OVERVIEW Prerequisites—DIAD training or equivalent working experience This one-day course will cover Power BI report layouts and structure the agile process to creating Power BI data visualizations. It will help attendees to understand the art behind visualizations, the implications behind choosing the right charts, the impact of color, shape, and size, and finally the use of Power BI custom visuals. The course includes various design patterns of dashboards and reports, as well as best practices for authoring great reports and dashboards for business users. The course content is managed by the Power BI engineering team at Microsoft. There is no exam associated with the course. COURSE BENEFITS: Understand the need for storytelling with data Understand the agile process to creating Power BI data visualizations Understand the art behind visualizations Gain familiarity with Power BI report layouts and structure Understand implications behind choosing the right charts Gain familiarity with using Power BI custom visuals WHO IS THE COURSE FOR? Power BI report developers who wish to improve the aesthetic quality of their reports Power BI and other BI practitioners who would like to understand more about the theory of data visualization BI practitioners who wish to create reports that communicate the meaning behind the data more clearly Power BI users who would like to explore the types of chart and visual available that answer different types of business question COURSE OUTLINE Module 1 What Is Storytelling With Data? Volume, Velocity and Variety The importance of business questions What is a story in this context? Module 2 The Science Behind Data Visualization Basic problems to avoid Memory and visualization Ways to spark iconic, short-term and long-term memory Module 3 The Process Behind Data Visualization Using an agile approach to report development Data structure and data grain Converting the story to a data model Module 4 Dashboards And Reports Terminology and definitions Dashboard layout and structure Report layout and structure Storyboarding Drill-through, bookmarks, toggles and tooltips Module 5 Chart Selection Charts for comparison Time series Proportions Constructing effective tables, cards and slicers Scatterplots Module 6 Accessibility And Custom Visuals Report accessibility checklists Custom visuals Creating a custom R visual Charticulator Module 7 Publishing And Formatting Colour schemes Making a Power BI theme Use of fonts, icons and symbols Sizing dashboard and report tiles Sparklines, hyperlinks and images Module 8 Report Authoring - Best Practices Design thought process The audience Defining the platform environment The user experience Visualization Implementation and testing Optimization Module 9 Dashboard And Goals Design Tips and tricks Best practices for dashboard design Tracking business metrics with goals
Course Information This one day course is designed to provide you with comprehensive guidance and practical help for when designing and implementing audit programmes. Using the guidance of ISO 19011 with reference to PV, GCP, GMP and GLP audit programmes, you will explore audit programme design, operation, review and improvement. The course will work through why audits are important and understanding the drivers behind a good audit programme. It will discuss how to identify and assess the risks in your organisation, linking them with organisational goals, using these risks as a basis for the design of a risk-based audit programme during facilitated practical workshops. Delegates will have the opportunity to consider and discuss common issues and constraints that may shape their audit programmes. By the end of the course you will have: A clear understanding of the role of audit programmes in managing compliance and of the drivers and risks behind audit programmes An understanding of the roles and responsibilities of management and personnel An appreciation of resourcing implications and auditor attributes A good insight into the practicalities and activities required for design of risk based audit programmes A comparison of your circumstances, challenges, common issues and ways to approach managing audit programmes with other delegates on the course. Tutors Tutors will be comprised of (click the photos for biographies): Louise Handy Director, Handy Consulting Ltd Programme Please note timings may be subject to alteration. Day 1 08:50 Registration 09:00 Welcome and Introduction 09:15 Why do we Need to Audit? Exploring risk and regulation, responsibility and performance. 09:45 Discussion - Programmes, Needs, Commonalities Understanding the needs of delegates' own organisation and comparing common themes and threats. 