiate various approaches to plan, implement, and sustain organizational change Demonstrate how to assess change impact and readiness, and deal with resistance Improve your ability to pass the APMG Change Management Foundation Certification exam Getting Started Introductions Course structure Course goals and objectives Change and the Individual How people learn Personality and change - introduction to MBTI Models of individual change - the Change Curve and Bridges' Transition Motivating individuals during change Change and the Organization Understanding organizational metaphors Organizational culture and change 3 models of change - Lewin, Kotter, and Senge Key roles in change Stakeholder Engagement Identifying and analyzing stakeholders Personas and empathy maps Influencing strategies Communication Feedback and communication approaches Communicating change - planning, factors, and barriers Communication biases and channels Change Impact Identifying and assessing change impact Stakeholder impact assessment Change severity assessment Change Readiness Building change agent networks and the change team How to make the organization ready for change Creating a change management plan Dealing with resistance to change APMG Change Management Foundation Exam Preparation Review of and practice with APMG sample questions and test papers APMG Change Management Foundation Exam Traditional Classroom: Paper-based exams will be taken on the last day of class Virtual Classroom: The exam is scheduled by the Participant and taken subsequent to the course

Change Management Foundation: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,995

PRINCE2 Agile Foundation: In-House Training

By IIL Europe Ltd

PRINCE2 Agile® Foundation: In-House Training PRINCE2 Agile® provides structure, governance, and control when working with agile concepts, methods, and techniques. It is a solution combining the flexibility and responsiveness of Agile with the clearly defined framework of PRINCE2. PRINCE2 Agile® framework covers a wide range of agile concepts, including SCRUM, Kanban, and Lean Startup. The PRINCE2 Agile® Foundation certificate is designed to help professionals deliver agile projects by tailoring PRINCE2® management controls with a broad toolset of agile delivery techniques and frameworks. PRINCE2 Agile® is an extension module tailored for forward-thinking organizations and individuals already benefiting from PRINCE2®. It provides further guidance on how to apply agile methods to the world's most recognized project management method. The purpose of the Practitioner qualification is to demonstrate that you can apply and tailor PRINCE2 Agile® in a scenario situation. What you will Learn Understand the key aspects of PRINCE2® Understand basic concepts behind common agile ways of working Demonstrate the purpose of combining PRINCE2® with agile Be able to fix and flex the aspects of a project in an agile context Apply the PRINCE2® principles and tailor the themes, processes, and management products to a project in an agile context Incorporate the areas that can support a PRINCE2 Agile® implementation To prepare Participants for the PRINCE2 Agile® Foundation exam Benefits Agile methods allow organizations to realize the benefits of products and potentially an earlier return on investment while products are being developed and improved. Improved communication through the use of common terminology across PRINCE2® and agile disciplines. Develop a clear definition of how agile can govern a project's delivery, while PRINCE2® governs projects as a whole. Seamless integration: PRINCE2 Agile® will complementPMBOK® GuideandAPM Body of Knowledge®just as PRINCE2® does currently. It will also be of interest for Program Managers with MSP® who need to understand how projects relate to the delivery mechanism. The most up-to-date and relevant view of Agile project management methodologies, PRINCE2 Agile® references the 'flow-based' working featured in Kanban in addition to other agile concepts not covered in other qualifications. Introduction - Getting Started Part 1 An overview of PRINCE2 Agile Overview Blending PRINCE2 and Agile What to fix and what to flex Part 2 Agile behaviors ad the PRINCE2 Principles Agile and the PRINCE2 Themes Part 3 Focus areas Agile and the PRINCE2 Processes Examination preparation Examination. Summary - What did we learn, and how can we implement this in our work environment?

PRINCE2 Agile Foundation: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,995