• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

90 ESC courses delivered Live Online

SOLD OUT! 26th September Maddy Belton #Agent121. Looking for: MG, YA, CHILDREN'S NON-FICTION, ADULT FICTION

5.0(3)

By I Am In Print

LOOKING FOR: MG, YA AND ADULT SCI-FI / FANTASY, CHILDREN'S NON-FICTION After graduating from St Andrews University with a degree in English Literature and Art History, Maddy followed her love of literature to an internship at non-fiction literary agency Graham Maw Christie. At GMC, Maddy worked her way up to Agent and built a list of authors who wrote for both for adults and children, spanning history, tarot, and nature writing. An avid reader of anything magical, Maddy joined Madeleine Milburn in 2022 to build a list specialising in SFF. Maddy would like to see SFF across all genres for all ages, including: grim dark, thriller, historical, romance, cosy fantasy, sci-fi, epic, YA fantasy, dark academia, contemporary fantasy, fantasy middle-grade, mythology, fairy tale and queer fantasy. Inspiring children’s non-fiction. She loves worlds to get lost in, adventures that transform what it means to be a hero, and unique magic that offers as many problems as solutions. She likes books that make her cry and books that change her mind. Above all, when she finishes a story about another world, she wants it to have taught her a lesson which helps her live in this one. She loves all fantasy, but favours richly imagined, complex worlds with a history to discover and a future to protect. Worldbuilding is one of her favourite aspects of this genre and she is always looking for a new, dense world with series potential. Think Brandon Sanderson’s Cosmere or the Marvel Cinematic Universe – the bigger the better! Maddy also likes character-driven fantasy with a diverse cast to root for (or root against) and she wants to see a range of different relationships depicted authentically. She particularly like epics that dip into big, universal themes such as grief, climate change, or war and which ask impossible questions in the vein of R.F. Kuang or N.K. Jemisin. She is also excited by authors that play with form and language in a fantasy setting. In YA, she is looking for much the same as in an adult fantasy, but with younger protagonists and a closer focus on relationships. She wants to see the tropes she knows and loves in new and exciting forms and her favourite YA books often centre around belonging and becoming. She likes a dash of romance in everything, because she is sentimental that way, but it’s particularly important in the YA space. Sci-fi is a big passion of hers, especially when it comes with a strong hook. She is a huge fan of Becky Chamber’s The Long Way to a Small Angry Planet and Michaiah Johnson’s The Space Between Worlds. She likes space as a metaphor, and would love something that explores different alien species. Please send her your space operas and sci-fi romances which combine space, magic and mayhem! In fantasy middle grade, she favours whimsy and animal companions; she would love to follow a group of kids through magic school. She tends to look for plenty of humour with a strong friendship at the centre, and she wants middle grade stories which engage with the concerns of children growing up as well as offering an all-important escape (preferably on a dragon/unicorn’s back). She is also looking for children’s non-fiction for all ages. In this space, she wants something as creative as it is informative, and thinks diverse voices are increasingly important. Maddy would like you to submit a covering letter, one page synopsis and the first three chapters (Max 5000 words) of your completed manuscript in a single word document. (In addition to the paid sessions, Maddy is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Wednesday 17th September 2025

SOLD OUT! 26th September Maddy Belton #Agent121. Looking for: MG, YA, CHILDREN'S NON-FICTION, ADULT FICTION
Delivered Online + more
£72

STGO Awareness, Abnormal Loads & Escort Vehicles Course - Online - November 2025

By Total Compliance

STGO Abnormal Loads

STGO Awareness, Abnormal Loads & Escort Vehicles Course - Online - November 2025
Delivered Online
£89.50

