Enhance your knowledge of natural gas and LNG sales agreements with EnergyEdge course. Enroll now to gain valuable industry knowledge and skills.
Duration 4 Days 24 CPD hours This course is intended for If you're a developer with a keen interest in providing automated solutions for your organization, this certification could be a great fit for you. You automate time-consuming and repetitive tasks by using Microsoft Power Automate. You review solution requirements, create process documentation, and design, develop, deploy, integrate, troubleshoot, and evaluate solutions. Working with business stakeholders, you help to improve and automate business workflows. Overview After completing this course, students will be able to: Design RPA solutions Develop RPA solutions Deploy and manage RPA solutions Candidates for this course automate time-consuming and repetitive tasks by using Microsoft Power Automate. They review solution requirements, create process documentation, and design, develop, troubleshoot, and evaluate solutions. Candidates work with business stakeholders to improve and automate business workflows. They collaborate with administrators to deploy solutions to production environments, and they support solutions. Module 1: Get started with Power Automate for desktop Get started with Power Automate for desktop by learning about flows, creating automated steps, and flow development essentials. Module 2: Automate processes with Robotic Process Automation and Power Automate for desktop Work with Power Automate for desktop to record Windows and Web applications, but also use out of box actions such as manipulating Excel documents as part of an end to end invoice processing solution. Module 3: Work with Power Automate for desktop Work with Power Automate for desktop options, flows, recording features, conditions, loops, variables, images, and error and exception handling. Module 4: Work with different technologies in Power Automate for desktop Learn how to automate email handling, Excel, user interface, and system services with Power Automate for desktop. Module 5: Implement advanced logic in Power Automate for desktop Learn how to work with system flows, control flows, mimic mouse actions, as well as operations used to manipulate text, date, and time in Power Automate for desktop. Module 6: Build expertise with Power Automate for desktop Learn how to use Power Automate for desktop to work with Power Automate, OCR technologies, and scripting. Module 7: Build custom connectors for Power Automate This Learning Path explores custom connectors and explains how to configure them and use them with Microsoft Power Automate Module 8: Use best practices to secure and govern Microsoft Power Platform environments This module focuses on introducing Microsoft Power Platform environments and their role in creating Data Loss Prevention (DLP) policies by using examples and use cases. A brief introduction and overview of tools will also be discussed, including Microsoft Power Platform and Power Automate Admin experiences and Microsoft Power Platform Center of Excellence (COE) toolkit. Additional course details: Nexus Humans PL-500T00 Microsoft Power Automate RPA Developer training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the PL-500T00 Microsoft Power Automate RPA Developer course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This course is for the Identity and Access Administrators who are planning to take the associated certification exam, or who are performing identity and access administration tasks in their day-to-day job. This course would also be helpful to an administrator or engineer that wants to specialize in providing identity solutions and access management systems for Azure-based solutions; playing an integral role in protecting an organization. The Microsoft Identity and Access Administrator course explores how to design, implement, and operate an organization?s identity and access management systems by using Microsoft Entra ID. Learn to manage tasks such as providing secure authentication and authorization access to enterprise applications. You will also learn to provide seamless experiences and self-service management capabilities for all users. Finally, learn to create adaptive access and governance of your identity and access management solutions ensuring you can troubleshoot, monitor, and report on your environment. The Identity and Access Administrator may be a single individual or a member of a larger team. Learn how this role collaborates with many other roles in the organization to drive strategic identity projects. The end goal is to provide you knowledge to modernize identity solutions, to implement hybrid identity solutions, and to implement identity governance. Prerequisites SC-900T00: Microsoft Security, Compliance, and Identity Fundamentals AZ-104T00 - Microsoft Azure Administrator 1 - Explore identity in Microsoft Entra ID Explain the identity landscape Explore zero trust with identity Discuss identity as a control plane Explore why we have identity Define identity administration Contrast decentralized identity with central identity systems Discuss identity management solutions Explain Microsoft Entra Business to Business Compare Microsoft identity providers Define identity licensing Explore authentication Discuss authorization Explain auditing in identity 2 - Implement initial configuration of Microsoft Entra ID Configure company brand Configure and manage Microsoft Entra roles Configure delegation by using administrative units Analyze Microsoft Entra role permissions Configure and manage custom domains Configure tenant-wide setting 3 - Create, configure, and manage