The Level 3 Award in Emergency First Aid at Work (RQF) is a regulated and nationally recognised qualification, specifically designed for those wishing to act as an emergency first aider in their workplace. Throughout this 1 day course, learners will develop the skills and knowledge needed to deal with a range of emergency first aid situations, including administering CPR, using a defibrillator, dealing with wounds and bleeding, minor injuries and more.
This course will provide an opportunity to begin to understand what commercial and financial awareness means and the importance of everyone in thinking commercially.
Definitive 802.1X training course description A hands-on training course concentrating solely on 802.1X. Hands on sessions follow major chapters to reinforce the theory. What will you learn Describe 802.1X. Explain how 802.1X works Configure 802.1X Troubleshoot 802.1X. Definitive 802.1X training course details Who will benefit: Technical network staff. Technical security staff. Prerequisites: SIP for engineers Duration 2 days Definitive 802.1X training course contents Introduction What is 802.1X? Authentication access, 802.3, 802.11. IEEE, 802, 802.1X-2001, 802.1X-2010. Architecture Supplicant, Authenticator, Authentication server, EAP, EAPOL, RADIUS, Diameter. Port configuration 802.1X in a switch environment. Hands on Configuring 802.1X. How it works Controlled ports, uncontrolled ports. Authentication flow chart, Initialisation, initiation, negotiation, authentication. Hands on 802.1X packet analysis. 802.1X and 802.11 WiFi, WiFi security. Hands on 802.1X WiFi port access. EAP Extensible Authentication Protocol, RFC 3748, RFC 5247. EAP methods: Weak, MD5, LEAP, Strong: TTLS, TLS, FAST. Encapsulation: 802.1X, PEAP, RADIUS, Diameter, PPP. 802.1X accounting RADIUS, accounting messages, 802.1X accounting AV pairs. 8021.X and VLANS VLANs, Guest VLAN, restricted VLAN, voice VLAN. Hands on VLAN assignments with 802.1X.
Confined Space Risk Management and Permits - This course includes a basic level of confined space knowledge with the opportunity to use confined space equipment in a simulated environment and a team exercise of creating and reviewing a safe system of work. Note: A pre-requisite qualification is required to complete this course. Day 1 is a CS1 course and the Confined Space Risk Management (CSRM) can be completed as a 1 Day add-on. Any of following courses can be completed as a pre-requisite within 12 weeks of the CSRM; CS1, CS2, 6160-09. Book via our website @ https://www.vp-ess.com/training/confined-spaces/confined-space-risk-management-and-permits/ or via email at: esstrainingsales@vpplc.com or phone on: 0800 000 346
Perl training course description A hands on introduction to programming in Perl. What will you learn Write Perl programs. Use Perl modules. Debug Perl programs. Examine existing code and determine its function. Perl training course details Who will benefit: Anyone wishing to learn Perl. Prerequisites: None although experience in another high level language would be useful. Duration 5 days Perl training course contents Introduction to Perl What is Perl? When to use Perl, downloading Perl, installing Perl, documentation, perldoc, running Perl, the Perl environment. Perl under UNIX, Perl under Windows. "Hello world". Variables Scalars, data types, $_, strings and numbers, assignment, constants, strict, scope, STDIN. Operators Number operators, string operators, precedence and associativity, converting numbers and strings, shortcut operators. Flow control Blocks, if, else, elseif, unless, foreach, while, for do, until. Regular expressions What are regular expressions? Pattern matching, Perl as a filter, file editing. Strings Comparing strings, concatenating, substrings, chomp, chop, formatting, string manipulation. Subroutines Comparing strings, concatenating, substrings, chomp, chop, formatting, string manipulation. Arrays and hashes Working with arrays, element access, push(), pop(), shift(), unshift(), <STDIN> as an array, associative arrays, hashes of arrays, hash references, arrays of hashes, hashes of hashes. Files Simple file handling, open, close, <FILEHANDLE>, <>, file tests, directory access, directory handles, database access, packing and packing binary data. I/O STDIN, STDOUT and STDERR, Command line arguments,@ARGV. Perl debugging The built in debugger, running the debugger, debugger commands, graphical debuggers. Script syntax errors, single stepping, breakpoints, watches. Packages and modules CPAN, Finding modules, installing modules, using modules, scope. Report formatting Formats, defining a format, invoking a format, field holders. Process management System interaction, system(), exec(), signals. Security issues.
