About this Training Course In turbulent times for the entire Energy Sector, Oil & Gas E & P segments are coming under tremendous pressure to reinvigorate. Oil Majors like Shell Plc are no longer termed as Oil & Gas Company but also branded as SHELL Energy, with technology at its forefront. The Risks, Scope and Context of Engineering, Procurement, Construction, Installation and Commissioning (EPCIC) Projects is evolving rapidly. Thus, the success of a project is dependent on the practical 'know how' in scoping, contract drafting, negotiation and execution competencies. Understanding the essential ingredients of contracts and mastering the international contracting principles will equip the participants to identify vague and ambiguous clauses, avoid dangerous and often hidden terms, and better understand the controlling position in a project. In this 3 full-day course, the participants will find out how to negotiate legacy contracts where parties are not allowed to edit any clauses during the bidding process. The participants will learn from the Case Law Reports and analysis to take home lessons learned from bitter experiences of their peers in the industry. It is designed to help those who need a solution to manage current contractual issues or those who execute contracts regularly and want to be more proficient in managing their contracts and projects, with changing contexts. The course is developed with the underlying objectives for the participants to: Enhance their current knowledge of the legal principles governing international Contracts from formation, execution to breaches, redresses and dispute resolution either as a party or as a consortium member or as a coverture. Manage Consortium and Joint Venture Partners inter-relationship and contractual responsibilities. Identify dangerous exposures due to joint and severally liable requirements of consortium-based contracts. Effectively Manage Risks of Projects, with Enforceable Contract Documents, by learning the purpose and potential benefits of maintaining evidence in compliance to the contract clauses. Learn the Contract Enforcement Nuggets of Owners and the Variation Claims Strategies of the Contractors. Allocation of contract management related roles / assignments and WBS within consortium partners for effective project management and profitable results. Use of Contract Terms & Conditions for enhancing project performance, monitoring, reporting, and achieving timely completion, thereby avoiding delays and disputes. This course can also be offered through Virtual Instructor Led Training (VILT) format. Training Objectives Upon completion of the course, the participants will have learnt: Project management strictly in accordance with the contract and the corporate strategies. How to ensure that Variations Order claims are appropriately managed in turnkey and lump-sum contracts. Manage contemporary challenges and market factors with direct or indirect impact on the contracts. Managing all members of the Supply Chain from vendors to logistics services providers. Cost Engineering and Performance Management. How to manage Consortium Partners, Contractors, and Owner's representatives. When and how to obtain / grant extension of time (EOT) and costs. Ability to identify rights and obligations of each party to a contract instead of making subjective decisions. Ability to be firm in negotiations without violating terms of the agreements. Ability to spot different legal systems, contract laws and arbitration rules. Ability to negotiate and avoidance of disputes and resolution in amicable manner, in accordance with the provisions of the contract. Competency in developing and maintaining documentary evidence and traceability for all works executed during the project. Target Audience This course is specially curated for professionals from International Oil & Gas Industries including Offshore & Marine Sectors. They include the heads of strategic business units, contracts managers, project directors, project managers, general managers, corporate legal counsels, procurements and supply chain managers, lawyers and legal professionals engaged in the EPCIC Segments of the Oil & Gas Industry. Course Level Intermediate Trainer Principal Management Consultant Chartered Valuer and Appraiser (CVA) FACICA | FAMTAC | FAIADR | M.S.I.D | Member, AIEN LL.M. (IP Law), M. Sc. (Maritime Studies), M. Tech (Knowledge Engineering), MBA, First Class CoC (MCA, UK), B. E. (Elect) Your expert course leader, during the last 47 year period, has worked and consulted in the industry verticals encompassing: Technology, Oil & Gas Exploration & Production, Petrochemical Process Plants and Power Plant Construction Projects, Logistics & Warehousing, Marine, Offshore, Oil & Gas Pipelines, Infrastructure Development Projects (Ports, Offshore Supply Bases, Oil & Gas Terminals and Airports etc), EPCIC Contracts, and Shipyards, in South East Asia, Africa, Middle East, Americas and Europe. He serves as the Principal Management Consultant with a management consultancy in Hong Kong and Singapore, specialising in the fields of corporate management consultancy, international contracts reviews and alternative dispute resolutions services. He undertakes special assignments for conducting audits and valuation of intangible properties involving proprietary processes for licensed production, and licensing of intellectual property rights (IP Rights) in patents, trademarks, and industrial designs. He is frequently engaged for assignments like due diligence, acquisitions, mergers, resolving various operational issues, technology transfer and agency services contracts reviews, cost controls, and enhancement of Supply