About this training course This 3-day training will provide a comprehensive understanding on the nature of costs and cost drivers in the E&P industry providing in-depth understanding on the budgeting process, proactive management, effective control and optimization of costs together with focused and relevant performance reporting. Training Objectives After the completion of this training course, participants will learn: Understand the nature of costs and cost drivers in the E&P industry through the Field Life Cycle Purpose of the Budget. Planning and Budgeting models. The Strategic and Medium-term plan Using budgets to make effective decisions. Prepare and understand costs in planning, budgeting & forecasting processes e.g. fixed / variable, capex / opex and routine / non-routine. Cost Accounting. Importance of timely cost capture and accurate recording e.g. VOWD / accruals, consistency of coding and clarity on accountability Strategic solutions in delivering cost optimization - 'do more for less' Management of costs in PSC and JV environments. Avoiding cost leakage and ensuring audit preparedness Cost Control Framework - budgets, AFEs, progress reports and variance analysis. Understanding key components and ensuring seamless interaction Cost Performance Reporting - use of KPI's, variance analysis and trend analysis. Tracking and monitoring cost optimization initiatives and targets Target Audience This training course is suitable and will greatly benefit the following specific groups: Finance staff with accounting and financial management responsibilities Those responsible for devising budgets, managing and controlling budgets Professionals engaged in planning, budgeting and management reporting Finance & Audit staff engaged on cost and financial controls Business unit managers and personnel whose responsibilities include cost management, controlling budgets and performance reporting Course Level Basic or Foundation Training Methods The training instructor relies on a highly interactive training method to enhance the learning process. This method ensures that all participants gain a complete understanding of all the topics covered. The training environment is highly stimulating, challenging, and effective because the participants will learn by case studies which will allow them to apply the material taught in their own organization. Course Duration: 3 days in total (21 hours). Training Schedule 0830 - Registration 0900 - Start of training 1030 - Morning Break 1045 - Training recommences 1230 - Lunch Break 1330 - Training recommences 1515 - Evening break 1530 - Training recommences 1700 - End of Training The maximum number of participants allowed for this training course is 25. This course is also available through our Virtual Instructor Led Training (VILT) format. Trainer Your expert course leader has more than 30 years of experience in the international oil and gas industry, covering all areas of Finance and Audit, including involvement in Commercial roles. During her 19 years with ENI she worked in Italy, Netherlands, Egypt and UK and was CFO for 2 major ENI subsidiaries. She has delivered training courses in Accounting, Audit, Economics and Commercial topics in many Countries. She has a Degree in Economics & Accounting and is a Certified Chartered Accountant. She is also a Chartered Auditor and an International Petroleum Negotiator. Outside of work, she is inspired by the beauty of nature and art, helping disadvantaged people, sports (football, golf) and her cat. Courses Delivered Internationally: E&P Accounting, Auditing in the Oil & Gas Industry Cost Control & Budgeting Introduction to the Oil & Gas Industry Petroleum Project Economics Contracts Strategy International O&G Exploitation Contracts POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
About this training course This 3-day introductory-level course provides a comprehensive overview of international accounting and finance practices in the E&P industry. It is particularly suitable for finance personnel who are new to the oil and gas industry, or want to gain a broader understanding of oil and gas financial policy, joint venture and cost-control topic areas. Training Objectives After the completion of this training course, participants will be able to: Comprehend an overview of accounting policies and practices in the oil and gas industry Manage project development and operating costs Understand the accounting and financial management implications of exploring for and producing oil and gas Review the background to financial issues like joint ventures that are unique to the E&P industry, and their accounting treatment Target Audience This training course is suitable and will greatly benefit the following specific groups: Finance staff new to the industry who require a grounding in the various specialist discipline areas that typically comprise an oil and gas company finance function Finance personnel who are being developed for broader accounting and financial management responsibilities Audit and information systems staff who have frequent dealings with financial controls and systems Treasury and tax specialists who require a better understanding of E&P finance and accounting Course Level Basic or Foundation Training Methods The training instructor relies on a highly interactive training method to enhance the learning process. This method ensures that all participants gain a complete understanding of all the topics covered. The training environment is highly stimulating, challenging, and effective because the participants will learn by case studies which will allow them to apply the material taught in their own organization. Course Duration: 3 days in total (21 hours). Training Schedule 0830 - Registration 0900 - Start of training 1030 - Morning Break 1045 - Training recommences 1230 - Lunch Break 1330 - Training recommences 1515 - Evening break 1530 - Training recommences 1700 - End of Training The maximum number of participants allowed for this training course is 25. This course is also available through our Virtual Instructor Led Training (VILT) format. Trainer Your expert course leader has more than 30 years of experience in the international oil and gas industry, covering all areas of Finance and Audit, including involvement in Commercial roles. During her 19 years with ENI she worked in Italy, Netherlands, Egypt and UK and was CFO for 2 major ENI subsidiaries. She has delivered training courses in Accounting, Audit, Economics and Commercial topics in many Countries. She has a Degree in Economics & Accounting and is a Certified Chartered Accountant. She is also a Chartered Auditor and an International Petroleum Negotiator. Outside of work, she is inspired by the beauty of nature and art, helping disadvantaged people, sports (football, golf) and her cat. Courses Delivered Internationally: E&P Accounting, Auditing in the Oil & Gas Industry Cost Control & Budgeting Introduction to the Oil & Gas Industry Petroleum Project Economics Contracts Strategy International O&G Exploitation Contracts POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
