• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1052 Engineer courses in Lydney delivered Live Online

Certified Wireless Security Professional

5.0(3)

By Systems & Network Training

CWSP training course description A hands-on training course concentrating solely on WiFi security with an emphasis on the delegates learning the necessary knowledge and skills to pass the CWSP exam. The course progresses from simple authentication, encryption and key management onto in depth coverage of 802.X and EAP along with many other security solutions such as access control, intrusion prevention and secure roaming. What will you learn Demonstrate the threats to WiFi networks. Secure WiFi networks. Configure: WPA2 RADIUS 802.1x EAP Pass the CWSP exam. CWSP training course details Who will benefit: Technical network staff. Technical security staff. Prerequisites: Certified Wireless Network Associate. Duration 5 days CWSP training course contents WLAN Security overview Standards, security basics, AAA, 802.11 security history. Hands on WLAN connectivity. Legacy 802.11 security Authentication: Open system, shared key. WEP. VPNs. MAC filters. SSID segmentation, SSID cloaking. Hands on Analysing 802.11 frame exchanges, viewing hidden SSIDs. Encryption Basics, AES, TKIP, CCMP, WPA, WPA2. Hands on Decrypting 802.11 data frames. 802.11 layer 2 authentication 802.1X: Supplicant, Authenticator, Authentication server. Credentials. Legacy authentication. EAP, Weak EAP protocols, Strong EAP protocols: EAP -PEAP, EAP-TTLS, EAP-TLS, EAP-FAST. Hands on Analysing 802.1X/EAP frames. 802.11 layer 2 dynamic key generation Robust Security Network. Hands on Authentication and key management. SOHO 802.11 security WPA/WPA2 personal, Preshared Keys, WiFi Protected Setup (WPS). Hands on PSK mapping. WLAN security infrastructure DS, Autonomous APs, WLAN controllers, split MAC, mesh, bridging, location based access control. Resilience. Wireless network management system. RADIUS/LDAP servers, PKI, RBAC. Hands on 802.1X/EAP configuration. RADIUS configuration. 802.11 Fast secure roaming History, RSNA, OKC, Fast BSS transition, 802.11k. Hands on Roaming. Wireless security risks Rogue devices, rogue prevention. Eavesdropping, DOS attacks. Public access and hotspots. Hands on Backtrack. WiFi security auditing Layer 1 audit, layer 2 audit, pen testing. WLAN security auditing tools. WiFi security monitoring Wireless Intrusion Detection and Prevention Systems. Device classification, WIDS/WIPS analysis. Monitoring. 802.11w. Hands on Laptop spectrum analysers. VPNs, remote access, guest access Role of VPNs in 802.11, remote access, hotspots, captive portal. Wireless security policies General policy, functional policy, recommendations.

Certified Wireless Security Professional
Delivered in Internationally or OnlineFlexible Dates
£3,697

Securing Linux systems

5.0(3)

By Systems & Network Training

Securing Linux systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure Linux accounts. Secure Linux file systems. Secure Linux access through the network. Securing Linux systems training course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing Linux systems training course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing Linux systems
Delivered in Internationally or OnlineFlexible Dates
£3,697

Complete Perl programming

5.0(3)

By Systems & Network Training

Perl training course description A hands on introduction to programming in Perl. What will you learn Write Perl programs. Use Perl modules. Debug Perl programs. Examine existing code and determine its function. Perl training course details Who will benefit: Anyone wishing to learn Perl. Prerequisites: None although experience in another high level language would be useful. Duration 5 days Perl training course contents Introduction to Perl What is Perl? When to use Perl, downloading Perl, installing Perl, documentation, perldoc, running Perl, the Perl environment. Perl under UNIX, Perl under Windows. "Hello world". Variables Scalars, data types, $_, strings and numbers, assignment, constants, strict, scope, STDIN. Operators Number operators, string operators, precedence and associativity, converting numbers and strings, shortcut operators. Flow control Blocks, if, else, elseif, unless, foreach, while, for do, until. Regular expressions What are regular expressions? Pattern matching, Perl as a filter, file editing. Strings Comparing strings, concatenating, substrings, chomp, chop, formatting, string manipulation. Subroutines Comparing strings, concatenating, substrings, chomp, chop, formatting, string manipulation. Arrays and hashes Working with arrays, element access, push(), pop(), shift(), unshift(), <STDIN> as an array, associative arrays, hashes of arrays, hash references, arrays of hashes, hashes of hashes. Files Simple file handling, open, close, <FILEHANDLE>, <>, file tests, directory access, directory handles, database access, packing and packing binary data. I/O STDIN, STDOUT and STDERR, Command line arguments,@ARGV. Perl debugging The built in debugger, running the debugger, debugger commands, graphical debuggers. Script syntax errors, single stepping, breakpoints, watches. Packages and modules CPAN, Finding modules, installing modules, using modules, scope. Report formatting Formats, defining a format, invoking a format, field holders. Process management System interaction, system(), exec(), signals. Security issues.