Chain Management. He has been conferred the credentials of Chartered Valuer & Appraiser (CVA) by SAC and IVAS, in accordance with the international valuation standards setting body IVSC. His consulting experience includes Charterparty Management, Business Process Re-engineering, Diversifications, Corporate Development, Marketing, Complex Project Management, Feasibility Studies, Dispute Resolutions and Market Research. He has successfully assisted Marine and offshore E & P clients in managing contractual disputes arising from various international contracts for upgrading & conversion projects. He continues to be actively engaged in claims reviews, mediation, arbitration, litigation, and expert witness related assignments, arising from international contracts and Charterparty Agreements. He graduated with a Bachelor's degree in Electrical Engineering, MBA in General Management, Master of Technology in Knowledge Engineering, Master of Science in Maritime Studies, and LL.M. (IP Law). He also holds professional qualifications in Business Valuations and Appraisers for CVA, arbitration, law, and marine engineering, including the Chief Engineer's First-Class Certificate of Competency (MCA, UK). He is further qualified and accredited as Certified International Arbitrator, Chartered Arbitrator, Sports arbitrator under CAS Rules, WIPO Neutral, Australian Communications and Media Authority (ACMA) Bargaining Code Arbitrator, Accredited Adjudicator and Accredited Mediator (Malaysia). He is admitted to the international panels of arbitrators and neutrals with WIPO, Geneva; ACICA, AMTAC and ACMA, Australia; BVIAC (British Virgin Islands); JIAC (Jamaica); HKIAC Hong Kong; AIAC, Malaysia; AIADR, Malaysia; KCAB, Seoul, South Korea; ICA, Delhi, India; ICC (Singapore); SISV, Singapore; SCMA, Singapore; SCCA, Saudi Arabia; VIAC Vienna, Austria; Thailand Arbitration Centre (THAC), and Mediator with AIAC Malaysia, CMC, and SIMI Singapore. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
Enhance your knowledge of natural gas and LNG sales agreements with EnergyEdge course. Enroll now to gain valuable industry knowledge and skills.
This course is aimed at those who would like to work as a learning support assistant in a school or further education setting. Level 3 Certificate in Supporting Teaching and Learning will give you an understanding of the skills and knowledge needed to support learners in the classroom.
Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options
Build- to- rent involves the construction of purpose- built residential buildings with the intention of renting out the units for the long term, rather than selling the individually. On this webinar, we will introduce the concept of Build-to-rent (BtR) and explore the key features, including design considerations, financial models and management strategies. We will also discuss the benefits of BTR investors, tenants, and communities as well as potential challenges and risk associated with this type of investment.
About this Training Course The Oil & Gas E&P industry is evolving from deep sea exploration to renewable sources of energy through windfarms and solar fields offshore. In tandem, OSBs will need to evolve for sustainability and revival from stagnant traditional Supply Base Models. The changing role of OSBs is toward support services for decommissioning projects and LNG Floating Terminals. In addition, the new geographical regions of East and South Africa are coming up at a faster pace. All such operations are dependent upon a complex network of transport and supply in order to deliver the staff, materials, machinery, and crew provisions where and when needed. This 3 full-day course is curated to enhance the skills and competencies of passionate professionals to plan and organise resources, minimise turnaround time for the vessels engaged in support of Offshore E & P operations. Various hands-on exercises can equip the participants to implement viable and feasible approaches for safe and efficient management of OSBs in compliance with continuously evolving international best practices and Oil & Gas standards. This course is specially developed for investors, business owners, senior executives and professionals from the offshore & marine logistics industry, with the following objectives: To provide a firm understanding about the role of an Offshore & Marine Supply Base in support of Oil & Gas E & P fleet operations, in contrast with traditional merchant shipping logistics. To provide an in-depth knowledge about the range and diversity of services being offered by Offshore & Marine Supply Bases ('OSB') in the target regions. To equip with the knowledge and information required for taking investment decisions when venturing in Offshore E & P Sector. To introduce contemporary techniques and tools required to identify target customer segments while developing a new OSB or expanding operations of an existing OSB. To elaborate comparative management methodologies for OSB facilities and services management, based on deployment of ICT solutions so as to deliver value added services to the customers. To learn to identify methodologies for sales and distribution of services to the customers and non-paying users of the OSB. To identify relevant state legislation for licensing & governing an OSB, and enforce through contractual obligations, rights and responsibilities of the parties as clients of an OSB. To develop and implement Business Processes with built-in Performance Evaluation Metrics for achieving competitive advantage over the peers in the OSB segment. To develop and implement integrated OSB's Risk Management framework. This course can also be offered