• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

11270 Environment courses in Coventry delivered Online

NCFE Level 2 Certificate in Creative Craft Cookery

By Technology Triumphs

This qualification is designed for learners aged pre-16 and above who wish to develop skills and knowledge in cookery. This course has been designed to be as affordable for families as possible and it is entirely possible to complete this qualification from a standard domestic kitchen. Please note, this is not a GCSE but is a GCSE Level course which is why it is designed to span 2 years, although we offer complete flexibility on the timeframe that learners can complete within. This qualification is a Level 2 Qualification and is Ofqual approved carrying 15 credits. Other examples of Level 2 qualifications are BTEC Level 2 and the Silver Arts Award. Feedback from our past learners shows that this qualiifcation is widely regarded as level to a grade A*-C/4-9 at GCSE standard when applying for college or work placements. Please also note, that whether this course is recognised as a GCSE equivalent by colleges and further education establishments, can vary according to location, college and even between courses at the same college. If reliant on this qualification for entry onto another course, it is recommended that you establish with the college whether or not this will aid admission, before committing to the course. Click here to download the 2023 Level 2 Cookery Info Pack.pdf The following video explains in detail how the course works and what the course covers: We don't impose any minimum or maximum ages on our learners as we recognise that every learner is an individual and is on their own unique learning journey. We believe, that their adult facilitator is the best person to judge whether a learner is ready for a particular course, but to enable you to make this decision we provide a workbook, free for you to try. Simpy email technologytriumphs@outlook.com to request a free sample session. We are also happy to advise you with this decision so do reach out to us if you would like our guidance on this. As part of your Induction pack, your learner will receive a free apron to use within their course, but aside from this we have designed the courses to utilise as affordable as possible. The following is not an exhaustive list, but does highlight the main costs associated with the course. *** PLEASE CLICK HERE TO BOOK *** UNIT SUMMARIES 601/3232/2/COO Credit Value: 15 Total Qualification Time: 150 hours   1 Be able to use materials, tools and equipment to develop craft techniques  1.1 Assess the properties of available materials for craft item(s) including the visual and tactile qualities  1.2 Select materials, tools, equipment and techniques to support craft ideas and give reasons for choices  1.3 Use appropriate tools and equipment for selected techniques  1.4 Develop craft techniques, making effective use of materials, tools and equipment  1.5 Maintain a safe working environment by ensuring safe use of materials, tools and equipment   1 Understand the market within a chosen craft area  1.1 Explore enterprises within a chosen craft area  1.2 Explain what makes them successful  1.3 Describe the market(s) for chosen craft area  1.4 Identify opportunities in chosen market(s)  1.5 Explain the importance of listening to stakeholders when developing ideas  1.6 Explain the importance of balancing risk against the potential reward of creative ideas  1.7 Identify appropriate financial tools to support creative enterprising ideas  1.8 Identify ways to market a creative product   2 Understand employment opportunities within a chosen craft area  The learner can:  2.1 Explore employment opportunities within a chosen craft area  2.2 Describe the characteristics of an enterprising individual in a chosen craft area  2.3 Identify own strengths and areas for development within a chosen craft area  2.4 Produce an action plan for personal development/career aspirations    1 Be able to develop craft ideas  The learner can:  1.1 Use a range of different sources to develop craft ideas  1.2 Develop visual language to communicate craft ideas  1.3 Use feedback and evaluation of own work to develop craft ideas  1.4 Adapt craft ideas in response to feedback and evaluation of own work  1.5 Select preferred craft idea giving reasons for  1.6 Maintain a safe working environment   1 Be able to create and present final craft item(s)  The learner can:  1.1 Use chosen idea to create a production plan 1.2 Use selected tools, materials, equipment and techniques to produce final craft work  1.3 Display craft work in an appropriate way/setting  1.4 Maintain a safe working environment    2 Know how to evaluate the creative and craft making processes  The learner can:  2.1 Evaluate the creative process  2.2 Review final craft item to identify opportunities for improvement or further development

NCFE Level 2 Certificate in Creative Craft Cookery
Delivered Online On Demand
£600