About this training course This 3-day introductory-level course provides a comprehensive overview of Auditing in the Exploration & Production (E&P) industry. It is suitable for anyone who wants to gain a broader understanding of Upstream Oil & Gas Auditing - including joint venture, financial and contractual audits by government and regulatory authorities in the various granting regimes (Production Sharing Contracts, Risk Service Contracts, Concessionary). Training Objectives After the completion of this training course, participants will be able to: Gain knowledge of the unique features or key phases of the E&P Business Understand the general principles and objectives of the various different types of Upstream Oil & Gas audits Add value to your organisation by improving your audit techniques and auditing skills Review the importance of following process in order to avoid costly audit related findings. Utilize industry specific examples and exercises, develop your understanding of the most common E&P industry audit issues Target Audience This training course is suitable and will greatly benefit the following specific groups: Audit staff who are new or relatively new to the industry and who require a grounding in the various aspects of E&P Audit Finance or Accounting personnel involved in supporting audits Staff from a wide range of other business functions who are connected to / impacted by audit, such as, Supply Chain, Operations, Contracts Holders, IT, Tax and Treasury Topics will be covered from both the perspective of being part of an audit team plus that of the team being audited. Therefore, the course will appeal to staff from IOC's, NOC's and those from Government and/or Regulatory Authorities. Course Level Basic or Foundation Training Methods The training instructor relies on a highly interactive training method to enhance the learning process. This method ensures that all participants gain a complete understanding of all the topics covered. The training environment is highly stimulating, challenging, and effective because the participants will learn by case studies which will allow them to apply the material taught in their own organization. Course Duration: 3 days in total (21 hours). Training Schedule 0830 - Registration 0900 - Start of training 1030 - Morning Break 1045 - Training recommences 1230 - Lunch Break 1330 - Training recommences 1515 - Evening break 1530 - Training recommences 1700 - End of Training The maximum number of participants allowed for this training course is 25. This course is also available through our Virtual Instructor Led Training (VILT) format. Trainer Your expert course leader has more than 30 years of experience in the international oil and gas industry, covering all areas of Finance and Audit, including involvement in Commercial roles. During her 19 years with ENI she worked in Italy, Netherlands, Egypt and UK and was CFO for 2 major ENI subsidiaries. She has delivered training courses in Accounting, Audit, Economics and Commercial topics in many Countries. She has a Degree in Economics & Accounting and is a Certified Chartered Accountant. She is also a Chartered Auditor and an International Petroleum Negotiator. Outside of work, she is inspired by the beauty of nature and art, helping disadvantaged people, sports (football, golf) and her cat. Courses Delivered Internationally: E&P Accounting, Auditing in the Oil & Gas Industry Cost Control & Budgeting Introduction to the Oil & Gas Industry Petroleum Project Economics Contracts Strategy International O&G Exploitation Contracts POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
Duration 4 Days 24 CPD hours This course is intended for Collaboration Communications Systems Engineers are responsible for planning, deploying, configuring, maintaining, and troubleshooting Microsoft Teams Phone, meetings, and personal and shared space devices, including Microsoft Teams Rooms and Surface Hub. Collaboration Communications Systems Engineers have a fundamental understanding ofÿnetworking, telecommunications, audio/visual and meeting room technologies, identity and access management. They are proficient in managing and monitoring Teams Phone, meetings, and certified devices using the Microsoft Teams admin center, PowerShell, the Microsoft Teams Rooms Pro Portal, and the Call Quality Dashboard. They deploy and configure Microsoft Teams Phone with PSTN connectivity through Microsoft Calling Plans, Operator Connect, Teams Phone Mobile, and Direct Routing. Collaboration Communications Systems Engineers work with Teams Administrators, Microsoft Identity and Access Administrators, and Microsoft 365ÿAdministrators. In addition, they may work with owners of other workloads, including facilitiesÿmanagers, network engineers, security engineers, device manufacturers, telephony providers, and Microsoft Certified solutions providers. This training course is designed to give participants the knowledge and skills to become a Collaboration Communications Systems Engineer. Participants should understand the fundamentals of networking, telecommunications, audio/visual and meeting room technologies, identity and access management, and Microsoft Teams. They will gain hands-on experience configuring and deploying Microsoft Teams Phone, meetings and certified devices including Microsoft Teams Rooms and Surface Hub. The course will also cover how to manage and monitor Teams Phone, meetings, and certified devices using the Microsoft Teams admin center, PowerShell, the Microsoft Teams Rooms Pro Portal, and the Call Quality Dashboard. In addition, the course will cover configuring and deploying Microsoft Teams Phone with PSTN connectivity through Microsoft Calling Plans, Operator Connect, Teams Phone Mobile, and Direct Routing. Prerequisites Microsoft 365 and Microsoft Teams Networking, telecommunications, and audio/visual basics Identity and access management basics 1 - Introduction to Teams meetings and calling Overview of Teams meetings and events Overview of Teams Phone Overview of auto attendants and call queues Overview of Teams devices 2 - Plan for Teams Phone Plan to deploy Teams Phone Plan for Teams Phone PSTN connectivity Determine license requirements Plan for Teams Phone devices Plan and design Teams Phone features Plan for voicemail 3 - Plan for Microsoft Teams Rooms and Surface Hub Determine license requirements for Microsoft Teams Rooms and shared devices Understand differences between Microsoft Teams Rooms on Android and Windows Understand Microsoft Teams Rooms on Surface Hub 2S Understand and plan Teams Room accessories, components, and peripherals Understand Teams Rooms management options 4 - Plan and optimize network performance for Teams media Understand Teams network requirements Design network for media optimization Design and implement QoS 5 - Configure and deploy Teams Phone Configure emergency calling for Teams Calling Plans Manage and configure Microsoft PSTN numbers Configure Operator Connect and Teams Phone Mobile Configure Teams Phone policies Create and manage Teams policies Configure Audio Conferencing 6 - Configure and deploy Teams Phone with Direct Routing Design Direct Routing call flows Implement SIP trunking with Direct Routing Configure Emergency Calling for Direct Routing Extend Teams Direct Routing infrastructure Deploy and maintain a survivable branch appliance 7 - Extend Teams Phone with additional services Understand how Teams interacts with additional services Configure compliance recording in Teams Configure and integrate a certified contact center in Teams Design and deploy voice bots in Teams 8 - Manage meetings and events experiences Explore meetings and events in Microsoft Teams