identities Create, configure, and manage users Create, configure, and manage groups Configure and manage device registration Manage licenses Create custom security attributes Explore automatic user creation 4 - Implement and manage external identities Describe guest access and Business to Business accounts Manage external collaboration Invite external users - individually and in bulk Demo - manage guest users in Microsoft Entra ID Manage external user accounts in Microsoft Entra ID Manage external users in Microsoft 365 workloads Implement and manage Microsoft Entra Verified ID Configure identity providers Implement cross-tenant access controls 5 - Implement and manage hybrid identity Plan, design, and implement Microsoft Entra Connect Implement manage password hash synchronization (PHS) Implement manage pass-through authentication (PTA) Demo - Manage pass-through authentication and seamless single sign-on (SSO) Implement and manage federation Trouble-shoot synchronization errors Implement Microsoft Entra Connect Health Manage Microsoft Entra Health 6 - Secure Microsoft Entra users with multifactor authentication What is Microsoft Entra multifactor authentication? Plan your multifactor authentication deployment Configure multi-factor authentication methods 7 - Manage user authentication Administer FIDO2 and passwordless authentication methods Explore Authenticator app and OATH tokens Implement an authentication solution based on Windows Hello for Business Deploy and manage password protection Configure smart lockout thresholds Implement Kerberos and certificate-based authentication in Microsoft Entra ID Configure Microsoft Entra user authentication for virtual machines 8 - Plan, implement, and administer Conditional Access Plan security defaults Plan Conditional Access policies Implement Conditional Access policy controls and assignments Test and troubleshoot Conditional Access policies Implement application controls Implement session management Implement continuous access evaluation 9 - Manage Microsoft Entra Identity Protection Review identity protection basics Implement and manage user risk policy Monitor, investigate, and remediate elevated risky users Implement security for workload identities Explore Microsoft Defender for Identity 10 - Implement access management for Azure resources Assign Azure roles Configure custom Azure roles Create and configure managed identities Access Azure resources with managed identities Analyze Azure role permissions Configure Azure Key Vault RBAC policies Retrieve objects from Azure Key Vault Explore Microsoft Entra Permissions Management 11 - Plan and design the integration of enterprise apps for SSO Discover apps by using Microsoft Defender for Cloud Apps and Active Directory Federation Services app report Configure connectors to apps Design and implement app management roles Configure preintegrated gallery SaaS apps Implement and manage policies for OAuth apps 12 - Implement and monitor the integration of enterprise apps for SSO Implement token customizations Implement and configure consent settings Integrate on-premises apps with Microsoft Entra application proxy Integrate custom SaaS apps for single sign-on Implement application-based user provisioning Monitor and audit access to Microsoft Entra integrated enterprise applications Create and manage application collections 13 - Implement app registration Plan your line of business application registration strategy Implement application registration Register an application Configure permission for an application Grant tenant-wide admin consent to applications Implement application authorization Manage and monitor application by using app governance 14 - Plan and implement entitlement management Define access packages Configure entitlement management Configure and manage connected organizations Review per-user entitlements 15 - Plan, implement, and manage access review Plan for access reviews Create access reviews for groups and apps Create and configure access review programs Monitor access review findings Automate access review management tasks Configure recurring access reviews 16 - Plan and implement privileged access Define a privileged access strategy for administrative users Configure Privileged Identity Management for Azure resources Plan and configure Privileged Access Groups Analyze Privileged Identity Management audit history and reports Create and manage emergency access accounts 17 - Monitor and maintain Microsoft Entra ID Analyze and investigate sign-in logs to troubleshoot access issues Review and monitor Microsoft Entra audit logs Export logs to third-party security information and event management system Analyze Microsoft Entra workbooks and reporting Monitor security posture with Identity Secure Score
Duration 4 Days 24 CPD hours This course is intended for This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). Prerequisites Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.) Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications. Experience with hybrid and cloud implementations. 