• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3806 Engineer courses delivered Online

Power Electronics for Electrical Engineering

4.8(9)

By Skill Up

Gain the skills and credentials to kickstart a successful career and learn from the experts with this step-by-step

Power Electronics for Electrical Engineering
Delivered Online On Demand15 hours 2 minutes
£25

About this Training Course In the oil & gas industry, it is common knowledge that operators and main contractors, contract or sub-contract a wide range of their activities. The service contract is the tool used to share the risk of a service between the operator and contractor. It is also an approach adopted by the operator to control the efficiency of his contractor. This course allows all parties involved, company, contractors and subcontractors, to better understand the contractual relationship, their rights and obligations. It gives a detailed review of the contract and its main features. This course will particularly focus on the services contracts that are put in place to support a drilling campaign, covering all specificities of the various contracts. Training Objectives At the end of this course, participants will: Get a thorough understanding of the service contract clauses Be able to administer the contract and optimise the relationship with the company or contractor Target Audience This course will be useful and applicable for the following professionals: contract engineers, contracts administrators, any party involved in the relationship between the company and the contractors of a service contract Drillers and logisticians may also have interest in this course as it covers the contractual aspects of their operational activity: They are the 'Owners' of these services contracts Trainer Your expert course leader has 25 years of experience in management positions in Contracting, Procurement and Logistics, mainly in the Oil & Gas Industry. During his Oil & Gas industry experience, he has worked on major Oil and Gas development projects like the Yadana project in Myanmar, Akpo project in Nigeria and YLNG in Yemen. His international experience allows him to adapt very easily and integrate the multicultural specificities of the Oil & Gas industry in his teaching. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

E&P Technical Services Contract
Delivered in Internationally or OnlineFlexible Dates
£2,579 to £2,999

Coal Power Plant Life Cycle Management and Flexible Operations in Energy Transition - Decommissioning, Preservation, Repurposing and Recommissioning

By EnergyEdge - Training for a Sustainable Energy Future

Enhance your knowledge in coal power plant life cycle management and flexible operations with EnergyEdge. Learn about decommissioning, preservation, repurposing, and recommissioning.

Coal Power Plant Life Cycle Management and Flexible Operations in Energy Transition - Decommissioning, Preservation, Repurposing and Recommissioning
Delivered in Internationally or OnlineFlexible Dates
£2,599 to £2,699

Python Basic Programming for Absolute Beginners

4.5(3)