through Virtual Instructor Led Training (VILT) format. Training Objectives Upon completion of this course, the participants will be able to: Implement and comply with the QHSSSE regulations and national or Port Controls regime for safe handling of import & export cargo and movements of the vessels. Establish role and responsibilities of the Offshore Supply Base management team. Plan and organise resources so as to minimise turnaround time for the vessels engaged in support of Offshore E & P and Windfarms operations. Plan and organise OSB cranes, vehicles, MHE, spaces and relevant facilities for storage, movement, and custody transfer of various types of solid and liquid cargo, tools, shackles, bulk materials in open yards and ships' gears. Be aware of potential emergency situations and how to respond and coordinate with relevant internal and external agencies. Manage safety of personnel of sub-contractors, stevedores', tenants, and ship crew, when engaged in OSB operations. Differentiate between various ships, technical and functional characteristics, safety requirements and potential hazards of each operation. Build competency in developing and maintaining documentary evidence for traceability for all works executed during the specific period or operation. Develop techniques for performance monitoring and continuous improvements based on lessons learned from each operation at the Base as well as from reports about peers in the similar business. Target Audience This course is intended for: Operations Management personnel from existing OSBs, Ports, Logistics & Warehouses, Offshore Fields, E & P Infrastructure Support services providers. Professionals who are interested in OSB segment of the Offshore & Marine Oil & Gas Industry. Participants who have no prior knowledge about OSB Operations and are new to the Offshore Logistics And highly recommended for: Managers, Engineers, and Professionals assigned to lead new initiatives in Logistics Management of Offshore & Marine Segments of Oil & Gas Industry. Course Level Intermediate Trainer Principal Management Consultant Chartered Valuer and Appraiser (CVA) FACICA | FAMTAC | FAIADR | M.S.I.D | Member, AIEN LL.M. (IP Law), M. Sc. (Maritime Studies), M. Tech (Knowledge Engineering), MBA, First Class CoC (MCA, UK), B. E. (Elect) Your expert course leader during the last 47 year period, has worked and consulted in the industry verticals encompassing: Technology, Oil & Gas Exploration & Production, Petrochemical Process Plants and Power Plant Construction Projects, Logistics & Warehousing, Marine, Offshore, Oil & Gas Pipelines, Infrastructure Development Projects (Ports, Offshore Supply Bases, Oil & Gas Terminals and Airports etc), EPCIC Contracts, and Shipyards, in South East Asia, Africa, Middle East, Americas and Europe. He serves as the Principal Management Consultant with a management consultancy in Hong Kong and Singapore, specialising in the fields of corporate management consultancy, international contracts reviews and alternative dispute resolutions services. He undertakes special assignments for conducting audits and valuation of intangible properties involving proprietary processes for licensed production, and licensing of intellectual property rights (IP Rights) in patents, trademarks, and industrial designs. He is frequently engaged for assignments like due diligence, acquisitions, mergers, resolving various operational issues, technology transfer and agency services contracts reviews, cost controls, and enhancement of Supply Chain Management. He has been conferred the credentials of Chartered Valuer & Appraiser (CVA) by SAC and IVAS, in accordance with the international valuation standards setting body IVSC. His consulting experience includes Charterparty Management, Business Process Re-engineering, Diversifications, Corporate Development, Marketing, Complex Project Management, Feasibility Studies, Dispute Resolutions and Market Research. He has successfully assisted Marine and offshore E & P clients in managing contractual disputes arising from various international contracts for upgrading & conversion projects. He continues to be actively engaged in claims reviews, mediation, arbitration, litigation, and expert witness related assignments, arising from international contracts and Charterparty Agreements. He graduated with a Bachelor's degree in Electrical Engineering, MBA in General Management, Master of Technology in Knowledge Engineering, Master of Science in Maritime Studies, and LL.M. (IP Law). He also holds professional qualifications in Business Valuations and Appraisers for CVA, arbitration, law, and marine engineering, including the Chief Engineer's First-Class Certificate of Competency (MCA, UK). He is further qualified and accredited as Certified International Arbitrator, Chartered Arbitrator, Sports arbitrator under CAS Rules, WIPO Neutral, Australian Communications and Media Authority (ACMA) Bargaining Code Arbitrator, Accredited Adjudicator and Accredited Mediator (Malaysia). He is admitted to the international panels of arbitrators and neutrals with WIPO, Geneva; ACICA, AMTAC and ACMA, Australia; BVIAC (British Virgin Islands); JIAC (Jamaica); HKIAC Hong Kong; AIAC, Malaysia; AIADR, Malaysia; KCAB, Seoul, South Korea; ICA, Delhi, India; ICC (Singapore); SISV, Singapore; SCMA, Singapore; SCCA, Saudi Arabia; VIAC Vienna, Austria; Thailand Arbitration Centre (THAC), and Mediator with AIAC Malaysia, CMC, and SIMI Singapore. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
Gain a deep understanding of Production Sharing Contracts (PSC) and related agreements through our expert-led course. Enroll now and excel in your field with EnergyEdge.
