Duration 2 Days 12 CPD hours Overview Lead the transformation to Business Agility with SAFe Become a Lean-Agile Leader Understand customer needs with Design Thinking Enable Agile Product Delivery Implement Lean Portfolio Management During this two-day course, attendees gain the knowledge necessary to lead a Lean-Agile enterprise by leveraging the Scaled Agile Framework© (SAFe©) and its underlying principles derived from Lean, systems thinking, Agile development, product development flow, and DevOps.Participants in the class gain insights into mastering Business Agility in order to thrive in the competitive market. They discuss how to establish team and technical agility and organize and re-organize around the flow of value. They also learn and practice the skills for supporting and executing PI Planning events and coordinating multiple Agile Release Trains (ARTs). Participants in the class explore the importance of adopting a customer-centric mindset and design thinking approach to agile product delivery. Learners also develop an understanding for implementing a Lean Portfolio Management function in their enterprise. During this two-day course, attendees gain the knowledge necessary to lead a Lean-Agile enterprise by leveraging the Scaled Agile Framework (SAFe) and its underlying principles derived from Lean, systems thinking, Agile development, product development flow, and DevOps. Participants in the class gain insights into mastering Business Agility in order to thrive in the competitive market. They discuss how to establish team and technical agility and organize and re-organize around the flow of value. They also learn and practice the skills for supporting and executing PI Planning events and coordinating multiple Agile Release Trains (ARTs). Participants in the class explore the importance of adopting a customer-centric mindset and design thinking approach to agile product delivery. Learners also develop an understanding for implementing a Lean Portfolio Management function in their enterprise.
About this Training Course This 5 full-day course has been designed to develop skills in understanding the geometry and petrophysical characteristics of carbonate reservoirs. Depositional fabric, grain type and size and subsequent diagenetic modifications are the major controls on carbonate reservoir behaviour. The complex inter-relationship of the depositional and burial history can be unravelled to allow prediction of reservoir facies and reconstruction of three-dimensional reservoir models. This course will demonstrate the value of the reservoir model in volumetric assessment and development of carbonate reservoirs. *Previous knowledge of carbonate sedimentology is not required. Course Content in Summary: Carbonate reservoirs: Basic principles; depositional concepts; grain types; textures and fabrics; environmental reconstruction. The reservoir model - depositional and diagenetic characteristics: Sabkha/tidal flat; lagoon; shelf; reef (rudist and coral/algal); barrier/shoal; slope and redeposited; aeolian and lacustrine; karst plays. Carbonate diagenesis: Primary and secondary porosity; compaction; pressure solution; cementation; dolomitisation; porosity generation and destruction; fractures. Carbonate sequence stratigraphy Log response in carbonate rocks: Gamma; sonic; neutron; density; FMS. Reservoir assessment: Fracture reservoirs; reservoir modelling; volumetric assessment in correlation and mapping; effects of capillary pressure; interface with engineering. Training Objectives By attending this course, participants will be able to: Understand carbonate depositional systems and controls. Recognise and model controls on reservoir quality and pore systems, including diagenesis and fracturing. Understand and apply carbonate seismic stratigraphy and sequence stratigraphy. Interpret log responses. Target Audience This course is intended for petroleum geologists, explorationists, petrophysicists, geophysicists and engineers involved with exploration of carbonate plays and development of carbonate reservoirs. Trainer Your expert course leader is a Director and Senior Consultant Geologist who has worked on various carbonate consultancy projects, conducted detailed sedimentological, sequence stratigraphic and diagenetic technical studies and delivered training programmes. He was formerly Managing Director of Robertson UK Limited and was responsible for the integration between different disciplines, recognition, and encouragement of technical innovation and research and development programmes across all oil and gas divisions in the company. He was also responsible for all aspects of the performance of the main Geological, Geophysical and Reservoir Engineering Services in the company. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