10:00 Establishing an Audit Programme Design, objectives, risk and resources. This session discusses the consideration when designing audit programmes. 10:30 Break 10:45 Risk Management Considerations, guidance and methods for assessing and controlling risk. 11:00 Workshop 1 - Risks, Prioritisation and Control Looking at specific risks, assessing and evaluating to feed into audit programme management. 12:00 Workshop 1 - Feedback 12:30 Lunch 13:30 Putting it into Practice Resources, practicalities and challenges - the realities of auditing, including selection of auditors, ensuring practice will meet expectations and the reasons to note audit results. 13:45 Workshop 2- Designing Audit Programmes Designing audit programmes using output from risk assessment process. Challenges and flexibility. 15:00 Break 15:15 Workshop 2 - Feedback 15:30 Monitoring, Reviewing and Improving Why or when should existing processes change, understanding the implications of change or inaction and exploring how to improve the audit programme. 16:15 Panel Session This final session will address any outstanding issues raised by delegates. 16:30 Close of Course Extra Information Remote Course Course Material This course will be run completely online. You will receive an email with a link to our online system, which will house your licensed course materials and access to the remote event. Please note this course will run in UK timezone. The advantages of this include: Ability for delegates to keep material on a mobile device< Ability to review material at any time pre and post course Environmental benefits – less paper being used per course Access to an online course group to enhance networking You will need a stable internet connection, a microphone and a webcam. CPD Points 7 Points Development Level Develop
Cyber security training course description This cyber security course focusses on the network side of security. Technologies rather than specific products are studied focussing around the protection of networks using firewalls and VPNs. What will you learn Describe: - Basic security attacks - RADIUS - SSL - VPNs Deploy firewalls and secure networks Explain how the various technologies involved in an IP VPN work. Describe and implement: - L2TP - IPsec - SSL - MPLS, L3, VPNs. Cyber security training course details Who will benefit: Anyone working in the security field. Prerequisites: TCP/IP foundation for engineers Duration 5 days Cyber security training course contents Security review Denial of service, DDOS, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits IP spoofing, SYN attacks, hijacking, reflectors and amplification, keeping up to date with new threats. Hands on port scanning, use a 'hacking' tool. Client and Server security Windows, Linux, Log files, syslogd, accounts, data security. Hands on Server hardening. Firewall introduction What is a firewall? Firewall benefits, concepts. HAnds on launching various attacks on a target. Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls. Firewall products. Hands on Simple personal firewall configuration. Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on SPI firewalls. Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall plusses and minuses. Hands on Proxy firewalls. Firewall architectures Small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Password cracking. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, RADIUS. Hands on Using certificates. VPN overview What is a VPN? What is an IP VPN? VPNs vs. Private Data Networks, Internet VPNs, Intranet VPNs, Remote access VPNs, Site to site VPNs, VPN benefits and disadvantages. VPN Tunnelling VPN components, VPN tunnels, tunnel sources, tunnel end points, tunnelling topologies, tunnelling protocols, which tunnelling protocol? Requirements of tunnels. L2TP Overview, components, how it works, security, packet authentication, L2TP/IPsec, L2TP/PPP, L2 vs L3 tunnelling. Hands on Implementing a L2TP tunnel. IPsec AH, HMAC, ESP, transport and tunnel modes, Security Association, encryption and authentication algorithms, manual vs automated key exchange, NAT and other issues. Hands on Implementing an IPsec VPN. SSL VPNs Layer 4 VPNs, advantages, disadvantages. SSL. TLS. TLS negotiation, TLS authentication. TLS and certificates. Hands on Implementing a SSL VPN. MPLS VPNs Introduction to MPLS, why use MPLS, Headers, architecture, label switching, LDP, MPLS VPNs, L2 versus L3 VPNs. Point to point versus multipoint MPLS VPNs. MBGP and VRFs and their use in MPLS VPNs. Hands on Implementing a MPLS L3 VPN. Penetration testing Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology. Hands on Hacking tools and countermeasures.
