• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

303 Courses delivered Online

CompTIA Network+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for entry-level computer support professionals with a basic knowledge of computer hardware, software, and operating systems who wish to increase their knowledge and understanding of networking concepts and acquire the required skills to prepare for a career in network support or administration, or who wish to prepare for the CompTIA Network+ certification. CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT professionals with job roles such as network administrator, network technician, network installer, help desk technician, and IT cable installer. This course is also designed for students who are seeking the CompTIA Network+ certification and who want to prepare for the CompTIA Network+ N10-008 Certification Exam. Overview In this course, you will describe the major networking technologies and systems of modern networks and configure, manage, and troubleshoot modern networks. Explain the OSI and TCP/IP Models. Explain properties of network traffic. Install and configure switched networks. Configure IP networks. Install and configure routed networks. Configure and monitor ports and protocols. Explain network application and storage issues. Monitor and troubleshoot networks. Explain network attacks and mitigations. Install and configure security devices. Explain authentication and access controls. Deploy and troubleshoot cabling solutions. Implement and troubleshoot wireless technologies. Compare and contrast WAN technologies. Use remote access methods. Identify site policies and best practices. CompTIA's Network+ certification is a foundation-level certification designed for IT professionals with around one year of experience, whose job role is focused on network administration. The CompTIA Network+ exam will certify the successful candidate has the knowledge and skills required to troubleshoot, configure, and manage common network devices; establish basic network connectivity; understand and maintain network documentation; identify network limitations and weaknesses; and implement network security, standards, and protocols. The candidate will have a basic understanding of enterprise technologies, including cloud and virtualization technologies. The Official CompTIA© Network+© (Exam N10-008): will teach you the fundamental principles of installing, configuring, and troubleshooting network technologies and help you to progress a career in network administration. In this course, you will build on your existing user-level knowledge and experience with personal computer operating systems and networks to master the fundamental skills and concepts that you will need to use on the job in any type of networking career. Prerequisites CompTIA A+ Certification (Exams 220-1001 and 220-1002) 1 - Explaining the OSI and TCP/IP Models Topic A: Explain OSI Model Layers Topic B: Explain the TCP/IP Suite 2 - Explaining Properties of Network Traffic Topic A: Explain Media Types and Access Methods Topic B: Deploy Ethernet Standards Topic C: Configure and Monitor Network Interfaces 3 - Installing and Configuring Switched Networks Topic A: Install and Configure Hubs and Bridges Topic B: Install and Configure Switches Topic C: Compare and Contrast Network Topologies Topic D: Compare and Contrast Network Types 4 - Configuring IP Networks Topic A: Configure IPv4 Addressing Components Topic B: Test IP Interfaces with Command Line Tools Topic C: Configure IPv4 Subnets Topic D: Configure Private and Public IPv4 Addressing Schemes Topic E: Configure IPv6 Addressing Components Topic F: Configure DHCP Services 5 - Installing and Configuring Routed Networks Topic A: Explain Characteristics of Routing Topic B: Install and Configure Routers 6 - Configuring and Monitoring Ports and Protocols Topic A: Explain the Uses of Ports and Protocols Topic B: Use Port Scanners and Protocol Analyzers Topic C: Explain the Use of Name Resolution Services Topic D: Configure DNS and IPAM Services 7 - Explaining Network Application and Storage Services Topic A: Explain the Uses of Network Applications Topic B: Explain the Uses of Voice Services and Advanced Networking Devices Topic C: Explain the Uses of Virtualization and Network Storage Services Topic D: Summarize the Concepts of Cloud Services 8 - Monitoring and Troubleshooting Networks Topic A: Monitor Network Interfaces and Logs Topic B: Explain Network Troubleshooting Methodology Topic C: Troubleshoot Common Network Services Issues 9 - Explaining Networking Attacks and Mitigations Topic A: Summarize Common Networking Attacks Topic B: Explain the Characteristics of VLANs Topic C: Explain the Characteristics of NAT and Port Forwarding 10 - Installing and Configuring Security Devices Topic A: Install and Configure Firewalls and Proxies Topic B: Explain the Uses of IDS/IPS and UTM 11 - Explaining Authentication and Access Controls Topic A: Explain Authentication Controls and Attacks Topic B: Explain the Uses of Authentication Protocols and Directory Services Topic C: Explain the Uses of Port Security and NAC Topic D: Implement Network Device Hardening Topic E: Explain Patch Management and Vulnerability Scanning Processes 12 - Deploying and Troubleshooting Cabling Solutions Topic A: Deploy Structured Cabling Systems Topic B: Deploy Twisted Pair Cabling Solutions Topic C: Test and Troubleshoot Twisted Pair Cabling Solutions Topic D: Deploy Fiber Optic Cabling Solutions 13 - Implementing and Troubleshooting Wireless Technologies Topic A: Install and Configure Wireless Technologies Topic B: Troubleshoot Wireless Performance Issues Topic C: Secure and Troubleshoot Wireless Connectivity 14 - Comparing and Contrasting WAN Technologies Topic A: Compare and Contrast WAN Core Service Types Topic B: Compare and Contrast WAN Subscriber Service Types Topic C: Compare and Contrast WAN Framing Service Types Topic D: Compae and Contrast Wireless and IoT WAN Technologies 15 - Using Remote Access Methods Topic A: Use Remote Access VPNs Topic B: Use Remote Access Management Methods 16 - Identifying Site Policies and Best Practices Topic A: Manage Networks with Documentation and Diagrams Topic B: Summarize the Purposes of Physical Security Devices Topic C: Compare and Contrast Business Continuity and Disaster Recovery Concepts Topic D: Identify Policies and Best Practices