Complete Perl programming
Delivered in Internationally or OnlineFlexible Dates
£3,697

Change Management Foundation

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for CxO?s IT Managers/ Directors Senior Project Officers Project & Program Coordinator/Managers Operations Managers Quality Managers Business Analysts Engineering Managers IT Infrastructure Managers Internal Consultants Professional Consultants Overview Change and the individual Change and the organization Communication and stakeholder engagement Change practice Dealing with change and more importantly, the impact of change is a high priority for all organisations. The Change Management Certification has been developed by APMG in partnership with the Change Management Institute (CMI), an independent, global professional association of change managers. Together they have developed a professional ?body of knowledge? for the discipline of change management. This body of knowledge now provides an independent benchmark for the professional knowledge expected of an effective change manager. APMG?s refreshed Change Management certification is fully aligned with the change management body of knowledge. Prerequisites There is no prerequisite to attending this foundation course, although it is recommended that candidates should have a good understanding of business practices. 1 - Change and the Organization Drivers for change Developing a vision Culture and climate Emergent change and lifecycle Organizational metaphors Models of change Roles required for change 2 - Stakeholders Principles Identification Analysis Influencing and listening Emotion and demonstration Communications Cognitive biases Remaining people focused Improving Communications Communications channels Collaboration Communications Planning Larger workshops 2 - Change Impact Assessing impact McKinsey 7 S Stakeholder impact assessment Assessing change readiness Large change ? how to staff Building a change team Preparing for resistance Building team effectiveness 4 - Individual Change Learning theory Motivation Change Curve Personality differences

Change Management Foundation
Delivered OnlineFlexible Dates
£2,000

About this Training Growing global competitiveness in the refining products' market requires an in-depth knowledge of fuel technology processes, global quality standards and quality monitoring procedures. As the global market turns to cleaner fuels with more stringent specifications, the market in which refiners operate in, is getting more sophisticated and challenging. Training Objectives Upon completion of this course, participants will be able to: Get a clear overview of processing background and how white products are produced and blended Understand the blending impact on product quality and how to deal with quality giveaways, stability of blends and specification margins Get a clear overview of fuel blending operations, blending principles, specifics and operations Understand the role of additives and how additives are selected and used to meet the specification for different products and different markets Realize the importance of specifications, their limitations and how to ensure that the product is fit for purpose Be able to correctly interpret the laboratory results Target Audience The course is intended for individuals who are interested in the field of refining blending. The following personnel will benefit from the knowledge shared in this course: Plant operative planning and scheduling specialists Oil products trading and blending personnel Laboratory supervisors and technical personnel Sales, marketing and product trading personnel Refinery market and research analysts Process and chemical Engineers Personnel from the oil, fuel, biofuel, additive and auto industries Regulatory and policy-makers personnel Course Level Basic or Foundation Trainer Your expert course leader is an experienced manager with more than 25 years of operational experience in the downstream Oil & Gas industry. She is a recognised expert in conventional, biofuels and alternative fuels with extensive experience in the crude selection process and formulation of finished products including product portfolio strategy, product quality road mapping and benchmarking. She is a long-time laboratory manager with comprehensive experience in laboratory processes, including financing, benchmarking, efficiency improvement and total quality management processes. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Refining Blending
Delivered in Internationally or OnlineFlexible Dates
£2,321 to £2,699