By Studyhub UK

Dive into the captivating world of programming with our course titled 'Python Basic Programming for Absolute Beginners'. Whether you're a novice looking to embark on a new journey or someone eager to grasp the foundational elements of Python, this course is tailored for you. From setting up Python to crafting your first game and understanding the intricacies of control flow statements, our comprehensive curriculum ensures you grasp every fundamental aspect, setting a robust foundation for your future coding endeavours. Learning Outcomes Understand the core concepts and foundational elements of Python programming. Develop proficiency in working with Python strings, operators, and sequences. Master the art of creating control flow statements and basic Python games. Gain insights into file structures and the application of regular expressions in Python. Successfully complete a Python project, showcasing your newfound knowledge. Why buy this Python Basic Programming for Absolute Beginners? Unlimited access to the course for forever Digital Certificate, Transcript, student ID all included in the price Absolutely no hidden fees Directly receive CPD accredited qualifications after course completion Receive one to one assistance on every weekday from professionals Immediately receive the PDF certificate after passing Receive the original copies of your certificate and transcript on the next working day Easily learn the skills and knowledge from the comfort of your home Certification After studying the course materials of the Python Basic Programming for Absolute Beginners there will be a written assignment test which you can take either during or at the end of the course. After successfully passing the test you will be able to claim the pdf certificate for £5.99. Original Hard Copy certificates need to be ordered at an additional cost of £9.60. Who is this Python Basic Programming for Absolute Beginners for? Beginners with no prior knowledge of programming seeking a structured introduction. Individuals with a curiosity to explore coding as a new skill or hobby. Students desiring to enhance their academic learning with foundational programming knowledge. Professionals from diverse fields looking to broaden their skill set. Educators wishing to acquire beginner-level knowledge for instructional purposes. Prerequisites This Python Basic Programming for Absolute Beginners does not require you to have any prior qualifications or experience. You can just enrol and start learning.This Python Basic Programming for Absolute Beginners was made by professionals and it is compatible with all PC's, Mac's, tablets and smartphones. You will be able to access the course from anywhere at any time as long as you have a good enough internet connection. Career path Python Developer: Average salary range £45,000 - £70,000. Data Analyst: Average salary range £30,000 - £55,000. Web Developer: Average salary range £25,000 - £50,000. Software Engineer: Average salary range £35,000 - £75,000. Automation Tester: Average salary range £40,000 - £65,000. Game Developer: Average salary range £30,000 - £60,000 Course Curriculum Section 01: Introduction Course Introduction 00:02:00 Course Curriculum 00:04:00 How to get Pre-requisites 00:02:00 Getting Started on Windows, Linux or Mac 00:01:00 Section 02: Introduction To Python And Setting Up Introduction to Python 00:02:00 Python vs Other Languages 00:04:00 Why It's Popular 00:04:00 Command Line Basics 00:07:00 Python Installation (Step By Step) 00:06:00 PyCharm IDE Installation 00:08:00 Getting Start PyCharm IDE 00:05:00 First Python Hello World Program 00:07:00 Assessment Test1 00:01:00 Solution for Assessment Test1 00:01:00 Summary 00:02:00 Section 03: PythonBasic Introduction 00:02:00 Variables 00:16:00 Data Types 00:13:00 Type Casting 00:07:00 User Inputs 00:08:00 Comments 00:04:00 Assessment Test2 00:01:00 Solution for Assessment Test2 00:02:00 Summary 00:02:00 Section 04: Python Strings Introduction 00:02:00 Strings 00:05:00 String Indexing 00:05:00 String Slicing 00:04:00 String Built-in Functions 00:09:00 Formatting String (Dynamic Data) 00:05:00 Assessment Test 00:01:00 Solution for Assessment Test 00:01:00 Summary 00:01:00 Section 05: Python Operators Introduction 00:03:00 Arithmetic Operators 00:08:00 Assignment Operators 00:05:00 Comparison Operators 00:05:00 Logical Operators 00:02:00 AND Operator 00:04:00 OR Operator 00:02:00 NOT Operator 00:03:00 Booleans 00:02:00 Assessment Test4 00:02:00 Solution for Assessment Test4 00:01:00 Summary 00:01:00 Section 06: Python Sequences Introduction 00:02:00 Arrays in Earlier 00:02:00 Lists 00:06:00 Add List Items 00:03:00 Remove List Items 00:01:00 Sort Lists 00:03:00 Join Lists 00:08:00 Tuples 00:08:00 Update tuples 00:07:00 Join tuples 00:02:00 Dictionaries 00:06:00 Add Dictionary Items 00:04:00 Remove Dictionary Items 00:03:00 Nested Dictionaries 00:04:00 Sets 00:04:00 Add Set Items 00:03:00 Remove Set Items 00:01:00 Join Set Items 00:04:00 Assessment Test 00:01:00 Solution for Assessment Test 00:02:00 Summary 00:01:00 Section 07: Python Statements Introduction 00:03:00 If Statement 00:03:00 If-else Statement 00:04:00 If-elif-else Statement 00:04:00 If Statement Coding Exercise 00:05:00 Assessment Test 00:02:00 Solution for Assessment Test 00:02:00 Summary 00:02:00 Section 08: Python Control Flow Statements Introduction 00:04:00 Flow Charts 00:04:00 While Loops Statement 00:10:00 For Loops Statement 00:06:00 Loop through a String 00:03:00 The Break Statement 00:03:00 The Continue Statement 00:02:00 The range() Function 00:04:00 Nested Loops 00:04:00 2D List using Nested Loop 00:04:00 Assessment Test 00:01:00 Solution for Assessment Test 00:03:00 Summary 00:01:00 Section 09: Python Games For Beginners Introduction 00:01:00 Guessing Game 00:07:00 Car Game 00:10:00 Summary 00:01:00 Section 10: Python Functions Introduction 00:02:00 Creating a Function 00:03:00 Calling a Function 00:06:00 Function with Arguments 00:05:00 args, Arbitrary Arguments 00:04:00 kwargs, Arbitrary Keyword Arguments 00:06:00 Summary 00:01:00 Section 11: Working With File Structure Introduction 00:03:00 Reading Files 00:10:00 Creating / Writing Files 00:06:00 Delete Files 00:03:00 Summary 00:01:00 Section 12: Regular Expressions Introduction 00:02:00 RegEx Module 00:07:00 RegEx Functions 00:08:00 Summary 00:02:00 Section 13: PythonProject Introduction 00:02:00 Project Overview 00:03:00 ATM RealTime Project 00:13:00 Summary 00:01:00