1 - Introduction to Zero Trust and best practice frameworks Zero Trust initiatives Zero Trust technology pillars part 1 Zero Trust technology pillars part 2 2 - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) Define a security strategy Cloud Adoption Framework secure methodology Design security with Azure Landing Zones The Well-Architected Framework security pillar 3 - Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) Design solutions with best practices for capabilities and controls Design solutions with best practices for attack protection 4 - Design a resiliency strategy for common cyberthreats like ransomware Common cyberthreats and attack patterns Support business resiliency Ransomware protection Configurations for secure backup and restore Security updates 5 - Case study: Design solutions that align with security best practices and priorities Case study description Case study answers Conceptual walkthrough Technical walkthrough 6 - Design solutions for regulatory compliance Translate compliance requirements into a security solution Address compliance requirements with Microsoft Purview Address privacy requirements with Microsoft Priva Address security and compliance requirements with Azure policy Evaluate infrastructure compliance with Defender for Cloud 7 - Design solutions for identity and access management Design cloud, hybrid and multicloud access strategies (including Azure AD) Design a solution for external identities Design modern authentication and authorization strategies Align conditional access and Zero Trust Specify requirements to secure Active Directory Domain Services (AD DS) Design a solution to manage secrets, keys, and certificates 8 - Design solutions for securing privileged access The enterprise access model Design identity governance solutions Design a solution to secure tenant administration Design a solution for cloud infrastructure entitlement management (CIEM) Design a solution for privileged access workstations and bastion services 9 - Design solutions for security operations Design security operations capabilities in hybrid and multicloud environments Design centralized logging and auditing Design security information and event management (SIEM) solutions Design solutions for detection and response Design a solution for security orchestration, automation, and response (SOAR) Design security workflows Design threat detection coverage 10 - Case study: Design security operations, identity and compliance capabilities Case study description Case study answers Conceptual walkthrough Technical walkthrough 11 - Design solutions for securing Microsoft 365 Evaluate security posture for collaboration and productivity workloads Design a Microsoft 365 Defender solution Design configurations and operational practices for Microsoft 365 12 - Design solutions for securing applications Design and implement standards to secure application development Evaluate security posture of existing application portfolios Evaluate application threats with threat modeling Design security lifecycle strategy for applications Secure access for workload identities Design a solution for API management and security Design a solution for secure access to applications 13 - Design solutions for securing an organization's data Design a solution for data discovery and classification using Microsoft Purview Design a solution for data protection Design data security for Azure workloads Design security for Azure Storage Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - Case study: Design security solutions for applications and data Case study description Case study answers Conceptual walkthrough Technical walkthrough 15 - Specify requirements for securing SaaS, PaaS, and IaaS services Specify security baselines for SaaS, PaaS, and IaaS services Specify security requirements for web workloads Specify security requirements for containers and container orchestration 16 - Design solutions for security posture management in hybrid and multicloud environments Evaluate security posture by using Microsoft Cloud Security Benchmark Design integrated posture management and workload protection Evaluate security posture by using Microsoft Defender for Cloud Posture evaluation with Microsoft Defender for Cloud secure score Design cloud workload protection with Microsoft Defender for Cloud Integrate hybrid and multicloud environments with Azure Arc Design a solution for external attack surface management 17 - Design solutions for securing server and client endpoints Specify server security requirements Specify requirements for mobile devices and clients Specify internet of things (IoT) and embedded device security requirements Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT Specify security baselines for server and client endpoints Design a solution for secure remote access 18 - Design solutions for network security Design solutions for network segmentation Design solutions for traffic filtering with network security groups Design solutions for network posture management Design solutions for network monitoring 19 - Case study: Design security solutions for infrastructure Case study description Case study answers Conceptual walkthrough Technical walkthrough Additional course details: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
SAFe® Lean Portfolio Management: Virtual In-House Training Create a culture of innovation, flexibility, and speed where all people in the portfolio can effectively execute as one unified team. In this course, you will gain the practical tools and techniques necessary to implement the Lean Portfolio Management functions of Strategy and Investment Funding, Agile Portfolio Operations, and Lean Governance. You will have the opportunity to capture the current and future state of the portfolio with the Portfolio Canvas tool and identify important business initiatives for achieving the future state. You'll be able to establish portfolio flow with the Portfolio Kanban and prioritize initiatives for maximum economic benefit. The course also provides insights on how to establish Value Stream Budgets and Lean Budget Guardrails and measure the Lean portfolio performance. What you will Learn Describe the importance of LPM Connect the portfolio to enterprise strategy Implement Lean budgeting and guardrails Establish portfolio flow with the Portfolio Kanban Support operational excellence with APMO and CoPs Coordinate Value Streams Measure the LPM performance Build a plan for LPM implementation Introducing Lean Portfolio Management (LPM) Establishing Strategy and Investment Funding Applying Agile Portfolio Operations Applying Lean Governance Implementing the LPM function