NCFE Level 2 Certificate in Creative Craft Cake Decorating

By Technology Triumphs

This qualification is designed for learners aged pre-16 and above who wish to develop skills and knowledge in cake decorating. This course has been designed to be as affordable for families as possible and it is entirely possible to complete this qualification from a standard domestic kitchen. Please note, this is not a GCSE but is a GCSE Level course which is why it is designed to span 2 years, although we offer complete flexibility on the timeframe that learners can complete within. This qualification is a Level 2 Qualification and is Ofqual approved carrying 15 credits. Other examples of Level 2 qualifications are BTEC Level 2 and the Silver Arts Award. Feedback from our past learners shows that this qualiifcation is widely regarded as level to a grade A*-C/4-9 at GCSE standard when applying for college or work placements. Please also note, that whether this course is recognised as a GCSE equivalent by colleges and further education establishments, can vary according to location, college and even between courses at the same college. If reliant on this qualification for entry onto another course, it is recommended that you establish with the college whether or not this will aid admission, before committing to the course. Click here to download the Level 2 Cake Decorating Information Pack.pdf We recently hosted an Open Day live which can be watch on replay here: We don't impose any minimum or maximum ages on our learners as we recognise that every learner is an individual and is on their own unique learning journey. We believe, that their adult facilitator is the best person to judge whether a learner is ready for a particular course, but to enable you to make this decision we provide a workbook, free for you to try. Simpy email technologytriumphs@outlook.com to request a free sample session. We are also happy to advise you with this decision so do reach out to us if you would like our guidance on this. As part of your Induction pack, your learner will receive a free apron to use within their course, but aside from this we have designed the courses to utilise as affordable as possible. The following is not an exhaustive list, but does highlight the main costs associated with the course. UNIT SUMMARIES 601/3232/2/CAK Credit Value: 15 Total Qualification Time: 150 hours   1 Be able to use materials, tools and equipment to develop craft techniques  1.1 Assess the properties of available materials for craft item(s) including the visual and tactile qualities  1.2 Select materials, tools, equipment and techniques to support craft ideas and give reasons for choices  1.3 Use appropriate tools and equipment for selected techniques  1.4 Develop craft techniques, making effective use of materials, tools and equipment  1.5 Maintain a safe working environment by ensuring safe use of materials, tools and equipment   1 Understand the market within a chosen craft area  1.1 Explore enterprises within a chosen craft area  1.2 Explain what makes them successful  1.3 Describe the market(s) for chosen craft area  1.4 Identify opportunities in chosen market(s)  1.5 Explain the importance of listening to stakeholders when developing ideas  1.6 Explain the importance of balancing risk against the potential reward of creative ideas  1.7 Identify appropriate financial tools to support creative enterprising ideas  1.8 Identify ways to market a creative product   2 Understand employment opportunities within a chosen craft area  The learner can:  2.1 Explore employment opportunities within a chosen craft area  2.2 Describe the characteristics of an enterprising individual in a chosen craft area  2.3 Identify own strengths and areas for development within a chosen craft area  2.4 Produce an action plan for personal development/career aspirations    1 Be able to develop craft ideas  The learner can:  1.1 Use a range of different sources to develop craft ideas  1.2 Develop visual language to communicate craft ideas  1.3 Use feedback and evaluation of own work to develop craft ideas  1.4 Adapt craft ideas in response to feedback and evaluation of own work  1.5 Select preferred craft idea giving reasons for  1.6 Maintain a safe working environment   1 Be able to create and present final craft item(s)  The learner can:  1.1 Use chosen idea to create a production plan 1.2 Use selected tools, materials, equipment and techniques to produce final craft work  1.3 Display craft work in an appropriate way/setting  1.4 Maintain a safe working environment    2 Know how to evaluate the creative and craft making processes  The learner can:  2.1 Evaluate the creative process  2.2 Review final craft item to identify opportunities for improvement or further development

NCFE Level 2 Certificate in Creative Craft Cake Decorating
Delivered Online On Demand
£600

Fundamentals of E&P Data Management

By EnergyEdge - Training for a Sustainable Energy Future

About this Virtual Instructor Led Training (VILT) The energy industry has started its journey to be more data centric by embracing the industry 4.0 concept. As a result, data management - which was considered until recently as a back-office service to support geoscience, reservoir management, engineering, production and maintenance - is now given the spotlight! To become an active stakeholder in this important transition in E&P data management, it is necessary to understand the new technical opportunities offered by the Cloud, Artificial Intelligence and how data governance can pave the way towards more reliable and resilient processes within E&P domain. Several key questions that need to be addressed: Why place more focus on data assets? Is data management just about serving geoscientists or engineers with fresh data? What is the value of data management in the E&P sector for decision making? How to convince the data consumers that the data we provide is reliable? Is the data architecture of my organization appropriate and sustainable? The purpose of this 5 half-day Virtual Instructor Led Training (VILT) course is to present the data challenges facing the energy organizations today and see how they practically solve them. The backbone of this course is based on the DAMA Book of Knowledge for Data Management. The main data management activities are described in sequence with a particular focus on recent technological developments. Training Objectives Upon completion of this VILT course, the participants will be able to: Understand why the data asset is now considered as a main asset by energy organizations Appreciate the importance of data governance and become an active stakeholder of it Understand the architecture and implementation of data structure in their professional environment Get familiarized with the more important data management activities such as data security and data quality Integrate their subsurface and surface engineering skills with the data managements concepts This VILT course is unique on several points: All notions are explained by some short presentations. For each of them, a set of video, exercises, quizzes will be provided to help develop an engaging experience between the trainer and the participants A pre-course questionnaire to help the trainer focus on the participants' needs and learning objectives A detailed reference manual A lexicon of terms for data-management Limited class size to encourage the interactivity Target Audience This VILT course is intended for: Junior/new data managers Geoscientists Reservoir engineers Producers Maintenance specialists Construction specialists Human resources Legal Course Level Basic or Foundation Training Methods The VILT course will be delivered online in 5 half-days consisting 4 hours per day, with 2 breaks of 10 minutes per day. Course Duration: 5 half-day sessions, 4 hours per session (20 hours in total). Trainer Your expert course leader is a geologist by education who has dedicated his career to subsurface data management services. In 2016, he initiated a tech startup dedicated to Data Management using Artificial Intelligence (AI) tools. He is heavily involved in developing business plans, pricing strategies, partnerships, marketing and SEO, and is the co-author of several Machine Learning publications. He also delivers training on Data Management and Data Science to students and professionals. Based in France, he was formerly Vice President, Sales & Marketing at CGG where he was in charge of the Data Management Services strategy, Sales Manager at Spie O&G Services where he initiated the Geoscience technical assistance activities and Product Manager of interactive seismic inversion software design and marketing at Paradigm.       POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Fundamentals of E&P Data Management
Delivered in Internationally or OnlineFlexible Dates
£953 to £1,799

The VTCT Level 3 Certificate in Assessing Vocational Achievement (Hairdressing)

4.8(16)

By Kleek Academy

Obtain The Assessor's Qualification through our comprehensive teaching and assessing courses at Kleek Training. Develop the skills and knowledge needed to effectively assess learners. Enquire today!

The VTCT Level 3 Certificate in Assessing Vocational Achievement (Hairdressing)
Delivered in Colchester + 1 more or OnlineFlexible Dates
£1,000

DP-900T00 Microsoft Azure Data Fundamentals

By Nexus Human

Duration 1 Days 6 CPD hours This course is intended for The audience for this course is individuals who want to learn the fundamentals of database concepts in a cloud environment, get basic skilling in cloud data services, and build their foundational knowledge of cloud data services within Microsoft Azure. Overview Describe core data concepts Identify considerations for relational data on Azure Describe considerations for working with non-relational data on Azure Describe an analytics workload on Azure In this course, students will gain foundational knowledge of core data concepts and related Microsoft Azure data services. Students will learn about core data concepts such as relational, non-relational, big data, and analytics, and build their foundational knowledge of cloud data services within Microsoft Azure. Students will explore fundamental relational data concepts and relational database services in Azure. They will explore Azure storage for non-relational data and the fundamentals of Azure Cosmos DB. Students will learn about large-scale data warehousing, real-time analytics, and data visualization. 1 - Explore core data concepts Identify data formats Explore file storage Explore databases Explore transactional data processing Explore analytical data processing 2 - Explore data roles and services Explore job roles in the world of data Identify data services 3 - Explore fundamental relational data concepts Understand relational data Understand normalization Explore SQL Describe database objects 4 - Explore relational database services in Azure Describe Azure SQL services and capabilities Describe Azure services for open-source databases 5 - Explore Azure Storage for non-relational data Explore Azure blob storage Explore Azure DataLake Storage Gen2 Explore Azure Files Explore Azure Tables 6 - Explore fundamentals of Azure Cosmos DB Describe Azure Cosmos DB Identify Azure Cosmos DB APIs 7 - Explore fundamentals of large-scale data warehousing Describe data warehousing architecture Explore data ingestion pipelines Explore analytical data stores 8 - Explore fundamentals of real-time analytics Understand batch and stream processing Explore common elements of stream processing architecture Explore Azure Stream Analytics Explore Apache Spark on Microsoft Azure 9 - Explore fundamentals of data visualization Describe Power BI tools and workflow Describe core concepts of data modeling Describe considerations for data visualization

DP-900T00 Microsoft Azure Data Fundamentals
Delivered OnlineFlexible Dates
£595

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered OnlineFlexible Dates
£3,495

Management of Value (MoV) Foundation: Virtual In-House Training

By IIL Europe Ltd

Management of Value (MoV®) Foundation: Virtual In-House Training This interactive MoV® Foundation course provides a modular and case-study-driven approach to learning Management of Value (MoV). The core knowledge is structured and comprehensive; and well-rounded modules cover the methodology and various techniques. A case study is used to help appreciate the relevance of MoV in its practical application. What you will Learn Upon completion of an MoV course candidates should be able to discuss and explain: The main processes and techniques used within MoV and the reasons for using them How MoV may be applied at portfolio, program, project and operational levels The differences in applying MoV at different stages in a project and the expected outputs from a MoV Study at each stage The circumstances under which MoV should be used The concept of value and how value may be improved The main benefits arising from the use of MoV Approaches for implementing MoV How to respond to external and internal influences The principles of embedding MoV into an organization The key topics in document checklists, the toolbox, health check, organizational maturity and individual competence. Upon successful completion of this course, you will be able to: Organize and contribute constructively to a Management of Value (MoV) Study Demonstrate a knowledge of MoV principles, processes, approach and environment Analyse a company, program or project to establish its organizational value; includes identification and weighting of Value Drivers Pass the AXELOS MoV Foundation Examination Introduction to value management and MoV Value and Value Management Capabilities, Outcomes, Benefits and Disbenefits What is Value? What is Management of Value (MoV)? Why use MoV? Where use MoV? When MoV should be used? What using MoV involve? Selected MoV benefits Relationship with other AXELOS Global Best Practices and Models How MoV fits with other AXELOS Global Best Practice Guides MoV principles Align with organization's objectives Focus on functions and required outcomes Balance the variables to maximise value Apply throughout the investment decision Tailor MoV to suit the subject Learn from experience and improve Assign clear roles and responsibilities and build a supportive culture MoV processes Frame the programme or project Gather information Analyse information Process information Evaluate and select Develop Value Improving Proposals Implement and share outputs MoV techniques Function Analysis Function Analysis System Technique (FAST) Traditional (or classic) FAST Technical FAST Customer FAST Value Trees Measuring value Value profiling (a.k.a. value benchmarking) Simple multi-attribute rating technique (a.k.a. SMART) Value index Value metrics Value for money (VfM) ratio Value Engineering / Analysis Common techniques used in MoV Analysis of information Benchmarking Process Mapping Root Cause Analysis Discounted Cash Flow Analysis Generating Ideas Brainstorming Evaluation and option selection Option Selection Matrix Idea selection Allocation to Categories Idea Selection Matrix Weighting techniques Paired Comparisons Points Distribution Developing VIPs Developing Proposals Cost Benefit Analysis Building Decisions Implementing VIPs Implementation Plans Feedback Following up Tracking Benefits Approach to Implementation Generic approach to MoV implementation Plan the MoV activities Understand and articulate value Prioritize value Improve value Quantify value Monitor improvements in value Learn lessons Environmental factors Portfolio Considerations Programme considerations Project considerations Operational Considerations Embedding MoV into an organization Benefits of Embedding MoV into an organization MoV Policy MoV Policy Composition Embedding MoV into an organisation Key steps Suggested MoV Management Structure Overcoming barriers We do it anyway It takes up too much time We can't afford to make the changes What's in it for me? Don't fix it if it ain't broke Fixed returns on investment MoV products Briefing Meeting Agenda (A.1) Communications Checklist (A.2) Equipment list for an Effective Study/Workshop (A.3) Invitation to join the Study Team (A.4) Option Evaluation Matrix (A.5) Plan the Study (A.6) Recording Idea Selection (A.7) Reporting Study outputs (A.8) Scoping the Study (A.9) Study or Workshop Handbook (A.10) Value-Improvement Proposal Forms (A.11) Value Improvement Tracking Report (A.12) MoV toolbox MoV health check and maturity model P3M3 Maturity Model MoV Maturity Model (aligned with P3M3)

Management of Value (MoV) Foundation: Virtual In-House Training
Delivered OnlineFlexible Dates
£1,850

Innovation and Design - Thinking Beyond the Obvious

By IIL Europe Ltd

Thinking and doing the same has got to change. The world we live in is becoming more volatile, uncertain, complex, and ambiguous. Expanding our innovation and design thinking capabilities is a key to unlock solutions for some of our biggest global and local challenges. What do you need to learn, do, and become in order to continue in the current and future environment? It is a powerful combination of knowledge, competencies, and mindset. In an increasingly complicated context, this course provides participants with the knowledge needed to not only learn about innovation and what is needed to make it sustainable in your organization but also to inspire others to innovate and think beyond the obvious,

Innovation and Design - Thinking Beyond the Obvious
Delivered Online On Demand3 hours
£350

Gas Turbines, Co-Generation and Combined Cycle Power Plants

By EnergyEdge - Training for a Sustainable Energy Future

About this training course This 5 full-day course will cover all aspects of gas turbines, co-generation and combined cycle power plants. It will cover in detail all the components of these types of power plants such as: compressors, gas and steam turbines, heat recovery steam generators, deaerators, condensers, lubricating systems, instrumentation, control systems, and economics. The design, selection considerations, operation, maintenance, pay-back period, economics of co-generation plants and combined cycles, as well as, emission limits, reliability, monitoring and governing systems are also covered in detail. This course will also provide up-dated information in respect to all the significant improvements that have been made to co-generation and combined cycles power plants, during the last two decades. The course will illustrate through sophisticated computer simulation how gas turbines, co-generation and combined cycle plants perform under steady-state and transient conditions. In addition, the participants will learn how to use the computer simulation program which provides the following benefits: Allow the operator to extend the gas turbine operating period by avoiding unnecessary outages and maintenance activities. Determination of essential gas turbine maintenance activities to reduce the duration of outages. Profit optimization of co-generation and combined cycle plants. Minimization of the environmental emissions of co-generation and combined cycle plants. Training Objectives Power Plant Computer simulation: Gain a thorough understanding of computer simulation of gas turbines, co-generation, and combined cycle plants. Power Plant Components and Systems: Learn about all components and subsystems of the various types of power plants such as gas turbines, co-generation and combined cycle plants Power Plants Economics: Examine the advantages, applications, performance and economics of power plants such as: gas turbines, co-generation, and combined cycle plants Power Plant Equipment: Learn about various power plant equipment including: compressors, turbines, governing systems, combustors, deaerators, feed water heaters, etc. Power Plant Maintenance: Learn all the maintenance activities required for power plants such as: gas turbines, co-generation plants and combined cycles to minimize their operating cost and maximize their efficiency, reliability, and longevity Power Plant Environmental Emissions: Learn about the monitoring and control of environmental emissions. Power Plant Instrumentation and Control Systems: Learn about the latest instrumentation and control systems of gas turbines, co-generation and combined cycles power plants Power Plant Reliability and Testing: Increase your knowledge of power plant predictive and preventive maintenance, reliability and testing. Power Plant Selection and Applications: Gain a detailed understanding of the selection considerations and applications of power plants such as: gas turbines, co-generation and combined-cycle power plants Power Plant Profitability: Learn about the reliability, life cycle cost, profitability, refurbishment, and life extension methods for gas turbines, co-generation and combined cycle power plants. Target Audience Engineers of all disciplines Managers Technicians Maintenance personnel Other technical individuals Course Level Basic or Foundation Training Methods Your specialist course leader relies on a highly interactive training method to enhance the learning process. This method ensures that all participants gain a complete understanding of all topics covered. The training environment is highly stimulating, challenging, and effective because the participants will learn by case studies which will allow them to apply the material taught to their own organization. Each delegate will receive a copy of the following materials written by the instructor: 'POWER GENERATION HANDBOOK' second edition, published by McGraw-Hill in 2012 (800 pages) Practical manual (500 pages) Trainer Your specialist course leader has more than 32 years of practical engineering experience with Ontario Power Generation (OPG), one of the largest electric utility in North America. He was previously involved in research on power generation equipment with Atomic Energy of Canada Limited at their Chalk River and Whiteshell Nuclear Research Laboratories. While working at OPG, he acted as a Training Manager, Engineering Supervisor, System Responsible Engineer and Design Engineer. During the period of time, he worked as a Field Engineer and Design Engineer, he was responsible for the operation, maintenance, diagnostics, and testing of gas turbines, steam turbines, generators, motors, transformers, inverters, valves, pumps, compressors, instrumentation and control systems. Further, his responsibilities included designing, engineering, diagnosing equipment problems and recommending solutions to repair deficiencies and improve system performance, supervising engineers, setting up preventive maintenance programs, writing Operating and Design Manuals, and commissioning new equipment. Later, he worked as the manager of a section dedicated to providing training for the staff at the power stations. The training provided by him covered in detail the various equipment and systems used in power stations. In addition, he has taught courses and seminars to more than four thousand working engineers and professionals around the world, specifically Europe and North America. He has been consistently ranked as 'Excellent' or 'Very Good' by the delegates who attended his seminars and lectures. He written 5 books for working engineers from which 3 have been published by McGraw-Hill, New York. Below is a list of the books authored by him; Power Generation Handbook: Gas Turbines, Steam Power Plants, Co-generation, and Combined Cycles, second edition, (800 pages), McGraw-Hill, New York, October 2011. Electrical Equipment Handbook (600 pages), McGraw-Hill, New York, March 2003. Power Plant Equipment Operation and Maintenance Guide (800 pages), McGraw-Hill, New York, January 2012. Industrial Instrumentation and Modern Control Systems (400 pages), Custom Publishing, University of Toronto, University of Toronto Custom Publishing (1999). Industrial Equipment (600 pages), Custom Publishing, University of Toronto, University of Toronto, University of Toronto Custom Publishing (1999). Furthermore, he has received the following awards: The first 'Excellence in Teaching' award offered by PowerEdge, Singapore, in December 2016 The first 'Excellence in Teaching' award offered by the Professional Development Center at University of Toronto (May, 1996). The 'Excellence in Teaching Award' in April 2007 offered by TUV Akademie (TUV Akademie is one of the largest Professional Development centre in world, it is based in Germany and the United Arab Emirates, and provides engineering training to engineers and managers across Europe and the Middle East). Awarded graduation 'With Distinction' from Dalhousie University when completed Bachelor of Engineering degree (1983). Lastly, he was awarded his Bachelor of Engineering Degree 'with distinction' from Dalhousie University, Halifax, Nova Scotia, Canada. He also received a Master of Applied Science in Engineering (M.A.Sc.) from the University of Ottawa, Canada. He is also a member of the Association of Professional Engineers in the province of Ontario, Canada. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Gas Turbines, Co-Generation and Combined Cycle Power Plants
Delivered in Internationally or OnlineFlexible Dates
£3,009 to £3,499

Neurodiversity Awareness

5.0(3)

By Lapd Solutions Ltd

Neurodiversity awareness training, Neurodiversity awareness,

Neurodiversity Awareness
Delivered in Birmingham + 1 more or UK Wide or OnlineFlexible Dates
£1,250 to £1,500