Python Basic Programming for Absolute Beginners
Delivered Online On Demand7 hours 18 minutes
£10.99

SC-100T00 Microsoft Cybersecurity Architect

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is for experienced cloud security engineers who have taken a previous certification in the security, compliance and identity portfolio. Specifically, students should have advanced experience and knowledge in a wide range of security engineering areas, including identity and access, platform protection, security operations, securing data, and securing applications. They should also have experience with hybrid and cloud implementations. Beginning students should instead take the course SC-900: Microsoft Security, Compliance, and Identity Fundamentals. This is an advanced, expert-level course. Although not required to attend, students are strongly encouraged to have taken and passed another associate level certification in the security, compliance and identity portfolio (such as AZ-500, SC-200 or SC-300) before attending this class. This course prepares students with the expertise to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), security operations (SecOps), and data and applications. Students will also learn how to design and architect solutions using zero trust principles and specify security requirements for cloud infrastructure in different service models (SaaS, PaaS, IaaS). Prerequisites Highly recommended to have attended and passed one of the associate level certifications in the security, compliance and identity portfolio (such as AZ-500T00 Microsoft Azure Security Technologies, SC-200T00: Microsoft Security Operations Analyst, or SC-300T00: Microsoft Identity and Access Administrator.) Advanced experience and knowledge in identity and access, platform protection, security operations, securing data and securing applications. Experience with hybrid and cloud implementations. 1 - Introduction to Zero Trust and best practice frameworks Zero Trust initiatives Zero Trust technology pillars part 1 Zero Trust technology pillars part 2 2 - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF) Define a security strategy Cloud Adoption Framework secure methodology Design security with Azure Landing Zones The Well-Architected Framework security pillar 3 - Design solutions that align with the Microsoft Cybersecurity Reference Architecture (MCRA) and Microsoft cloud security benchmark (MCSB) Design solutions with best practices for capabilities and controls Design solutions with best practices for attack protection 4 - Design a resiliency strategy for common cyberthreats like ransomware Common cyberthreats and attack patterns Support business resiliency Ransomware protection Configurations for secure backup and restore Security updates 5 - Case study: Design solutions that align with security best practices and priorities Case study description Case study answers Conceptual walkthrough Technical walkthrough 6 - Design solutions for regulatory compliance Translate compliance requirements into a security solution Address compliance requirements with Microsoft Purview Address privacy requirements with Microsoft Priva Address security and compliance requirements with Azure policy Evaluate infrastructure compliance with Defender for Cloud 7 - Design solutions for identity and access management Design cloud, hybrid and multicloud access strategies (including Azure AD) Design a solution for external identities Design modern authentication and authorization strategies Align conditional access and Zero Trust Specify requirements to secure Active Directory Domain Services (AD DS) Design a solution to manage secrets, keys, and certificates 8 - Design solutions for securing privileged access The enterprise access model Design identity governance solutions Design a solution to secure tenant administration Design a solution for cloud infrastructure entitlement management (CIEM) Design a solution for privileged access workstations and bastion services 9 - Design solutions for security operations Design security operations capabilities in hybrid and multicloud environments Design centralized logging and auditing Design security information and event management (SIEM) solutions Design solutions for detection and response Design a solution for security orchestration, automation, and response (SOAR) Design security workflows Design threat detection coverage 10 - Case study: Design security operations, identity and compliance capabilities Case study description Case study answers Conceptual walkthrough Technical walkthrough 11 - Design solutions for securing Microsoft 365 Evaluate security posture for collaboration and productivity workloads Design a Microsoft 365 Defender solution Design configurations and operational practices for Microsoft 365 12 - Design solutions for securing applications Design and implement standards to secure application development Evaluate security posture of existing application portfolios Evaluate application threats with threat modeling Design security lifecycle strategy for applications Secure access for workload identities Design a solution for API management and security Design a solution for secure access to applications 13 - Design solutions for securing an organization's data Design a solution for data discovery and classification using Microsoft Purview Design a solution for data protection Design data security for Azure workloads Design security for Azure Storage Design a security solution with Microsoft Defender for SQL and Microsoft Defender for Storage 14 - Case study: Design security solutions for applications and data Case study description Case study answers Conceptual walkthrough Technical walkthrough 15 - Specify requirements for securing SaaS, PaaS, and IaaS services Specify security baselines for SaaS, PaaS, and IaaS services Specify security requirements for web workloads Specify security requirements for containers and container orchestration 16 - Design solutions for security posture management in hybrid and multicloud environments Evaluate security posture by using Microsoft Cloud Security Benchmark Design integrated posture management and workload protection Evaluate security posture by using Microsoft Defender for Cloud Posture evaluation with Microsoft Defender for Cloud secure score Design cloud workload protection with Microsoft Defender for Cloud Integrate hybrid and multicloud environments with Azure Arc Design a solution for external attack surface management 17 - Design solutions for securing server and client endpoints Specify server security requirements Specify requirements for mobile devices and clients Specify internet of things (IoT) and embedded device security requirements Secure operational technology (OT) and industrial control systems (ICS) with Microsoft Defender for IoT Specify security baselines for server and client endpoints Design a solution for secure remote access 18 - Design solutions for network security Design solutions for network segmentation Design solutions for traffic filtering with network security groups Design solutions for network posture management Design solutions for network monitoring 19 - Case study: Design security solutions for infrastructure Case study description Case study answers Conceptual walkthrough Technical walkthrough Additional course details: Nexus Humans SC-100T00 Microsoft Cybersecurity Architect training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the SC-100T00 Microsoft Cybersecurity Architect course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

