• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

11264 Environment courses in Houghton Regis delivered Online

Agriculture & Botany - QLS Level 5 Endorsed Certificate

By Imperial Academy

Level 5 Endorsed Diploma | QLS Hard Copy Certificate Included | Plus 5 CPD Courses | Lifetime Access

Agriculture & Botany - QLS Level 5 Endorsed Certificate
Delivered Online On Demand
£300

Management of Value (MoV) Foundation: Virtual In-House Training

By IIL Europe Ltd

Management of Value (MoV®) Foundation: Virtual In-House Training This interactive MoV® Foundation course provides a modular and case-study-driven approach to learning Management of Value (MoV). The core knowledge is structured and comprehensive; and well-rounded modules cover the methodology and various techniques. A case study is used to help appreciate the relevance of MoV in its practical application. What you will Learn Upon completion of an MoV course candidates should be able to discuss and explain: The main processes and techniques used within MoV and the reasons for using them How MoV may be applied at portfolio, program, project and operational levels The differences in applying MoV at different stages in a project and the expected outputs from a MoV Study at each stage The circumstances under which MoV should be used The concept of value and how value may be improved The main benefits arising from the use of MoV Approaches for implementing MoV How to respond to external and internal influences The principles of embedding MoV into an organization The key topics in document checklists, the toolbox, health check, organizational maturity and individual competence. Upon successful completion of this course, you will be able to: Organize and contribute constructively to a Management of Value (MoV) Study Demonstrate a knowledge of MoV principles, processes, approach and environment Analyse a company, program or project to establish its organizational value; includes identification and weighting of Value Drivers Pass the AXELOS MoV Foundation Examination Introduction to value management and MoV Value and Value Management Capabilities, Outcomes, Benefits and Disbenefits What is Value? What is Management of Value (MoV)? Why use MoV? Where use MoV? When MoV should be used? What using MoV involve? Selected MoV benefits Relationship with other AXELOS Global Best Practices and Models How MoV fits with other AXELOS Global Best Practice Guides MoV principles Align with organization's objectives Focus on functions and required outcomes Balance the variables to maximise value Apply throughout the investment decision Tailor MoV to suit the subject Learn from experience and improve Assign clear roles and responsibilities and build a supportive culture MoV processes Frame the programme or project Gather information Analyse information Process information Evaluate and select Develop Value Improving Proposals Implement and share outputs MoV techniques Function Analysis Function Analysis System Technique (FAST) Traditional (or classic) FAST Technical FAST Customer FAST Value Trees Measuring value Value profiling (a.k.a. value benchmarking) Simple multi-attribute rating technique (a.k.a. SMART) Value index Value metrics Value for money (VfM) ratio Value Engineering / Analysis Common techniques used in MoV Analysis of information Benchmarking Process Mapping Root Cause Analysis Discounted Cash Flow Analysis Generating Ideas Brainstorming Evaluation and option selection Option Selection Matrix Idea selection Allocation to Categories Idea Selection Matrix Weighting techniques Paired Comparisons Points Distribution Developing VIPs Developing Proposals Cost Benefit Analysis Building Decisions Implementing VIPs Implementation Plans Feedback Following up Tracking Benefits Approach to Implementation Generic approach to MoV implementation Plan the MoV activities Understand and articulate value Prioritize value Improve value Quantify value Monitor improvements in value Learn lessons Environmental factors Portfolio Considerations Programme considerations Project considerations Operational Considerations Embedding MoV into an organization Benefits of Embedding MoV into an organization MoV Policy MoV Policy Composition Embedding MoV into an organisation Key steps Suggested MoV Management Structure Overcoming barriers We do it anyway It takes up too much time We can't afford to make the changes What's in it for me? Don't fix it if it ain't broke Fixed returns on investment MoV products Briefing Meeting Agenda (A.1) Communications Checklist (A.2) Equipment list for an Effective Study/Workshop (A.3) Invitation to join the Study Team (A.4) Option Evaluation Matrix (A.5) Plan the Study (A.6) Recording Idea Selection (A.7) Reporting Study outputs (A.8) Scoping the Study (A.9) Study or Workshop Handbook (A.10) Value-Improvement Proposal Forms (A.11) Value Improvement Tracking Report (A.12) MoV toolbox MoV health check and maturity model P3M3 Maturity Model MoV Maturity Model (aligned with P3M3)

Management of Value (MoV) Foundation: Virtual In-House Training
Delivered OnlineFlexible Dates
£1,850

Preventing Workplace Discrimination

By OnlineCoursesLearning.com

Forestalling Workplace Discrimination Certification Being a survivor of work environment separation and provocation is a heartbreaking reality for such a large number of laborers across the UK. Ongoing measurements show that more than half of ladies have been the survivor of badgering, with comparable numbers being accounted for by numerous people with ensured qualities. Undeniable degrees of segregation and badgering can detrimentally affect your labor force, including diminished efficiency, higher turnover and low general assessment. Figuring out how you, as a representative, can forestall separation and badgering in the working environment can prompt a better and seriously enabling climate. This course gives you significant data about forestalling work environment segregation and badgering, zeroing in on the job of the worker. It starts by giving you the lawful foundation behind those terms. Then, it covers the examples that are apparent in work environments with tolerant mentalities towards segregation and provocation. Explicit procedures that representatives and managers can execute are examined straightaway. At long last, the last module diagrams what to do, in the event that you witness or are a casualty of working environment provocation or prejudicial recruiting or advancement rehearses. You will Learn: What a 'ensured trademark' is; Insights regarding the enactment that covers badgering and separation at work; Tips on the most proficient method to perceive a poisonous working air; How looking into the recruiting and advancement practices of an organization can show the degree of separation that you can expect experiencing; What a zero-resistance strategy is, and why your organization ought to have one; Data on what comprises a reasonable grumblings measure. Advantages of Taking this Course: Studying work environment separation and provocation, including the meanings of each term; Seeing how corporate culture and degrees of consistency mirror the probability of experiencing separation or provocation at work; Realizing what data ought to be in worker preparing programs, if a work environment is not kidding about forestalling provocation and segregation; Figuring out how to build up an objections interaction that is reasonable for everybody included; Understanding what steps you should take, on the off chance that you witness or are the survivor of badgering or segregation at work.

Preventing Workplace Discrimination
Delivered Online On Demand
£50

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered OnlineFlexible Dates
£3,495

Neurodiversity Awareness

5.0(3)

By Lapd Solutions Ltd

Neurodiversity awareness training, Neurodiversity awareness,

Neurodiversity Awareness
Delivered in Birmingham + 1 more or UK Wide or OnlineFlexible Dates
£1,250 to £1,500

Microsoft Project Introduction (live online classes)

By Microsoft Office Training

Course Objectives At the end of this course you will be able to: Identify the components of the Microsoft Project environment Create a new project plan Create the project schedule Use different views to analyse the project plan Create, allocate and manage resources in a project plan Finalise a project plan Track progress View and report project plan information ' 1 year email support service Customer Feedback Very good course. Learnt a lot. Looking forward to the next level. Alexandra - CIAL ' 1 year email support service Take a closer look at the consistent excellent feedback from our growing corporate clients visiting our site ms-officetraining co uk With more than 20 years experience, we deliver courses on all levels of the Desktop version of Microsoft Office and Office 365; ranging from Beginner, Intermediate, Advanced to the VBA level. Our trainers are Microsoft certified professionals with a proven track record with several years experience in delivering public, one to one, tailored and bespoke courses. Our competitive rates start from £550.00 per day of training Tailored training courses: You can choose to run the course exactly as they are outlined by us or we can customise it so that it meets your specific needs. A tailored or bespoke course will follow the standard outline but may be adapted to your specific organisational needs. Introduction to Microsoft Project Recap on project management concepts Project environment overview The 3 databases: Tasks, Resources and Assignments Different ways of displaying the Project Plan Access Help Creating a Project Plan Create a New Project Plan Project Information Create and apply the project calendar Defining recurring exceptions to the calendar Defining the calendar's work weeks Create the Summary tasks Create the Work Breakdown Structure Task creation and scheduling Exploring the Entry Table and its fields Task editing and the Task Information window Task Durations Defining Milestones Manual Scheduling vs Automatic Scheduling Changing the Task's Calendar Create a split in a Task Create Task Relationships Adding Lag or Lead to a Relationship Identifying the Critical Path Adding Constraints and Deadlines to Tasks Create Recurring Activities Adding Notes and links to Tasks Managing Resources Exploring the Entry Table and its fields Resource editing and the Resource Information window Resource Types Fixed Costs vs Variable Costs Adding Resource Costs Defining when costs accrue Changing the Resource Calendar and Availability Project calendar vs Resource and Task Calendar Assigning Resources to Tasks Effort Driven Scheduling Resolving Resource Overallocation Tracking the Project Progress Setting a Project Baseline Entering Actuals Different ways of viewing the Progress Checking if the Project is on track Viewing and Reporting Project Detail Adding Tasks to the Timeline and sharing it Modifying the Timescale and Zoom level Formatting the Gantt View Filtering and Grouping Tasks Print and Troubleshoot the Gantt View Using built-in Reports in Microsoft Project Who is this course for? Who is this course for? This course is designed for a person who has an understanding of project management concepts, who is responsible for creating and modifying project plans, and who needs a tool to manage these project plans. Requirements Requirements General knowledge of the Windows OS Career path Career path Microsoft Office know-how can instantly increase your job prospects as well as your salary. 80 percent of job openings require spreadsheet and word-processing software skills

Microsoft Project Introduction (live online classes)
Delivered OnlineFlexible Dates
£275

Inclusion Facilitation

By Inclusive Solutions

Inclusion Facilitation (IF) is an approach to enhancing the inclusion, in a mainstream community of any child or young person who is experiencing difficulties in the world because of disability, personal crisis or because of their challenging behaviour towards others. The IF approach works by mobilising the young person’s natural supports to provide support and engage with the person in difficulty. Inclusion Facilitation is designed to create a better life for an individual by the provision of an intense input designed to being about social change. This usually entails a series of visits focused on getting the person out and about to increase confidence, social skills and presence in their local community and to pursue goals and dreams. Uniquely, the work is carried out under the close clinical supervision of a practicing psychologist. What is Inclusion Facilitation Work? ‘We do whatever it takes!’ Usually a Person Centred Planning event would be carried out using the PATHor MAP process – majoring on dreams and goal setting leading to precise action planning.  An experienced psychologist alongside the inclusion facilitator would carry out a PATH. A large graphic will be one of the outcomes of the meetings this is a great visual record and a shared memory of the event. This will also inform the priorities for the inclusion facilitation work Optionally following the PATH event a ‘scoping report’ is created outlining what Inclusion Facilitation could offer and highlighting what dreams and goals the individual has. The PATH is also provides a good opportunity for the Facilitator to meet the focus person in a comfortable positive environment. 12 weekly visits from the Inclusion Facilitator followed by 5 monthly visits is our preferred model but we can be flexible with the delivery of this input. This is just a guideline, however we have received good results using this time frame. After this intensive input the Inclusion Facilitator will hand over to the existing family, carers and PA team to carry on where he or she has left off. This transition time is planned from the outset. An experienced psychologist is there to support the facilitator at all times and will guide all work done by the inclusion facilitator.  Is this just Support work? No! This is proactive engagement – doing whatever is required. We are not just passively or reactively providing what is asked for – we are actively pursuing a good life for the individual. Our work is built on careful research around a person’s interests and what opportunities exist locally. We carry out community mapping.  We actively work to tackle an individual’s own resistance and reluctance to engage more socially. We actively engage with people in social settings that the individual attends to build bridges and connections – we are bridge builders. We build circles around a person. We create the conditions in which friendships can flourish. We have direct psychological supervision and support throughout. This work is short term and intense. Enjoy participating in a multimedia workshop that will challenge, entertain and reach for your emotions. Learning Objectives 1.To be able to understand the values and wider context of inclusion. 2.To be able to set up and run an ‘Inclusion Facilitation project to improve the life chances and connections of a child or young person. 3.To understand and be able to maximise the power of the peer group in supporting relationships, achievement and behaviour. Course Content The course answers the questions: What do you do with the child who is isolated by their aggression and anger, through being different, disabled or new to the school or community? Practically how do we go about including high profile children or young people? How can we help some children be friends? We will cover:  Inclusion values underpinning this work The Intentional Building of Relationships –‘Inclusion Facilitation’ work as an example Not doing it alone – The Importance of Teams in developing inclusive practice Practical setting up and running of IF work Lessons learned Stories of IF work

Inclusion Facilitation
Delivered in UK Wide Travel Costs or OnlineFlexible Dates
£1,800 to £2,500

Food Hygiene Rating and Food Labelling

By Imperial Academy

Level 3 & 5 Endorsed Diploma | QLS Hard Copy Certificate Included | Plus 5 CPD Courses | Lifetime Access

Food Hygiene Rating and Food Labelling
Delivered Online On Demand
£300

Gas Turbines, Co-Generation and Combined Cycle Power Plants

By EnergyEdge - Training for a Sustainable Energy Future

About this training course This 5 full-day course will cover all aspects of gas turbines, co-generation and combined cycle power plants. It will cover in detail all the components of these types of power plants such as: compressors, gas and steam turbines, heat recovery steam generators, deaerators, condensers, lubricating systems, instrumentation, control systems, and economics. The design, selection considerations, operation, maintenance, pay-back period, economics of co-generation plants and combined cycles, as well as, emission limits, reliability, monitoring and governing systems are also covered in detail. This course will also provide up-dated information in respect to all the significant improvements that have been made to co-generation and combined cycles power plants, during the last two decades. The course will illustrate through sophisticated computer simulation how gas turbines, co-generation and combined cycle plants perform under steady-state and transient conditions. In addition, the participants will learn how to use the computer simulation program which provides the following benefits: Allow the operator to extend the gas turbine operating period by avoiding unnecessary outages and maintenance activities. Determination of essential gas turbine maintenance activities to reduce the duration of outages. Profit optimization of co-generation and combined cycle plants. Minimization of the environmental emissions of co-generation and combined cycle plants. Training Objectives Power Plant Computer simulation: Gain a thorough understanding of computer simulation of gas turbines, co-generation, and combined cycle plants. Power Plant Components and Systems: Learn about all components and subsystems of the various types of power plants such as gas turbines, co-generation and combined cycle plants Power Plants Economics: Examine the advantages, applications, performance and economics of power plants such as: gas turbines, co-generation, and combined cycle plants Power Plant Equipment: Learn about various power plant equipment including: compressors, turbines, governing systems, combustors, deaerators, feed water heaters, etc. Power Plant Maintenance: Learn all the maintenance activities required for power plants such as: gas turbines, co-generation plants and combined cycles to minimize their operating cost and maximize their efficiency, reliability, and longevity Power Plant Environmental Emissions: Learn about the monitoring and control of environmental emissions. Power Plant Instrumentation and Control Systems: Learn about the latest instrumentation and control systems of gas turbines, co-generation and combined cycles power plants Power Plant Reliability and Testing: Increase your knowledge of power plant predictive and preventive maintenance, reliability and testing. Power Plant Selection and Applications: Gain a detailed understanding of the selection considerations and applications of power plants such as: gas turbines, co-generation and combined-cycle power plants Power Plant Profitability: Learn about the reliability, life cycle cost, profitability, refurbishment, and life extension methods for gas turbines, co-generation and combined cycle power plants. Target Audience Engineers of all disciplines Managers Technicians Maintenance personnel Other technical individuals Course Level Basic or Foundation Training Methods Your specialist course leader relies on a highly interactive training method to enhance the learning process. This method ensures that all participants gain a complete understanding of all topics covered. The training environment is highly stimulating, challenging, and effective because the participants will learn by case studies which will allow them to apply the material taught to their own organization. Each delegate will receive a copy of the following materials written by the instructor: 'POWER GENERATION HANDBOOK' second edition, published by McGraw-Hill in 2012 (800 pages) Practical manual (500 pages) Trainer Your specialist course leader has more than 32 years of practical engineering experience with Ontario Power Generation (OPG), one of the largest electric utility in North America. He was previously involved in research on power generation equipment with Atomic Energy of Canada Limited at their Chalk River and Whiteshell Nuclear Research Laboratories. While working at OPG, he acted as a Training Manager, Engineering Supervisor, System Responsible Engineer and Design Engineer. During the period of time, he worked as a Field Engineer and Design Engineer, he was responsible for the operation, maintenance, diagnostics, and testing of gas turbines, steam turbines, generators, motors, transformers, inverters, valves, pumps, compressors, instrumentation and control systems. Further, his responsibilities included designing, engineering, diagnosing equipment problems and recommending solutions to repair deficiencies and improve system performance, supervising engineers, setting up preventive maintenance programs, writing Operating and Design Manuals, and commissioning new equipment. Later, he worked as the manager of a section dedicated to providing training for the staff at the power stations. The training provided by him covered in detail the various equipment and systems used in power stations. In addition, he has taught courses and seminars to more than four thousand working engineers and professionals around the world, specifically Europe and North America. He has been consistently ranked as 'Excellent' or 'Very Good' by the delegates who attended his seminars and lectures. He written 5 books for working engineers from which 3 have been published by McGraw-Hill, New York. Below is a list of the books authored by him; Power Generation Handbook: Gas Turbines, Steam Power Plants, Co-generation, and Combined Cycles, second edition, (800 pages), McGraw-Hill, New York, October 2011. Electrical Equipment Handbook (600 pages), McGraw-Hill, New York, March 2003. Power Plant Equipment Operation and Maintenance Guide (800 pages), McGraw-Hill, New York, January 2012. Industrial Instrumentation and Modern Control Systems (400 pages), Custom Publishing, University of Toronto, University of Toronto Custom Publishing (1999). Industrial Equipment (600 pages), Custom Publishing, University of Toronto, University of Toronto, University of Toronto Custom Publishing (1999). Furthermore, he has received the following awards: The first 'Excellence in Teaching' award offered by PowerEdge, Singapore, in December 2016 The first 'Excellence in Teaching' award offered by the Professional Development Center at University of Toronto (May, 1996). The 'Excellence in Teaching Award' in April 2007 offered by TUV Akademie (TUV Akademie is one of the largest Professional Development centre in world, it is based in Germany and the United Arab Emirates, and provides engineering training to engineers and managers across Europe and the Middle East). Awarded graduation 'With Distinction' from Dalhousie University when completed Bachelor of Engineering degree (1983). Lastly, he was awarded his Bachelor of Engineering Degree 'with distinction' from Dalhousie University, Halifax, Nova Scotia, Canada. He also received a Master of Applied Science in Engineering (M.A.Sc.) from the University of Ottawa, Canada. He is also a member of the Association of Professional Engineers in the province of Ontario, Canada. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Gas Turbines, Co-Generation and Combined Cycle Power Plants
Delivered in Internationally or OnlineFlexible Dates
£3,009 to £3,499

Business Analysis Fundamentals - Solving the Business Problem: On-Demand

By IIL Europe Ltd

Business Analysis Fundamentals - Solving the Business Problem: On-Demand This course teaches participants the overall process of business analysis and where it fits in the bigger picture of the project life cycle and the business context. The course is interactive and combines discussion, active workshops, and demonstrations of techniques. The goal is bottom-line results that cut through the real-world problems facing people seeking to improve the way they operate to develop new and improved systems and products or otherwise deliver results through project performance. What You Will Learn Upon completion, participants will be able to: Define the solution scope Work with the development team in the systems testing stage Ensure the solution is usable in the business environment Foundation Concepts Defining the Business Analyst Function Role of the Business Analyst as Change Agent An Introduction to the BABOK® Guide Business Analyst Roles and Relationships through the Project Life Cycle Business Analysis Planning and Monitoring - Defining the Process Overview of Business Analysis Planning & Monitoring (BAP&M) BAP&M - Process and Tools BAP&M - Roles and Responsibilities BAP&M - Governance, Information Management & Performance Improvement Elicitation and Collaboration - Gathering and Confirming Information Overview of Elicitation and Collaboration Elicitation and Collaboration Techniques Requirements Life Cycle Management - Maintaining Requirements and Design Information Overview of Requirements Life Cycle Management Requirements Life Cycle Management Tasks - Details Strategy Analysis - Providing Context to Requirements Analysis and Design Definition Overview of Strategy Analysis Analyze Current State Define Future State Assess Risks Define Change Strategy Requirements Analysis and Design Definition - Defining Solution Options Overview of Requirements Analysis and Design Definition (RA&DD) The Anatomy of Requirements RA&DD Task Descriptions RA&DD Techniques Solution Evaluation - Assessing Solution Performance Overview of Solution Evaluation Solution Evaluation Tasks Solution Evaluation in Development Stages Underlying Competencies Overview of Underlying Competencies (UCs) Underlying Competencies - Details

Business Analysis Fundamentals - Solving the Business Problem: On-Demand
Delivered Online On Demand30 minutes
£850