Implementing Scrum for Teams: In-House Training Scrum is an iterative, incremental framework for developing products. It allows the team to deliver a potentially shippable set of functionalities for each iteration, providing the agility needed to respond to rapidly changing requirements. These characteristics have led to Scrum becoming the most popular method in the world of Agile projects. This two-day course provides a practical approach to implementing the Scrum method on your projects. You will learn how to initiate a Scrum project, how to build a Product Backlog, containing user stories, and how to plan and estimate releases and iterations. You will learn how to conduct Scrum events, such as the Sprint Planning Meeting, and how to track progress during an iteration. You will apply what you learn in a series of hands-on, team-based activities and simulations that take you through the entire Scrum process. The overall goal of the course is to enable you to successfully apply the Scrum method on appropriate projects in your environment. What you will Learn At the end of this program, you will be able to: Teach-back Agile and Scrum foundation concepts Initiate a Scrum Project Conduct Team Sprint Planning and Sprint Review meetings Develop Release Plans (including effective user stories and priorities) Build a Sprint plan (including effective estimates) Executive a Sprint (including essential Scrum ceremonies) Implement Scrum in your environment Foundation Concepts Agile Mindset, Values, and Tenets Agile Benefits and Methods Scrum Overview Teams: Self-Managing, Self-Organizing, and Self-Improving Initiating a Scrum Project 'Sprint Zero' Activities Defining the Vision The Product Backlog and User Stories Acceptance Criteria Story Map Planning Releases Planning releases Estimating user stories Prioritizing user stories Selecting a Sprint length Estimating velocity Creating a release plan Planning a Sprint The Sprint Planning Meeting Building the Sprint Backlog Creating a Sprint Plan Running a Sprint Conduct a Sprint Burn-down and Burn-up Charts Negotiating Changes During a Sprint The Sprint Review Meeting Sprint Retrospective Releasing into Production Closing the Scrum Project Implementing Scrum Scrum Simulation Exercise Conditions of Success for Implementing Scrum
Java training course description A comprehensive introduction of the Java language and environment. It is important to note that the course will assume that the delegates are already familiar with the C language as this enables more advanced features of the Java language to be covered in the course. The course will also give an overview of areas related to programming in Java. What will you learn Describe the Java architecture. Write Java applets and applications. Debug Java programs. Examine existing code and determine its function. Use multimedia extensions, the awt, multithreading, exceptions within Java Java training course details Who will benefit: Those wishing to program in Java. Prerequisites: Complete C programming Duration 5 days Java training course contents Review of UNIX fundamentals What is Java? What Java is, history of Java, reasons for success. The Java Virtual Machine, Bytecodes, getting up and running with Java, Java resources. Simple Java applications. C features in Java Java data structures, Java flow control, differences from C, arrays, strings and packages. OO features in Java Java classes and objects, inheritance, overloading, packages. Differences from C++. Java applets Applications vs. applets, HTML, the applet tag, applet methods, life cycle, testing and debugging. Multimedia applets Images, sounds, fonts, colours and animation. Java products The JDK in detail, other development environments. Javabeans and JDBC overviews. Abstract Window Toolkit JFC and Swing versus AWT. Event handling (JDK 1.1), GUIs, panels, buttons, lists, scrollbars, text areas, frames⦠Exception handling and multithreading Handling exceptions. Starting, pausing, stopping threads, producers, consumers, monitoring. More standard classes Java file I/O, Streams, The system class. The networking model, java.net classes. Security and Java Types of attack, the security manager, craplets, securing the network. Integrating legacy code with Java