SC-100T00 Microsoft Cybersecurity Architect
Delivered OnlineFlexible Dates
£2,380

About this Virtual Instructor Led Training (VILT) A large amount of geological data is acquired at a substantial cost when carrying out a drilling operation. Ensuring optimal quality of this information and effective reporting plays a key role during well design and drilling operations. In addition, there is much to benefit from the later usage of the data in field studies. A critical component that ensures favourable and positive results is the close co-operation between geological, drilling and well engineering departments. Comprising 5 half-day sessions, this Virtual Instructor Led Training (VILT) course aims to provide the required knowledge in order for the collaboration to be most effective and successful. This VILT course will comprise lectures interspersed with practical and interactive exercises and quizzes to promote better understanding. Training Objectives At the end of this VILT course, participants will be able to: Understand the techniques used by wellsite geologists in formation evaluation via: Quick-look analysis to assess reservoir and hydrocarbons Mudlog data (lithology/cutting description, gas readings) Grasp the application of wellsite data in exploration and development Be able to read, assess and use drilling reports Acquire an understanding of drilling problems caused by subsurface conditions Understand the role and contributions of the geologist to the well maturation process Target Audience This VILT course is intended for geologists and other subsurface staff involved in drilling operations who would like to work and communicate more effectively with wellsite staff.  Please note that this VILT course is not a preparation course for a wellsite assignment. To be able to work independently on the wellsite, a more hands-on or on-site training would be required. Training Methods This VILT course will be delivered online in 5 half-day sessions comprising 4 hours per day, with 2 breaks of 10 minutes per day. Course Duration: 5 half-day sessions, 4 hours per session (20 hours in total). Trainer Your expert course leader has close to 20 years of experience as a geologist in the Oil & Gas industry. Her main interest and passion is in well planning and operations. She had previously worked as a production geologist and technical authority in NAM (Netherlands), and as a discipline advisor tasked to coach young staff in Bangalore. She has been active in internal training sessions on drilling hazards, mudwindow assessment and project management. She obtained an MSc in hard rock structural geology from the University in Utrecht, a PhD at Brown University (RI, USA) and a post-doctoral at the RWTH Aachen. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Wellsite Geology & Operations
Delivered in Internationally or OnlineFlexible Dates
£2,493 to £2,899