About this Virtual Instructor Led Training (VILT) A decision to drill an exploration well with the objective to find a new oil or gas field must be based on sound assessment of the prospect risk and of the volumes. What is the chance that a well will find hydrocarbons, and how much could it be? Risk and volume assessments form the basis for decisions to drill a well or not, and as such form the link between subsurface evaluation and the business aspects of the petroleum industry. This Virtual Instructor Led Training (VILT) course explains how risks and volumes can be assessed in a realistic manner, based on a sound understanding of the geological details of the prospect as well as its regional geological setting and current play understanding. Participants of this VILT course will receive a softcopy of Risk and Volume Assessment Handbook which explains the concepts that are associated with probabilistic Risk & Volume (R & V) Assessment and contains many practical recommendations on how to translate geological understanding into meaningful inputs for probabilistic R &V assessments. The book is fully compatible with any probabilistic R & V tool in the industry. Training Objectives By the end of this VILT course, participants will be able to understand: The fundamentals of risk and volumes assessment; translating geological understanding into reasonable numbers and ranges. The difference between risk and uncertainty. Fundamentals of statistics; including explanation of distribution curves, understanding of expectation curves, do's and don'ts for adding risked volumes, and Bayes theorem. Uncertainty of trap, reservoir, seal and charge, illustrated by examples. Guidelines and exercises for estimating risks realistically and consistently. Calculating volume ranges for prospects and for portfolios of prospects; how to add prospect volumes for a correct representation of prospect portfolios. Incorporation of geophysical evidence (DHIs) in a realistic risk assessment. Target Audience This VILT course has been designed in the first place for geoscientists working in exploration, for prospect portfolio analysts and for their direct supervisors. It will also benefit staff from disciplines working closely with exploration staff, such as reservoir engineers, petrophysicists and geophysicists. Course Level Intermediate Training Methods Learning, methods and tools The VILT course will be delivered online in 5 half-day sessions comprising 4 hours per day, with 2 breaks of 10 minutes per day. It is the intention to have at least 2 smaller exercises per day. Time will be reserved for recapitulation, questions and discussions. VILT will be conducted either via Zoom or Microsoft Teams. Presenting materials can easily be done on this platform. When participants need to ask a question, they can raise their hand, write notes or interrupt the Instructor by using their microphone. The presenter can switch to a screen where he/she can see all participants (also when each participant is sitting in another location e.g. at home). There is also a whiteboard functionality that can be used as one would use a flip chart. Exercises will be done on an online platform which provides each participant with a private work area that can be accessed by the Instructor to discuss the exercise in a similar manner as in a classroom course. Each topic is introduced by a lecture, and learning is re-enforced by practical exercises and discussions. Handout material in electronic format will be provided. Trainer Dr. Jan de Jager has a PhD in Geology from the University of Utrecht. He joined Shell in 1979 as an exploration geologist, and worked in several locations around the world such as Netherlands, Gabon, USA, Australia, Argentina, and Malaysia in technical and management positions. During the last 10 years of his career, he was responsible for the quality assurance of Shell's exploration prospects in many parts of the world and for upgrading and replenishing Shell's global exploration portfolio. During this period, he had also developed extensive expertise in Prospect Risk and Volume assessments for which he ran successful internal training programmes. Following his retirement from Shell in 2010, Dr Jan de Jager took on a position as part-time professor at the University of Amsterdam and also serves as a consultant exploration advisor for various E&P companies. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations
Have you always been intrigued by dreamcatchers and want to learn the art of weaving your own, or do you know someone who loves them and want to gift them one? This ancient art is has gone through a lot of morphism and yet the old techniques are still here as always. Learn to weave a traditional dreamcatcher.
This course is designed to enable candidates to develop the knowledge of the terminology and basic concepts of TOGAF Standard, 10th Edition and principles of Enterprise Architecture. Candidates will also be able to analyze and apply knowledge of TOGAF Standard.