Junos Operating System training course description This course provides students with the foundational knowledge required to work with the Junos OS and to configure Junos devices. The course provides a brief overview of the Junos device families and discusses the key architectural components of the software. The course then delves into foundational routing knowledge and configuration examples including general routing concepts, routing policy, and firewall filters. Delegates will gain experience in configuring and monitoring the Junos OS and monitoring basic device operations. This course is based on Junos OS Release 15.1X49. What will you learn Describe the design architecture of the Junos OS. Navigate within the Junos CLI and perform tasks within the CLI operational and configuration modes. Configure and monitor network interfaces. Navigate within the Junos J-Web interface. Identify where you might use firewall filters. Explain basic routing operations and concepts. Identify key factors in Juniper Networks' security. Junos Operating System training course details Who will benefit: This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. Prerequisites: TCP/IP foundation for engineers Duration 3 days Junos Operating System training course contents Junos Operating System Fundamentals The Junos OS Traffic Processing Overview of Junos Devices User Interface Options-The Junos CLI User Interface Options The Junos CLI: CLI Basics The Junos CLI: Operational Mode The Junos CLI: Configuration Mode User Interface Options-The J-Web Interface The J-Web GUI Configuration Lab 1: User Interface Options Initial Configuration Factory-Default Configuration Initial Configuration Interface Configuration Lab 2: Initial System Configuration Secondary System Configuration User Configuration and Authentication System Logging and Tracing Network Time Protocol Archiving Configurations SNMP Lab 3: Secondary System Configuration Operational Monitoring and Maintenance Monitoring Platform and Interface Operation Network Utilities Maintaining the Junos OS Password Recovery System Clean-Up Lab 4: Operational Monitoring and Maintenance Interface Configuration Examples Review of the Interface Configuration Hierarchy Interface Configuration Examples Using Configuration Groups Routing Fundamentals Routing Concepts: Overview of Routing Routing Concepts: The Routing Table Routing Concepts: Routing Instances Static Routing Dynamic Routing Lab 5: Routing Fundamentals Routing Policy Routing Policy Overview Case Study: Routing Policy Lab 6: Routing Policy Firewall Filters Firewall Filters Overview Case Study: Firewall Filters Unicast Reverse-Path-Forwarding Checks Lab 7: Firewall Filters Class of Service CoS Overview Traffic Classification Traffic Queueing Traffic Scheduling Case Study: CoS Lab 8: Class of Service JTAC Procedures Opening a Support Case Customer Support Tools Transferring Files to JTAC Juniper Security Concepts Security Challenges Juniper's Security Focus Appendix A: IPv6 Fundamentals IPv6 Addressing Protocols and Services Configuration
Graphic Design Using Canva Course Overview: This course introduces learners to the world of graphic design using Canva, a powerful yet accessible design tool. It covers the essentials of graphic design, starting from the basics of working with colour and progressing through intermediate and advanced design techniques. Learners will explore photo-editing tools, graphic layout principles, and how to create professional-quality designs for a variety of purposes. By the end of the course, learners will have developed the skills to create engaging and visually appealing graphics, preparing them for roles in the creative industry. Course Description: The course covers a range of topics that build a solid foundation in graphic design using Canva. Starting with working with Adobe colours online, learners will move on to mastering basic design principles within Canva, before advancing to more complex techniques such as photo editing and designing at a professional level. The course provides learners with the knowledge to create impactful designs for social media, marketing, and branding. Learners will gain valuable skills that are widely used in the design industry, allowing them to apply these techniques in real-world contexts. The course structure is designed to build upon each module, ensuring learners progress at a comfortable pace while enhancing their graphic design abilities. Graphic Design Using Canva Curriculum: Module 01: Working with Adobe Colours Online Module 02: Basic Graphics Design using Canva Module 03: Photo-Editing Basics Module 04: Intermediate to Pro Lessons on Canva Graphic Designs Module 05: Bonus (See full curriculum) Who is this course for? Individuals seeking to enter the graphic design field. Professionals aiming to enhance their creative design skills. Beginners with an interest in digital design and visual communication. Entrepreneurs looking to improve their brand visuals. Career Path Graphic Designer Digital Marketing Specialist Social Media Content Creator Branding Consultant Freelance Designer