Legal Aid - Crime Lower Billing Course

By DG Legal

The LAA operates a strict compliance regime when it comes to auditing crime lower bills, and mistakes can often result in a Contract Notice, corrective action, and further follow-up activity within 6 months. This course will take you through the various aspects of crime lower billing, with discussions on topics such as what is and is not claimable; how you apply series of offences guidance; what evidence is required to claim a trial fee when a matter is discontinued; how do the LAA audit travel and other disbursement claims (including the rules when instructing an agent); and what evidence must be present on files to avoid any issues on audit. Key aspects of the Crime Contract, Criminal Bills Assessment Manual and Codes Guidance will be included, along with a discussion of common errors that are made; and how to claim non-standard and escape fee matters. Target Audience This online course is aimed at anyone involved in billing Legal Aid Police Station and Magistrates Court matters or managing an LAA Crime Contract. Resources Course notes will be provided to all delegates which may be useful for ongoing reference or cascade training. Please note a recording of the course will not be made available. Speaker Steve Keeling, Consultant, DG Legal Steve joined DG Legal after leaving the Legal Aid Agency in August 2016. In his 17 years at the LAA, he worked in the audit team as both auditor and manager and was a Contract Manager for several years. Steve is also a certified SQM auditor and undertakes audits on behalf of Recognising Excellence as well as running training sessions for the SQM Audit Team periodically.

Legal Aid - Crime Lower Billing Course
Delivered Online + more
£67.50 to £90

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered OnlineFlexible Dates
£3,495

Nemstar's CISSP Programme

5.0(12)

By Nemstar Ltd

Our unique 5 day workshop prepares you for a first time pass of your CISSP exam. Covering each of the famous 8 CBK's, cram the theory before testing your knowledge during exam simulations. Led by a multi-award winning InfoSec consultant, this workshop delivers everything you need to pass,

Nemstar's CISSP Programme
Delivered OnlineFlexible Dates
£2,754

Security+

5.0(3)

By Systems & Network Training

Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.

Security+
Delivered in Internationally or OnlineFlexible Dates
£2,797

Linux for network engineers

5.0(3)

By Systems & Network Training

Linux training course description A Linux foundation appropriate for all flavours of Linux, focussed on getting network engineers up and running with Linux. The command line is used throughout. The course progresses from the basics of Linux commands onto useful tools such as grep, then shell features such as piping and then onto shell scripting. Administration aspects covered are the tasks network engineers are most likely to encounter such as software installation. Hands on exercises concentrate on network related tasks such as installing net-snmp and using shell scripts to provide network automation. What will you learn Use Linux commands to perform a variety of tasks from manipulating files to handling processes. Create and edit files with vi. Work with permissions. Write simple shell scripts. Install software packages. Configure base networking. Linux training course details Who will benefit: Network engineers. Prerequisites: TCP/IP Foundation Duration 5 days Linux training course contents What is Linux? Linux distributions, open source software. Getting started Logging in, changing passwords, logging out. Hands on Basics and root access. Linux basics Command structure. The Linux manuals, basic commands (who, date, tty, uname, echo, banner...). Hands on Using the CLI. Connecting to a network IP configuration, DHCP, static addressing, routing, ifconfig, ping, netstat, traceroute, dig. Hands on Network configuration and testing. Managing Software Package Concepts, Comparison of package formats, RPM, rpm Commands, Yum, Debian Packages, dpkg, apt-cache, apt-get, dselect, aptitude, Converting Between Package Formats, Dependencies and Conflicts, Startup Script Problems, Shared Libraries, Library Management Hands on Installing network packages such as nmap and net-snmp. Processes and log files ps, kill, background processes, at, exec, priorities. Managing Linux log files. Syslogd. Setting the time. Cron and cronjobs. Managing Processes, the Kernel: The First Process. Hands on Controlling daemons and services. Setting up a TFTP server. Filesystem commands Home directories, manipulating files and directories, Filesystem layout, Pathnames, hard and symbolic links. Viewing files. Hands on Exploring the filesystem, working with network device configuration files. The Linux editors ed, vi, shell escapes, .exrc. Hands on Editing network device configuration files. Extracting data from files grep, find, cut, sort and paste… Hands on Working with syslog files. Permissions Theory, chmod, chown, newgrp. Hands on Handling permission problems. The shell Metacharacters, piping and redirection. Hands on Running SNMP commands and working with their output. Basic shell scripting What are shell scripts? Simple scripts, control structures. Variable. Setting variables, using variables, set, scope, export, sourcing, environmental variables, read. Positional parameters: $0 to $9, $#, $* and others. shift parameter substitution. Control statements: The test command, if , while loops, for loops, the case statement. Hands on Automating network tasks. Customising your environment Environmental variables, stty, .profile and other startup files. Hands on Customising Linux. Introduction to administration The root user, su. Managing users and groups. Hands on The power of root. Archiving files Backups, tar, cpio, dd, gzip. Hands on Working with tar files. Booting Linux and Editing Files Installing Boot Loaders, GRUB Legacy, GRUB 2, Alternative Boot Loaders, the Boot Process, Boot Messages, Runlevels and the Initialization Process, Runlevel Functions, Runlevel Services, Alternative Boot Systems , Upstart, system. Hands on Installing network services on Linux.

Linux for network engineers
Delivered in Internationally or OnlineFlexible Dates
£2,797

Maintenance and Reliability Best Practices - Aligned with SMRP* Best Practices and the CMRP Certification

By EnergyEdge - Training for a Sustainable Energy Future

About this Training Course This 4 full-day Maintenance and Reliability Masterclass course will provide Maintenance and Reliability personnel with a full explanation of the Award-winning Model of Excellence for maintenance. This is top tier training that has also been designed to equip participants with practical skills to take back to work. The course enables participants to develop a strategy to achieve outstanding maintenance and reliability performance for their own workplace. This course is aligned with SMRP* best practices and the CMRP exam. It provides an opportunity for participants to sit for an examination+ on the final day of the course. Your facilitator for this course is a fully qualified CMRP professional, an approved SMRP Proctor, authorised to conduct CMRP exams and a globally respected maintenance consultant and best practice trainer. +Exam fees are not inclusive in the course fees. *SMRP refers to Society of Maintenance and Reliability Professionals. PetroEdge is not affiliated with SMRP. Training Objectives By the end of this course, participants will be able to: Appreciate the content and underlying principles of our maintenance Model of Excellence o How to develop a strategy for outstanding maintenance and reliability performance o Developing reliability methodologies and programmes to drive performance o Options and tools to improve reliability at equipment level o Leadership skills and improving organisation and human performance o Work with management with an overview of the latest practice in planning scheduling and control Describe how maintenance can become a more strategic and influential function Use the Carcharodon model of excellence and class leading methodologies for improving maintenance and reliability Target Audience This course will benefit: Maintenance managers Reliability professionals Experienced supervisors Planners Project engineers Operations managers Functional specialists Course Level Basic or Foundation Training Methods Course methodology of this training course: Other than world-class visuals and slides, this course will include a high level of interaction between the facilitator and participants and group discussion among the participants themselves. There will be a number of case studies to demonstrate key points and also a minimum of one workshop exercise each day to give participants the chance to apply learning and appreciate key aspects of best practice. Participants will also have the chance to share examples from their own experience, discuss real problems they are facing and develop actions for improvement when they return to work. Examples of the exercises that are used in this course are as follows: Exercise: Understanding the challenges and seeing the opportunities Exercise: Developing a strategy Group Exercise: Selecting maintenance plans Group exercise: Case study failure Group exercise: Planning work Trainer Your expert course leader is an award-winning consultant and trainer with 30 years' experience in maintenance and reliability improvement. He has worked across five continents, in a wide variety of environments from the world's largest oil refinery to a small drinks production line. He has 10 years of maintenance management experience in the process industry, so he brings a very practical approach to training. He moved into consulting with ABB Eutech as their global maintenance specialist where he led maintenance and reliability best practice panels, delivered a wide range of maintenance improvement projects and trained other consultants. He is a fully qualified CMRP professional, an approved SMRP* Proctor, authorised to conduct CMRP exams and a globally respected maintenance consultant and best practice trainer. He founded his consultancy and training business in 2002 to focus on maintenance and reliability improvement. As part of this, he developed a range of maintenance 'models of excellence' with inputs from authors, international lecturers and some of the world's leading consultants and operators. His work has been recognised as being at the leading edge of industry best practice, winning independent awards such as the UK Chemical Industries Association 'Excellence in Engineering' award. He remains close to the industry as a respected specialist helping operating companies to achieve changes in performance. This ongoing field work enables him to continue to refine and extend best practice and the learning from this is continually fed into his training. His unique experience of facilitating two major turnarounds when the Coronavirus escalated into lockdown have given him a unique insight into how events of this type can disrupt maintenance. Moreover, his involvement in developing management processes and leading a Coronavirus response on a major industrial asset means he can talk with direct experience about how to cope and innovate in this global pandemic. He is also the expert course leader for the following courses offered by PetroEdge: Preventive and Predictive Maintenance Effective Plant Turnaround Management POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Maintenance and Reliability Best Practices - Aligned with SMRP* Best Practices and the CMRP Certification
Delivered in Internationally or OnlineFlexible Dates
£3,009 to £3,499

Being an IT Business Partner - BCS Practitioner Certificate

5.0(12)

By Duco Digital Training

This Level 4 course aims to equip professionals with the knowledge about the skills and practical behaviours which are required for them to step into a leadership/management role. The demand for management roles is expected to grow in the coming years. This is due to a number of factors, including: The ageing population, which is leading to a shortage of skilled workers. The increasing complexity of businesses requires more managers to oversee operations. The growing importance of technology is creating new opportunities for managers to lead and innovate.