Duration 2 Days 12 CPD hours This course is intended for The intended audience for this comprehensive course on Information Assurance and STIGs includes professionals with roles such as: IT professionals - System administrators, network engineers, and security analysts who are responsible for maintaining and securing IT infrastructure and web applications. Developers - Software engineers and web developers who design, implement, and maintain web applications, and need to integrate security best practices throughout the development process. Project teams - Cross-functional teams that collaborate on application development projects, including members from development, testing, and deployment teams. Technical leads - Senior software engineers or architects who oversee technical aspects of projects and ensure the implementation of secure design and coding practices. Project managers - Professionals responsible for planning, executing, and closing projects, ensuring that security requirements are met throughout the project lifecycle. Overview Working in an interactive learning environment, guided by our application security expert, you'll explore: The concepts and terminology behind defensive coding Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets The entire spectrum of threats and attacks that take place against software applications in today's world The role that static code reviews and dynamic application testing to uncover vulnerabilities in applications The vulnerabilities of programming languages as well as how to harden installations The basics of Cryptography and Encryption and where they fit in the overall security picture The requirements and best practices for program management as specified in the STIGS The processes and measures associated with the Secure Software Development (SSD) The basics of security testing and planning Understand the concepts and terminology behind defensive coding Understand Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets Learn the entire spectrum of threats and attacks that take place against software applications in today's world Discuss the role that static code reviews and dynamic application testing to uncover vulnerabilities in applications Understand the vulnerabilities of programming language as well as how to harden installations Understand the basics of Cryptography and Encryption and where they fit in the overall security picture Understand the fundamentals of XML Digital Signature and XML Encryption as well as how they are used within the web services arena Understand the requirements and best practices for program management as specified in the STIGS Understand the processes and measures associated with the Secure Software Development (SSD) Understand the basics of security testing and planning The Information Assurance (STIG) Overview is a comprehensive two-day course that delves into the realm of Information Assurance, empowering you to enhance your cybersecurity skills, understand the essentials of STIGs, and discover cutting-edge web application security practices. This immersive experience is tailored for IT professionals, developers, project teams, technical leads, project managers, testing/QA personnel, and other key stakeholders who seek to expand their knowledge and expertise in the evolving cybersecurity landscape. The course focuses on the intricacies of best practices for design, implementation, and deployment, inspired by the diverse and powerful STIGs, ultimately helping participants become more proficient in application security.The first half of the course covers the foundations of DISA's Security Technical Implementation Guides (STIGs) and learn the ethical approach to bug hunting, while exploring the language of cybersecurity and dissecting real-life case studies. Our expert instrtors will guide you through the importance of respecting privacy, working with bug bounty programs, and avoiding common mistakes in the field.The next half delves into the core principles of information security and application protection, as you learn how to identify and mitigate authentication failures, SQL injections, and cryptographic vulnerabilities. You?ll gain experience with STIG walkthroughs and discover the crucial steps for securing web applications.Throughout the course, you'll also explore the fundamentals of application security and development, including checklists, common practices, and secure development lifecycle (SDL) processes. You?ll learn from recent incidents and acquire actionable strategies to strengthen your project teams and IT organizations. You'll also have the opportunity to explore asset analysis and design review methodologies to ensure your organization is prepared to face future cybersecurity challenges. DISA's Security Technical Implementation Guides (STIGs) The motivations behind STIGs Requirements that the various software development roles must meet Implementing STIG requirements and guidelines Why Hunt Bugs? The Language of CyberSecurity The Changing Cybersecurity Landscape AppSec Dissection of SolarWinds The Human Perimeter Interpreting the 2021 Verizon Data Breach Investigation Report First Axiom in Web Application Security Analysis First Axiom in Addressing ALL Security Concerns Lab: Case Study in Failure Safe and Appropriate Bug Hunting/Hacking Working Ethically Respecting Privacy Bug/Defect Notification Bug Bounty Programs Bug Hunting Mistakes to Avoid Principles of Information Security Secuity Is a Lifecycle Issue Minimize Attack Surface Area Layers of Defense: Tenacious D Compartmentalize Consider All Application States Do NOT Trust the