Configure meeting settings Create and manage meeting policies Configure audio conferencing Create and manage meeting templates and template policies Create and manage meetings customization policies Configure live events settings Create and manage live events policies Examine live events across Microsoft 365 9 - Guided project - Create and assign Teams policies to meet business requirements in Microsoft Teams Prepare 10 - Configure and manage voice users Enable users for Teams Phone Enable users for Direct Routing with Teams Phone Enable additional calling features for Teams Phone Enable users for Teams Phone Mobile 11 - Configure auto attendants and call queues Design call flows for auto attendants and call queues Configure auto attendants and call queues Deploy a channel-based call queue Configure resource accounts Configure Microsoft 365 groups for voicemail Interpret call queue conference modes Interpret call queue routing methods Configure holidays for auto attendants and call queues Configure custom music on hold 12 - Configure, deploy, and manage Teams devices Manage Microsoft Teams Phones Manage Microsoft Teams Room Systems Microsoft Teams Rooms management options Manage Surface Hub 2S devices Configure Microsoft Teams SIP gateway Manage Microsoft Teams displays Remote provisioning and sign in for Teams Phones Update Microsoft Teams devices remotely Manage Microsoft Teams device tags 13 - Guided project - Prepare meeting room experiences Prepare 14 - Monitor and troubleshoot Teams collaboration communications systems Diagnose and troubleshoot phone number assignment Diagnose and troubleshoot Teams client issues Diagnose and troubleshoot call failure and call quality issues Report on and troubleshoot Teams calls with Call Quality Dashboard Diagnose and troubleshoot Direct Routing issues Troubleshoot and monitor Teams devices Troubleshoot Teams meetings and calling Troubleshoot Teams Rooms devices
Duration 4 Days 24 CPD hours This course is intended for Students for AZ-140: Configuring and Operating Microsoft Azure Virtual Desktop are interested in delivering applications on Azure Virtual Desktop and optimizing them to run in multi-session virtual environments. As an Azure Virtual Desktop administrator, you will closely with the Azure Administrators and Architects, along with Microsoft 365 Administrators. Azure Virtual Desktop administrator responsibilities include planning, deploying, packaging, updating, and maintaining the Azure Virtual Desktop infrastructure. They also create session host images, implement and manage FSLogix, monitor Azure Virtual Desktop performance, and automate Azure Virtual Desktop management tasks. This course teaches Azure administrators how to plan, deliver, and manage virtual desktop experiences and remote apps, for any device, on Azure. Lessons include implementing and managing networking for Azure Virtual Desktop, configuring host pools and session hosts, creating session host images, implementing, and managing FSLogix, monitoring Azure Virtual Desktop performance and health, and automating Azure Virtual Desktop management tasks. Students will learn through a mix of demonstrations and hands-on lab experiences deploying virtual desktop experiences and apps on Azure Virtual Desktop and optimizing them to run in multi-session virtual environments. Candidates of this course must have solid Azure administration skills. This course assumes prior experience, including virtualization, networking, identity, storage, backup and restore, and disaster recovery. Students should have knowledge of on-premises virtual desktop infrastructure technologies as they relate to migrating to Azure Virtual Desktop. Students are expected to have used the tools common to the Azure environment, such as the Azure PowerShell and Cloud Shell. 1 - Azure Virtual Desktop Architecture Azure Virtual Desktop for the enterprise Azure Virtual Desktop components Personal and pooled desktops Service updates for Azure Virtual Desktop desktops Azure limitations for Azure Virtual Desktop Virtual machine sizing for Azure Virtual Desktop Azure Virtual Desktop pricing 2 - Design the Azure Virtual Desktop architecture Assess network capacity and speed requirements for Azure Virtual Desktop Azure Virtual Desktop Experience Estimator Recommend an operating system for an Azure Virtual Desktop implementation Balancing host pools Recommendations for using subscriptions and management groups Configure a location for the Azure Virtual Desktop metadata Recommend a configuration for performance requirements 3 - Design for user identities and profiles Select an appropriate licensing model for Azure Virtual Desktop based on requirements Personal and multi-session desktop scenarios Recommend an appropriate storage solution Plan for a desktop client deployment Plan for Azure Virtual Desktop client deployment - Remote Desktop Protocol (RDP) Windows Desktop client to multiple devices Hybrid Identity with Azure Active Directory Plan for Azure Active Directory (AD) Connect for user identities 4 - Implement and manage networking for Azure Virtual Desktop Implement Azure virtual network connectivity Manage connectivity to the internet and on-premises networks Understanding Azure Virtual Desktop network connectivity Implement and manage network security for Azure Virtual Desktop Configure Azure Virtual Desktop session hosts using Azure Bastion Monitor and troubleshoot network connectivity for Azure Virtual Desktop Plan and implement Remote Desktop Protocol Shortpath Configure Remote Desktop Protocol Shortpath for managed networks Configure Windows Defender Firewall with Advanced Security for RDP Shortpath Plan and implement Quality of Service for Azure Virtual Desktop 5 - Implement and manage storage for Azure Virtual Desktop Storage for FSLogix components Configure storage for FSLogix components Configure storage accounts Create file shares Configure disks 6 - Create and configure host pools and session hosts for Azure Virtual Desktop Automate creation of an Azure Virtual Desktop host pool using PowerShell Configure host pool assignment type Customize Remote Desktop Protocol (RDP) properties for a host pool Manage licensing for session hosts that run Windows client Deploying Azure AD-joined virtual machines in Azure Virtual Desktop 7 - Create and manage session host image for Azure Virtual Desktop Create a managed virtual machine (VM) image Modify a session host image Plan for image update and management Create and use an Azure Compute Gallery using the portal Create an Azure Virtual Desktop image by using VM Image Builder Install Microsoft 365 Apps on a master Virtual Hard Disk image Install language packs in Azure Virtual Desktop 8 - Manage access for Azure Virtual Desktop Role-based access control (RBAC) for Azure Virtual Desktop Plan and implement Azure roles and role-based access control (RBAC) for Azure Virtual Desktop Using Azure Virtual Desktop with Microsoft Intune Configuring screen capture protection for Azure Virtual Desktop 9 - Manage security for Azure Virtual Desktop Plan and implement Conditional Access policies for connections to Azure Virtual Desktop Plan and implement multifactor authentication (MFA) in Azure Virtual Desktop Understand Conditional Access policy components Manage security by using Azure Security Center Security posture management and threat protection 10 - Implement and manage FSLogix Plan for