Introduction to Carbon Capture and Storage (CCS) for Non-Technical Professionals

By EnergyEdge - Training for a Sustainable Energy Future

About this training Carbon Capture and Storage (CCS) is an upcoming new technology that has a vital place within global efforts to decarbonise. It has a unique set of challenges, opportunities and risks to be understood and accommodated within appropriate legal, regulatory, and social and public license frameworks. The course has a strong international and global south emphasis with case studies on CCS projects and will touch on the role of CCS in developing country energy transition. The course satisfies a part of the market that is not currently catered for - the wider science, risks, financing, regulation, planning and social license aspects of CCS. These are issues that are as important as the technical issues in the sense that any of them can be a show-stopper for CCS. Training Objectives Upon completion of this course, participants will be able to: Place CCS within the context of the global geological carbon cycle and the contribution to could make to carbon abatement Explore the basic engineering and other challenges and solutions of CO2 transport and capture Recognize the geological challenges and solutions of CO2 storage Learn the methods of geological and environmental monitoring of CCS sites and why monitoring is important Understand the policy and finance challenges and solutions of CCS projects Know the importance of social license to operate and how to gain a social license to operate Target Audience This course will cater for in-company legal specialists, finance, project managers, marketing and communications specialists; as well as geologists, planners and environmental scientists in regulatory or government roles in regions considering the development of CCS. The course will provide up to date and relevant information to help in understanding opportunities and in managing risk. Geoscientists Government energy regulators and policy makers Financiers and investors Government natural resource and planning department Environmental scientists Finance professionals Marketing and communication professionals Legal specialists Project managers Course Level Basic or Foundation Trainer Your expert course leader is one of the most influential figures in British geoscience. He has 25 years' experience in geological, energy, and palaeontological science and research, including 8 years national level science leadership as the UK's chief geologist (Executive Chief Scientist and Director of Science and Technology of the British Geological Survey). He has been providing geoscience advice to Government for almost 15 years and has an excellent overview of Government policy, industrial activity and funding landscape in applied and energy geoscience, including CCUS and shale gas. He is a well-known communicator of science and has published three single-author popular science books (one award-winning), including the best introductory book on CCS 'Returning Carbon to Nature' Elsevier 2013. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Introduction to Carbon Capture and Storage (CCS) for Non-Technical Professionals
Delivered in Internationally or OnlineFlexible Dates
£2,493 to £2,899

Prospect Risks & Volumes Assessment

By EnergyEdge - Training for a Sustainable Energy Future

About this Virtual Instructor Led Training (VILT)  A decision to drill an exploration well with the objective to find a new oil or gas field must be based on sound assessment of the prospect risk and of the volumes. What is the chance that a well will find hydrocarbons, and how much could it be? Risk and volume assessments form the basis for decisions to drill a well or not, and as such form the link between subsurface evaluation and the business aspects of the petroleum industry. This Virtual Instructor Led Training (VILT) course explains how risks and volumes can be assessed in a realistic manner, based on a sound understanding of the geological details of the prospect as well as its regional geological setting and current play understanding. Participants of this VILT course will receive a softcopy of Risk and Volume Assessment Handbook which explains the concepts that are associated with probabilistic Risk & Volume (R & V) Assessment and contains many practical recommendations on how to translate geological understanding into meaningful inputs for probabilistic R &V assessments. The book is fully compatible with any probabilistic R & V tool in the industry. Training Objectives By the end of this VILT course, participants will be able to understand: The fundamentals of risk and volumes assessment; translating geological understanding into reasonable numbers and ranges. The difference between risk and uncertainty. Fundamentals of statistics; including explanation of distribution curves, understanding of expectation curves, do's and don'ts for adding risked volumes, and Bayes theorem. Uncertainty of trap, reservoir, seal and charge, illustrated by examples. Guidelines and exercises for estimating risks realistically and consistently. Calculating volume ranges for prospects and for portfolios of prospects; how to add prospect volumes for a correct representation of prospect portfolios. Incorporation of geophysical evidence (DHIs) in a realistic risk assessment. Target Audience This VILT course has been designed in the first place for geoscientists working in exploration, for prospect portfolio analysts and for their direct supervisors. It will also benefit staff from disciplines working closely with exploration staff, such as reservoir engineers, petrophysicists and geophysicists. Course Level Intermediate Training Methods Learning, methods and tools The VILT course will be delivered online in 5 half-day sessions comprising 4 hours per day, with 2 breaks of 10 minutes per day. It is the intention to have at least 2 smaller exercises per day. Time will be reserved for recapitulation, questions and discussions. VILT will be conducted either via Zoom or Microsoft Teams. Presenting materials can easily be done on this platform. When participants need to ask a question, they can raise their hand, write notes or interrupt the Instructor by using their microphone. The presenter can switch to a screen where he/she can see all participants (also when each participant is sitting in another location e.g. at home). There is also a whiteboard functionality that can be used as one would use a flip chart. Exercises will be done on an online platform which provides each participant with a private work area that can be accessed by the Instructor to discuss the exercise in a similar manner as in a classroom course. Each topic is introduced by a lecture, and learning is re-enforced by practical exercises and discussions. Handout material in electronic format will be provided. Trainer Dr. Jan de Jager has a PhD in Geology from the University of Utrecht. He joined Shell in 1979 as an exploration geologist, and worked in several locations around the world such as Netherlands, Gabon, USA, Australia, Argentina, and Malaysia in technical and management positions. During the last 10 years of his career, he was responsible for the quality assurance of Shell's exploration prospects in many parts of the world and for upgrading and replenishing Shell's global exploration portfolio. During this period, he had also developed extensive expertise in Prospect Risk and Volume assessments for which he ran successful internal training programmes. Following his retirement from Shell in 2010, Dr Jan de Jager took on a position as part-time professor at the University of Amsterdam and also serves as a consultant exploration advisor for various E&P companies. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Prospect Risks & Volumes Assessment
Delivered in Internationally or OnlineFlexible Dates
£1,536 to £2,899

CompTIA Security+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed for people who are seeking to launch a career in cybersecurity. Overview Assess the security posture of an enterprise environment and recommend and implement appropriate security solutions; Monitor and secure hybrid environments, including cloud, mobile, and IoT; Operate with an awareness of applicable laws and policies, including principles of governance, risk, and compliance; Identify, analyze, and respond to security events and incidents. CompTIA Security+ is a global certification that validates the baseline skills necessary to perform core security functions and is the first security certification a candidate should earn. CompTIA Security+ establishes the core knowledge required of any cybersecurity role and provides a springboard to intermediate-level cybersecurity jobs. Lesson 1: Summarize Fundamental Security Concepts Security Concepts Security Controls Lesson 2: Compare Threat Types Threat Actors Attack Surfaces Social Engineering Lesson 3: Explain Cryptographic Solutions Cryptographic Algorithms Public Key Infrastructure Cryptographic Solutions Lesson 4: Implement Identity and Access Management Authentication Authorization Identity Management Lesson 5: Secure Enterprise Network Architecture Enterprise Network Architecture Network Security Appliances Secure Communications Lesson 6: Secure Cloud Network Architecture Cloud Infrastructure Embedded Systems and Zero Trust Architecture Lesson 7: Explain Resiliency and Site Security Concepts Asset Management Redundancy Strategies Physical Security Lesson 8: Explain Vulnerability Management Device and OS Vulnerabilities Application and Cloud Vulnerabilities Vulnerability Identification Methods Vulnerability Analysis and Remediation Lesson 9: Evaluate Network Security Capabilities Network Security Baselines Network Security Capability Enhancement Lesson 10: Assess Endpoint Security Capabilities Implement Endpoint Security Mobile Device Hardening Lesson 11: Enhance Application Security Capabilities Application Protocol Security Baselines Cloud and Web Application Security Concepts Lesson 12: Explain Incident Response and Monitoring Concepts Incident Response Digital Forensics Data Sources Alerting and Monitoring Tools Lesson 13: Analyze Indicators of Malicious Activity Malware Attack Indicators Physical and Network Attack Indicators Application Attack Indicators Lesson 14: Summarize Security Governance Concepts Policies, Standards, and Procedures Change Management Automation and Orchestration Lesson 15: Explain Risk Management Processes Risk Management Processes and Concepts Vendor Management Concepts Audits and Assessments Lesson 16: Summarize Data Protection and Compliance Concepts Data Classification and Compliance Personnel Policies Additional course details: Nexus Humans CompTIA Security Plus Certification (Exam SY0-601) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Security Plus Certification (Exam SY0-601) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Security+
Delivered OnlineFlexible Dates
£2,475