Duration 3 Days 18 CPD hours This course is intended for This course is designed for technical professionals who need to know how to deploy a Cisco NCS 2000 Series Dense Wavelength-Division Multiplexing (DWDM) network with Flex Spectrum. The primary audience for this course includes: Designers Systems engineers and implementation staff Network operations center personnel Technical support personnel who are involved with the deployment, operations, and maintenance of the Cisco NCS 2000 Series Channel partners and resellers Overview After taking this course, you should be able to: Describe the hardware and components required and used with the Flex Spectrum feature Design optical networks in the Cisco Transport Planner software Install the hardware, including multishelf nodes Perform node turn-up and create circuits using the Cisco Transport Controller software Configure optical networks with multidegree ROADM multishelf nodes Configure optical networks with colorless, contentionless, omnidirectional, and MPO cross-connect advanced features Describe and configure the NCS 2000 400-Gbps Xponder line card Add a node to an existing DWDM ring Describe the NCS 2000 Troubleshooting Guide Use the features and documentation with Transport Controller to perform maintenance, testing, and basic troubleshooting The Cisco NCS2000 Deploying 96-Channel Flex Spectrum (OPT201) v3.0 course shows you how to plan, configure, and control optical networks using the Cisco© Network Convergence System (NCS) 2000 series Flex Spectrum platform.The course teaches you how to design Flex Spectrum networks with multi-degree Reconfigurable Optical Add-Drop Multiplexer (ROADM) multi-shelf nodes using the Cisco Transport Planner (CTP) software. Course Outline DWDM and Flex Spectrum Foundation NCS 2000 Chassis and Cards Design ROADM Networks with CTP Hardware Installation and Multishelf Node Turn-Up and Circuit Creation Advanced Feature Networks and Circuits Testing, Maintenance, and Basic Troubleshooting Spectrum Switched Optical Network
ITIL® 4 Strategist: Direct, Plan and Improve: Virtual In-House Training The ITIL® 4 Strategist: Direct, Plan, and Improve course is based on the ITIL® 4 Strategist Direct, Plan, and Improve candidate syllabus from AXELOS. This course is based on the ITIL® 4 Strategist: Direct, Plan and Improve IT exam specifications from AXELOS. With the help of ITIL® 4 concepts and terminology, exercises, and examples included in the course, candidates acquire the relevant knowledge required to pass the certification exam. This course provides the practical skills necessary to create a 'learning and improving' IT organization, with a strong and effective strategic direction. It was designed to provide practitioners with a practical and strategic method for planning and delivering continual improvement with necessary agility. It covers both practical and strategic elements, making it the universal module that is a key component to both ITIL® 4 Managing Professional and ITIL® 4 Strategic Leader streams. What You Will Learn At the end of this course, participants will be able to: Understand the key concepts of direction, planning, improvement Understand the scope of what is to be directed and/or planned and know how to use key principles and methods of direction and planning in that context Understand the role of GRC and know how to integrate the principles and methods into the service value system Understand and know how to use the key principles and methods of continual improvement for all types of improvements Understand and know how to use the key principles and methods of Communication and Organizational Change Management to direction, planning and improvement Understand and know how to use the key principles and methods of measurement and reporting in direction, planning, and improvement Understand and know how to direct, plan, and improve value streams and practices Course Introduction Let's Get to Know Each Other Course Overview ITIL® 4 Certification Scheme Course Learning Objectives Course Components Course Agenda Exercises Case Study: Axle Car Hire Case Study: HandyPerson on Demand Exam Details Core Concepts of DPI Key Terms Covered in the Module Module Learning Objectives Basics of Direction Basics of Planning Basics of Improvement Other Core Elements DPI through Service Value Chain and Guiding Principles Key Terms Covered in the Module Module Learning Objectives DPI of the SVS DPI of Guiding Principles Role of Direction in Strategy Management Key Terms Covered in the Module Introducing Strategy Management Developing Effective Strategies Implementation of Strategies Key Terms Covered in the Module Module Learning Objectives Managing Risks Making Decisions through Portfolio Management