FSLogix FSLogix profile containers and Azure files Install FSLogix Storage options for FSLogix profile containers Profile Container vs Office Container Configure Office Containers Installing Microsoft Office using FSLogix application containers Configure Cloud Cache Configure Profile Containers Create a profile container with Azure NetApp Files and capacity pool Manage Rule Sets and application masking 11 - Configure user experience settings Virtual desktop optimization principles Persistent virtual desktop environments Configure user settings through group policies Configure user settings through Endpoint Manager policies Configure session timeout properties Configure device redirections Configure Universal Print Implement the Start Virtual Machine on Connect feature Troubleshoot user profile issues Troubleshoot Azure Virtual Desktop clients 12 - Install and configure apps on a session host MSIX app attach How MSIX app attach works Set up a file share for MSIX app attach Upload MSIX images to Azure NetApp Files in Azure Virtual Desktop How to configure apps for users Using the OneDrive sync app on virtual desktops Using Microsoft Teams on Azure Virtual desktop Publish built-in apps in Azure Virtual Desktop Troubleshoot application issues for Azure Virtual Desktop 13 - Plan for disaster recovery Disaster recovery for Azure Virtual Desktop Virtual machine replication FSLogix configuration 14 - Automate Azure Virtual Desktop management tasks Scale session hosts using Azure Automation Create or update an Azure Automation account Create an Azure Automation Run As account Create the Azure Logic App and execution schedule 15 - Monitor and manage performance and health Monitor Azure Virtual Desktop by using Azure Monitor Log Analytics workspace for Azure Monitor Monitor Azure Virtual Desktop by using Azure Advisor How to resolve Azure Advisor recommendations Diagnose graphics performance issues Additional course details: Nexus Humans AZ-140T00 Configuring and Operating Windows Virtual Desktop on Microsoft Azure training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-140T00 Configuring and Operating Windows Virtual Desktop on Microsoft Azure course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 4 Days 24 CPD hours This course is intended for This course is for Azure Security Engineers who are planning to take the associated certification exam, or who are performing security tasks in their day-to-day job. This course would also be helpful to an engineer that wants to specialize in providing security for Azure-based digital platforms and play an integral role in protecting an organization's data. This course provides IT Security Professionals with the knowledge and skills needed to implement security controls, maintain an organization?s security posture, and identify and remediate security vulnerabilities. This course includes security for identity and access, platform protection, data and applications, and security operations. Prerequisites AZ-104T00 - Microsoft Azure Administrator Security best practices and industry security requirements such as defense in depth, least privileged access, role-based access control, multi-factor authentication, shared responsibility, and zero trust model. Be familiar with security protocols such as Virtual Private Networks (VPN), Internet Security Protocol (IPSec), Secure Socket Layer (SSL), disk and data encryption methods. Have some experience deploying Azure workloads. This course does not cover the basics of Azure administration, instead the course content builds on that knowledge by adding security specific information. Have experience with Windows and Linux operating systems and scripting languages. Course labs may use PowerShell and the CLI. 1 - Manage identities in Microsoft Entra ID Secure users in Microsoft Entra ID Secure groups in Microsoft Entra ID Recommend when to use external identities Secure external identities Implement Microsoft Entra Identity protection 2 - Manage authentication by using Microsoft Entra ID Configure Microsoft Entra Verified ID Implement multifactor authentication (MFA) Implement passwordless authentication Implement password protection Implement single sign-on (SSO) Integrate single sign-on (SSO) and identity providers Recommend and enforce modern authentication protocols 3 - Manage authorization by using Microsoft Entra ID Configure Azure role permissions for management groups, subscriptions, resource groups, and resources Assign built-in roles in Microsoft Entra ID Assign built-in roles in Azure Create and assign a custom role in Microsoft Entra ID Implement and manage Microsoft Entra Permissions Management Configure Microsoft Entra Privileged Identity Management Configure role management and access reviews by using Microsoft Entra Identity Governance Implement Conditional Access policies 4 - Manage application access in Microsoft Entra ID Manage access to enterprise applications in Microsoft Entra ID, including OAuth permission grants Manage app registrations in Microsoft Entra ID Configure app registration permission scopes Manage app registration permission consent Manage and use service principals Manage managed identities for Azure resources Recommend when to use and configure a Microsoft Entra Application Proxy, including authentication 5 - Plan and implement security for virtual networks Plan and implement Network Security Groups (NSGs) and Application Security Groups (ASGs) Plan and implement User-Defined Routes (UDRs) Plan and implement Virtual Network peering or gateway Plan and implement Virtual Wide Area Network, including secured virtual hub Secure VPN connectivity, including point-to-site and site-to-site Implement encryption over ExpressRoute Configure firewall settings on PaaS resources Monitor network security by using Network Watcher, including NSG flow logging 6 - Plan and implement security for private access to Azure resources Plan and implement virtual network Service Endpoints Plan and implement Private Endpoints Plan and implement Private Link services Plan and implement network integration for Azure App Service and Azure Functions Plan and implement network security configurations for an App Service Environment (ASE) Plan and implement network security configurations for an Azure SQL Managed Instance 7 - Plan and implement security for public access to Azure resources Plan and implement Transport Layer Security (TLS) to applications, including Azure App Service and API Management Plan, implement, and manage an Azure Firewall, Azure Firewall Manager and firewall policies Plan and implement an Azure Application Gateway Plan and implement an Azure Front Door, including Content Delivery Network (CDN) Plan and implement a Web Application Firewall (WAF) Recommend when to use Azure DDoS Protection Standard 8 - Plan and implement advanced security for compute Plan and implement remote access to public endpoints, Azure Bastion and just-in-time (JIT) virtual machine (VM) access Configure network isolation for Azure Kubernetes Service (AKS) Secure and monitor AKS Configure authentication for AKS Configure security for Azure Container Instances (ACIs) Configure security for Azure Container Apps (ACAs) Manage access to Azure Container Registry (ACR) Configure disk encryption, Azure Disk Encryption (ADE), encryption as host, and confidential disk encryption Recommend security configurations for Azure API Management 9 - Plan and implement security for storage Configure access control for storage accounts Manage life cycle for storage account access keys Select and configure an appropriate method for access to Azure Files Select and configure an appropriate method for access to Azure Blob Storage Select and configure an appropriate method for access to Azure Tables Select and configure an appropriate method for access to Azure Queues Select and configure appropriate methods for protecting against data security threats, including soft delete, backups, versioning, and immutable storage Configure Bring your own key (BYOK) Enable double encryption at the Azure Storage infrastructure level 10 - Plan and implement security for Azure SQL Database and Azure SQL Managed Instance Enable database authentication by using Microsoft Entra ID Enable and monitor database audit Identify use cases for the Microsoft Purview governance portal Implement data classification of sensitive information by using the Microsoft Purview governance portal Plan and implement dynamic mask Implement transparent data encryption? Recommend when to use Azure SQL Database Always Encrypted 11 - Plan, implement, and manage governance for security Create, assign, and interpret security policies and initiatives in Azure Policy Configure security settings by using Azure Blueprint Deploy secure infrastructures by using a landing zone Create and configure an Azure Key Vault Recommend when to use a dedicated Hardware Security Module (HSM) Configure access to Key Vault, including vault access policies and Azure Role Based Access Control Manage certificates, secrets, and keys Configure key rotation Configure backup and recovery of certificates, secrets, and keys 12 - Manage security posture by using Microsoft Defender for Cloud Implement Microsoft Defender for Cloud Identify and remediate security risks by using the Microsoft Defender for Cloud Secure Score and Inventory Assess compliance against security frameworks and Microsoft Defender for Cloud Add industry and regulatory standards to Microsoft Defender for Cloud Add custom initiatives to Microsoft Defender for Cloud Connect hybrid cloud and multicloud environments to Microsoft Defender for Cloud Identify and monitor external assets by using Microsoft Defender External Attack Surface Management 13 - Configure and manage threat protection by using Microsoft Defender for Cloud Enable workload protection services in Microsoft Defender for Cloud, including Microsoft Defender for Storage, Databases, Containers, App Service, Key Vault, Resource Manager, and DNS Configure Microsoft Defender for Servers Configure Microsoft Defender for Azure SQL Database Manage and respond to security alerts in Microsoft Defender for Cloud Configure workflow automation by using Microsoft Defender for Cloud Evaluate vulnerability scans from Microsoft Defender for Server 14 - Configure and manage security monitoring and automation solutions Monitor security events by using Azure Monitor Configure data connectors in Microsoft Sentinel Create and customize analytics rules in Microsoft Sentinel Configure automation in Microsoft Sentinel Additional course details: Nexus Humans AZ-500T00 Microsoft Azure Security Technologies training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-500T00 Microsoft Azure Security Technologies course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
About this Training Energy insurance is a type of insurance designed to protect businesses that work in the energy industry. This type of insurance covers a wide range of risks that are unique to the energy industry, such as damage to oil rigs, power plants, pipelines, or other energy infrastructure, as well as accidents, explosions, fires, and environmental damage. Energy insurance can also provide coverage for business interruption caused by unforeseen events that can disrupt energy production or supply, such as natural disasters, equipment breakdown, and cyber-attacks. It may also include coverage for liability and loss of income resulting from lawsuits and legal claims. Training Objectives Upon completion of this course, participants will be able to: Understand the risk sharing between oil companies and contractors Know how this is dealt within the insurance products available Understand insurer's perception of risk Create awareness of how market insurance products meet industry needs Be familiar with insurer's pricing methodologies Better understanding of the broker interface Understand technical evaluation of the coverage wordings Putting technical knowledge into practice with claims workshop Target Audience The course is intended for individuals who work in the energy industry, particularly those who are involved in managing risk or making decisions related to insurance coverage. The following personnel will benefit from the knowledge shared in this course: Insurers Brokers Adjusters Lawyers Risk Managers Treasury Contracts Legals Contract Adjustor Project Managers Course Level Basic or Foundation Trainer Your expert course leader has worked in the insurance sector for 59 years. He has worked as a broker for reputable firms, such as Marsh, where he served as the managing director of Energy Construction. He has also participated in peer review for different Lloyds Syndicates. He also served as a broker for Sedgwick, AAA, and Miller in the offshore energy sector. He has helped businesses including Shell, BP, Chevron, ConocoPhillips, Petrofina, Woodside, ENI, and Brunei Shell for their policy reviews during his career. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
About this Training Course This 3 full-day course covers the design of systems for natural gas handling and treatment from the wellhead to the gas processing plant to achieve marketable products that meet desired product specifications. This course will emphasize on field handling equipment and separation systems, dehydration, fluid measurement, sampling and analysis as well as introduction into reciprocating and centrifugal compressors. It will comprise interactive presentations including exercises/quizzes. This course can also be offered through Virtual Instructor Led Training (VILT) format. Training Objectives At the end of the course, the participants will be able to describe and explain the following: Gas processing principles of dehydration (water removal) by absorption, adsorption, refrigeration and low temperature separation (JT effect) and basic associated equipment Gas processing in-depth by absorption using glycol and glycol proper (Pre- Cooling requirements, Dew Point control and related processes). Glycol regeneration including principles of stripping, DRIZO and Coldfinger. Process equipment involved for water removal by absorption. (Knock out drums; Contactor - absorber and internals, heat exchangers, re-boilers, pumps, filters and glycol storage). Principles of gas metering and types of meter (Measurement Units (MJ, BTU, nM3, scf and conversions). Typical gas contracts & sales specifications. Gas pipeline operations. Target Audience Production and processing personnel involved with natural gas and associated liquids to acquaint or reacquaint themselves with gas conditioning and processing unit operations. This course is for production operations engineers, operations field supervisors, facility engineers, process engineers, design engineers, operations personnel and others who select, design, install, evaluate or operate gas processing plants and related facilities. Course Level Intermediate Trainer Your expert course leader has more than 25 years of accumulated experience in the Oil & Gas Industry, particularly in LNG / Offshore LNG Industry as Project Manager (8 years) and Process Technology Design (12 years). From 2010 to 2012, he worked for TOTAL E&P as Manager of R&D activities related to LNG, FLNG, Gas Treatment and Safety Engineering. From 1992 to 2010, he worked for Technip, spending 12 years (1992 to 2004) in the Process and Technology Division, where he was the Principal Engineer on gas treatment and LNG projects such as Yemen LNG and Nigeria LNG. From 2004 to 2010, he was actively involved in the development of Technip Offshore LNG technologies as Project Manager - several patents filed, author or co-author of different publications on LNG transfer technologies. He has also been a member of: the Foreign Advisory Committee on the 2nd Trondheim Technology Gas Conference, Norway, 2-3 November 2011 the Steering Committee on the SPE Forum 'Economic and Sustainability Challenges in the Future Development of Sour Gas', Bali, Indonesia, 8-13 May 2011 The Technip 'Experts Network' as 'Main Expert - LNG' for several years He holds a 'summa cum laude' master's degree in Chemical Engineering from Rome University 'La apienza' (1992) and has been a member of the Italian Register of Engineers. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations
Duration 4 Days 24 CPD hours This course is intended for The Microsoft Security Operations Analyst collaborates with organizational stakeholders to secure information technology systems for the organization. Their goal is to reduce organizational risk by rapidly remediating active attacks in the environment, advising on improvements to threat protection practices, and referring violations of organizational policies to appropriate stakeholders. Responsibilities include threat management, monitoring, and response by using a variety of security solutions across their environment. The role primarily investigates, responds to, and hunts for threats using Microsoft Sentinel, Microsoft Defender for Cloud, Microsoft 365 Defender, and third-party security products. Since the Security Operations Analyst consumes the operational output of these tools, they are also a critical stakeholder in the configuration and deployment of these technologies. Learn how to investigate, respond to, and hunt for threats using Microsoft Sentinel, Microsoft Defender for Cloud, and Microsoft 365 Defender. In this course you will learn how to mitigate cyberthreats using these technologies. Specifically, you will configure and use Microsoft Sentinel as well as utilize Kusto Query Language (KQL) to perform detection, analysis, and reporting. The course was designed for people who work in a Security Operations job role and helps learners prepare for the exam SC-200: Microsoft Security Operations Analyst. Prerequisites Basic understanding of Microsoft 365 Fundamental understanding of Microsoft security, compliance, and identity products Intermediate understanding of Windows 10 Familiarity with Azure services, specifically Azure SQL Database and Azure Storage Familiarity with Azure virtual machines and virtual networking Basic understanding of scripting concepts. 1 - Introduction to Microsoft 365 threat protection Explore Extended Detection & Response (XDR) response use cases Understand Microsoft Defender XDR in a Security Operations Center (SOC) Explore Microsoft Security Graph Investigate security incidents in Microsoft Defender XDR 2 - Mitigate incidents using Microsoft 365 Defender Use the Microsoft Defender portal Manage incidents Investigate incidents Manage and investigate alerts Manage automated investigations Use the action center Explore advanced hunting Investigate Microsoft Entra sign-in logs Understand Microsoft Secure Score Analyze threat analytics Analyze reports Configure the Microsoft Defender portal 3 - Protect your identities with Microsoft Entra ID Protection Microsoft Entra ID Protection overview Detect risks with Microsoft Entra ID Protection policies Investigate and remediate risks detected by Microsoft Entra ID Protection 4 - Remediate risks with Microsoft Defender for Office 365 Automate, investigate, and remediate Configure, protect, and detect Simulate attacks 5 - Safeguard your environment with Microsoft Defender for Identity Configure Microsoft Defender for Identity sensors Review compromised accounts or data Integrate with other Microsoft tools 6 - Secure your cloud apps and services with Microsoft Defender for Cloud Apps Understand the Defender for Cloud Apps Framework Explore your cloud apps with Cloud Discovery Protect your data and apps with Conditional Access App Control Walk through discovery and access control with Microsoft Defender for Cloud Apps Classify and protect sensitive information Detect Threats 7 - Respond to data loss prevention alerts using Microsoft 365 Describe data loss prevention alerts Investigate data loss prevention alerts in Microsoft Purview Investigate data loss prevention alerts in Microsoft Defender for Cloud Apps 8 - Manage insider risk in Microsoft Purview Insider risk management overview Create and manage insider risk policies Investigate insider risk alerts Take action on insider risk alerts through cases Manage insider risk management forensic evidence Create insider risk management notice templates 9 - Investigate threats by using audit features in Microsoft Defender XDR and Microsoft Purview Standard Explore Microsoft Purview Audit solutions Implement Microsoft Purview Audit (Standard) Start recording activity in the Unified Audit Log Search the Unified Audit Log (UAL) Export, configure, and view audit log records Use audit log searching to investigate common support issues 10 - Investigate threats using audit in Microsoft Defender XDR and Microsoft Purview (Premium) Explore Microsoft Purview Audit (Premium) Implement Microsoft Purview Audit (Premium) Manage audit log retention policies Investigate compromised email accounts using Purview Audit (Premium) 11 - Investigate threats with Content search in Microsoft Purview Explore Microsoft Purview eDiscovery solutions Create a content search View the search results and statistics Export the search results and search report Configure search permissions filtering Search for and delete email messages 12 - Protect against threats with Microsoft Defender for Endpoint Practice security administration Hunt threats within your network 13 - Deploy the Microsoft Defender for Endpoint environment Create your environment Understand operating systems compatibility and features Onboard devices Manage access Create and manage roles for role-based access control Configure device groups Configure environment advanced features 14 - Implement Windows security enhancements with Microsoft Defender for Endpoint Understand attack surface reduction Enable attack surface reduction rules 15 - Perform device investigations in Microsoft Defender for Endpoint Use the device inventory list Investigate the device Use behavioral blocking Detect devices with device discovery 16 - Perform actions on a device using Microsoft Defender for Endpoint Explain device actions Run Microsoft Defender antivirus scan on devices Collect investigation package from devices Initiate live response session 17 - Perform evidence and entities investigations using Microsoft Defender for Endpoint Investigate a file Investigate a user account Investigate an IP address Investigate a domain 18 - Configure and manage automation using Microsoft Defender for Endpoint Configure advanced features Manage automation upload and folder settings Configure automated investigation and remediation capabilities Block at risk devices 19 - Configure for alerts and detections in Microsoft Defender for Endpoint Configure advanced features Configure alert notifications Manage alert suppression Manage indicators 20 - Utilize Vulnerability Management in Microsoft Defender for Endpoint Understand vulnerability management Explore vulnerabilities on your devices Manage remediation 21 - Plan for cloud workload protections using Microsoft Defender for Cloud Explain Microsoft Defender for Cloud Describe Microsoft Defender for Cloud workload protections Enable Microsoft Defender for Cloud 22 - Connect Azure assets to Microsoft Defender for Cloud Explore and manage your resources with asset inventory Configure auto provisioning Manual log analytics agent provisioning 23 - Connect non-Azure resources to Microsoft Defender for Cloud Protect non-Azure resources Connect non-Azure machines Connect your AWS accounts Connect your GCP accounts 24 - Manage your cloud security posture management? Explore Secure Score Explore Recommendations Measure and enforce regulatory compliance Understand Workbooks 25 - Explain cloud workload protections in Microsoft Defender for Cloud Understand Microsoft Defender for servers Understand Microsoft Defender for App Service Understand Microsoft Defender for Storage Understand Microsoft Defender for SQL Understand Microsoft Defender for open-source databases Understand Microsoft Defender for Key Vault Understand Microsoft Defender for Resource Manager Understand Microsoft Defender for DNS Understand Microsoft Defender for Containers Understand Microsoft Defender additional protections 26 - Remediate security alerts using Microsoft Defender for Cloud Understand security alerts Remediate alerts and automate responses Suppress alerts from Defender for Cloud Generate threat intelligence reports Respond to alerts from Azure resources 27 - Construct KQL statements for Microsoft Sentinel Understand the Kusto Query Language statement structure Use the search operator Use the where operator Use the let statement Use the extend operator Use the order by operator Use the project operators 28 - Analyze query results using KQL Use the summarize operator Use the summarize operator to filter results Use the summarize operator to prepare data Use the render operator to create visualizations 29 - Build multi-table statements using KQL Use the union operator Use the join operator 30 - Work with data in Microsoft Sentinel using Kusto Query Language Extract data from unstructured string fields Extract data from structured string data Integrate external data Create parsers with functions 31 - Introduction to Microsoft Sentinel What is Microsoft Sentinel? How Microsoft Sentinel works When to use Microsoft Sentinel 32 - Create and manage Microsoft Sentinel workspaces Plan for the Microsoft Sentinel workspace Create a Microsoft Sentinel workspace Manage workspaces across tenants using Azure Lighthouse Understand Microsoft Sentinel permissions and roles Manage Microsoft Sentinel settings Configure logs 33 - Query logs in Microsoft Sentinel Query logs in the logs page Understand Microsoft Sentinel tables Understand common tables Understand Microsoft Defender XDR tables 34 - Use watchlists in Microsoft Sentinel Plan for watchlists Create a watchlist Manage watchlists 35 - Utilize threat intelligence in Microsoft Sentinel Define threat intelligence Manage your threat indicators View your threat indicators with KQL 36 - Connect data to Microsoft Sentinel using data connectors Ingest log data with data connectors Understand data connector providers View connected hosts 37 - Connect Microsoft services to Microsoft Sentinel Plan for Microsoft services connectors Connect the Microsoft Office 365 connector Connect the Microsoft Entra connector Connect the Microsoft Entra ID Protection connector Connect the Azure Activity connector 38 - Connect Microsoft Defender XDR to Microsoft Sentinel Plan for Microsoft Defender XDR connectors Connect the Microsoft Defender XDR connector Connect Microsoft Defender for Cloud connector Connect Microsoft Defender for IoT Connect Microsoft Defender legacy connectors 39 - Connect Windows hosts to Microsoft Sentinel Plan for Windows hosts security events connector Connect using the Windows Security Events via AMA Connector Connect using the Security Events via Legacy Agent Connector Collect Sysmon event logs 40 - Connect Common Event Format logs to Microsoft Sentinel Plan for Common Event Format connector Connect your external solution using the Common Event Format connector 41 - Connect syslog data sources to Microsoft Sentinel Plan for syslog data collection Collect data from Linux-based sources using syslog Configure the Data Collection Rule for Syslog Data Sources Parse syslog data with KQL 42 - Connect threat indicators to Microsoft Sentinel Plan for threat intelligence connectors Connect the threat intelligence TAXII connector Connect the threat intelligence platforms connector View your threat indicators with KQL 43 - Threat detection with Microsoft Sentinel analytics What is Microsoft Sentinel Analytics? Types of analytics rules Create an analytics rule from templates Create an analytics rule from wizard Manage analytics rules 44 - Automation in Microsoft Sentinel Understand automation options Create automation rules 45 - Threat response with Microsoft Sentinel playbooks What are Microsoft Sentinel playbooks? Trigger a playbook in real-time Run playbooks on demand 46 - Security incident management in Microsoft Sentinel Understand incidents Incident evidence and entities Incident management 47 - Identify threats with Behavioral Analytics Understand behavioral analytics Explore entities Display entity behavior information Use Anomaly detection analytical rule templates 48 - Data normalization in Microsoft Sentinel Understand data normalization Use ASIM Parsers Understand parameterized KQL functions Create an ASIM Parser Configure Azure Monitor Data Collection Rules 49 - Query, visualize, and monitor data in Microsoft Sentinel Monitor and visualize data Query data using Kusto Query Language Use default Microsoft Sentinel Workbooks Create a new Microsoft Sentinel Workbook 50 - Manage content in Microsoft Sentinel Use solutions from the content hub Use repositories for deployment 51 - Explain threat hunting concepts in Microsoft Sentinel Understand cybersecurity threat hunts Develop a hypothesis Explore MITRE ATT&CK 52 - Threat hunting with Microsoft Sentinel Explore creation and management of threat-hunting queries Save key findings with bookmarks Observe threats over time with livestream 53 - Use Search jobs in Microsoft Sentinel Hunt with a Search Job Restore historical data 54 - Hunt for threats using notebooks in Microsoft Sentinel Access Azure Sentinel data with external tools Hunt with notebooks Create a notebook Explore notebook code