CompTIA Network+
Delivered Online + more
£2,475

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered Online
£3,495

Certificate in UX Design Fundamentals

By UX Design Institute

A comprehensive introduction to UX design. Learn the key principles and concepts behind the UX process. Take your first steps into UX Whether you want to explore UX as a career or expand your professional skillset, this UX design fundamentals course is the perfect starting point. Follow 65 expert lessons that will immerse you in the theory and principles of UX Design Learn about the techniques that underpin the UX process, like user research, affinity diagrams, and prototyping Earn a globally recognised and university credit-rated professional qualification Who is it for? Anybody who needs to understand UX Format Online, self-paced Duration 6 weeks (recommended) Commitment 3 hours per week How you’ll benefit If you want to really understand UX, this UX design fundamentals course for you. Speak confidently about UX design Develop a mindset for problem-solving Learn to advocate for the user - and make better business decisions as a result Become a more rounded, valuable professional Showcase your knowledge with a university credit-rated certificate Learn the key UX design fundamentals concepts in just six weeks. Everything you need to truly grasp UX, over five engaging modules. Module 1 Introduction to UX design Gain a comprehensive overview of the UX design process. Module 2 User research methods Learn how to gain deep insights into customer needs and behaviours. Module 3 Analysis techniques Discover how research gets translated into actionable insights. Module 4 Defining the experience Explore problem-solving techniques and design principles. Module 5 Prototyping techniques Understand the different forms of prototyping and when to use them. Exam 40-minute final exam Get assessed on your knowledge through a final exam.

Certificate in UX Design Fundamentals
Delivered Online + more
£675 to £850

Certified Data Centre Specialist (CDCS)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is an IT, facilities or data centre operations professional working in and around the data centre and having the responsibility to achieve and improve high-availability and manageability of the data centre. Overview After completion of the course the participant will be able to:? Understand the design life cycle of data centres and the stages involved? Discuss the data centre requirements in great level of detail with vendors, suppliers and contractors to ensure that these requirements are met? Validate design plans, quotes and offers proposed by vendors/contractors? Understand redundancy levels for both the data centre design/setup and maintenance? Understand the various building considerations such as bullet proofing, mitigation of seismic activity, fire ratings and thermal stability? Understand how to install a raised floor that meets requirements, avoiding misalignment, level differences and leakage? Understand how to read a Single Line Electrical Diagram to identify and avoid the most common design issues? Choose the correct UPS and parallel configuration, learn and avoid classic parallel installation mistakes? Understand how to calculate battery banks, validate offered configurations to ensure they meet requirements? Understand what distance to keep to avoid EMF issues for human safety and equipment disturbances? Understand the fundamental cooling setup, CFM, Delta-T and other important factors? Understand contamination factors and limitations? Understand full details of fire suppression options, how to calculate gas content and verify installations? Understand how to measure data centre energy efficiency and how to improve it The course will bring participants to the level of a suitable sparring partner with suppliers. They will be able to verify offers provided by vendors for correctness, effectiveness and efficiency. Data Centre Design/Life Cycle Overview Overview of the phases of a data centre life cycle Planning, re-alignment and continuous improvement Standards and Rating Level Definitions Rating level history Difference between Uptime and TIA-942 Rating level definitions Redundancy options (N+1), 2N, 2(N+1) Concurrent Maintainability/Compartmentalisation Example configurations Substation and feed requirements Maintenance options Operational processes guidelines/standards Skill development Building Considerations Building location considerations Floor and hanging loads requirements Fire rating for walls and glass Blast protection Bullet proofing Forced entry protection Advanced Raised Floor & Suspended Ceiling Raised floor installation guidelines Techniques to install a proper and leveled raised access floor Common mistakes Choosing the right tiles and their locations Seismic-mitigating floor constructions Choosing the correct suspended ceiling Advanced Power Power infrastructure layout; Formulas which you should know for the data centre Single Line Electrical diagrams; how to read to ensure key components are present for protection Over current protection devices (MCB/MCCB/VCB/ACB/Fuses) definitions and what to use where Earth Leakage devices (RCB/RCD/ELCB/GFCI/ALCI/RCBO), definitions and what to use where Sizing of protective components Lightning strikes and surge protection devices (TVSS/SPD), how they operate, where to use and how to install Power cabling and cable run considerations PDU/DB setup and minimum requirements Generators; Generator types: Standy/Prime/Continuous Component make up and functions Fuel storage and calculation Paralleling of gen-sets Generator room/area requirements UPS Systems; Required specifications for UPS systems How to read data sheets and select the correct UPS Requirements for parallel configurations and avoid pitfalls such as single point of failures How parallel installation should be done, classic mistakes made by installers and how to avoid these Harmonic Filters; Active/Passive filters and their application Battery Banks; Battery bank terminology Designing battery banks, how to calculate, and double check the battery bank to be installed Battery charging pitfalls and ensuring the right charger is being installed and used Using parallel battery banks; how to properly install them, limitations and risks when using batteries in parallel How to test batteries correctly and make decisions on cell/block or string replacement Battery casing choices; ABS, V0, V1, V2 Alternative energy storage; flywheel, re-usable cell, compressed air UPS, etc. Advanced Electro Magnetic Fields Sources of EMF Difference between single, three phase and bus-bar EMF Options available to measure EMF and how to interpret the results from single-axes and composite measurements Guidance on safe distance for equipment and humans Calculation of EMF attenuation factor for shielding material permeability and saturation factors Advanced Cooling Important definitions; dry-bulb, wet-bulb, dew-point, RH, sensible and latent heat Psychometric chart and ASHRAE recommendations Environmental class definitions and thermal specifications Temperature/humidity measurements guideline Heat dissipation methods Altitude impact on temperature intake to ICT equipment Floor plan setup for effective cooling Differences in tile surface and supporting structure and the air-flow performance impact Rack door construction and the flow performance impact Equipment Delta-T and its impact Optimising air flow Thermal units conversions Calculations for air volume displacement (CFM/CMH) Cooling capacity calculations Air-conditioning selection De- / humidifying options Air conditioning efficiency SHR impact on cost saving Efficiency indicator New cooling principle and techniques (Submerged, VSD/VRF/ECF/water- and air side economisers) Redundancy guidelines for air-conditioners avoiding classic misconceptions and mistakes for meeting ANSI/TIA-942 compliant designs Installation requirements Connections to fire panel and EPO Commissioning of air conditioners Set points and calibration CFD (Computational Fluid Dynamics) Advanced Fire Protection The fire triangle and elements to stop a fire Detection systems in detail (VESDA, VIEW, smoke sensors) Considerations for installation of sensors Proper testing of smoke sensors Water based systems i.e. deluge, wet-pipe, dry-pipe, pre-action and why most of them don't work and how to detect this Details on Inert and Halocarbon systems and how to select the correct system for your data centre How to calculate the gas content ensuring the appropriate level is installed to suppress the fire including safety considerations Other requirements for gas systems such as release times, hold times, pipe install requirements and other important factors Requirements for the fire detection panel Installation verification, methods, what to check and how New advanced fire suppression technologies Design and Install Scalable Networking Cabling System ANSI/TIA942 cabling structure topology ToR, EoR Design Intelligent patching systems Installation best practice such as routing, bending radius, separation from power, containment fill ratio, fiber link loss calculator, bonding and grounding requirement Standard for telecommunications labeling and administration Environmental Specifications and Contamination Control Acoustic noise effects, regulations, specifications and limits Data centre contaminations and classifications Measurements, standards and limits Preventive measures and avoidance Data Centre Efficiency Business drivers to go Green High-availability or Green? Green guidelines and standards How to measure it and what are acceptable numbers compared to the general industry PUE classes defined by Green Grid and issues with PUE Techniques for saving energy in all parts of the data centre i.e. application/system level, cooling, power distribution Mock ExamEXAM: Certified Data Centre Specialist

Certified Data Centre Specialist (CDCS)
Delivered Online
£2,050

Professional Certificate in User Research

By UX Design Institute

The industry standard course in UX research Master the research skills that make UX professionals so valuable. Become a confident, credible and effective user researcher with a globally recognised qualification. Who is it for? UX professionals Aspiring UX researchers Duration 16 weeks Commitment 3 hours per week Format Online, self-paced with live support and mentoring Why take this user research course: Gain the most in-demand skills* and boost your career in a thriving industry. Learn a complete range of UX research methods. Expand your toolkit to conduct high-quality research at pace. Become an insights expert. Translate findings into actionable insights and communicate them with conviction. Showcase your expertise. Build a professional user research portfolio and earn a university credit-rated qualification. Get the confidence to succeed. Count on our mentors, career advisors and student community throughout your journey. *Research is one of the top 10 most in-demand skills globally (LinkedIn, 2023). A comprehensive, in-depth curriculum This user research course has been created and validated by experts in UX research. It is credit-rated by Glasgow Caledonian University. Self-paced learning gives you the flexibility to study in your own time. Monthly deadlines and submissions give you structure and accountability. The best of both worlds. Module 1 Introduction to user research Understand the role of a UX researcher. Explore the types, methods and ethics of research. Module 2 Planning the research Learn how to build a research plan, collaborate with stakeholders, recruit participants and manage data. Module 3 Fundamental user research skills Master the core skills of interviewing and usability testing. Learn how to moderate and take notes. Module 4 Expanding your toolkit Explore qualitative research methods like ethnography, contextual enquiry, service safaris and diary studies. Module 5 Analysing qualitative research Learn to analyse research data and translate it into user goals, affinity diagrams, personas and journey maps. Module 6 Quantitative research Learn to design, conduct and analyse online surveys, A/B tests and more. Module 7 Communicating the research Learn how to report and present your findings with confidence. Module 8 AI for user research Explore how AI tools can assist researchers. Project Portfolio project Build a professional portfolio to showcase your research expertise.

Professional Certificate in User Research
Delivered Online + more
£1,575 to £1,750

Advanced Piping & Instrumentation Diagrams P&IDs

By Course Cloud

The comprehensive Advanced Piping & Instrumentation Diagrams P&IDs has been designed by industry experts to provide learners with everything they need to enhance their skills and knowledge in their chosen area of study. Enrol on the Advanced Piping & Instrumentation Diagrams P&IDs today, and learn from the very best the industry has to offer! This best selling Advanced Piping & Instrumentation Diagrams P&IDs has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Advanced Piping & Instrumentation Diagrams P&IDs is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Advanced Piping & Instrumentation Diagrams P&IDs is CPD-accredited, so you can be confident you're completing a quality training course which will boost your CV and enhance your career potential. The Advanced Piping & Instrumentation Diagrams P&IDs is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Advanced Piping & Instrumentation Diagrams P&IDs, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Advanced Piping & Instrumentation Diagrams P&IDs will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Advanced Piping & Instrumentation Diagrams P&IDs to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

Advanced Piping & Instrumentation Diagrams P&IDs
Delivered Online On Demand
£319

UML Class Diagrams Level 2

By Course Cloud

Course Overview Are you looking to become a Computer Programmer? Then you will need to know how to communicate your designs and ideas to other programmers, analysts and architects, in an effective way. This is where UML comes in.  The UML Class Diagrams Level 2 course will teach you the skills required to read and create UML class diagrams. It will show you how to use them as a valuable communication and software tool, where you will explore its different concepts from basic to advanced. By the end of this course, you will be able to design object-oriented classes in UML, write code based on UML class diagrams, and much more. You will also have an excellent understanding of the different elements of UML class diagrams. This course has no particular entry requirements, however, a basic understanding of object-oriented programming concepts is ideal. This best selling UML Class Diagrams Level 2 has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth UML Class Diagrams Level 2 is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The UML Class Diagrams Level 2 is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The UML Class Diagrams Level 2 is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the UML Class Diagrams Level 2, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the UML Class Diagrams Level 2 will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the UML Class Diagrams Level 2 to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

UML Class Diagrams Level 2
Delivered Online On Demand
£25

Piping & Instrumentation Diagrams P&IDs

4.8(9)

By Skill Up

Learn Piping and Instrumentation Diagrams (P&IDs) and enhance your engineering knowledge. Master P&ID symbols, control theory, and safety systems!

Piping & Instrumentation Diagrams P&IDs
Delivered Online On Demand8 hours 4 minutes
£25

Visio Flowcharts and Diagrams

By Underscore Group

Ensure you can fully utilize this powerful tool to create a range of flowcharts and diagrams. Course overview Duration: 1 day (6.5 hours)  Microsoft Visio is a powerful tool designed to simplify complex information through the creation of simple, professional-looking diagrams. While Visio is capable of producing almost any type of drawing this training concentrates on flowcharts, swim lane process diagrams and organisation charts. You will also discover the real power of Visio by adding essential data to the content of your diagrams and producing reports in Excel using this data. This course is designed for either new users of Visio or those who have dabbled and can create basic diagrams. Our course will give you the skills and knowledge you need to navigate your way around this powerful program and produce different types of diagram. Objectives  By the end of the course you will be able to: Create and amend flowcharts Create cross functional (Swim Lane) process flows Produce organisation charts by importing data Add essential data to shapes Export diagram data reports to Excel Present, publish and print Visio diagrams Content Visio essentials Finding your way around Visio Using the ribbon and Quick Access toolbar Keyboard shortcuts Shapes and stencils explained What Visio can do for you Creating basic flowcharts Working with shapes Adding and deleting shapes Joining, aligning and sizing shapes Using Auto-Connect Labelling shapes and connectors Editing and improvinC flowcharts Amending shape and connector labels Using colours to emphasise Changing line styles Moving and copying objects Grouping diagram elements Quick ways of working Cross functional flowcharts Creating Cross-Functional Flowcharts Manipulating functional bands Creating off-page references within diagrams and hyperlinks to other documentation Organising charts and shape data Using the wizard to create an organisation Chart Importing existing Data into to create an organisation chart Modifying an organisation chart Shape Data Adding shape data to a shape Creating shape data sets Diagram reports Exporting data to a report in Excel Exporting to HTML Creating and customizing reports Presenting, publishing and printing Using Page Setup Print previewing Embedding backgrounds Adding headers and footers Converting your final documentation to PDF Saving as HTML Visio with PowerPoint

Visio Flowcharts and Diagrams
Delivered in Horsham or OnlineFlexible Dates
Price on Enquiry

Understand Piping & Instrumentation Diagrams P&IDs

5.0(10)

By Apex Learning

Overview This comprehensive course on Understand Piping & Instrumentation Diagrams P&IDs will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Understand Piping & Instrumentation Diagrams P&IDs comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? At the end of the course there will be an online written test, which you can take either during or after the course. After successfully completing the test you will be able to order your certificate, these are included in the price. Who is This course for? There is no experience or previous qualifications required for enrolment on this Understand Piping & Instrumentation Diagrams P&IDs. It is available to all students, of all academic backgrounds. Requirements Our Understand Piping & Instrumentation Diagrams P&IDs is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 14 sections • 119 lectures • 08:26:00 total length •Introduction: 00:04:00 •What's a P&ID ?: 00:03:00 •Why is a P&ID so important ?: 00:02:00 •Who uses P&ID's ?: 00:06:00 •How do P&ID's look like ?: 00:08:00 •Introduction- PID READING: 00:02:00 •Anatomy of a P&ID: 00:01:00 •The title block: 00:03:00 •The drawing scale: 00:03:00 •The grid system: 00:02:00 •The revision block: 00:03:00 •Changes: 00:02:00 •Notes and legends: 00:03:00 •Valve symbols: 00:14:00 •Valve actuator symbols: 00:09:00 •Control valve designations: 00:02:00 •Standards and conventions for valve status: 00:07:00 •Process equipment symbols: 00:12:00 •Piping symbols: 00:03:00 •Pipe fitting symbols: 00:03:00 •Isolating, venting & draining symbols for ease of maintenance: 00:05:00 •Instrumentation: 00:03:00 •Sensing devices and detectors: 00:04:00 •Location symbols: 00:04:00 •Modifiers and transmitters: 00:05:00 •Indicators and recorders: 00:03:00 •Controllers: 00:03:00 •Example #1 : Identifying process equipment and flow paths: 00:05:00 •Example #2 : Identifying valve position and failure mode: 00:03:00 •Example #3 : Identifying the symbols: 00:02:00 •Piping designation code: 00:06:00 •Equipment designation code: 00:03:00 •Instrument designation code: 00:02:00 •Miscellaneous designation codes: 00:02:00 •The process: 00:01:00 •Process control: 00:06:00 •The control loop: 00:02:00 •Process control terms: 00:10:00 •Control loops : Feedback control: 00:02:00 •Pressure control loops: 00:01:00 •Flow control loops: 00:01:00 •Level control loops: 00:01:00 •Temperature control loops: 00:01:00 •Multi-variable loops: 00:02:00 •Feedforward control: 00:02:00 •Feedforward + Feedback: 00:01:00 •Cascade control: 00:08:00 •Split range control: 00:03:00 •Operations on control signals: 00:02:00 •Ratio control: 00:02:00 •Batch control: 00:01:00 •Selective control: 00:01:00 •Do we need to control at all ?: 00:01:00 •Principles of equipment-wise control: 00:10:00 •Pipe control system: 00:02:00 •Control of a single pipe: 00:02:00 •Control of pressure in a pipe: 00:03:00 •Control of flow in a pipe: 00:04:00 •Flow merging: 00:08:00 •Flow splitting: 00:05:00 •Centrifugal pump control: 00:04:00 •Control valve vs Variable Frequency Drive (VFD) for centrifugal pumps: 00:03:00 •Minimum flow control for centrifugal pumps: 00:09:00 •Positive displacement pump control: 00:02:00 •Control by a recirculation pipe for PD pumps: 00:03:00 •Variable Speed Drive (VSD) control for PD pumps: 00:01:00 •Control by stroke adjustment for PD pumps: 00:01:00 •Compressor control system: 00:02:00 •Compressor capacity control: 00:12:00 •Compressor anti-surge control: 00:03:00 •Heat transfer equipment control: 00:02:00 •Heat exchanger direct control system: 00:04:00 •Heat exchanger bypass control system: 00:04:00 •Reactor temperature control: 00:06:00 •Air cooler control: 00:02:00 •Heat exchanger for heat recovery: 00:01:00 •Heat exchanger back pressure control: 00:02:00 •Basic fired heater control: 00:08:00 •Complex fired heater control: 00:05:00 •Container and vessel control: 00:07:00 •Container blanket gas control: 00:02:00 •Safety strategies: 00:01:00 •Concept of Safety Instrumented Systems (SIS): 00:01:00 •SIS actions and types: 00:14:00 •SIS extent: 00:02:00 •SIS requirement: 00:03:00 •Anatomy of a SIS: 00:02:00 •SIS element symbols: 00:01:00 •SIS primary elements : Sensors: 00:03:00 •SIS final elements: 00:04:00 •Switching valve actuator arrangements: 00:02:00 •Valve position validation: 00:02:00 •Merging a switching valve and a control valve: 00:03:00 •SIS logics: 00:01:00 •Showing safety instrumented functions on P&ID's: 00:07:00 •Discrete control: 00:05:00 •Alarm system: 00:02:00 •Anatomy of alarm systems: 00:02:00 •Alarm requirements: 00:06:00 •Alarm system symbology in P&ID's: 00:06:00 •Concept of common alarms: 00:01:00 •Fire and Gas Detection Systems (FGS): 00:03:00 •Electric motor control: 00:07:00 •P&ID representation of commands and responses: 00:05:00 •P&ID representation of inspection and repair: 00:05:00 •P&ID example of electro-motor control: 00:04:00 •P&ID example #1 : Legend and specifications: 00:05:00 •P&ID example #2 : Hydrogen delivery station: 00:16:00 •P&ID example #3 : Acid system: 00:13:00 •P&ID example #4 : Centrifugal pump: 00:09:00 •P&ID example #5 : Utility station: 00:04:00 •P&ID example #6 : Waste water filter: 00:08:00 •P&ID example #7 : Steam separator: 00:15:00 •P&ID example #8 : Flare knock-out drum: 00:14:00 •P&ID example #9 : Centrifugal compressor: 00:05:00 •P&ID example #10 : Hydrogen production from shale gas: 00:11:00 •P&ID example #11 : Fired heater: 00:07:00 •Resources - Understand Piping & Instrumentation Diagrams P&IDs: 00:00:00 •Assignment - Understand Piping & Instrumentation Diagrams P&IDs: 00:00:00

Understand Piping & Instrumentation Diagrams P&IDs
Delivered Online On Demand8 hours 26 minutes
£12

Educators matching "diagrams"

Show all 13