About this Training Course This is a 2 full-day course that is aimed at providing professionals in the Oil & Gas business with a comprehensive set of core negotiating skills. Negotiations take place in many situations e.g. between peers, manager and subordinate, company and trade unions, company and government. The skills learnt on this course will be useful in all of these situations. However, this course puts a focus on the skills needed in commercial negotiations. A particular emphasis is placed on the relationship and negotiations typically carried out between client and contractor, vendor or the provider of services. A mixture of theory, examples and practical exercises are used so that the participants understand the principles and get an opportunity to try them out. The case studies used are real cases encountered in the Oil & Gas industry. Training Objectives Many technical experts find it difficult to move out of their expertise areas and deal with commercial matters. Negotiating to optimise business value is a step further from their comfort zones. All too often negotiations are then left to finance personnel. They bring many strengths to the table but an understanding of engineering trade-offs is not one of them. By the end of this course, the participants will add to their technical know-how a core competence in negotiation skills. They will thus become formidable negotiating opponents. Target Audience The course is intended for middle-managers and technical and other staff who are responsible for contracts, but with limited previous exposure to negotiations, and who will need these skills in the near future. Course Level Intermediate Trainer Your expert course leader is a consultant, manager and engineer with more than 30 years' experience in a broad range of positions. He spent 15 years with the Shell group and during this time, gained extensive negotiating experience with contractors, vendors, service agents, trade unions and purchasers of equipment and products. Over the last 15 years, he has worked with a broad range of multinational businesses across the globe in a wide range of negotiation related roles including: Developing negotiating capability and skillsets Advising on negotiation strategies Establishing Alliances, Joint Ventures and Partnerships, & Remediating Alliances, Joint Ventures and Partnerships He has many years of teaching experience to technical staff - both in a corporate setting, and in an academic setting - for Melbourne University in Melbourne, Australia. Several thousand people from around the world have benefited from his courses. He brings an engineer's practical perspective, and can readily empathize with technical staff making forays into the commercial world of negotiations. He is joint author (with Professor Danny Samson) of Patterns of Excellence ISBN 0273638769, published by Financial Times Management. This has been adopted by a number of blue chip companies as the core text for management development. Corporate Experience: 15 years with Shell in a broad range of international & domestic technical and managerial and change management roles. Consulting Experience: 5 Years with McKinsey Consulting Group 4 Years with Melbourne Business Schoo POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
Duration 3 Days 18 CPD hours This course is intended for Delegates attending this course must have successfully achieved the ITIL 4 Foundation Qualification; your certificate must be presented as documentary evidence to gain admission to this course. Ideally, candidates should have at least two years of professional experience working in IT Service Management. The ITIL 4 CDS Qualification would most likely suit the following delegates: Individuals continuing their journey in service management ITSM managers and aspiring ITSM managers ITSM practitioners managing the operation of IT-enabled & digital products and services, and those responsible for the end-to-end delivery Existing ITIL qualification holders wishing to develop their knowledge The above list is a suggestion only; individuals may wish to attend based on their own career aspirations, personal goals or objectives. Delegates may take as few or as many Intermediate qualifications as they require, and to suit their needs. Overview The course includes core concepts describing how different types of work (value streams) are built, tested and delivered ?end-to-end? from beginning to end and with continual iterations and feedback loops. There is also a focus on areas such as testing, knowledge, customer and employee feedback, new technologies, supplier sourcing, and ways of managing work. During this course, you will: Understand how to plan and build a service value stream to create, deliver and support services Know how relevant ITIL practices contribute to creation, delivery, and support across the SVS and value streams Know how to create, deliver and support services Understand how to integrate different value streams and activities to create, deliver and support IT-enabled products and services, and relevant practices, methods, and tools Understand service performance, service quality, and improvement methods. This course begins your journey toward the ITIL Managing Professional designation. You will acquire insight