About this Virtual Instructor Led Training (VILT) This 5 half-day course provides a detailed description of all performance testing methods for all thermal power plant equipment including boilers, turbines, condensers, pumps, fans, deaerators, and feedwater heaters. The methodology, and code requirements for the performance tests for all thermal power plant equipment will be explained in detail. The preparatory work and instrumentation required for each test will also be covered during the course. The efficiency calculations for all equipment used in circulating fluidized bed (CFB) boiler and pulverized coal boiler power plants will be explained, including all processes, operational and maintenance activities, capital projects, technical options, potential initiatives and incentives to implement upgrades / repairs for increasing the power plant equipment efficiency. The course will also provide a thorough explanation of CFB and pulverized coal boiler technology including hydrodynamics, combustion, emissions, design considerations, gas-solid separators, design of CFB and pulverized coal boiler components, management of solid residues, materials, stoichiometric calculations, and model for sulfur capture. The operation, maintenance, testing, and refurbishment options of all the equipment and systems used in CFB and pulverized coal power plants will be presented, including boilers, superheaters, reheaters, turbines, condensers, feedwater heaters, deaerators, pumps, compressors, fans, electric generators, instrumentation and control systems, and governing systems, etc. The participants will get equipped on all factors which affect the CFB and pulverized coal boiler power plant efficiency and emissions, all methods used to calculate the heat rate of CFB and pulverized coal power plants as well as all areas in CFB and pulverized coal boiler power plants where efficiency loss can occur. Updated information on the methods used to improve CFB boiler and pulverized coal boiler power plant heat rate will also be provided. It includes: Optimizing the combustion process and sootblowing Controlling the steam temperature Recovering moisture from boiler flue gas Performing steam turbine maintenance Lowering condenser back pressure Pre-drying high moisture coal and reducing stack temperature Training Objectives Thermal Plant Performance Testing: Gain a thorough understanding of all the performance testing methods for all thermal power plant equipment including boilers, turbines, condensers, pumps, fans, daerators, and feedwater heaters Performance Test Methodology and Code Requirements: Understand the methodology, and code requirements for performance tests of all thermal power plant equipment Performance Test Preparatory Work and Instrumentation: Learn about the preparatory work and instrumentation required for each equipment performance test in a thermal power plant Equipment Efficiency Calculations: Gain a thorough understanding of the efficiency calculations for all the equipment used in circulating fluidized bed (CFB) boilers and pulverized coal boilers power plants Calculating the Heat Rate of CFB and Pulverized Coal Boiler Power Plants: Learn all the methods used to calculate the heat rate of CFB and pulverized coal boiler coal power plants Benefits of Lowering the Heat Rate of CFB and Pulverized Coal Boiler Power Plants: Understand all the benefits of lowering the heat rate of CFB coal power plants Methods Used to Improve CFB and Pulverized Coal Boiler Power Plants Heat Rate: Gain a thorough understanding of all the methods used to improve the heat rate of CFB and pulverized boiler coal power plants Processes, Operational and Maintenance Activities in CFB and Pulverized Coal Boiler Power Plants: Discover all the processes, operational and maintenance activities used to improve the heat rate of CFB and pulverized coal power plants Capital Projects Used to Improve the Heat Rate of CFB and Pulverized Coal Boiler Power Plants: Learn about all the capital projects used to improve the heat rate of CFB and pulverized coal power plants Technical Options for Improving the Heat Rate of CFB and Pulverized Coal Boiler Power Plants: Understand all the technical options used to improve the heat rate of CFB and pulverized coal boiler power plants Potential Initiatives and Incentives to Implement Upgrades / Repairs for Improving the Heat Rate of CFB and Pulverized Coal Bed Boiler Power Plants: Discover all the potential initiatives and incentives to implement upgrades / repairs for improving the heat rate of CFB and pulverized coal power plants Factors Affecting CFB and Pulverized Coal Boiler Power Plants Efficiency and Emissions: Learn about all the factors which affect CFB and pulverized coal boiler power plants efficiency and emissions Areas in CFB and Pulverized Coal Power Plants where Efficiency Loss Can Occur: Discover all the areas in CFB and pulverized coal power plants where efficiency loss can occur Optimize the Operation of CFB and Pulverized Coal Power Plant Equipment and Systems to Improve the Plant Heat Rate: Understand all the techniques and methods used to optimize the operation of CFB and pulverized coal power plant equipment and systems to improve the plant heat rate CFB and Pulverized Coal Power Plant Equipment and Systems: Learn about the various types of CFB and pulverized coal power plant equipment and systems including boilers, superheater, reheaters, steam turbines, governing systems, deaerators, feedwater heaters, coal-handling equipment, transformers, generators and auxiliaries Target Audience Engineers of all disciplines Managers Technicians Maintenance personnel Other technical individuals Training Methods The VILT will be delivered online in 5 sessions comprising 4 hours per day, with 2 breaks of 10 minutes per day, including time for lectures, discussion, quizzes and short classroom exercises. Additionally, some self-study will be requested. Participants are invited but not obliged to bring a short presentation (10 mins max) on a practical problem they encountered in their work. This will then be explained and discussed during the VILT. A short test or quiz will be held at the end the course. The instructor relies on a highly interactive training method to enhance the learning process. This method ensures that all the delegates gain a complete understanding of all the topics covered. The training environment is highly stimulating, challenging, and effective because the participants will learn by case studies which will allow them to apply the material taught to their own organization. Trainer Your specialist course leader relies on a highly interactive training method to enhance the learning process. This method ensures that all participants gain a complete understanding of all topics covered. The training environment is highly stimulating, challenging, and effective because the participants will learn by case studies which will allow them to apply the material taught to their own organization. Each delegate will receive a soft copy of the following materials written by the instructor: 'POWER GENERATION HANDBOOK' second edition published by McGraw-Hill in 2012 (800 pages) Excerpt of the relevant chapters from the 'POWER PLANT EQUIPMENT OPERATION AND MAINTENANCE GUIDE' published by McGraw-Hill in 2012 (800 pages) THERMAL POWER PLANT PERFORMANCE TESTING MANUAL (includes practical information about all the performance testing methods for all thermal power plant equipment - 400 pages) POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations