• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

3288 Engineering courses

ETAP Power System Protection Analysis for Electrical Engineers

4.7(160)

By Janets

Register on the ETAP Power System Protection Analysis for Electrical Engineers today and build the experience, skills and knowledge you need to enhance your professional development and work towards your dream job. Study this course through online learning and take the first steps towards a long-term career. The course consists of a number of easy to digest, in-depth modules, designed to provide you with a detailed, expert level of knowledge. Learn through a mixture of instructional video lessons and online study materials. Receive online tutor support as you study the course, to ensure you are supported every step of the way. Get an e-certificate as proof of your course completion. The ETAP Power System Protection Analysis for Electrical Engineers is incredibly great value and allows you to study at your own pace. Access the course modules from any internet-enabled device, including computers, tablet, and smartphones. The course is designed to increase your employability and equip you with everything you need to be a success. Enrol on the now and start learning instantly! What You Get With The ETAP Power System Protection Analysis for Electrical Engineers Receive a e-certificate upon successful completion of the course Get taught by experienced, professional instructors Study at a time and pace that suits your learning style Get instant feedback on assessments 24/7 help and advice via email or live chat Get full tutor support on weekdays (Monday to Friday) Course Design The course is delivered through our online learning platform, accessible through any internet-connected device. There are no formal deadlines or teaching schedules, meaning you are free to study the course at your own pace. You are taught through a combination of Video lessons Online study materials Certification Upon successful completion of the course, you will be able to obtain your course completion e-certificate free of cost. Print copy by post is also available at an additional cost of £9.99 and PDF Certificate at £4.99. Who Is This Course For: The course is ideal for those who already work in this sector or are an aspiring professional. This course is designed to enhance your expertise and boost your CV. Learn key skills and gain a professional qualification to prove your newly-acquired knowledge. Requirements: The online training is open to all students and has no formal entry requirements. To study the ETAP Power System Protection Analysis for Electrical Engineers, all your need is a passion for learning, a good understanding of English, numeracy, and IT skills. You must also be over the age of 16. Course Content ETAP Power System Protection Analysis Lesson 1 - Protection Course Introduction 00:07:00 Lesson 2 - Protection & Coordination Analysis Fundamentals 00:23:00 Lesson 3 - Protection & Coordination Analysis Example 00:52:00 Lesson 4 - Star Auto Evaluation Example 00:12:00 Lesson 5 - Understanding of CT Polarity 00:02:00 Lesson 6 - Ring Main System Coordination Fundamental 00:14:00 Lesson 7 - Ring Main System Coordination Example 00:05:00 Lesson 8 - Relay Coordination for Multiple Source Theory 00:07:00 Lesson 9 - Relay Coordination for Multiple Source_Method1_ETAP Example 00:11:00 Lesson 10 - Relay Coordination for Multiple Source_Method2_ETAP Example 00:08:00 Lesson 11 - Relay Coordination for Multiple Source_Method3_ETAP Example 00:06:00 Lesson 12 - Voltage-Dependent Relay Coordination Theory 00:13:00 Lesson 13 - Voltage-Dependent Relay Coordination Example ETAP 00:27:00 Resource - ETAP Power System Protection Analysis for Electrical Engineers 00:00:00 Frequently Asked Questions Are there any prerequisites for taking the course? There are no specific prerequisites for this course, nor are there any formal entry requirements. All you need is an internet connection, a good understanding of English and a passion for learning for this course. Can I access the course at any time, or is there a set schedule? You have the flexibility to access the course at any time that suits your schedule. Our courses are self-paced, allowing you to study at your own pace and convenience. How long will I have access to the course? For this course, you will have access to the course materials for 1 year only. This means you can review the content as often as you like within the year, even after you've completed the course. However, if you buy Lifetime Access for the course, you will be able to access the course for a lifetime. Is there a certificate of completion provided after completing the course? Yes, upon successfully completing the course, you will receive a certificate of completion. This certificate can be a valuable addition to your professional portfolio and can be shared on your various social networks. Can I switch courses or get a refund if I'm not satisfied with the course? We want you to have a positive learning experience. If you're not satisfied with the course, you can request a course transfer or refund within 14 days of the initial purchase. How do I track my progress in the course? Our platform provides tracking tools and progress indicators for each course. You can monitor your progress, completed lessons, and assessments through your learner dashboard for the course. What if I have technical issues or difficulties with the course? If you encounter technical issues or content-related difficulties with the course, our support team is available to assist you. You can reach out to them for prompt resolution.

ETAP Power System Protection Analysis for Electrical Engineers
Delivered Online On Demand3 hours 7 minutes
£25

Certified Professional Ethical Hacker

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is targeted towards the information technology (IT) professional that has a minimum 1 year IT Security and Networking experience. This course would be ideal for Information System Owners, Security Officers, Ethical Hackers, Information Owners, Penetration Testers, System Owner and Managers as well as Cyber Security Engineers. Overview Upon completion, the Certified Professional Ethical Hacker candidate will be able to competently take the CPEH exam. The CPEH certification training enables students to understand the importance of vulnerability assessments and how to implement counter response along with preventative measures when it comes to a network hack. Security Fundamentals Overview The Growth of Environments and Security Our Motivation? The Goal: Protecting Information! CIA Triad in Detail Approach Security Holistically Security Definitions Definitions Relationships Method: Ping The TCP/IP Stack Which Services Use Which Ports? TCP 3-Way Handshake TCP Flags Malware Types of Malware Types of Malware Cont... Types of Viruses More Malware: Spyware Trojan Horses Back Doors DoS DDoS Packet Sniffers Passive Sniffing Active Sniffing Firewalls, IDS and IPS Firewall ? First Line of Defense IDS ? Second Line of Defense IPS ? Last Line of Defense? Firewalls Firewall Types: (1) Packet Filtering Firewall Types: (2) Proxy Firewalls Firewall Types ? Circuit-Level Proxy Firewall Type of Circuit- Level Proxy ? SOCKS Firewall Types ? Application-Layer Proxy Firewall Types: (3) Stateful Firewall Types: (4) Dynamic Packet-Filtering Firewall Types: (5) Kernel Proxies Firewall Placement Firewall Architecture Types ? Screened Host Multi- or Dual-Homed Screened Subnet Wi-Fi Network Types Wi-Fi Network Types Widely Deployed Standards Standards Comparison 802.11n - MIMO Overview of Database Server Review Access Controls Overview Role of Access Control Definitions More Definitions Categories of Access Controls Physical Controls Logical Controls ?Soft? Controls Security Roles Steps to Granting Access Access Criteria Physical Access Control Mechanisms Biometric System Types Synchronous Token Asynchronous Token Device Memory Cards Smart Card Cryptographic Keys Logical Access Controls OS Access Controls Linux Access Controls Accounts and Groups Password & Shadow File Formats Accounts and Groups Linux and UNIX Permissions Set UID Programs Trust Relationships Review Protocols Protocols Overview OSI ? Application Layer OSI ? Presentation Layer OSI ? Session Layer Transport Layer OSI ? Network Layer OSI ? Data Link OSI ? Physical Layer Protocols at Each OSI Model Layer TCP/IP Suite Port and Protocol Relationship Conceptual Use of Ports UDP versus TCP Protocols ? ARP Protocols ? ICMP Network Service ? DNS SSH Security Protocol SSH Protocols ? SNMP Protocols ? SMTP Packet Sniffers Example Packet Sniffers Review Cryptography Overview Introduction Encryption Cryptographic Definitions Encryption Algorithm Implementation Symmetric Encryption Symmetric Downfalls Symmetric Algorithms Crack Times Asymmetric Encryption Public Key Cryptography Advantages Asymmetric Algorithm Disadvantages Asymmetric Algorithm Examples Key Exchange Symmetric versus Asymmetric Using the Algorithm Types Together Instructor Demonstration Hashing Common Hash Algorithms Birthday Attack Example of a Birthday Attack Generic Hash Demo Instructor Demonstration Security Issues in Hashing Hash Collisions MD5 Collision Creates Rogue Certificate Authority Hybrid Encryption Digital Signatures SSL/TLS SSL Connection Setup SSL Hybrid Encryption SSH IPSec - Network Layer Protection IPSec IPSec Public Key Infrastructure Quantum Cryptography Attack Vectors Network Attacks More Attacks (Cryptanalysis) Review Why Vulnerability Assessments? Overview What is a Vulnerability Assessment? Vulnerability Assessment Benefits of a Vulnerability Assessment What are Vulnerabilities? Security Vulnerability Life Cycle Compliance and Project Scoping The Project Overview Statement Project Overview Statement Assessing Current Network Concerns Vulnerabilities in Networks More Concerns Network Vulnerability Assessment Methodology Network Vulnerability Assessment Methodology Phase I: Data Collection Phase II: Interviews, Information Reviews, and Hands-On Investigation Phase III: Analysis Analysis cont. Risk Management Why Is Risk Management Difficult? Risk Analysis Objectives Putting Together the Team and Components What Is the Value of an Asset? Examples of Some Vulnerabilities that Are Not Always Obvious Categorizing Risks Some Examples of Types of Losses Different Approaches to Analysis Who Uses What? Qualitative Analysis Steps Quantitative Analysis ALE Values Uses ALE Example ARO Values and Their Meaning ALE Calculation Can a Purely Quantitative Analysis Be Accomplished? Comparing Cost and Benefit Countermeasure Criteria Calculating Cost/Benefit Cost of a Countermeasure Can You Get Rid of All Risk? Management?s Response to Identified Risks Liability of Actions Policy Review (Top-Down) Methodology Definitions Policy Types Policies with Different Goals Industry Best Practice Standards Components that Support the Security Policy Policy Contents When Critiquing a Policy Technical (Bottom-Up) Methodology Review Vulnerability Tools of the Trade Vulnerability Scanners Nessus SAINT ? Sample Report Tool: Retina Qualys Guard http://www.qualys.com/products/overview/ Tool: LANguard Microsoft Baseline Analyzer MBSA Scan Report Dealing with Assessment Results Patch Management Options Review Output Analysis and Reports Overview Staying Abreast: Security Alerts Vulnerability Research Sites Nessus SAINT SAINT Reports GFI Languard GFI Reports MBSA MBSA Reports Review Reconnaissance, Enumeration & Scanning Reconnaissance Overview Step One in the Hacking ?Life-Cycle? What Information is Gathered by the Hacker? Passive vs. Active Reconnaissance Footprinting Defined Social Access Social Engineering Techniques Social Networking Sites People Search Engines Internet Archive: The WayBack Machine Footprinting Tools Overview Maltego GUI Johnny.Ihackstuff.com Google (cont.) Domain Name Registration WHOIS Output DNS Databases Using Nslookup Traceroute Operation Web Server Info Tool: Netcraft Introduction to Port Scanning Which Services use Which Ports? Port Scan Tips Port Scans Shou

Certified Professional Ethical Hacker
Delivered OnlineFlexible Dates
Price on Enquiry

DAW Production Stage 1 - DAW set up and making music (6-week course every Tuesday evening)

By MakeNoiseAcademy

DAW Production Stage 1 - DAW set up and making music EVERY TUESDAY FOR SIX WEEKS 12th September to 17th October 5pm - 9pm So you've worked out how to EQ things, when to use a compressor, how to manipulate the space with reverb and how much fun modulation effects can be. BUT ever feel like there's something they're just not telling you? This course gives you answers to the questions you didn't even know to ask!

DAW Production Stage 1 - DAW set up and making music (6-week course every Tuesday evening)
Delivered In-PersonFlexible Dates
£100

Mixing Techniques Stage 2 - Advanced mix tools and mastering (6-week course every Tuesday evening)

By MakeNoiseAcademy

MIXING TECHNIQUES STAGE 2 EVERY TUESDAY FOR SIX WEEKS 5pm - 9pm So you've worked out how to EQ things, when to use a compressor, how to manipulate the space with reverb and how much fun modulation effects can be. BUT ever feel like there's something they're just not telling you? This course gives you answers to the questions you didn't even know to ask!

Mixing Techniques Stage 2 - Advanced mix tools and mastering (6-week course every Tuesday evening)
Delivered In-PersonFlexible Dates
£100

Mixing Techniques Stage 1 - Processing and balancing audio (6-week course every Tuesday evening)

By MakeNoiseAcademy

MIXING TECHNIQUES STAGE 1 EVERY TUESDAY FOR SIX WEEKS 5pm - 9pm Imagine a gloriously painted landscape; as well as the main subjects, you see patches of sky and ground and maybe some things you don't notice on your first exposure. In mixing, we are trying to create a detailed 3D illusion, just like in this painting. But how can this be done?

Mixing Techniques Stage 1 - Processing and balancing audio (6-week course every Tuesday evening)
Delivered In-PersonFlexible Dates
£100

Home Studio Essentials (6-week course every Tuesday evening)

By MakeNoiseAcademy

HOME STUDIO ESSENTIALS EVERY TUESDAY FOR SIX WEEKS 5pm - 9pm A friendly, no-nonsense course to help you get the most out of your home studio. Learn everything you need to know, and discover a few things you didn't know you needed!

Home Studio Essentials (6-week course every Tuesday evening)
Delivered In-PersonFlexible Dates
£100

Recording Techniques Stage 1 - Essential recording skills (6-week course every Tuesday evening)

By MakeNoiseAcademy

RECORDING TECHNIQUES STAGE 1 EVERY TUESDAY FOR SIX WEEKS 5pm - 9pm A friendly, no-nonsense course about recording techniques including types of mics and how to use them.

Recording Techniques Stage 1 - Essential recording skills (6-week course every Tuesday evening)
Delivered In-PersonFlexible Dates
£100

Recording Techniques Stage 2 - Acoustics, complex recordings, and post-production (6-week course every Tuesday evening)

By MakeNoiseAcademy

RECORDING TECHNIQUES STAGE 1 EVERY TUESDAY FOR SIX WEEKS 5pm - 9pm A friendly, in-person course about advanced recording techniques.

Recording Techniques Stage 2 - Acoustics, complex recordings, and post-production (6-week course every Tuesday evening)
Delivered In-PersonFlexible Dates
£100

DAW Production Stage 2 - Creating and manipulating music (6-week course every Tuesday evening)

By MakeNoiseAcademy

EVERY TUESDAY FOR SIX WEEKS 5pm - 9pm 31st October - 5th December I NEED IT TO SOUND AWESOME! Get more creative with expert DAW production techniques.

DAW Production Stage 2 - Creating and manipulating music (6-week course every Tuesday evening)
Delivered In-PersonFlexible Dates
£100

Complete Document Control Training

By Wise Campus

Document Control: Complete Document Control Course Online Do you wish to strengthen your document control abilities? If so, you are welcome to enrol in our specially created Document Control Course, which is intended to provide participants an in-depth understanding. You will learn about the advantages of document management as well as the document control lifecycle in this Document Control course. The Document Control course also explains how to make a document control system more efficient. Additionally, the Document Control course places a strong emphasis on the underlying expertise, best practices, and legal ideas related to document control. Following your completion of our Document Control programme, you'll be more efficient at work. Join in our Document Control programme to get the skills you need to become more productive and structured. Learning Outcome of Document Control Course After completing the Document Control, learners will know about: Introduction to document control. The basics of document control. Keep document identification as a Document Control expert. Document classifying, filing & information security for Document Controlling. Document Control also explains documents lifecycle and document distribution. Project document control, prepare final documentation controlling and specifications for Document Control in an organisation. The Document Control course teaches electronic document management systems. Interactions with project teams, engineering teams, managers described in other modules of Document Control course. Special Offers of this Document Control: Complete Document Control Course This Document Control: Complete Document Control Course includes a FREE PDF Certificate. Lifetime access to this Document Control: Complete Document Control Course Instant access to this Document Control: Complete Document Control Course Get FREE Tutor Support to this Document Control: Complete Document Control Course Document Control: Complete Document Control Course Online You will learn the fundamentals of document control as well as how to recognize it in this course on document control. The classification and security of the document management system are also covered in the Document management course. Furthermore, the course on document control has a strong emphasis on the document control lifecycle, legal ideas, best practices, and underlying expertise. After completing our Document Control program, you will be more efficient at creating the final paperwork and management. You may manage teams, engineering, and document control as a document control specialist. Who is this course for? Document Control: Complete Document Control Course Online This Document Control course is open to students without any prior understanding of Document Control. Requirements Document Control: Document Control Course Online To enrol in this Document Control: Complete Document Control Course, students must fulfil the following requirements. To join in our Document Control: Complete Document Control Course, you must have a strong command of the English language. To successfully complete our Document Control: Complete Document Control Course, you must be vivacious and self driven. To complete our Document Control: Complete Document Control Course, you must have a basic understanding of computers. A minimum age limit of 15 is required to enrol in this Document Control: Complete Document Control Course. Career path Document Control: Complete Document Control Course Online Training in Document Control: Complete Document Control is a special chance to develop important abilities and progress your career.

Complete Document Control Training
Delivered Online On Demand48 minutes
£12