Signalling training course description An intensive course that defines and explores the signalling methods that are to be found in today's telecommunications services. What will you learn Describe the Functionality and Features of Signalling. Describe the Functionality of Analogue & Digital Subscriber Signalling. Describe the various types of signalling used on different network types. Describe the Functionality of Private Network Signalling. Describe the Functionality of Public Network Signalling. Signalling training course details Who will benefit: Personnel involved with systems design, implementation and support. Prerequisites: Telecommunications Introduction Duration 2 days Signalling training course contents Introduction What is Signalling?, Standards, ITU-T Recommendations, Signalling Categories - Supervisory Addressing, E.164, Call Information, Network Management, Network Components, Inband/Outband Switch Signalling, Analogue Vs Digital Signalling. Analogue Subscriber Signalling Analogue Local Loops/Switches/Trunks, Digital Switches/Local Loops, Telephone Handset, Accessing the Local Exchange, Pulse/Tone Dialling. Digital Subscriber Signalling Integrated Digital Access, DASS2 & DPNSS, DASS2 - Call, IMUX, Euro ISDN, Q.931 Call Control, Message Identification, Message Types, Call Establishment Messages, Call Clearing. Network Types Service Types, Circuit Switched, Packet Switched, Signalling Terminology, In-Channel Signalling, G.704, Performance and Quality, Digital Signalling, CAS, CAS Applications, Foreign Exchange, CCS, Break-In/Out Private Network Signalling Types Networking PABXs, Inter PABX Analogue Signalling Methods, E & M, Tone-On-Idle, Inter PABX Digital Signalling Methods, DPNSS, DPNSS Deployment, PABX Support for DPNSS, DPNSS Call, Q.Sig, Q.Sig support/functionality/protocol, Message Overview, Call Establishment. Public Network Signalling SS7, SS7 Operations, SS7 Topology, SSP, STP, SCP, Database Types - CMSDB NP LIDB HLR VLR, Signalling Modes, Link Types, Further Redundancy, Linksets, SS7 addressing, Point Codes, Sub-System, Global Title Addressing and Translation, ANSI PCs, ITU-T PCs, SS7 Protocol Stack, MTP Level 1, MTP Level 2, Flow Control, FISU, LSSU, MSU, MSU SIF, MTP Level 3, SCCP, TCAP, TUP, Facility Format, Main Facilities, Flow Control Negotiation, Closed User Groups, Reverse Charging, Fast Select Facility, Throughput Class Negotiation, Call Barring, On-Line Facility Registration. BTUP, ISDN ISUP, Supplementary Services, ISUP Call - IAM, Progress/Answer/Suspend/ Resume/Release Messages, Intelligent Network (IN) Introduction, IN Evolution, IN Conceptual Model, IN Target Services & Service Features, Service Independent Building Blocks
Duration 5 Days 30 CPD hours This course is intended for Developed for IT Professionals with extensive networking and Citrix ADC experience. This course is built for IT Professionals who are responsible for defining the overall structure or architecture of a Citrix networking environment. This course encompasses advanced Citrix networking configurations and leading Citrix design principles. Overview How to identify and prioritize business drivers, constraints, and requirements using the Citrix Consulting methodologyAssess environment requirements and learn to apply leading design principles to address them in a multi-site Citrix ADC deploymentApply advanced authentication and load balancing principles In this expert training course students will be exposed to advanced networking and Citrix ADC concepts and configurations. Through lecture, lab exercises, and real-world case studies, students will learn to look critically at environment requirements, constraints, and business drivers to create a complex Citrix networking solution. Topics to be covered in this course include multi-site and multitenant deployments, advanced authentication and load balancing, and automation and orchestration and advanced troubleshooting. This training will also prepare students for the Citrix Certified Expert in Networking (CCE-N) exam.This course includes a voucher to take the related exam (1Y0-440: Citrix Networking Assessment, Design, and Advanced Configuration) and earn your Citrix Certified Expert ? Networking (CCE-N) certification. Networking Methodology and Assessment Understanding the Citrix methodology Business Drivers and Requirements User Segmentation Application Assessment Capabilities Assessment Citrix Networking Deployment Architecture and Topology Multi-Site Deployments Multi Tennant Infrastructure Cloud Deployments High Availability Citrix ADC Double-Hop Scenarios Secure Web Gateway Advanced Authentication and Authorization Authorization Policies Access Policies Advanced Authentication Options Multi-Factor Authentication nFactor Authentication AAA Session Management Citrix ADC Security Authorization Pre-authentication and Endpoint Analysis Scans Protection against Layer 4-7 Attacks Web App Firewall Citrix Gateway Configuration Considerations ICA Proxy Configuration VPN Access Clientless Access Split Tunneling RDP Proxy Deployment and Configuration Advanced Load Distribution and Link Load balancing Advanced Load Balancing Link Load Balancing Firewall Load Balancing Microsoft Exchange Load Balancing Advanced Global Server Load Balancing Global Server Load Balancing