Biofuels and Alternative Fuel Sources

By EnergyEdge - Training for a Sustainable Energy Future

About this Training The expanding human population and industrialisation are increasing the demand for energy worldwide. This has resulted in numerous challenges such as environmental pollution, reliable supply of fossil fuels, and increased demand of electricity supply, which must be overcome. To fulfil the energy demands and overcome these challenges, numerous projects and funds are involved in finding an adequate solution. Transport accounts for around one-fifth of global carbon dioxide (CO2) emissions and road travel accounts for three-quarters of transport emissions. Most of this comes from passenger vehicles. Emission limits are increasingly stringent, and the fuel industry must change its approach to product formulation to meet the challenge. Training Objectives Upon completion of this course, participants will be able to: Get a clear overview of the different types of bio and alternative fuels Understand how different bio and alternative fuels are produced Have an overview of feedstock utilised for biofuels production Realize how the biofuels production could be integrated in modern refinery Understand how bio and alternative fuels function as single and blended fuels Understand what impact bio and alternative fuels have on car engine Get an overview of the environmental impact of bio and alternative fuels Get the overview of regulation related to bio and alternative fuel Target Audience The course is intended for individuals who are interested in or developing in the field of bio and alternative fuels. The following personnel will benefit from the knowledge shared in this course: Refinery Technical Personnel Trading and blending personnel Sales, marketing, and product trading personnel Laboratory supervisors and technical personnel Policymakers Professionals who are interested in or developing in the field of bio and alternative fuels Process, project, and consultant engineers involved in bioenergy, petrochemical and chemical industries Course Level Basic or Foundation Trainer Your expert course leader is an experienced manager with more than 25 years of operational experience in the downstream Oil & Gas industry. She is a recognised expert in conventional, biofuels and alternative fuels with extensive experience in the crude selection process and formulation of finished products including product portfolio strategy, product quality road mapping and benchmarking. She is a long-time laboratory manager with comprehensive experience in laboratory processes, including financing, benchmarking, efficiency improvement and total quality management processes. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Biofuels and Alternative Fuel Sources
Delivered in Internationally or OnlineFlexible Dates
£2,321 to £2,699

Certified Information Security Manager (CISM)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The intended audience for this course is information security and IT professionals, such as network administrators and engineers, IT managers, and IT auditors, and other individuals who want to learn more about information security, who are interested in learning in-depth information about information security management, who are looking for career advancement in IT security, or who are interested in earning the CISM certification. Overview Establish and maintain a framework to provide assurance that information security strategies are aligned with business objectives and consistent with applicable laws and regulations. Identify and manage information security risks to achieve business objectives. Create a program to implement the information security strategy. Implement an information security program. Oversee and direct information security activities to execute the information security program. Plan, develop, and manage capabilities to detect, respond to, and recover from information security incidents. In this course, students will establish processes to ensure that information security measures align with established business needs. Prerequisites Information security governance Information risk management Information security program development Information security program management Incident management and response 1 - Information Security Governance Develop an Information Security Strategy Align Information Security Strategy with Corporate Governance Identify Legal and Regulatory Requirements Justify Investment in Information Security Identify Drivers Affecting the Organization Obtain Senior Management Commitment to Information Security Define Roles and Responsibilities for Information Security Establish Reporting and Communication Channels 2 - Information Risk Management Implement an Information Risk Assessment Process Determine Information Asset Classification and Ownership Conduct Ongoing Threat and Vulnerability Evaluations Conduct Periodic BIAs Identify and Evaluate Risk Mitigation Strategies Integrate Risk Management into Business Life Cycle Processes Report Changes in Information Risk 3 - Information Security Program Development Develop Plans to Implement an Information Security Strategy Security Technologies and Controls Specify Information Security Program Activities Coordinate Information Security Programs with Business Assurance Functions Identify Resources Needed for Information Security Program Implementation Develop Information Security Architectures Develop Information Security Policies Develop Information Security Awareness, Training, and Education Programs Develop Supporting Documentation for Information Security Policies 4 - Information Security Program Implementation Integrate Information Security Requirements into Organizational Processes Integrate Information Security Controls into Contracts Create Information Security Program Evaluation Metrics 5 - Information Security Program Management Manage Information Security Program Resources Enforce Policy and Standards Compliance Enforce Contractual Information Security Controls Enforce Information Security During Systems Development Maintain Information Security Within an Organization Provide Information Security Advice and Guidance Provide Information Security Awareness and Training Analyze the Effectiveness of Information Security Controls Resolve Noncompliance Issues 6 - Incident Management and Response Develop an Information Security Incident Response Plan Establish an Escalation Process Develop a Communication Process Integrate an IRP Develop IRTs Test an IRP Manage Responses to Information Security Incidents Perform an Information Security Incident Investigation Conduct Post-Incident Reviews

Certified Information Security Manager (CISM)
Delivered OnlineFlexible Dates
£1,995

Wind Power Generation: Advantages, Design, Site Selection, Equipment Selection, Operation and Maintenance, On-Shore and Off-Shore Wind Farms, Economics, Rate of Return, and Cost of Electricity from Wind Power Plants

By EnergyEdge - Training for a Sustainable Energy Future

About this Training Course Wind has surpassed hydro-power generation in many countries recently. Wind energy offers many advantages, which explains why it's one of the fastest-growing energy sources in the world. The following are the advantages of wind power: Wind power is cost effective: Land-based utility-scale wind is one of the lowest-priced energy sources available today The fuel for wind power is free. This reduces the operation and maintenance cost of wind power plants significantly Wind is a clean source of power generation that does not pollute the air like power plants which rely on combustion of fossil fuel Wind power plants create jobs. Wind turbine technician is the fastest growing career in many countries Wind enables industry growth and competitiveness due to its low cost Wind power is a domestic source of energy. The wind supply is abundant and inexhaustible. The wind power generation capacity has become the largest source of renewable power in many countries Wind turbines can be built on existing farms and ranches. This greatly benefits the economy in rural areas, where most of the best wind sites are found. Wind power plant owners make rent payments to the farmers or ranchers for the use of their land, providing landowners with additional income This 5 half-day course covers all aspects of wind power plants including evaluation of a potential location for a wind power plant using wind data and using statistical distributions to approximate available wind energy at a wind power plant site. It provides also an in-depth understanding of all wind power plant equipment including wind turbines, generators, instrumentation and control systems, drive trains, gearboxes, doubly fed induction generators, synchronous generators, nacelles, towers, transformers, etc. The economics of a wind power plant including economic analysis of wind power generation, economic comparison between a large- and small-scale wind power plant, economic decision making, rate of return from a wind power plant, economic life and replacement of a wind power plant as well as the cost of electricity from wind power plants are covered in detail in this course. A thorough explanation of the design, operation and maintenance of on-shore and off-shore wind farms is presented in detail in this course as well as all the significant improvements that have been made to wind power generating plants during the last two decades. Training Objectives Evaluation of a Potential Location for a Wind Power Plant Using Wind Data: Learn how to evaluate the potential location for a wind turbine power plant using wind data. Using Statistical 'Rayleigh' Distribution to Approximate Available Power Generation from a Wind Turbine at a Specific Site: Learn how to use statistical 'Rayleigh' distribution to approximate available power generation from a wind turbine at a specific site. Calculate the Wind Energy Available at a Site: Gain an understanding on how to calculate the wind energy available at a site. Rated Capacity of a Wind Facility and Capacity Factor: Understand how to determine the rated capacity of a wind facility and its capacity factor. Designing a Wind Power Generating Plant: Learn how to design a wind power generating plant. Wind Power Plant Equipment Operation and Maintenance: Understand the operation and maintenance requirements for all wind power plant equipment including wind turbines, generators, nacelles, towers, transformers, etc. Wind Power Plant Instrumentation and Control Systems: Gain a thorough understanding about the latest instrumentation and control systems of wind power plants. Economics of Wind Power Plants: Gain a thorough understanding of the economics of wind power plants including economic analysis of wind power generation, economic comparison between a large- and small-scale wind power plant, comparison of alternatives, rate of return from a wind power plant, financial statements for a wind power plant, cost of electricity from a wind power plant, and levelized cost of wind energy.   Target Audience Engineers of all disciplines Managers Technicians Maintenance personnel Other technical individuals Training Methods Your specialist course leader relies on a highly interactive training method to enhance the learning process. This method ensures that all participants gain a complete understanding of all topics covered. The training environment is highly stimulating, challenging, and effective because the participants will learn by case studies which will allow them to apply the material taught to their own organization. Each delegate will receive a soft copy of the following materials written by the instructor: POWER GENERATION HANDBOOK' second edition, published by McGraw-Hill in 2012 (800 pages) Wind Power Generating Plant Manual (500 pages) POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Wind Power Generation: Advantages, Design, Site Selection, Equipment Selection, Operation and Maintenance, On-Shore and Off-Shore Wind Farms, Economics, Rate of Return, and Cost of Electricity from Wind Power Plants
Delivered in Internationally or OnlineFlexible Dates
£1,431 to £2,700

Thermal Power Plant Performance Testing

By EnergyEdge - Training for a Sustainable Energy Future

About this Virtual Instructor Led Training (VILT)  This 5 half-day course provides a detailed description of all performance testing methods for all thermal power plant equipment including boilers, turbines, condensers, pumps, fans, deaerators, and feedwater heaters. The methodology, and code requirements for the performance tests for all thermal power plant equipment will be explained in detail. The preparatory work and instrumentation required for each test will also be covered during the course. The efficiency calculations for all equipment used in circulating fluidized bed (CFB) boiler and pulverized coal boiler power plants will be explained, including all processes, operational and maintenance activities, capital projects, technical options, potential initiatives and incentives to implement upgrades / repairs for increasing the power plant equipment efficiency. The course will also provide a thorough explanation of CFB and pulverized coal boiler technology including hydrodynamics, combustion, emissions, design considerations, gas-solid separators, design of CFB and pulverized coal boiler components, management of solid residues, materials, stoichiometric calculations, and model for sulfur capture. The operation, maintenance, testing, and refurbishment options of all the equipment and systems used in CFB and pulverized coal power plants will be presented, including boilers, superheaters, reheaters, turbines, condensers, feedwater heaters, deaerators, pumps, compressors, fans, electric generators, instrumentation and control systems, and governing systems, etc. The participants will get equipped on all factors which affect the CFB and pulverized coal boiler power plant efficiency and emissions, all methods used to calculate the heat rate of CFB and pulverized coal power plants as well as all areas in CFB and pulverized coal boiler power plants where efficiency loss can occur. Updated information on the methods used to improve CFB boiler and pulverized coal boiler power plant heat rate will also be provided. It includes: Optimizing the combustion process and sootblowing Controlling the steam temperature Recovering moisture from boiler flue gas Performing steam turbine maintenance Lowering condenser back pressure Pre-drying high moisture coal and reducing stack temperature Training Objectives Thermal Plant Performance Testing: Gain a thorough understanding of all the performance testing methods for all thermal power plant equipment including boilers, turbines, condensers, pumps, fans, daerators, and feedwater heaters Performance Test Methodology and Code Requirements: Understand the methodology, and code requirements for performance tests of all thermal power plant equipment Performance Test Preparatory Work and Instrumentation: Learn about the preparatory work and instrumentation required for each equipment performance test in a thermal power plant Equipment Efficiency Calculations: Gain a thorough understanding of the efficiency calculations for all the equipment used in circulating fluidized bed (CFB) boilers and pulverized coal boilers power plants Calculating the Heat Rate of CFB and Pulverized Coal Boiler Power Plants: Learn all the methods used to calculate the heat rate of CFB and pulverized coal boiler coal power plants Benefits of Lowering the Heat Rate of CFB and Pulverized Coal Boiler Power Plants: Understand all the benefits of lowering the heat rate of CFB coal power plants Methods Used to Improve CFB and Pulverized Coal Boiler Power Plants Heat Rate: Gain a thorough understanding of all the methods used to improve the heat rate of CFB and pulverized boiler coal power plants Processes, Operational and Maintenance Activities in CFB and Pulverized Coal Boiler Power Plants: Discover all the processes, operational and maintenance activities used to improve the heat rate of CFB and pulverized coal power plants Capital Projects Used to Improve the Heat Rate of CFB and Pulverized Coal Boiler Power Plants: Learn about all the capital projects used to improve the heat rate of CFB and pulverized coal power plants Technical Options for Improving the Heat Rate of CFB and Pulverized Coal Boiler Power Plants: Understand all the technical options used to improve the heat rate of CFB and pulverized coal boiler power plants Potential Initiatives and Incentives to Implement Upgrades / Repairs for Improving the Heat Rate of CFB and Pulverized Coal Bed Boiler Power Plants: Discover all the potential initiatives and incentives to implement upgrades / repairs for improving the heat rate of CFB and pulverized coal power plants Factors Affecting CFB and Pulverized Coal Boiler Power Plants Efficiency and Emissions: Learn about all the factors which affect CFB and pulverized coal boiler power plants efficiency and emissions Areas in CFB and Pulverized Coal Power Plants where Efficiency Loss Can Occur: Discover all the areas in CFB and pulverized coal power plants where efficiency loss can occur Optimize the Operation of CFB and Pulverized Coal Power Plant Equipment and Systems to Improve the Plant Heat Rate: Understand all the techniques and methods used to optimize the operation of CFB and pulverized coal power plant equipment and systems to improve the plant heat rate CFB and Pulverized Coal Power Plant Equipment and Systems: Learn about the various types of CFB and pulverized coal power plant equipment and systems including boilers, superheater, reheaters, steam turbines, governing systems, deaerators, feedwater heaters, coal-handling equipment, transformers, generators and auxiliaries Target Audience Engineers of all disciplines Managers Technicians Maintenance personnel Other technical individuals Training Methods The VILT will be delivered online in 5 sessions comprising 4 hours per day, with 2 breaks of 10 minutes per day, including time for lectures, discussion, quizzes and short classroom exercises. Additionally, some self-study will be requested. Participants are invited but not obliged to bring a short presentation (10 mins max) on a practical problem they encountered in their work. This will then be explained and discussed during the VILT. A short test or quiz will be held at the end the course. The instructor relies on a highly interactive training method to enhance the learning process. This method ensures that all the delegates gain a complete understanding of all the topics covered. The training environment is highly stimulating, challenging, and effective because the participants will learn by case studies which will allow them to apply the material taught to their own organization. Trainer Your specialist course leader relies on a highly interactive training method to enhance the learning process. This method ensures that all participants gain a complete understanding of all topics covered. The training environment is highly stimulating, challenging, and effective because the participants will learn by case studies which will allow them to apply the material taught to their own organization. Each delegate will receive a soft copy of the following materials written by the instructor: 'POWER GENERATION HANDBOOK' second edition published by McGraw-Hill in 2012 (800 pages) Excerpt of the relevant chapters from the 'POWER PLANT EQUIPMENT OPERATION AND MAINTENANCE GUIDE' published by McGraw-Hill in 2012 (800 pages) THERMAL POWER PLANT PERFORMANCE TESTING MANUAL (includes practical information about all the performance testing methods for all thermal power plant equipment - 400 pages) POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Thermal Power Plant Performance Testing
Delivered in Internationally or OnlineFlexible Dates
£1,431 to £2,700

AI-102T00 Designing and Implementing an Azure AI Solution

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Software engineers concerned with building, managing and deploying AI solutions that leverage Azure AI Services, Azure AI Search, and Azure OpenAI. They are familiar with C# or Python and have knowledge on using REST-based APIs to build computer vision, language analysis, knowledge mining, intelligent search, and generative AI solutions on Azure. AI-102 Designing and Implementing an Azure AI Solution is intended for software developers wanting to build AI infused applications that leverage?Azure AI Services,?Azure AI Search, and?Azure OpenAI. The course will use C# or Python as the programming language. Prerequisites Before attending this course, students must have: Knowledge of Microsoft Azure and ability to navigate the Azure portal Knowledge of either C# or Python Familiarity with JSON and REST programming semantics Recommended course prerequisites AI-900T00: Microsoft Azure AI Fundamentals course 1 - Prepare to develop AI solutions on Azure Define artificial intelligence Understand AI-related terms Understand considerations for AI Engineers Understand considerations for responsible AI Understand capabilities of Azure Machine Learning Understand capabilities of Azure AI Services Understand capabilities of the Azure Bot Service Understand capabilities of Azure Cognitive Search 2 - Create and consume Azure AI services Provision an Azure AI services resource Identify endpoints and keys Use a REST API Use an SDK 3 - Secure Azure AI services Consider authentication Implement network security 4 - Monitor Azure AI services Monitor cost Create alerts View metrics Manage diagnostic logging 5 - Deploy Azure AI services in containers Understand containers Use Azure AI services containers 6 - Analyze images Provision an Azure AI Vision resource Analyze an image Generate a smart-cropped thumbnail 7 - Classify images Provision Azure resources for Azure AI Custom Vision Understand image classification Train an image classifier 8 - Detect, analyze, and recognize faces Identify options for face detection analysis and identification Understand considerations for face analysis Detect faces with the Azure AI Vision service Understand capabilities of the face service Compare and match detected faces Implement facial recognition 9 - Read Text in images and documents with the Azure AI Vision Service Explore Azure AI Vision options for reading text Use the Read API 10 - Analyze video Understand Azure Video Indexer capabilities Extract custom insights Use Video Analyzer widgets and APIs 11 - Analyze text with Azure AI Language Provision an Azure AI Language resource Detect language Extract key phrases Analyze sentiment Extract entities Extract linked entities 12 - Build a question answering solution Understand question answering Compare question answering to Azure AI Language understanding Create a knowledge base Implement multi-turn conversation Test and publish a knowledge base Use a knowledge base Improve question answering performance 13 - Build a conversational language understanding model Understand prebuilt capabilities of the Azure AI Language service Understand resources for building a conversational language understanding model Define intents, utterances, and entities Use patterns to differentiate similar utterances Use pre-built entity components Train, test, publish, and review a conversational language understanding model 14 - Create a custom text classification solution Understand types of classification projects Understand how to build text classification projects 15 - Create a custom named entity extraction solution Understand custom named entity recognition Label your data Train and evaluate your model 16 - Translate text with Azure AI Translator service Provision an Azure AI Translator resource Specify translation options Define custom translations 17 - Create speech-enabled apps with Azure AI services Provision an Azure resource for speech Use the Azure AI Speech to Text API Use the text to speech API Configure audio format and voices Use Speech Synthesis Markup Language 18 - Translate speech with the Azure AI Speech service Provision an Azure resource for speech translation Translate speech to text Synthesize translations 19 - Create an Azure AI Search solution Manage capacity Understand search components Understand the indexing process Search an index Apply filtering and sorting Enhance the index 20 - Create a custom skill for Azure AI Search Create a custom skill Add a custom skill to a skillset 21 - Create a knowledge store with Azure AI Search Define projections Define a knowledge store 22 - Plan an Azure AI Document Intelligence solution Understand AI Document Intelligence Plan Azure AI Document Intelligence resources Choose a model type 23 - Use prebuilt Azure AI Document Intelligence models Understand prebuilt models Use the General Document, Read, and Layout models Use financial, ID, and tax models 24 - Extract data from forms with Azure Document Intelligence What is Azure Document Intelligence? Get started with Azure Document Intelligence Train custom models Use Azure Document Intelligence models Use the Azure Document Intelligence Studio 25 - Get started with Azure OpenAI Service Access Azure OpenAI Service Use Azure OpenAI Studio Explore types of generative AI models Deploy generative AI models Use prompts to get completions from models Test models in Azure OpenAI Studio's playgrounds 26 - Build natural language solutions with Azure OpenAI Service Integrate Azure OpenAI into your app Use Azure OpenAI REST API Use Azure OpenAI SDK 27 - Apply prompt engineering with Azure OpenAI Service Understand prompt engineering Write more effective prompts Provide context to improve accuracy 28 - Generate code with Azure OpenAI Service Construct code from natural language Complete code and assist the development process Fix bugs and improve your code 29 - Generate images with Azure OpenAI Service What is DALL-E? Explore DALL-E in Azure OpenAI Studio Use the Azure OpenAI REST API to consume DALL-E models 30 - Use your own data with Azure OpenAI Service Understand how to use your own data Add your own data source Chat with your model using your own data 31 - Fundamentals of Responsible Generative AI Plan a responsible generative AI solution Identify potential harms Measure potential harms Mitigate potential harms Operate a responsible generative AI solution

AI-102T00 Designing and Implementing an Azure AI Solution
Delivered OnlineFlexible Dates
£1,785