that will allow you to integrate different value streams and activities to create, deliver and support IT-enabled products and services. Armed with this knowledge and skill set, you will be confident in running those IT-enabled services, teams and workflows successfully. This class includes an exam voucher. Prerequisites ITIL© 4 Foundation 1 - PLANNING AND BUILDING A SERVICE VALUE STREAM Tackling the concepts and challenges related to SVS Using the ?shift left? approach The true value of information and technology across the SVS 2 - CONTRIBUTING TO CREATION, DELIVERY AND SUPPORT Using the value stream to design, develop and transition new services Adding to a value stream by leveraging ITIL practices Providing user support Furthering the value stream for support through ITIL practices 3 - CREATING, DELIVERING AND SUPPORTING SERVICES Coordinate, prioritize and structure activities The value of buy vs. build, sourcing, and service integration and management
Duration 4 Days 24 CPD hours This course is intended for This course is intended for both novice and experienced SharePoint users who wish to make full use of SharePoint Online. Overview #NAME? This course delivers the complete site owner story from start to finish in an engaging and practical way to ensure you have the confidence to plan and create new sites or manage your existing sites in SharePoint Online. Your goal is to learn how to make SharePoint online relevant to your team by using a sites functionality to help you share information and collaborate with your colleagues. During the class, you will also learn best practices and ?what not to do? as you watch live, interactive demonstrations and put theory into practice with hands on exercises in SharePoint Online. 1 - An Introduction to SharePoint Online Introducing Office 365 and SharePoint Getting started with Office 365 The cloud revolution Login to Office 365 What is Office 365 Using the app launcher What is SharePoint Office 365 settings Introducing Office 365 Groups Delve Ownership and Access OneDrive 2 - Creating Sites Planning your sites Create new subsites The Office 365 tenant Site templates Web addresses Apply a them Site collections Building your navigation Create a new site Delete subsites Team site navigation User interface: classic vs modern Site contents: classic vs modern Where does classic come from? 3 - Creating and Managing Web Pages The types of pages found in SharePoint Classic SharePoint pages Modern SharePoint pages How to use classic team site pages Create news and site pages Review features of publishing sites Web parts Save, publish, share and delete pages Communication sites 4 - Working with Apps An introduction to apps Co-authoring Marketplace apps Check In ? Out Adding apps to a site Edit and view file properties Create and manage columns Quick edit view Public and personal views File commands Managing app settings Copy link and Share Content approval Folders Major and minor versioning The recycle bin Document sets Alerts Working with files in a library OneDrive sync Create, Upload and edit files Working with classic lists 5 - Building processes with Flow and PowerApps What are business processes? Design and publish a Flow Classic tools for designing processes Getting started with PowerApps in SharePoint Design and test a classic workflow Enhance data capture with PowerApps Getting started with Flow in SharePoint Test a Flow and PowerApps enriched list 6 - Customizing Security Office 365 Group access Share a file Updating Office 365 Group Security Remove a user Managing access to SharePoint Customizing SharePoint security New sites private vs public Create permission levels and groups Setup access requests Security inheritance Share a site Security best practices 7 - Working with Search Delve Search tips An introduction to SharePoint search Accessing classic search Search in folders, libraries and sites Promoted results Search results 8 - Enterprise Content Management Managed metadata service Information management policies An introduction to content types The records center Create and manage content type In-place records management Deploy content types The content organizer Using content types in apps Durable links The content type hub
About this training course This 3-day introductory-level course provides a comprehensive overview of international accounting and finance practices in the E&P industry. It is particularly suitable for finance personnel who are new to the oil and gas industry, or want to gain a broader understanding of oil and gas financial policy, joint venture and cost-control topic areas. Training Objectives After the completion of this training course, participants will be able to: Comprehend an overview of accounting policies and practices in the oil and gas industry Manage project development and operating costs Understand the accounting and financial management implications of exploring for and producing oil and gas Review the background to financial issues like joint ventures that are unique to the E&P industry, and their accounting treatment Target Audience This training course is suitable and will greatly benefit the following specific groups: Finance staff new to the industry who require a grounding in the various specialist discipline areas that typically comprise an oil and gas company finance function Finance personnel who are being developed for broader accounting and financial management responsibilities Audit and information systems staff who have frequent dealings with financial controls and systems Treasury and tax specialists who require a better understanding of E&P finance and accounting Course Level Basic or Foundation Training Methods The training instructor relies on a highly interactive training method to enhance the learning process. This method ensures that all participants gain a complete understanding of all the topics covered. The training environment is highly stimulating, challenging, and effective because the participants will learn by case studies which will allow them to apply the material taught in their own organization. Course Duration: 3 days in total (21 hours). Training Schedule 0830 - Registration 0900 - Start of training 1030 - Morning Break 1045 - Training recommences 1230 - Lunch Break 1330 - Training recommences 1515 - Evening break 1530 - Training recommences 1700 - End of Training The maximum number of participants allowed for this training course is 25. This course is also available through our Virtual Instructor Led Training (VILT) format. Trainer Your expert course leader has more than 30 years of experience in the international oil and gas industry, covering all areas of Finance and Audit, including involvement in Commercial roles. During her 19 years with ENI she worked in Italy, Netherlands, Egypt and UK and was CFO for 2 major ENI subsidiaries. She has delivered training courses in Accounting, Audit, Economics and Commercial topics in many Countries. She has a Degree in Economics & Accounting and is a Certified Chartered Accountant. She is also a Chartered Auditor and an International Petroleum Negotiator. Outside of work, she is inspired by the beauty of nature and art, helping disadvantaged people, sports (football, golf) and her cat. Courses Delivered Internationally: E&P Accounting, Auditing in the Oil & Gas Industry Cost Control & Budgeting Introduction to the Oil & Gas Industry Petroleum Project Economics Contracts Strategy International O&G Exploitation Contracts POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
About this training course This 3-day training will provide a comprehensive understanding on the nature of costs and cost drivers in the E&P industry providing in-depth understanding on the budgeting process, proactive management, effective control and optimization of costs together with focused and relevant performance reporting. Training Objectives After the completion of this training course, participants will learn: Understand the nature of costs and cost drivers in the E&P industry through the Field Life Cycle Purpose of the Budget. Planning and Budgeting models. The Strategic and Medium-term plan Using budgets to make effective decisions. Prepare and understand costs in planning, budgeting & forecasting processes e.g. fixed / variable, capex / opex and routine / non-routine. Cost Accounting. Importance of timely cost capture and accurate recording e.g. VOWD / accruals, consistency of coding and clarity on accountability Strategic solutions in delivering cost optimization - 'do more for less' Management of costs in PSC and JV environments. Avoiding cost leakage and ensuring audit preparedness Cost Control Framework - budgets, AFEs, progress reports and variance analysis. Understanding key components and ensuring seamless interaction Cost Performance Reporting - use of KPI's, variance analysis and trend analysis. Tracking and monitoring cost optimization initiatives and targets Target Audience This training course is suitable and will greatly benefit the following specific groups: Finance staff with accounting and financial management responsibilities Those responsible for devising budgets, managing and controlling budgets Professionals engaged in planning, budgeting and management reporting Finance & Audit staff engaged on cost and financial controls Business unit managers and personnel whose responsibilities include cost management, controlling budgets and performance reporting Course Level Basic or Foundation Training Methods The training instructor relies on a highly interactive training method to enhance the learning process. This method ensures that all participants gain a complete understanding of all the topics covered. The training environment is highly stimulating, challenging, and effective because the participants will learn by case studies which will allow them to apply the material taught in their own organization. Course Duration: 3 days in total (21 hours). Training Schedule 0830 - Registration 0900 - Start of training 1030 - Morning Break 1045 - Training recommences 1230 - Lunch Break 1330 - Training recommences 1515 - Evening break 1530 - Training recommences 1700 - End of Training The maximum number of participants allowed for this training course is 25. This course is also available through our Virtual Instructor Led Training (VILT) format. Trainer Your expert course leader has more than 30 years of experience in the international oil and gas industry, covering all areas of Finance and Audit, including involvement in Commercial roles. During her 19 years with ENI she worked in Italy, Netherlands, Egypt and UK and was CFO for 2 major ENI subsidiaries. She has delivered training courses in Accounting, Audit, Economics and Commercial topics in many Countries. She has a Degree in Economics & Accounting and is a Certified Chartered Accountant. She is also a Chartered Auditor and an International Petroleum Negotiator. Outside of work, she is inspired by the beauty of nature and art, helping disadvantaged people, sports (football, golf) and her cat. Courses Delivered Internationally: E&P Accounting, Auditing in the Oil & Gas Industry Cost Control & Budgeting Introduction to the Oil & Gas Industry Petroleum Project Economics Contracts Strategy International O&G Exploitation Contracts POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations