• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

440 Engineering courses in Androssan delivered Live Online

AZ-400 Designing and Implementing Microsoft DevOps Solutions

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for Students in this course are interested in implementing DevOps processes or in passing the Microsoft Azure DevOps Solutions certification exam. Overview After completing this course, students will be able to: Plan for the transformation with shared goals and timelines Select a project and identify project metrics and Key Performance Indicators (KPI's) Create a team and agile organizational structure Design a tool integration strategy Design a license management strategy (e.g., Azure DevOps and GitHub users) Design a strategy for end-to-end traceability from work items to working software Design an authentication and access strategy Design a strategy for integrating on-premises and cloud resources Describe the benefits of using Source Control Describe Azure Repos and GitHub Migrate from TFVC to Git Manage code quality including technical debt SonarCloud, and other tooling solutions Build organizational knowledge on code quality Explain how to structure Git repos Describe Git branching workflows Leverage pull requests for collaboration and code reviews Leverage Git hooks for automation Use Git to foster inner source across the organization Explain the role of Azure Pipelines and its components Configure Agents for use in Azure Pipelines Explain why continuous integration matters Implement continuous integration using Azure Pipelines Define Site Reliability Engineering Design processes to measure end-user satisfaction and analyze user feedback Design processes to automate application analytics Manage alerts and reduce meaningless and non-actionable alerts Carry out blameless retrospectives and create a just culture Define an infrastructure and configuration strategy and appropriate toolset for a release pipeline and application infrastructure Implement compliance and security in your application infrastructure Describe the potential challenges with integrating open-source software Inspect open-source software packages for security and license compliance Manage organizational security and compliance policies Integrate license and vulnerability scans into build and deployment pipelines Configure build pipelines to access package security and license ratings This course provides the knowledge and skills to design and implement DevOps processes and practices. Students will learn how to plan for DevOps, use source control, scale Git for an enterprise, consolidate artifacts, design a dependency management strategy, manage secrets, implement continuous integration, implement a container build strategy, design a release strategy, set up a release management workflow, implement a deployment pattern, and optimize feedback mechanisms. Module 1: Get started on a DevOps transformation journey Introduction to DevOps Choose the right project Describe team structures Choose the DevOps tools Plan Agile with GitHub Projects and Azure Boards Introduction to source control Describe types of source control systems Work with Azure Repos and GitHub Module 2: Development for enterprise DevOps Structure your Git Repo Manage Git branches and workflows Collaborate with pull requests in Azure Repos Explore Git hooks Plan foster inner source Manage Git repositories Identify technical debt Module 3: Implement CI with Azure Pipelines and GitHub Actions Explore Azure Pipelines Manage Azure Pipeline agents and pools Describe pipelines and concurrency Explore Continuous integration Implement a pipeline strategy Integrate with Azure Pipelines Introduction to GitHub Actions Learn continuous integration with GitHub Actions Design a container build strategy Module 4: Design and implement a release strategy Introduction to continuous delivery Explore release strategy recommendations Build a high-quality release pipeline Introduction to deployment patterns Implement blue-green deployment and feature toggles Implement canary releases and dark launching Implement A/B testing and progressive exposure deployment Module 5: Implement a secure continuous deployment using Azure Pipelines Create a release pipeline Provision and test environments Manage and modularize tasks and templates Automate inspection of health Manage application configuration data Integrate with identity management systems Implement application configuration Module 6: Manage infrastructure as code using Azure and DSC Explore infrastructure as code and configuration management Create Azure resources using Azure Resource Manager templates Create Azure resources by using Azure CLI Explore Azure Automation with DevOps Implement Desired State Configuration (DSC) Implement Bicep Module 7: Implement security and validate code bases for compliance Introduction to Secure DevOps Implement open-source software Software Composition Analysis Static analyzers OWASP and Dynamic Analyzers Security Monitoring and Governance Module 8: Design and implement a dependency management strategy Explore package dependencies Understand package management Migrate, consolidate, and secure artifacts Implement a versioning strategy Introduction to GitHub Packages Module 9: Implement continuous feedback Implement tools to track usage and flow Develop monitor and status dashboards Share knowledge within teams Design processes to automate application analytics Manage alerts, Blameless retrospectives and a just culture Additional course details: Nexus Humans AZ-400 Designing and Implementing Microsoft DevOps Solutions training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-400 Designing and Implementing Microsoft DevOps Solutions course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

AZ-400 Designing and Implementing Microsoft DevOps Solutions
Delivered OnlineFlexible Dates
Price on Enquiry

Partial Discharges - Fundamentals, Dectection, Diagnostics

By High Frequency Diagnostics and Engineering (HFDE) Ltd

Customised courses ranging from 1 hour online to a full day in person at your premises with hands-on experience and demonstrations. Please contact Martin Judd for details of our training options, delivery methods and pricing.

Partial Discharges - Fundamentals, Dectection, Diagnostics
Delivered in person or OnlineFlexible Dates
£100

Certified Professional Ethical Hacker

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. Security Fundamentals Overview The Growth of Environments and Security Our Motivation? The Goal: Protecting Information! CIA Triad in Detail Approach Security Holistically Security Definitions Definitions Relationships Method: Ping The TCP/IP Stack Which Services Use Which Ports? TCP 3-Way Handshake TCP Flags Malware Types of Malware Types of Malware Cont... Types of Viruses More Malware: Spyware Trojan Horses Back Doors DoS DDoS Packet Sniffers Passive Sniffing Active Sniffing Firewalls, IDS and IPS Firewall ? First Line of Defense IDS ? Second Line of Defense IPS ? Last Line of Defense? Firewalls Firewall Types: (1) Packet Filtering Firewall Types: (2) Proxy Firewalls Firewall Types ? Circuit-Level Proxy Firewall Type of Circuit- Level Proxy ? SOCKS Firewall Types ? Application-Layer Proxy Firewall Types: (3) Stateful Firewall Types: (4) Dynamic Packet-Filtering Firewall Types: (5) Kernel Proxies Firewall Placement Firewall Architecture Types ? Screened Host Multi- or Dual-Homed Screened Subnet Wi-Fi Network Types Wi-Fi Network Types Widely Deployed Standards Standards Comparison 802.11n - MIMO Overview of Database Server Review Access Controls Overview Role of Access Control Definitions More Definitions Categories of Access Controls Physical Controls Logical Controls ?Soft? Controls Security Roles Steps to Granting Access Access Criteria Physical Access Control Mechanisms Biometric System Types Synchronous Token Asynchronous Token Device Memory Cards Smart Card Cryptographic Keys Logical Access Controls OS Access Controls Linux Access Controls Accounts and Groups Password & Shadow File Formats Accounts and Groups Linux and UNIX Permissions Set UID Programs Trust Relationships Review Protocols Protocols Overview OSI ? Application Layer OSI ? Presentation Layer OSI ? Session Layer Transport Layer OSI ? Network Layer OSI ? Data Link OSI ? Physical Layer Protocols at Each OSI Model Layer TCP/IP Suite Port and Protocol Relationship Conceptual Use of Ports UDP versus TCP Protocols ? ARP Protocols ? ICMP Network Service ? DNS SSH Security Protocol SSH Protocols ? SNMP Protocols ? SMTP Packet Sniffers Example Packet Sniffers Review Cryptography Overview Introduction Encryption Cryptographic Definitions Encryption Algorithm Implementation Symmetric Encryption Symmetric Downfalls Symmetric Algorithms Crack Times Asymmetric Encryption Public Key Cryptography Advantages Asymmetric Algorithm Disadvantages Asymmetric Algorithm Examples Key Exchange Symmetric versus Asymmetric Using the Algorithm Types Together Instructor Demonstration Hashing Common Hash Algorithms Birthday Attack Example of a Birthday Attack Generic Hash Demo Instructor Demonstration Security Issues in Hashing Hash Collisions MD5 Collision Creates Rogue Certificate Authority Hybrid Encryption Digital Signatures SSL/TLS SSL Connection Setup SSL Hybrid Encryption SSH IPSec - Network Layer Protection IPSec IPSec Public Key Infrastructure Quantum Cryptography Attack Vectors Network Attacks More Attacks (Cryptanalysis) Review Why Vulnerability Assessments? Overview What is a Vulnerability Assessment? Vulnerability Assessment Benefits of a Vulnerability Assessment What are Vulnerabilities? Security Vulnerability Life Cycle Compliance and Project Scoping The Project Overview Statement Project Overview Statement Assessing Current Network Concerns Vulnerabilities in Networks More Concerns Network Vulnerability Assessment Methodology Network Vulnerability Assessment Methodology Phase I: Data Collection Phase II: Interviews, Information Reviews, and Hands-On Investigation Phase III: Analysis Analysis cont. Risk Management Why Is Risk Management Difficult? Risk Analysis Objectives Putting Together the Team and Components What Is the Value of an Asset? Examples of Some Vulnerabilities that Are Not Always Obvious Categorizing Risks Some Examples of Types of Losses Different Approaches to Analysis Who Uses What? Qualitative Analysis Steps Quantitative Analysis ALE Values Uses ALE Example ARO Values and Their Meaning ALE Calculation Can a Purely Quantitative Analysis Be Accomplished? Comparing Cost and Benefit Countermeasure Criteria Calculating Cost/Benefit Cost of a Countermeasure Can You Get Rid of All Risk? Management?s Response to Identified Risks Liability of Actions Policy Review (Top-Down) Methodology Definitions Policy Types Policies with Different Goals Industry Best Practice Standards Components that Support the Security Policy Policy Contents When Critiquing a Policy Technical (Bottom-Up) Methodology Review Vulnerability Tools of the Trade Vulnerability Scanners Nessus SAINT ? Sample Report Tool: Retina Qualys Guard http://www.qualys.com/products/overview/ Tool: LANguard Microsoft Baseline Analyzer MBSA Scan Report Dealing with Assessment Results Patch Management Options Review Output Analysis and Reports Overview Staying Abreast: Security Alerts Vulnerability Research Sites Nessus SAINT SAINT Reports GFI Languard GFI Reports MBSA MBSA Reports Review Reconnaissance, Enumeration & Scanning Reconnaissance Overview Step One in the Hacking ?Life-Cycle? What Information is Gathered by the Hacker? Passive vs. Active Reconnaissance Footprinting Defined Social Access Social Engineering Techniques Social Networking Sites People Search Engines Internet Archive: The WayBack Machine Footprinting Tools Overview Maltego GUI Johnny.Ihackstuff.com Google (cont.) Domain Name Registration WHOIS Output DNS Databases Using Nslookup Traceroute Operation Web Server Info Tool: Netcraft Introduction to Port Scanning Which Services use Which Ports? Port Scan Tips Port Scans Shou

Certified Professional Ethical Hacker
Delivered OnlineFlexible Dates
Price on Enquiry

Cisco Administering Collaboration Environments (CLACE)

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is as follows: Administrator IT support personnel Helpdesk support staff The secondary audience for this course is as follows: Network Engineering Staff Overview Upon completing this course, the learner can meet these overall objectives: Demonstrate an overall understanding of the Cisco Unified Communications Manager (CUCM) system and its environment Configure CUCM to support IP Phones Configure Cisco Unified Communications Manager and IM&Presence to support Cisco Jabber soft client. Configure CUCM to route calls to internal and PSTN destinations Configure User accounts and multi-level administration Demonstrate the use of Self Care Portal functionality Configure user features, including Hunt Groups, Call Pickup, and Call Park. Define the capabilities of and demonstrate the Bulk Administration Tool Define the SMART Licensing model for Cisco Unified Communications Demonstrate the use of the Unified Reporting tool Demonstrate the use of the Dialed Number Analyzer Explain the function of Cisco Unity Connection and the various interfaces that are used to access the system Describe the components that are required for user call processing by Cisco Unity Connection Implement the various features and options that are available to users in Cisco Unity Connection Explore Cisco Unity Connection version features and functions Use the various applications, tools, and reports that are available in Cisco Unity Connection Administering Collaboration Environments (CLACE) is an instructor-led course presented by Skyline-ATS to system administrators and customers involved with the Cisco Unified Communications Manager and Cisco Unity Connection product's day-to-day operation. The CLACE course is the replacement for the CMA / UCA courses. CLACE is a lab-intensive course. The primary focus is learning by performing the configuration tasks. The amount of theory is limited to allow more time for discovery exercises. This course introduces you to the CUCM system, the necessary procedures for administering IP Phones and Users, understanding the Dial Plan, and implementing Features. The course also covers Jabber administration and Cisco Unity Connection administration features, options, and configuration settings. In addition to instructor-led lectures and discussions, you will configure CUCM and Cisco IP Phones in the lab, either in a live classroom or WebEx remote classroom environment. While the CUCM and CUC software used in the class is version 12.5.1, the course material applies to versions 8.x, 9.x, 10.x, 11.x, or 12.x of the applications. The concepts and the lab tasks are the same for most of the software versions. Define Collaboration Technology and Benefits Define Collaboration Benefits Describe On-Premise, Cloud, and Hybrid Deployments Describe On-Premise Collaboration Deployments Describe Cisco's Collaboration Endpoints Describe Cisco Collaboration On-Premise Edge Solutions Describe Cisco's Collaboration On-Premise Conferencing Solutions Describe Cisco Cloud Services Administering Initial Parameters for Cisco Unified Communications Manager Understand the On-Premise Collaboration Deployment Models Describe The Cisco Unified CM Cluster Services Define Network requirements for Collaboration Define Network Services for Collaboration Navigate Cisco Unified CM Discovery 1: Configure Cisco Unified Communications Manager Initial Parameters Explore Cisco Unified CM Groups Discovery 2: Configure the Cisco UCM Core Systems Settings Exploring Endpoints and the Registration Process Identify Cisco Endpoint Solutions Explore the Boot up Process of an Endpoint Describe Power Over Ethernet Discovery 3: Configure an Access Switch for an Endpoint Describe IP Network Settings Discovery 4: Deploy an IP Phone Through Auto and Manual Registration Discovery 5: Administer Endpoints in Cisco Unified Communications Manager Managing Users in Cisco Unified Communications Manager Analyze Cisco UCM Users Types and Settings Describe Methods for Authenticating Cisco UCM Users Discovery 6: Create Local User Accounts Discovery 7: Adding Users in Cisco Unified Communications Manager Describing a Basic Dial Plan Describe the Concepts of a Dial Plan and Call Routing Describe Elements of Call Routing Explore Digit Manipulation and Translation Patterns Discovery 8: Create a Basic Dial Plan Describing Class of Service Explore the Concepts of Class of Control Discovery 9: Explore Partitions and Calling Search Spaces Discovery 10: Explore Private Line Automatic Ringdown (PLAR) Enabling Endpoints and Features Configure a Cisco Jabber Endpoint in Cisco UCM Discovery 11: Implementing Common Endpoint Features (Configuring Hunt Groups and Call Coverage) Explore Mobility Discovery 12: Implement Mobility Implementing Media Resources in Cisco Unified Communications Manager Media Resource Overview Media Resource Selection and Access Control Audio and Video Conference Bridge Devices Audio and Video Conference Bridge Integration Options Discovery 13: Configuring Media Resources Reporting and Maintenance Explore the Troubleshooting Process Describe Reporting and Maintenance Tools Describe the Cisco Real-Time Monitoring Tool Discovery 14: Use Reporting and maintenance Tools Describing Cisco Instant Messaging and Presence Describe Cisco IM and Presence Features and Architecture Clustering Describe Cisco IM and Presence Components and Communication Flows Enabling Jabber Cisco Jabber Deployment Modes Discovery 15: Deploy an On-Premise Cisco Jabber Client for Windows Configure Unity Connection Integration Overview of Cisco Unity Connection Integration SIP Integration Typical Integration Mistakes Integration Considerations Discovery 16: Configure the integration between Cisco Unity Connection and Cisco UCM Discovery 17: Configure Voicemail Users Configuring Cisco Unity Connection Call Handlers Call handler Overview System Call Handler Caller Input Operator Call Handler Goodbye Call Handler Directory Handler Interview Handler Troubleshooting Cisco Unity Connection Overview of Cisco Unity Connection Troubleshooting Options Integration Troubleshooting Tools Cisco Real-Time Monitoring Tool Discovery 18: Troubleshoot Cisco Unity Connection Additional course details: Nexus Humans Cisco Administering Collaboration Environments (CLACE) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Cisco Administering Collaboration Environments (CLACE) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Cisco Administering Collaboration Environments (CLACE)
Delivered OnlineFlexible Dates
Price on Enquiry

CompTIA Data+

By Nexus Human

Duration 5 Days 30 CPD hours Overview Mining data Manipulating data Visualizing and reporting data Applying basic statistical methods Analyzing complex datasets while adhering to governance and quality standards throughout the entire data life cycle CompTIA Data+ is an early-career data analytics certification for professionals tasked with developing and promoting data-driven business decision-making. CompTIA Data+ gives you the confidence to bring data analysis to life. As the importance for data analytics grows, more job roles are required to set context and better communicate vital business intelligence. Collecting, analyzing, and reporting on data can drive priorities and lead business decision-making. 1 - Identifying Basic Concepts of Data Schemas Identify Relational and Non-Relational Databases Understand the Way We Use Tables, Primary Keys, and Normalization 2 - Understanding Different Data Systems Describe Types of Data Processing and Storage Systems Explain How Data Changes 3 - Understanding Types and Characteristics of Data Understand Types of Data Break Down the Field Data Types 4 - Comparing and Contrasting Different Data Structures, Formats, and Markup Languages Differentiate between Structured Data and Unstructured Data Recognize Different File Formats Understand the Different Code Languages Used for Data 5 - Explaining Data Integration and Collection Methods Understand the Processes of Extracting, Transforming, and Loading Data Explain API/Web Scraping and Other Collection Methods Collect and Use Public and Publicly-Available Data Use and Collect Survey Data 6 - Identifying Common Reasons for Cleansing and Profiling Data Learn to Profile Data Address Redundant, Duplicated, and Unnecessary Data Work with Missing Value Address Invalid Data Convert Data to Meet Specifications 7 - Executing Different Data Manipulation Techniques Manipulate Field Data and Create Variables Transpose and Append Data Query Data 8 - Explaining Common Techniques for Data Manipulation and Optimization Use Functions to Manipulate Data Use Common Techniques for Query Optimization 9 - Applying Descriptive Statistical Methods Use Measures of Central Tendency Use Measures of Dispersion Use Frequency and Percentages 10 - Describing Key Analysis Techniques Get Started with Analysis Recognize Types of Analysis 11 - Understanding the Use of Different Statistical Methods Understand the Importance of Statistical Tests Break Down the Hypothesis Test Understand Tests and Methods to Determine Relationships Between Variables 12 - Using the Appropriate Type of Visualization Use Basic Visuals Build Advanced Visuals Build Maps with Geographical Data Use Visuals to Tell a Story 13 - Expressing Business Requirements in a Report Format Consider Audience Needs When Developing a Report Describe Data Source Considerations For Reporting Describe Considerations for Delivering Reports and Dashboards Develop Reports or Dashboards Understand Ways to Sort and Filter Data 14 - Designing Components for Reports and Dashboards Design Elements for Reports and Dashboards Utilize Standard Elements Creating a Narrative and Other Written Elements Understand Deployment Considerations 15 - Understand Deployment Considerations Understand How Updates and Timing Affect Reporting Differentiate Between Types of Reports 16 - Summarizing the Importance of Data Governance Define Data Governance Understand Access Requirements and Policies Understand Security Requirements Understand Entity Relationship Requirements 17 - Applying Quality Control to Data Describe Characteristics, Rules, and Metrics of Data Quality Identify Reasons to Quality Check Data and Methods of Data Validation 18 - Explaining Master Data Management Concepts Explain the Basics of Master Data Management Describe Master Data Management Processes Additional course details: Nexus Humans CompTIA Data Plus (DA0-001) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the CompTIA Data Plus (DA0-001) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

CompTIA Data+
Delivered OnlineFlexible Dates
£2,475

Building Your Own Computer

By NextGen Learning

Course Overview "Building Your Own Computer" is designed to provide a comprehensive introduction to the world of computer assembly and configuration. This course covers the essential aspects of understanding computer hardware, software, and networking, equipping learners with the necessary skills to build their own custom systems. The course is structured to help individuals at all levels understand the key components of a computer, from the basics of hardware to advanced topics like gaming PC construction and system maintenance. By the end of the course, learners will be able to confidently assemble a computer, troubleshoot common issues, and understand the importance of system optimisation. Course Description This course offers an in-depth exploration of the process of building a computer from scratch. Learners will start with a foundational understanding of computer components, moving through each part's function and interaction. Key topics include selecting and assembling hardware, installing software, and configuring networking systems. The course also covers the process of building a custom gaming PC, along with strategies for maintaining and upgrading a computer system. Through a series of well-structured modules, learners will develop a strong understanding of how to assemble, optimise, and troubleshoot a computer, preparing them for both personal projects and professional roles in IT and system management. Course Modules Module 01: Introduction to Computer & Building PC Module 02: Overview of Hardware and Parts Module 03: Building the Computer Module 04: Input and Output Devices Module 05: Software Installation Module 06: Computer Networking Module 07: Building a Gaming PC Module 08: Maintenance of Computers (See full curriculum) Who is this course for? Individuals seeking to build their own computer systems. Professionals aiming to enhance their understanding of IT hardware and software. Beginners with an interest in computer engineering or system management. Technology enthusiasts looking to deepen their knowledge of computer construction. Career Path IT Technician Network Administrator Hardware Engineer Systems Analyst Gaming PC Builder and Optimisation Specialist Computer Maintenance and Support Expert

Building Your Own Computer
Delivered OnlineFlexible Dates
£9.99

Energy Saving in Electric Motors

By NextGen Learning

Course Overview This course on "Energy Saving in Electric Motors" provides learners with a comprehensive understanding of the principles and techniques for improving energy efficiency in electric motors. With the increasing demand for sustainable practices, this course equips participants with the knowledge to identify and implement energy-saving solutions, ultimately helping businesses reduce operational costs and environmental impact. Through a structured approach, learners will explore motor classifications, losses, and various strategies for optimising energy consumption. By the end of the course, participants will be equipped with the skills to enhance motor performance, ensuring long-term energy savings and contributing to a greener future. Course Description The "Energy Saving in Electric Motors" course covers a wide range of topics crucial for understanding energy efficiency in motor systems. Learners will explore key concepts such as motor classifications, relevant terminology, and the various losses associated with electric motors. The course delves into multiple strategies for energy saving across five focused modules, providing detailed insights into how energy consumption can be reduced at different stages of motor operation. The course also introduces energy-efficient motor technologies, ensuring learners gain a well-rounded understanding of the subject. Participants will develop the skills to identify opportunities for energy optimisation in motor systems, improving both operational efficiency and environmental sustainability. Course Modules Module 01: Introduction Module 02: Classification Module 03: Terminologies Module 04: Losses Module 05: Energy saving in motors part I Module 06: Energy saving in motors part II Module 07: Energy saving in motors part III Module 08: Energy saving in motors part IV Module 09: Energy saving in motors part V Module 10: Energy Efficient Motor (See full curriculum) Who is this course for? Individuals seeking to improve energy efficiency in industrial operations. Professionals aiming to enhance their expertise in electric motor systems. Beginners with an interest in energy management or electrical engineering. Environmental advocates looking to contribute to sustainable practices in the industrial sector. Career Path Energy Efficiency Consultant Electrical Engineer (Industrial Applications) Sustainability Manager Motor Systems Specialist Energy Auditing Professional

Energy Saving in Electric Motors
Delivered OnlineFlexible Dates
£9.99

Intermediate Solidworks Course

By NextGen Learning

Intermediate Solidworks Course Overview This Intermediate SolidWorks course is designed for individuals looking to deepen their knowledge of CAD and 3D modelling. With an emphasis on advanced part and assembly modelling techniques, this course offers learners the opportunity to refine their skills and become proficient in SolidWorks. By completing this course, learners will gain a solid understanding of complex modelling strategies, design tables, and advanced configurations. They will also develop the ability to manage assemblies efficiently and implement best practices for higher-level design work. Whether you are looking to improve your technical capabilities or move into more advanced roles, this course will provide the foundation for future success in design and engineering. Course Description The Intermediate SolidWorks course dives deep into advanced techniques for part and assembly modelling. Key topics include mastering design tables, configurations, and exploring sophisticated methods to build complex parts. Learners will explore a range of modelling tools that enhance efficiency and accuracy in creating intricate 3D models. The course also covers assembly management, enabling learners to handle large-scale projects effectively. By the end of the course, learners will be equipped with the skills to confidently tackle intermediate-level SolidWorks challenges. This course is ideal for those looking to enhance their CAD proficiency and prepare for more advanced technical roles. Intermediate Solidworks Course Curriculum Module 01: Part Modeling Advanced Techniques- Part 1 Module 02: Part Modeling Advanced Techniques- Part 2 Module 03: Design Table and Configurations Module 04: Assembly Advanced Techniques- Part 1 Module 05: Assembly Advanced Techniques- Part 2 (See full curriculum) Who is this course for? Individuals seeking to expand their 3D modelling skills Professionals aiming to enhance their CAD expertise Beginners with an interest in computer-aided design Designers and engineers looking to improve their technical knowledge Career Path CAD Designer Mechanical Engineer Design Engineer Product Development Specialist Manufacturing Engineer SolidWorks Specialist

Intermediate Solidworks Course
Delivered OnlineFlexible Dates
£7.99

DP-100T01 Designing and Implementing a Data Science Solution on Azure

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is designed for data scientists with existing knowledge of Python and machine learning frameworks like Scikit-Learn, PyTorch, and Tensorflow, who want to build and operate machine learning solutions in the cloud. Overview Learn how to operate machine learning solutions at cloud scale using Azure Machine Learning. This course teaches you to leverage your existing knowledge of Python and machine learning to manage data ingestion and preparation, model training and deployment, and machine learning solution monitoring in Microsoft Azure. Learn how to operate machine learning solutions at cloud scale using Azure Machine Learning. This course teaches you to leverage your existing knowledge of Python and machine learning to manage data ingestion and preparation, model training and deployment, and machine learning solution monitoring with Azure Machine Learning and MLflow. Prerequisites Creating cloud resources in Microsoft Azure. Using Python to explore and visualize data. Training and validating machine learning models using common frameworks like Scikit-Learn, PyTorch, and TensorFlow. Working with containers AI-900T00: Microsoft Azure AI Fundamentals is recommended, or the equivalent experience. 1 - Design a data ingestion strategy for machine learning projects Identify your data source and format Choose how to serve data to machine learning workflows Design a data ingestion solution 2 - Design a machine learning model training solution Identify machine learning tasks Choose a service to train a machine learning model Decide between compute options 3 - Design a model deployment solution Understand how model will be consumed Decide on real-time or batch deployment 4 - Design a machine learning operations solution Explore an MLOps architecture Design for monitoring Design for retraining 5 - Explore Azure Machine Learning workspace resources and assets Create an Azure Machine Learning workspace Identify Azure Machine Learning resources Identify Azure Machine Learning assets Train models in the workspace 6 - Explore developer tools for workspace interaction Explore the studio Explore the Python SDK Explore the CLI 7 - Make data available in Azure Machine Learning Understand URIs Create a datastore Create a data asset 8 - Work with compute targets in Azure Machine Learning Choose the appropriate compute target Create and use a compute instance Create and use a compute cluster 9 - Work with environments in Azure Machine Learning Understand environments Explore and use curated environments Create and use custom environments 10 - Find the best classification model with Automated Machine Learning Preprocess data and configure featurization Run an Automated Machine Learning experiment Evaluate and compare models 11 - Track model training in Jupyter notebooks with MLflow Configure MLflow for model tracking in notebooks Train and track models in notebooks 12 - Run a training script as a command job in Azure Machine Learning Convert a notebook to a script Run a script as a command job Use parameters in a command job 13 - Track model training with MLflow in jobs Track metrics with MLflow View metrics and evaluate models 14 - Perform hyperparameter tuning with Azure Machine Learning Define a search space Configure a sampling method Configure early termination Use a sweep job for hyperparameter tuning 15 - Run pipelines in Azure Machine Learning Create components Create a pipeline Run a pipeline job 16 - Register an MLflow model in Azure Machine Learning Log models with MLflow Understand the MLflow model format Register an MLflow model 17 - Create and explore the Responsible AI dashboard for a model in Azure Machine Learning Understand Responsible AI Create the Responsible AI dashboard Evaluate the Responsible AI dashboard 18 - Deploy a model to a managed online endpoint Explore managed online endpoints Deploy your MLflow model to a managed online endpoint Deploy a model to a managed online endpoint Test managed online endpoints 19 - Deploy a model to a batch endpoint Understand and create batch endpoints Deploy your MLflow model to a batch endpoint Deploy a custom model to a batch endpoint Invoke and troubleshoot batch endpoints

DP-100T01 Designing and Implementing a Data Science Solution on Azure
Delivered OnlineFlexible Dates
£1,785

Hybrid Vehicle Expert Training

By NextGen Learning

Hybrid Vehicle Expert Training Course Overview The Hybrid Vehicle Expert Training course provides an in-depth understanding of hybrid electric vehicles (HEVs), focusing on their design, operation, and technology. Learners will explore various types of hybrids, key components, and the degree of hybridisation, enhancing their technical knowledge for the automotive industry. This course equips participants with essential skills to analyse regenerative systems and other innovative features that improve fuel efficiency and reduce emissions. By the end of the course, learners will be confident in identifying different HEV architectures and understanding their functional principles, preparing them for roles in vehicle maintenance, engineering, and technical consultancy within the evolving green transport sector. Course Description This course offers comprehensive coverage of hybrid vehicle technology, beginning with an introduction to hybrid electric vehicles and their classifications. It delves into the degree of hybridisation, explaining how various systems operate to optimise energy use. Detailed study of HEV components provides insight into powertrains, batteries, and control systems. The course also covers regenerative braking and energy recovery technologies that enhance vehicle efficiency. Learners will gain analytical skills required to evaluate hybrid systems and keep pace with developments in sustainable automotive design. The structured learning experience combines theory and technical knowledge, suitable for those aiming to build expertise in green vehicle technologies and contribute to environmental sustainability within the automotive sector. Hybrid Vehicle Expert Training Curriculum: Module 01: Introduction Module 02: Types of Hybrid Electric Vehicles Module 03: Degree of Hybridisation Module 04: Components of HEVs Module 05: Regenerative Systems (See full curriculum) Who is this course for? Individuals seeking to develop expertise in hybrid vehicle technology. Professionals aiming to advance their careers in the automotive or green transport sectors. Beginners with an interest in sustainable automotive technologies. Technicians and engineers preparing for roles in vehicle systems analysis and maintenance. Career Path Hybrid Vehicle Technician Automotive Engineer specialising in green technologies Vehicle Systems Analyst Technical Consultant for sustainable transport solutions Research and Development Specialist in automotive innovation

Hybrid Vehicle Expert Training
Delivered OnlineFlexible Dates
£7.99