Is this course for you? Looking to upgrade your React 17 applications to React 18? Are you working with React already? Then sooner or later, you will need to upgrade to React 18. New to React and curious to know how React is different from libraries such as Vue? This course will explain the importance of concurrent rendering to you. A beginner-friendly course in React.
About this Training Course This five-day course provides an intermediate level of understanding of the geomechanical factors that affect wellbore instability, sand production and hydraulic fracture design. The course is structured such that upon completion, participants will have understood the value that geomechanics can bring to drilling, completion and production operations and will be able to leverage this value wherever it applies. The course emphasis will be on integrating the topics presented through a combination of lectures, case-studies and hands-on exercises. A special focus will be on how geomechanics knowledge is extracted from routinely acquired well data and how it is applied in the prediction and prevention of formation instability. Course Highlights The course is essentially non-mathematical and makes wide use of diagrams, pictures and exercises to illustrate the essential concepts of geomechanics Essential Rock Mechanics Principles Wellbore Stability Analysis Anisotropic Rock Properties for unconventional projects Lost Circulation and Wellbore Strengthening applications Sand Production Management Input to Hydraulic Fracture design Salt instability Training Objectives By attending this training, you will be able to acquire the following: Apply the basic concepts of geomechanics to identify, predict and mitigate against formation instability during drilling, completion and production Target Audience This course is intended for Drilling Engineers, Well Engineers, Production Technologists, Completion Engineers, Well Superintendents, Directional Drillers, Wellsite Supervisors and others, who wish to further their understanding of rock mechanics and its application to drilling and completion. There is no specific formal pre-requisite for this course. However, attendees are requested to have been exposed to drilling, completions and production operations in their positions and to have a recommended minimum of 3 years of field experience. Trainer Your Expert Course Instructor is an operational geomechanics advisor with over 46 years of experience in exploration, development and production in the upstream oil and gas industry. After obtaining a BSc (Hons) Physics degree from Aberdeen University, he worked for a variety of oil service companies in wireline operations, management and formation evaluation, before joining Schlumberger in 1995. Since 2000 he has worked principally in real-time geomechanics operations and developing acousto-geomechical applications, taking on the role of geomechanics advisor and technical manager within the Europe-Africa area of operations. Before forming his own company in 2014, Your Expert Course Instructor was one of Schlumberger's principal instructors, delivering cross-discipline internal and external geomechanics training to petrophysicists, geologists, reservoir, petroleum, well construction and drilling engineers at operating company locations, training centers and operational centers worldwide. Through extensive operational and wellsite experience gained in the North Sea, Europe, Africa, South America and the Far East, he has gained a broad based knowledge of drilling, production, log data acquisition, analysis and interpretation that has allowed him to develop and deliver pragmatic solutions to the geomechanical challenges of drilling, sand production, fracturing and unconventional reservoirs, faced by operators. His principal interests include the development and application of acousto-geomechanical techniques for the evaluation of anisotropic formations and fracture systems and the identification and prevention of wellbore instability POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations
Explore the Spring Data Java Persistence API, Spring MVC, REST clients, and more, and get hands-on with creating robust Spring Boot applications.
In this course, you will learn C# programming for desktop applications. These lessons assume no prior knowledge of programming or the C# language and will have you up and running in no time. By the end of this course, you will have enough knowledge to build a functional Windows Forms application, connected to a Microsoft SQL Server database, with all your program code and changes being tracked on GitHub.
Providing Guidance & Support for MHFAiders: giving reassurance they are not alone. Our MHFAider guidance & support forums are tailored to provide MHFAiders with the clarity they need to excel in their role. We believe it's important to offer a safe space for MHFAiders to discuss their role, while staying up to date with the latest best practices and information. Mental Health First-Aiders and Champions forum for open discussions, guidance, support, and focus topic learning with a registered Mental Health Nurse.
Welcome to this course on OWASP Top 10 where we will take a closer look at the top ten vulnerabilities that applications face today. This is a mix of both theory as well as practical and explains to you the real-world cyber-attacks on various companies and web applications.
The course will help you create amazing interactive dynamic applications that can synchronize data between your database and front-end HTML codes. You need to have basic coding knowledge and a basic understanding of HTML, JavaScript (DOM), and jQuery to take up this course.
Learn Node.js by building real-world applications with Node, Express, MongoDB, Mocha, and more!