About this Training Course In today's business environment, there has never been more of a need to make Asset Management and Maintenance more cost effective and efficient. By utilising the Reliability Centred Maintenance process (RCM), you can increase safety performance, reduce maintenance costs, improve the effectiveness of your operations, boost machine uptime, and gain a greater understanding of the level of risk your organisation manages. RCM is just one component of an overall integrated Asset Management Process. All participants will complete detailed pre-course questionnaires before this 3 full-day course, enabling the trainer to tailor course content in order to meet specific delegate needs. Participant objectives are re-visited before, during and after the course, allowing the trainer to focus on outcomes and address any participant concerns and specific issues during the program. Training Objectives At the end of this course, participants will be able to: Develop skills to carry out successful RCMs and introduce the RCM process into their own and their company's daily activities. Be aware of our changing business environment and the need to apply RCM to drive continuous improvement, in safety, cost reduction, and minimise their environmental footprint Understand the impact of human reliability and the various methods used to improve this important area Understand the basics of Change Management and the methods used to securely anchor this process and make it routine Develop an appreciation for a holistic 'Asset Management' program, and know where the RCM process fits in, and the benefits it will deliver Target Audience Reliability Centred Maintenance is primarily a team activity and benefits from a cross functional team participation. This course is aimed at managers, engineers, technicians and operators at all levels who are responsible for the operation and maintenance of plant equipment and who will benefit from the elimination of bad actors (recurring equipment failure) and continuous improvement in the areas of safety, environmental impact, reliability and integrity. Trainer Your expert course leader has enjoyed a 37-year career with Shell International in a variety of leadership roles predominantly in Turnaround, Maintenance and Engineering Management before he left in late 2017 to pursue his interest in Turnaround and Maintenance Management consultancy. He has undertaken several Asset Management and Engineering positions within Shell Australia including the implementation and establishment of formal Reliability Studies including FMEA, RCA, RCM, Maintenance Planning and Turnaround Management programs at Geelong Refinery. Additionally, he was appointed Shell's Regional Turnaround Advisor within Australia and South East Asia supporting Shell Operating Companies throughout several Australasian and European sites. In more recent times, he had been engaged to implement and establish a formal Turnaround Management program within Brunei Shell Petroleum as well as becoming the appointed Regional Turnaround Management Subject Matter Expert (SME), TA Network and Governance & Assurance lead for Shell within the Shell Australasian, Russian Federation and Indian Sub-Continent OpCo community. His career repertoire includes hands-on practitioner, supervisory, reliability, contracts and management roles and he holds several maintenance and engineering tertiary qualifications including an Associate Diploma in Mechanical Engineering. He has presented at several Maintenance, Reliability, Asset Management & Turnaround forums and conferences. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
RFID training course description This training course focuses on the technologies used in Radio Frequency Identification (RFID). What will you learn Describe the RFID architecture. Design RFID systems. Evaluate tag types. Recognise common RFID problems. RFID training course details Who will benefit: RFID technologists and system engineers. Prerequisites: RF fundamentals. Duration 2 days RFID training course contents What is RFID? Review of RF basics, what is RFID, RFID history, RFID base system architecture, frequency bands used by RFID, comparison with barcodes. RFID applications Supply chain, asset tracking, theft reduction, retail, access control, tolls. Tags Tag features, types of tag, passive and active, chips, read only, read write, affixing tags, selecting location to affix a tag, tag orientation and location, tag stacking, impact of rate of movement, tag data formats. Interrogators/readers Interrogation zones, interrogator types, antennas, read distance tests, multiple interrogators, synchronisation, dense interrogator environment issues. RFID peripherals. Standards and regulations Global regulatory requirements, regional regulatory requirements, ISO, ETSI, FCC, EPC, safety regulations/issues. Testing and troubleshooting Read rate problems, improperly tagged items, tag failure. RFID system design Antenna types, interference, antenna location and spacing, how many antennas? How many interrogators? tag types, grounding considerations, cabling, site diagrams.