Being an IT Business Partner - BCS Practitioner Certificate
Delivered OnlineFlexible Dates
£2,500

Preventive and Predictive Maintenance

By EnergyEdge - Training for a Sustainable Energy Future

About this Virtual Instructor Led Training (VILT) Preventive and Predictive maintenance are not new concepts. Both have been used across industry all over the world and when done properly, can yield impressive results (cost reductions of 20% or greater and a leap forward in equipment reliability and performance are very achievable). However, for every company using these concepts effectively, there are many others who are not. This 8 half-day Virtual Instructor Led Training (VILT) course has been derived from the Plant Performance Improvement Road Map developed by practitioners that guarantee the reliability of your operations. The VILT training focuses on how to improve profitability of any business by identifying the right maintenance strategy for any equipment. The aim of the VILT training is to help practitioners run programmes that will deliver real benefits as fast as possible with minimum zero wasted effort. The VILT training will also cover the core principles of Reliability Centred Maintenance, Total Productive Maintenance and Six Sigma and the increasingly important role of operations in achieving optimised asset performance. This is a certified course with the option of sitting for a short exam on the final day of the course to give participants the opportunity to gain a Certificate from petroEDGE and the Carcharodon Maintenance Academy. Training Objectives Master the critical skills by acquiring the following: An understanding of how maintenance can add profit The ability to develop improvement programmes that deliver maximum benefit in the shortest time A fundamental understanding of the principles of Preventive, Predictive and other maintenance types A practical understanding of the latest methods of solving problems at root cause level An appreciation of maintenance methodologies such as Reliability Centred Maintenance Strategies for ensuring your company gets value for money from your Contractors How to use the Maintenance Model of Excellence and Plant Performance Improvement Road Map Target Audience This VILT course has been designed for maintenance managers and engineers, reliability professionals, planners, project engineers, operations team members, and functional specialists. Training Methods The VILT course will be delivered online in 8 half-day sessions comprising 4 hours per day, with 2 breaks of 10 minutes per day. Course Duration: 8 half-day sessions, 4 hours per session (32 hours in total). Trainer Your expert course leader is an award-winning consultant and trainer with 30 years' experience in maintenance and reliability improvement. He has worked across five continents, in a wide variety of environments from the world's largest oil refinery to a small drinks production line. He has 10 years of maintenance management experience in the process industry, so he brings a very practical approach to training. He moved into consulting with ABB Eutech as their global maintenance specialist where he led maintenance and reliability best practice panels, delivered a wide range of maintenance improvement projects and trained other consultants. He is a fully qualified CMRP professional, an approved SMRP* Proctor, authorised to conduct CMRP exams and a globally respected maintenance consultant and best practice trainer. He founded his consultancy and training business in 2002 to focus on maintenance and reliability improvement. As part of this, he developed a range of maintenance 'models of excellence' with inputs from authors, international lecturers and some of the world's leading consultants and operators. His work has been recognised as being at the leading edge of industry best practice, winning independent awards such as the UK Chemical Industries Association 'Excellence in Engineering' award. He remains close to the industry as a respected specialist helping operating companies to achieve changes in performance. This ongoing field work enables him to continue to refine and extend best practice and the learning from this is continually fed into his training. His unique experience of facilitating two major turnarounds when the Coronavirus escalated into lockdown have given him a unique insight into how events of this type can disrupt maintenance. Moreover, his involvement in developing management processes and leading a Coronavirus response on a major industrial asset means he can talk with direct experience about how to cope and innovate in this global pandemic. *SMRP refers to Society of Maintenance and Reliability Professionals. PetroEdge is not affiliated with SMRP POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Preventive and Predictive Maintenance
Delivered in Internationally or OnlineFlexible Dates
£1,642 to £3,099