Duration 4 Days 24 CPD hours This course is intended for This course is for the Identity and Access Administrators who are planning to take the associated certification exam, or who are performing identity and access administration tasks in their day-to-day job. This course would also be helpful to an administrator or engineer that wants to specialize in providing identity solutions and access management systems for Azure-based solutions; playing an integral role in protecting an organization. The Microsoft Identity and Access Administrator course explores how to design, implement, and operate an organization?s identity and access management systems by using Microsoft Entra ID. Learn to manage tasks such as providing secure authentication and authorization access to enterprise applications. You will also learn to provide seamless experiences and self-service management capabilities for all users. Finally, learn to create adaptive access and governance of your identity and access management solutions ensuring you can troubleshoot, monitor, and report on your environment. The Identity and Access Administrator may be a single individual or a member of a larger team. Learn how this role collaborates with many other roles in the organization to drive strategic identity projects. The end goal is to provide you knowledge to modernize identity solutions, to implement hybrid identity solutions, and to implement identity governance. Prerequisites SC-900T00: Microsoft Security, Compliance, and Identity Fundamentals AZ-104T00 - Microsoft Azure Administrator 1 - Explore identity in Microsoft Entra ID Explain the identity landscape Explore zero trust with identity Discuss identity as a control plane Explore why we have identity Define identity administration Contrast decentralized identity with central identity systems Discuss identity management solutions Explain Microsoft Entra Business to Business Compare Microsoft identity providers Define identity licensing Explore authentication Discuss authorization Explain auditing in identity 2 - Implement initial configuration of Microsoft Entra ID Configure company brand Configure and manage Microsoft Entra roles Configure delegation by using administrative units Analyze Microsoft Entra role permissions Configure and manage custom domains Configure tenant-wide setting 3 - Create, configure, and manage identities Create, configure, and manage users Create, configure, and manage groups Configure and manage device registration Manage licenses Create custom security attributes Explore automatic user creation 4 - Implement and manage external identities Describe guest access and Business to Business accounts Manage external collaboration Invite external users - individually and in bulk Demo - manage guest users in Microsoft Entra ID Manage external user accounts in Microsoft Entra ID Manage external users in Microsoft 365 workloads Implement and manage Microsoft Entra Verified ID Configure identity providers Implement cross-tenant access controls 5 - Implement and manage hybrid identity Plan, design, and implement Microsoft Entra Connect Implement manage password hash synchronization (PHS) Implement manage pass-through authentication (PTA) Demo - Manage pass-through authentication and seamless single sign-on (SSO) Implement and manage federation Trouble-shoot synchronization errors Implement Microsoft Entra Connect Health Manage Microsoft Entra Health 6 - Secure Microsoft Entra users with multifactor authentication What is Microsoft Entra multifactor authentication? Plan your multifactor authentication deployment Configure multi-factor authentication methods 7 - Manage user authentication Administer FIDO2 and passwordless authentication methods Explore Authenticator app and OATH tokens Implement an authentication solution based on Windows Hello for Business Deploy and manage password protection Configure smart lockout thresholds Implement Kerberos and certificate-based authentication in Microsoft Entra ID Configure Microsoft Entra user authentication for virtual machines 8 - Plan, implement, and administer Conditional Access Plan security defaults Plan Conditional Access policies Implement Conditional Access policy controls and assignments Test and troubleshoot Conditional Access policies Implement application controls Implement session management Implement continuous access evaluation 9 - Manage Microsoft Entra Identity Protection Review identity protection basics Implement and manage user risk policy Monitor, investigate, and remediate elevated risky users Implement security for workload identities Explore Microsoft Defender for Identity 10 - Implement access management for Azure resources Assign Azure roles Configure custom Azure roles Create and configure managed identities Access Azure resources with managed identities Analyze Azure role permissions Configure Azure Key Vault RBAC policies Retrieve objects from Azure Key Vault Explore Microsoft Entra Permissions Management 11 - Plan and design the integration of enterprise apps for SSO Discover apps by using Microsoft Defender for Cloud Apps and Active Directory Federation Services app report Configure connectors to apps Design and implement app management roles Configure preintegrated gallery SaaS apps Implement and manage policies for OAuth apps 12 - Implement and monitor the integration of enterprise apps for SSO Implement token customizations Implement and configure consent settings Integrate on-premises apps with Microsoft Entra application proxy Integrate custom SaaS apps for single sign-on Implement application-based user provisioning Monitor and audit access to Microsoft Entra integrated enterprise applications Create and manage application collections 13 - Implement app registration Plan your line of business application registration strategy Implement application registration Register an application Configure permission for an application Grant tenant-wide admin consent to applications Implement application authorization Manage and monitor application by using app governance 14 - Plan and implement entitlement management Define access packages Configure entitlement management Configure and manage connected organizations Review per-user entitlements 15 - Plan, implement, and manage access review Plan for access reviews Create access reviews for groups and apps Create and configure access review programs Monitor access review findings Automate access review management tasks Configure recurring access reviews 16 - Plan and implement privileged access Define a privileged access strategy for administrative users Configure Privileged Identity Management for Azure resources Plan and configure Privileged Access Groups Analyze Privileged Identity Management audit history and reports Create and manage emergency access accounts 17 - Monitor and maintain Microsoft Entra ID Analyze and investigate sign-in logs to troubleshoot access issues Review and monitor Microsoft Entra audit logs Export logs to third-party security information and event management system Analyze Microsoft Entra workbooks and reporting Monitor security posture with Identity Secure Score
This course empowers you to create interactive web applications using Shiny for Python. From fundamental concepts to advanced techniques, you will master web development with Python as your toolkit. Develop dynamic projects, learn diverse deployment methods, and embark on a journey to become a skilled Python web developer.