Persistence DNS, Policies, Expressions, Actions, and Views GSLB Monitoring and Considerations Application Delivery Management Automation and Orchestration Application Delivery Management Outbound Traffic Dashboard Automation Orchestration Configuration Jobs Configuration Audit NITRO API StyleBooks (Net-new) Additional course details: Nexus Humans CNS-420 Citrix Networking Assessment, Design, and Advanced Configuration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CNS-420 Citrix Networking Assessment, Design, and Advanced Configuration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Interior Design: Space Planning Course Overview: The "Interior Design: Space Planning" course is designed to provide learners with the foundational knowledge and skills needed to plan and design functional, aesthetically pleasing spaces. Covering essential topics such as space planning principles, building types, and design techniques, this course equips learners with the understanding of how to effectively organise and optimise spaces for a variety of environments. By exploring the differences between open and closed plan spaces, the course highlights the importance of planning to create efficient, versatile layouts. Upon completion, learners will have developed the necessary skills to apply space planning concepts to diverse interior design projects. Course Description: This course delves into the key principles of space planning, helping learners understand the importance of layout design and how it can influence the functionality of a space. Topics covered include the differences between open and closed plan spaces, the impact of well-planned versus poorly planned layouts, and the design principles that guide effective space utilisation. Learners will explore various types of building and space plans, as well as tips and tricks for improving space efficiency. By the end of the course, participants will gain a comprehensive understanding of space planning techniques that can be applied to residential, commercial, or public spaces, enhancing both form and function. Interior Design: Space Planning Curriculum: Module 01: Introduction To Chapters Module 02: Introduction To Space Planning Module 03: Efficient vs. Poorly Planned Spaces Module 04: Types of Building and Spaces Plans Module 05: Open Plan vs. Closed Plan Spaces Module 06: Space Planning and The Design Principles Module 07: Tips and Tricks to Space Planning Module 08: Conclusion (See full curriculum) Who is this course for? Individuals seeking to enhance their knowledge of interior design. Professionals aiming to develop space planning skills for design projects. Beginners with an interest in the field of interior design. Anyone looking to improve their understanding of spatial design and organisation. Career Path: Interior Designer Space Planner Residential Designer Commercial Space Planner Facility Manager Retail Space Designer
CCNP training course description The Implementing and Operating Cisco Enterprise Network Core Technologies (ENCOR) v1.2 course provides the knowledge and skills needed to configure, troubleshoot, and manage enterprise wired and wireless networks. You'll learn to implement security principles within an enterprise network and how to overlay network design using solutions such as SDAccess and SD-WAN. Course content includes 3 days of self-study material. This course helps you prepare for the 350-401 Implementing Cisco Enterprise Network Core Technologies (ENCOR) exam What will you learn Configure, troubleshoot, and manage enterprise wired and wireless networks Implement security principles within an enterprise network Prepare you prepare to take the 350-401 Implementing Cisco Enterprise Network Core Technologies (ENCOR) exam CCNP training course details Who will benefit: Mid-level network engineers, Network administrators, Network support technicians, Help desk technicians. Prerequisites: Implementation of Enterprise LAN networks. Basic understanding of Enterprise routing and wireless connectivity, and Python scripting Duration 5 days CCNP training course content Cisco Enterprise Network Architecture: Access, distribution, core in the hierarchical network. Cisco Switching Paths: Switching mechanisms, TCAM, CAM, process switching, fast switching, and CEF. Implementing Campus LAN Connectivity: Troubleshoot L2 connectivity using VLANs and trunkingBuilding Redundant Switched Topology: STP Implementing Layer 2 Port Aggregation Troubleshoot link aggregation using Etherchannel EIGRP Implement and optimize OSPFv2/v3, including adjacencies, packet types, and areas, summarization, and route filtering for IPv4/v6 Implement EBGP interdomain routing, path selection, and single and dual-homed networkingImplementing Network Redundancy: HSRP and VRRP Implement static and dynamic NAT Virtualization Protocols and TechniquesVPNs and Interfaces: Overlay technologies such as VRF, GRE, VPN, and LISP Wireless Principles: RF, antenna characteristics, and wireless standards.Wireless Deployment: Models available, autonomous AP deployments and cloud-based designs within the centralized Cisco WLC architecture Wireless Roaming and Location ServicesWireless AP Operation: How APs communicate