CompTIA Cybersecurity Analyst (CySA+)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is designed primarily for cybersecurity practitioners who perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This course focuses on the knowledge, ability, and skills necessary to provide for the defense of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. In addition, the course ensures that all members of an IT team?everyone from help desk staff to the Chief Information Officer?understand their role in these security processes. Overview In this course, you will assess and respond to security threats and operate a systems and network security analysis platform. You will: - Assess information security risk in computing and network environments. - Analyze reconnaissance threats to computing and network environments. - Analyze attacks on computing and network environments. - Analyze post-attack techniques on computing and network environments. - Implement a vulnerability management program. - Collect cybersecurity intelligence. - Analyze data collected from security and event logs. - Perform active analysis on assets and networks. - Respond to cybersecurity incidents. - Investigate cybersecurity incidents. - Address security issues with the organization's technology architecture. The course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyze cybersecurity intelligence, and handle incidents as they occur. 1 - ASSESSING INFORMATION SECURITY RISK Identify the Importance of Risk Management Assess Risk Mitigate Risk Integrate Documentation into Risk Management 2 - ANALYZING RECONNAISSANCE THREATS TO COMPUTING AND NETWORK ENVIRONMENTS Assess the Impact of Reconnaissance Incidents Assess the Impact of Social Engineering 3 - ANALYZING ATTACKS ON COMPUTING AND NETWORK ENVIRONMENTS Assess the Impact of System Hacking Attacks Assess the Impact of Web-Based Attacks Assess the Impact of Malware Assess the Impact of Hijacking and Impersonation Attacks Assess the Impact of DoS Incidents Assess the Impact of Threats to Mobile Security Assess the Impact of Threats to Cloud Security 4 - ANALYZING POST-ATTACK TECHNIQUES Assess Command and Control Techniques Assess Persistence Techniques Assess Lateral Movement and Pivoting Techniques Assess Data Exfiltration Techniques Assess Anti-Forensics Techniques 5 - MANAGING VULNERABILITIES IN THE ORGANIZATION Implement a Vulnerability Management Plan Assess Common Vulnerabilities Conduct Vulnerability Scans Conduct Penetration Tests on Network Assets 6 - COLLECTING CYBERSECURITY INTELLIGENCE Deploy a Security Intelligence Collection and Analysis Platform Collect Data from Network-Based Intelligence Sources Collect Data from Host-Based Intelligence Sources 7 - ANALYZING LOG DATA Use Common Tools to Analyze Logs Use SIEM Tools for Analysis 8 - PERFORMING ACTIVE ASSET AND NETWORK ANALYSIS Analyze Incidents with Windows-Based Tools Analyze Incidents with Linux-Based Tools Analyze Malware Analyze Indicators of Compromise 9 - RESPONDING TO CYBERSECURITY INCIDENTS Deploy an Incident Handling and Response Architecture Mitigate Incidents Prepare for Forensic Investigation as a CSIRT 10 - INVESTIGATING CYBERSECURITY INCIDENTS Apply a Forensic Investigation Plan Securely Collect and Analyze Electronic Evidence Follow Up on the Results of an Investigation 11 - ADDRESSING SECURITY ARCHITECTURE ISSUES Remediate Identity and Access Management Issues Implement Security During the SDLC Additional course details: Nexus Humans CompTIA Cybersecurity Analyst Certification (CySA Plus) (Exam CS0-003) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Cybersecurity Analyst Certification (CySA Plus) (Exam CS0-003) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Cybersecurity Analyst (CySA+)
Delivered OnlineFlexible Dates
£2,475