Directing via Governance, Risk, and Compliance (GRC) Introduction to Assessment and Planning Key Terms Covered in the Module Module Learning Objectives Core Concepts of Assessment Conducting Effective Assessments Core Concepts of Planning Assessment and Planning through VSM Key Terms Covered in the Module Module Learning Objectives Introducing VSM Developing Value Stream Maps Knowing More About VSM Measurement, Reporting, and Continual Improvement Key Terms Covered in the Module Module Learning Objectives Measurement and Reporting Alignment of Measurements and Metrics Success Factors and Key Performance Indicators Continual Improvement Measurements and Continual Improvement through Dimensions and SVS Key Terms Covered in the Module Module Learning Objectives Measurements for the Four Dimensions Continual Improvement of the Service Value Chain and Practices OCM Principles and Methods Key Terms Covered in the Module Module Learning Objectives Basics of OCM OCM throughout DPI and Service Value Chain Resistance and Reinforcement Communication Principles and Methods Key Terms Covered in the Module Module Learning Objectives Basics of Effective Communication Communication with Stakeholders SVS Development Using Four Dimensions Key Terms Covered in the Module Module Learning Objectives Organizations and People in the SVS Partners and Suppliers in the SVS Value Streams and Processes in the SVS Information and Technology in the SVS
Duration 1 Days 6 CPD hours This course is intended for This course is designed for students wishing to gain intermediate-level skills or individuals whose job responsibilities include constructing relational databases and developing tables, queries, forms, and reports in Microsoft Access for Microsoft 365. Overview In this course, you will optimize an Access database. You will: Provide input validation features to promote the entry of quality data into a database. Organize a database for efficiency and performance, and to maintain data integrity. Improve the usability of Access tables. Create advanced queries to join and summarize data. Use advanced formatting and controls to improve form presentation. Use advanced formatting and calculated fields to improve reports. Your training and experience using Microsoft© Access© has given you basic database management skills, such as creating tables, designing forms and reports, and building queries. In this course, you will expand your knowledge of relational database design; promote quality input from users; improve database efficiency and promote data integrity; and implement advanced features in tables, queries, forms, and reports. Extending your knowledge of Access will result in a robust, functional database for your users.This course is the second part of a three-course series that covers the skills needed to perform database design and development in Access.Microsoft© Access© for Office 365?: Part 1 : Focuses on the design and construction of an Access database?viewing, navigating, searching, and entering data in a database, as well as basic relational database design and creating simple tables, queries, forms, and reports.Microsoft© Access© for Office 365?: Part 2 (this course): Focuses on optimization of an Access database, including optimizing performance and normalizing data; data validation; usability; and advanced queries, forms, and reports.Microsoft© Access© for Office 365?: Part 3 : Focuses on managing the database and supporting complex database designs, including import and export of data; using action queries to manage data; creating complex forms and reports; macros and Visual Basic for Applications (VBA); and tools and strategies to manage, distribute, and secure a database.This course may be a useful component in your preparation for the Microsoft Access Expert (Microsoft 365 Apps and Office 2019): Exam MO-500 certification exam. Lesson 1: Promoting Quality Data Input Topic A: Restrict Data Input Through Field Validation Topic B: Restrict Data Input Through Forms and Record Validation Lesson 2: Improving Efficiency and Data Integrity Topic A: Data Normalization Topic B: Associate Unrelated Tables Topic C: Enforce Referential Integrity Lesson 3: Improving Table Usability Topic A: Create Lookups Within a Table Topic B: Work with Subdatasheets Lesson 4: Creating Advanced Queries Topic A: Create Query Joins Topic B: Create Subqueries Topic C: Summarize Data Lesson 5: Improving Form Presentation Topic A: Apply Conditional Formatting Topic B: Create Tab Pages with Subforms and Other Controls Lesson 6: Creating Advanced Reports Topic A: Apply Advanced Formatting to a Report Topic B: Add a Calculated Field to a Report Topic C: Control Pagination and Print Quality Topic D: Add a Chart to a Report