with WLCs to obtain software, configurations, and centralized managementWireless Client Authentication: EAP, WebAuth, and PSK wireless client authentication on a WLC. Troubleshoot wireless client connectivity issues using various available tools Troubleshoot networks using services such as NTP, SNMP, Cisco IP SLAs, NetFlow, and Cisco IOS EEM Explain network analysis and troubleshooting tools, which include show and debug commands, as well as best practices in troubleshootingMulticast Protocols: IGMP v2/v3, PIM DM/SM and RPs Introducing QoS: Concepts and features. Implementing Network Services: Secure administrative access for Cisco IOS devices using CLI access, RBAC, ACL, and SSH, and device hardening concepts to secure devices from less secure applications Using Network Analysis ToolsInfrastructure Security: Scalable administration using AAA and the local database, features and benefits Enterprise Network Security Architecture: VPNs, content security, logging, endpoint security, personal firewalls, and other security features. Automation and Assurance with Cisco DNA Center: Purpose, function, features, and workflow. Intent-Based Networking, for network visibility, proactive monitoring, and application experienceCisco SD-Access Solution: Nodes, fabric control plane, and data plane, VXLAN gatewaysCisco SD-WAN Solution: Components and features of Cisco SD-WAN solutions, including the orchestration, management, control, and data planesBasics of Python Programming: Python components and conditionals with script writing and analysis Network Programmability: NETCONF and RESTCONF APIs in Cisco DNA Center and vManage Labs: Investigate the CAM. Analyze CEF. Troubleshoot VLAN and Trunk Issues. Tuning STP and Configuring RSTP. Configure MSTP. Troubleshoot EtherChannel. Implement Multi-area OSPF. Implement OSPF Tuning. Apply OSPF Optimization. Implement OSPFv3. Configure and Verify Single-Homed EBGP. Implementing HSRP. Configure VRRP. Implement NAT. Configure and Verify VRF. Configure and Verify a GRE Tunnel. Configure Static VTI Point-to-Point Tunnels. Configure Wireless Client Authentication in a Centralized Deployment. Troubleshoot Wireless Client Connectivity Issues. Configure Syslog. Configure and Verify Flexible NetFlow. Configuring Cisco IOS EEM. Troubleshoot Connectivity and Analyze Traffic with Ping, Traceroute, and Debug. Configure and Verify Cisco IP SLAs. Configure Standard and Extended ACLs. Configure Control Plane Policing. Implement Local and Server-Based AAA. Writing and Troubleshooting Python Scripts. Explore JSON Objects and Scripts in Python. Use NETCONF Via SSH. Use RESTCONF with Cisco IOS XE.
About this Training Course The 3-day hands-on petroleum economics training course provides a comprehensive overview of the practices of exploration and development petroleum economics and its application in valuing oil and gas assets to aid corporate decisions. Participants will gain a thorough understanding of the principles of economic analysis as well as practical instruction in analytical techniques used in the industry. The participants will learn how to construct economic models, to include basic fiscal terms, production and cost profiles and project timing. The resulting model will provide insights of how the various inputs affect value. Example exercises will be used throughout the course. Training Objectives Upon completion of this course, participants will be able to: Understand and construct petroleum industry cash flow projections Calculate, understand and know how to apply economic indicators Learn and apply risk analysis to exploration and production investments Evaluate and model fiscal/PSC terms of countries worldwide Target Audience The following oil & gas company personnel will benefit from the knowledge shared in this course: Geologists Explorationists Reservoir Engineers Project Accountants Contract Negotiators Financial Analysts New Venture Planners Economists Course Level Basic or Foundation Intermediate Trainer Your expert trainer has over 40 years' experience as a petroleum economist in the upstream oil and gas industry. He has presented over 230 oil and gas industry short courses worldwide on petroleum economics, risk, production sharing contracts (PSC) and fiscal analysis. In over 120 international oil industry consulting assignments, he has advised companies and governments in the Asia Pacific region on petroleum PSC and fiscal terms. He has prepared many independent valuations of petroleum properties and companies for acquisition and sale, as well as economics research reports on the oil and gas industry and including commercial support for oil field operations and investments worldwide. He has been involved in projects on petroleum royalties, design of petroleum fiscal terms, divestment of petroleum assets, and economic evaluation of assets and discoveries since the early 1990s to date. He has been working on training, consultancy, research and also advisory works in many countries including USA, UK, Denmark, Switzerland, Australia, New Zealand, Indonesia, India, Iran, Malaysia, Thailand, Vietnam, Brunei, Egypt, Libya, and South Africa. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations