• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

178 Educators providing Engineering Construction Industry Training (ECITB) courses

AulaGEO Academy

aulageo academy

Welcome to our Academy platform, your ultimate destination for online courses covering a wide range of subjects, including GIS, CAD, BIM and Digital Twins applied to the land development environment. We are committed to providing comprehensive education and empowering individuals to excel in various domains related to infrastructures. Whether you are a student, a professional seeking to expand your knowledge, or an enthusiast passionate about these subjects, our platform offers a diverse selection of courses tailored to meet your specific needs. At our Academy, we recognize the significance of these disciplines in the infrastructures life cycle, from initial design to project completion. To ensure the highest quality of education, we have collaborated with renowned industry expert Golgi Alvarez and assembled a team of AulaGEO Academy [https://www.udemy.com/courses/search/?q=aulageo+golgi&sort=relevance&src=ukw] experts to create and curate cutting-edge courses. In addition to our in-house experts, we also promote courses from third-party instructors who bring valuable perspectives and expertise to our platform.   Architecture – Engineering – Construction – Operation (AECO) is a harmonious blend of creativity and technical expertise. Our AECO courses encompass a broad range of topics, from Civil design principles to sustainable construction practices. You will gain proficiency in conceptualizing and developing designs that fulfill aesthetic, functional, structural and regulatory requirements. Our instructors, including renowned expert Golgi Alvarez, will guide you through the design process, helping you refine your visualization and communication skills. Furthermore, you will acquire a solid foundation in structural analysis and design, ensuring the safety and stability of your land development creations. -------------------------------------------------------------------------------- Geographic Information Systems (GIS) have revolutionized the way we collect, analyze, and visualize spatial data. Our GIS courses explore the power of GIS technology for mapping, spatial analysis, and data management. Using software like ArcGIS Pro [https://www.udemy.com/courses/search/?courseLabel=8926&q=aulageo+golgi&sort=relevance&src=ukw] and QGIS [https://www.udemy.com/courses/search/?src=ukw&q=aulageo+golgi+qgis] you will gain insights into interpreting and manipulating geospatial data, designing interactive maps, conducting spatial queries, and leveraging GIS for various applications, including land management, environmental analysis, and urban planning. Our GIS courses provide a competitive advantage in fields that rely on spatial data analysis and informed decision-making. Civil Engineering plays a pivotal role in the design and construction of infrastructure. Our engineering courses cover a broad spectrum of topics, including structural engineering, transportation systems, and urban design. Using software like AutoDesk Civil3D and Bentley OpenRoads [https://www.udemy.com/courses/search/?src=ukw&q=openroads] you will learn the principles and techniques required to design, construct, and maintain buildings, bridges, roads, and more. Our experienced instructors bring their industry expertise to the virtual classroom, providing valuable insights Computer-Aided Design (CAD) is the backbone of modern design processes, enabling precise and efficient creation of 2D and 3D models. Our CAD courses cover a wide array of software applications, including AutoCAD, Microstation, and CREO Parametric. From fundamental concepts to advanced techniques, you will acquire the skills necessary to create, modify, and analyze complex designs, ensuring accuracy and optimizing workflows. Our courses cater to beginners seeking a solid foundation as well as experienced professionals aiming to enhance their expertise. Building Information Modeling (BIM) has transformed the architecture, engineering, and construction industries by facilitating collaborative and data-driven project management. Our BIM courses delve into the principles, workflows, and software tools utilized in BIM, such as Revit, ArchiCAD and SYNCHRO [https://www.udemy.com/courses/search/?src=ukw&q=synchro+aulageo]. You will learn to create intelligent 3D models that encompass architectural, structural, and MEP (mechanical, electrical, and plumbing) systems. Additionally, you will discover techniques for accurate quantity extraction, clash detection, and generating construction documents. Mastery of BIM equips you to contribute effectively to multidisciplinary project teams and streamline project delivery.

Courses matching "Engineering Construction Industry Training (ECITB)"

Show all 556

Navigating Petrophysics: Log Analysis, LWD & Wireline

By EnergyEdge - Training for a Sustainable Energy Future

Dive deep into petrophysics, log analysis, LWD, and wireline techniques with EnergyEdge's specialized course. Enroll today!

Navigating Petrophysics: Log Analysis, LWD & Wireline
Delivered In-Person
£3,299 to £3,399

Marginal Field Development and Planning

By EnergyEdge - Training for a Sustainable Energy Future

Enhance your knowledge in marginal field development and planning with EnergyEdge's course. Enroll now to gain valuable insights.

Marginal Field Development and Planning
Delivered In-Person
£3,699 to £3,799

Exploration Concepts for Tight Sand Plays

By EnergyEdge - Training for a Sustainable Energy Future

Enhance your knowledge in exploration concepts for tight sand plays with EnergyEdge's course. Sign up now to gain valuable insights!

Exploration Concepts for Tight Sand Plays
Delivered In-Person
£1,799 to £1,999

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered Online
£3,495

Technical Report Writing and Presentation Skills In the AI Era – For Engineers, Scientists and Technical Professionals in The Energy Industry

By EnergyEdge - Training for a Sustainable Energy Future

Develop your technical report writing and presentation skills with EnergyEdge's course designed for oil & gas professionals. Sign up now!

Technical Report Writing and Presentation Skills In the AI Era
– For Engineers, Scientists and Technical Professionals in The Energy Industry
Delivered In-Person
£1,399 to £1,499

Introduction to Exploration and Production for New Engineers and Non-Technical Professionals in Oil & Gas (2 Days)

By EnergyEdge - Training for a Sustainable Energy Future

Enhance your knowledge of exploration and production in oil & gas with EnergyEdge's course. Ideal for new engineers and non-technical professionals.

Introduction to Exploration and Production for New Engineers and Non-Technical Professionals in Oil & Gas (2 Days)
Delivered In-Person
£1,299 to £1,399

Enhance your expertise in completion design with EnergyEdge's comprehensive classroom training. Join now and gain valuable insights!

Completion Design
Delivered In-Person
£3,499 to £3,599

DP-203T00 Data Engineering on Microsoft Azure

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for The primary audience for this course is data professionals, data architects, and business intelligence professionals who want to learn about data engineering and building analytical solutions using data platform technologies that exist on Microsoft Azure. The secondary audience for this course includes data analysts and data scientists who work with analytical solutions built on Microsoft Azure. In this course, the student will learn how to implement and manage data engineering workloads on Microsoft Azure, using Azure services such as Azure Synapse Analytics, Azure Data Lake Storage Gen2, Azure Stream Analytics, Azure Databricks, and others. The course focuses on common data engineering tasks such as orchestrating data transfer and transformation pipelines, working with data files in a data lake, creating and loading relational data warehouses, capturing and aggregating streams of real-time data, and tracking data assets and lineage. Prerequisites Successful students start this course with knowledge of cloud computing and core data concepts and professional experience with data solutions. AZ-900T00 Microsoft Azure Fundamentals DP-900T00 Microsoft Azure Data Fundamentals 1 - Introduction to data engineering on Azure What is data engineering Important data engineering concepts Data engineering in Microsoft Azure 2 - Introduction to Azure Data Lake Storage Gen2 Understand Azure Data Lake Storage Gen2 Enable Azure Data Lake Storage Gen2 in Azure Storage Compare Azure Data Lake Store to Azure Blob storage Understand the stages for processing big data Use Azure Data Lake Storage Gen2 in data analytics workloads 3 - Introduction to Azure Synapse Analytics What is Azure Synapse Analytics How Azure Synapse Analytics works When to use Azure Synapse Analytics 4 - Use Azure Synapse serverless SQL pool to query files in a data lake Understand Azure Synapse serverless SQL pool capabilities and use cases Query files using a serverless SQL pool Create external database objects 5 - Use Azure Synapse serverless SQL pools to transform data in a data lake Transform data files with the CREATE EXTERNAL TABLE AS SELECT statement Encapsulate data transformations in a stored procedure Include a data transformation stored procedure in a pipeline 6 - Create a lake database in Azure Synapse Analytics Understand lake database concepts Explore database templates Create a lake database Use a lake database 7 - Analyze data with Apache Spark in Azure Synapse Analytics Get to know Apache Spark Use Spark in Azure Synapse Analytics Analyze data with Spark Visualize data with Spark 8 - Transform data with Spark in Azure Synapse Analytics Modify and save dataframes Partition data files Transform data with SQL 9 - Use Delta Lake in Azure Synapse Analytics Understand Delta Lake Create Delta Lake tables Create catalog tables Use Delta Lake with streaming data Use Delta Lake in a SQL pool 10 - Analyze data in a relational data warehouse Design a data warehouse schema Create data warehouse tables Load data warehouse tables Query a data warehouse 11 - Load data into a relational data warehouse Load staging tables Load dimension tables Load time dimension tables Load slowly changing dimensions Load fact tables Perform post load optimization 12 - Build a data pipeline in Azure Synapse Analytics Understand pipelines in Azure Synapse Analytics Create a pipeline in Azure Synapse Studio Define data flows Run a pipeline 13 - Use Spark Notebooks in an Azure Synapse Pipeline Understand Synapse Notebooks and Pipelines Use a Synapse notebook activity in a pipeline Use parameters in a notebook 14 - Plan hybrid transactional and analytical processing using Azure Synapse Analytics Understand hybrid transactional and analytical processing patterns Describe Azure Synapse Link 15 - Implement Azure Synapse Link with Azure Cosmos DB Enable Cosmos DB account to use Azure Synapse Link Create an analytical store enabled container Create a linked service for Cosmos DB Query Cosmos DB data with Spark Query Cosmos DB with Synapse SQL 16 - Implement Azure Synapse Link for SQL What is Azure Synapse Link for SQL? Configure Azure Synapse Link for Azure SQL Database Configure Azure Synapse Link for SQL Server 2022 17 - Get started with Azure Stream Analytics Understand data streams Understand event processing Understand window functions 18 - Ingest streaming data using Azure Stream Analytics and Azure Synapse Analytics Stream ingestion scenarios Configure inputs and outputs Define a query to select, filter, and aggregate data Run a job to ingest data 19 - Visualize real-time data with Azure Stream Analytics and Power BI Use a Power BI output in Azure Stream Analytics Create a query for real-time visualization Create real-time data visualizations in Power BI 20 - Introduction to Microsoft Purview What is Microsoft Purview? How Microsoft Purview works When to use Microsoft Purview 21 - Integrate Microsoft Purview and Azure Synapse Analytics Catalog Azure Synapse Analytics data assets in Microsoft Purview Connect Microsoft Purview to an Azure Synapse Analytics workspace Search a Purview catalog in Synapse Studio Track data lineage in pipelines 22 - Explore Azure Databricks Get started with Azure Databricks Identify Azure Databricks workloads Understand key concepts 23 - Use Apache Spark in Azure Databricks Get to know Spark Create a Spark cluster Use Spark in notebooks Use Spark to work with data files Visualize data 24 - Run Azure Databricks Notebooks with Azure Data Factory Understand Azure Databricks notebooks and pipelines Create a linked service for Azure Databricks Use a Notebook activity in a pipeline Use parameters in a notebook Additional course details: Nexus Humans DP-203T00 Data Engineering on Microsoft Azure training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the DP-203T00 Data Engineering on Microsoft Azure course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

DP-203T00 Data Engineering on Microsoft Azure
Delivered Online
£2,380

Root Cause Analysis for Boilers and Steam Cycle Failures

By EnergyEdge - Training for a Sustainable Energy Future

Enhance your skills with our EnergyEdge course on root cause analysis for boilers and steam cycle failures. Join us for a transformative learning experience!

Root Cause Analysis for Boilers and Steam Cycle Failures
Delivered In-Person
£2,699 to £2,799

Heat Rate Optimization of Coal Power Plants

By EnergyEdge - Training for a Sustainable Energy Future

Enhance coal power plant efficiency with EnergyEdge's course on heat rate optimization. Join our classroom training for expert insights!

Heat Rate Optimization of Coal Power Plants
Delivered In-Person
£2,799 to £2,999