Untrusted Identification and Authentication Failures Applicable STIGs Quality and Protection of Authentication Data Proper hashing of passwords Handling Passwords on Server Side Session Management HttpOnly and Security Headers Lab: STIG Walk-Throughs Injection Applicable STIGs Injection Flaws SQL Injection Attacks Evolve Drill Down on Stored Procedures Other Forms of Server-Side Injection Minimizing Injection Flaws Client-side Injection: XSS Persistent, Reflective, and DOM-Based XSS Best Practices for Untrusted Data Lab: STIG Walk-Throughs Applications: What Next? Common Vulnerabilities and Exposures CWE/SANS Top 25 Most Dangerous SW Errors Strength Training: Project Teams/Developers Strength Training: IT Organizations Cryptographic Failures Applicable STIGs Identifying Protection Needs Evolving Privacy Considerations Options for Protecting Data Transport/Message Level Security Weak Cryptographic Processing Keys and Key Management Threats of Quantum Computing Steal Now, Crack Later Threat Lab: STIG Walk-Throughs Application Security and Development Checklists Checklist Overview, Conventions, and Best Practices Leveraging Common AppSec Practices and Control Actionable Application Security Additional Tools for the Toolbox Strength Training: Project Teams/Developers Strength Training: IT Organizations Lab: Recent Incidents SDL Overview Attack Phases: Offensive Actions and Defensive Controls Secure Software Development Processes Shifting Left Actionable Items Moving Forward Lab: Design Study Review Asset Analysis Asset Analysis Process Types of Application-Related Assets Adding Risk Escalators Discovery and Recon Design Review Asset Inventory and Design Assets, Dataflows, and Trust Boundaries Risk Escalators in Designs Risk Mitigation Options
Duration 3 Days 18 CPD hours This course is intended for This course is designed for technical professionals who need to know how to deploy a Cisco NCS 2000 Series Dense Wavelength-Division Multiplexing (DWDM) network with Flex Spectrum. The primary audience for this course includes: Designers Systems engineers and implementation staff Network operations center personnel Technical support personnel who are involved with the deployment, operations, and maintenance of the Cisco NCS 2000 Series Channel partners and resellers Overview After taking this course, you should be able to: Describe the hardware and components required and used with the Flex Spectrum feature Design optical networks in the Cisco Transport Planner software Install the hardware, including multishelf nodes Perform node turn-up and create circuits using the Cisco Transport Controller software Configure optical networks with multidegree ROADM multishelf nodes Configure optical networks with colorless, contentionless, omnidirectional, and MPO cross-connect advanced features Describe and configure the NCS 2000 400-Gbps Xponder line card Add a node to an existing DWDM ring Describe the NCS 2000 Troubleshooting Guide Use the features and documentation with Transport Controller to perform maintenance, testing, and basic troubleshooting The Cisco NCS2000 Deploying 96-Channel Flex Spectrum (OPT201) v3.0 course shows you how to plan, configure, and control optical networks using the Cisco© Network Convergence System (NCS) 2000 series Flex Spectrum platform.The course teaches you how to design Flex Spectrum networks with multi-degree Reconfigurable Optical Add-Drop Multiplexer (ROADM) multi-shelf nodes using the Cisco Transport Planner (CTP) software. Course Outline DWDM and Flex Spectrum Foundation NCS 2000 Chassis and Cards Design ROADM Networks with CTP Hardware Installation and Multishelf Node Turn-Up and Circuit Creation Advanced Feature Networks and Circuits Testing, Maintenance, and Basic Troubleshooting Spectrum Switched Optical Network
ITIL® 4 Strategist: Direct, Plan and Improve: In-House Training The ITIL® 4 Strategist: Direct, Plan, and Improve course is based on the ITIL® 4 Strategist Direct, Plan, and Improve candidate syllabus from AXELOS. This course is based on the ITIL® 4 Strategist: Direct, Plan and Improve IT exam specifications from AXELOS. With the help of ITIL® 4 concepts and terminology, exercises, and examples included in the course, candidates acquire the relevant knowledge required to pass the certification exam. This course provides the practical skills necessary to create a 'learning and improving' IT organization, with a strong and effective strategic direction. It was designed to provide practitioners with a practical and strategic method for planning and delivering continual improvement with necessary agility. It covers both practical and strategic elements, making it the universal module that is a key component to both ITIL® 4 Managing Professional and ITIL® 4 Strategic Leader streams. What You Will Learn At the end of this course, participants will be able to: Understand the key concepts of direction, planning, improvement Understand the scope of what is to be directed and/or planned and know how to use key principles and methods of direction and planning in that context Understand the role of GRC and know how to integrate the principles and methods into the service value system Understand and know how to use the key principles and methods of continual improvement for all types of improvements Understand and know how to use the key principles and methods of Communication and Organizational Change Management to direction, planning and improvement Understand and know how to use the key principles and methods of measurement and reporting in direction, planning, and improvement Understand and know how to direct, plan, and improve value streams and practices Course Introduction Let's Get to Know Each Other Course Overview ITIL® 4 Certification Scheme Course Learning Objectives Course Components Course Agenda Exercises Case Study: Axle Car Hire Case Study: HandyPerson on Demand Exam Details Core Concepts of DPI Key Terms Covered in the Module Module Learning Objectives Basics of Direction Basics of Planning Basics of Improvement Other Core Elements DPI through Service Value Chain and Guiding Principles Key Terms Covered in the Module Module Learning Objectives DPI of the SVS DPI of Guiding Principles Role of Direction in Strategy Management Key Terms Covered in the Module Introducing Strategy Management Developing Effective Strategies Implementation of Strategies Key Terms Covered in the Module Module Learning Objectives Managing Risks Making Decisions through Portfolio Management Directing via Governance, Risk, and Compliance (GRC) Introduction to Assessment and Planning Key Terms Covered in the Module Module Learning Objectives Core Concepts of Assessment Conducting Effective Assessments Core Concepts of Planning Assessment and Planning through VSM Key Terms Covered in the Module Module Learning Objectives Introducing VSM Developing Value Stream Maps Knowing More About VSM Measurement, Reporting, and Continual Improvement Key Terms Covered in the Module Module Learning Objectives Measurement and Reporting Alignment of Measurements and Metrics Success Factors and Key Performance Indicators Continual Improvement Measurements and Continual Improvement through Dimensions and SVS Key Terms Covered in the Module Module Learning Objectives Measurements for the Four Dimensions Continual Improvement of the Service Value Chain and Practices OCM Principles and Methods Key Terms Covered in the Module Module Learning Objectives Basics of OCM OCM throughout DPI and Service Value Chain Resistance and Reinforcement Communication Principles and Methods Key Terms Covered in the Module Module Learning Objectives Basics of Effective Communication Communication with Stakeholders SVS Development Using Four Dimensions Key Terms Covered in the Module Module Learning Objectives Organizations and People in the SVS Partners and Suppliers in the SVS Value Streams and Processes in the SVS Information and Technology in the SVS
Build- to- rent involves the construction of purpose- built residential buildings with the intention of renting out the units for the long term, rather than selling the individually. On this webinar, we will introduce the concept of Build-to-rent (BtR) and explore the key features, including design considerations, financial models and management strategies. We will also discuss the benefits of BTR investors, tenants, and communities as well as potential challenges and risk associated with this type of investment.
Unlock Your Potential as a Team Leader or Supervisor with Our Level 3 Course This qualification is for Supervisors, Team leaders, Project officers, Shift supervisor, Foreperson, and Shift manager. A Team leader or supervisor is a first line management role, with operational and project responsibilities or responsibility for managing a team to deliver a clearly defined outcome. They provide direction, instructions, and guidance to ensure the achievement of set goals. Working in the private, public or third sector and in all sizes of organisation, specific responsibilities will vary, but the knowledge, skills and behaviours needed will be the same whatever the role. Learn about the Cavity Training Team Leader or Supervisor Course This qualification allows candidates to learn, develop and practice the skills required for employment and a career in Management. The content covers all essential areas of team leader and supervisor skills. Key responsibilities are likely to include supporting, managing, and developing team members, managing projects, planning, and monitoring workloads and resources, delivering operational plans, resolving problems, and building relationships internally and externally. Fees This course can be completed as an government funded apprenticeship, through Cavity Training, or as a privately funded course for £2500. You can either pay as a lump sum or alternatively, you can split into 12 instalments. Entry requirements Whilst any entry requirements will be a matter for individual employers, a minimum of English & Maths GCSE are required. Structure Our candidates are trained to the highest standards and are fully supported to develop all of the knowledge, skills and behaviours required to be an outstanding Team Leader. The course duration is typically 12 – 18 months. Knowledge Our course is delivered via live training webinars with specialist tutors. Skills and Behaviours You will be appointed a designated Skills Coach, who will coach you through your qualification and complete regular assessments with you to support you to complete your qualification. You will have weekly contact from our training team. How we compare with our competitors? Don't just take our word for it, here is what our staff think Bridget I did my course years ago. It was classroom based one night per week. I think I would prefer to be more ‘hands on’ like it is now. Cavity really are a great company to work for. I truly believe that there expertise will ensure the next generation are amazing! Gina I did mine over an apprenticeship but the company my employer used wasn’t great and I didn’t get much support. Although I passed I can only imagine the length that Cavity have gone to to ensure that the students feel supported. As an employee, its super! Enquire Today