NPORS Crusher Training The aim of the NPORS Crusher Training is to provide theoretical and practical training for operators of Mobile Crushing equipment in the workplace. This Crusher training Course Or Test is carried out on your site using your own equipment. Please contact us for a competitive quote The Crusher Training Course is designed to provide candidates with the skills and knowledge required in order to operate a crusher safely and competently in the workplace. NPORS is an approved CSCS Partner Card Scheme, providing evidence that individuals working on construction sites have the appropriate Crusher training and qualifications for the Crusher Operation. Furthermore, training criteria is based on the approved standards of the Construction Leadership Council. Most major contractors should accept the NPORS Crusher card when presented on-site, which displays the silver CSCS logo. This NPORS crusher training meets the statutory requirements of the Health & Safety at Work Act 1974 and other relevant statutory provisions and Approved Codes of Practice. NPORS Crusher Test For Experienced Operators Book with Confidence at Vally Plant Training At Vally Plant Training, we guarantee unbeatable value with our Crusher Experienced Test Price Match Promise. When you choose us, you can book with confidence, knowing that we will not be beaten on price. If you find a lower price for the same NPORS Crusher Experienced Worker Test, we’ll match it—ensuring you receive top-quality training at the best possible rate. Click for our terms and conditions Your skills, our commitment—always at the best price. NPORS Crusher Test is for operators who have received some form of training in the past or alternatively has been operating Crusher for a number of years. If you are unsure if you qualify to go down the test route please contact us to discuss this in more detail. Discounts are available for multiple bookings There are two parts to the Crusher Test, a theory section comprised of 25 questions and a practical session operating the Crusher, revision notes are available when booking. Crusher Course Content Crushers are essential equipment in mining, quarrying, and construction industries, tasked with breaking down large rocks and materials into smaller, more manageable sizes. Operating mobile crushers requires specialised skills and knowledge to ensure safety, efficiency, and optimal performance. In this comprehensive course overview, we will explore the essential content covered in a crusher training course, designed to equip participants with the expertise needed to operate crushers safely and effectively in the workplace. 1. Introduction to Crushers: Overview of crusher types: jaw crushers, cone crushers, impact crushers, etc. Understanding the components and operating principles of crushers Different configurations and applications for specific tasks 2. Crusher Safety Procedures: Importance of safety in crusher operation Pre-operational checks and inspections Understanding crusher capacities and limitations Personal protective equipment (PPE) requirements Emergency procedures: shutdown, lockout/tagout, and evacuation protocols 3. Crusher Operation Basics: Starting, stopping, and controlling the crusher, including emergency stops Familiarisation with crusher controls: power source, conveyor belts, feeders, etc. Monitoring and adjusting crusher settings for optimal performance Understanding crusher dynamics: feed size, speed, and throughput 4. Material Handling and Crushing Techniques: Proper assessment of materials: hardness, size, and moisture content Loading and feeding materials into the crusher safely and efficiently Adjusting crusher settings for different material types and sizes Maximising crusher efficiency and product quality 5. Site Safety and Hazard Awareness: Identifying potential hazards in the crusher area Working safely around moving parts, conveyor belts, and rotating equipment Recognising environmental hazards: dust, noise, and vibration Understanding site-specific safety rules and regulations 6. Maintenance and Inspections: Importance of regular maintenance for crusher performance and reliability Daily, pre-shift, and post-shift inspection procedures Lubrication points and maintenance schedules Identifying and reporting mechanical issues and wear parts replacement 7. Practical Hands-On Crusher Training: Moving the crusher in reverse and forwards through obstructions Loading and feeding materials into the crusher using excavator and loading shovels Adjusting crusher settings and monitoring performance for efficiency Emergency response drills: simulated scenarios to test response and decision-making skills 8. Assessment and Certification: Written examination to assess theoretical knowledge Practical assessment of crusher operation skills Certification upon successful completion of the course Conclusion: A crusher training course equips participants with the essential knowledge, skills, and confidence to operate crushers safely and efficiently in various work environments. By covering topics such as safety procedures, operation techniques, material handling, site safety awareness, best maintenance practices, and practical hands-on training, participants can enhance their proficiency and contribute to a safer and more productive workplace. Whether you’re a novice operator or an experienced professional, investing in crusher training with Vally Plant Training is essential for ensuring compliance, reducing risks, and maximising productivity in crushing operations. Frequently Asked Questions About Crusher Training What is Crusher Training, and why is it necessary? Crusher Training provides individuals with the skills and knowledge required to safely and effectively operate crushers, heavy machinery used in mining, construction, and recycling industries. It’s essential for ensuring operator safety, maximising productivity, and preventing accidents on job sites. Who should undergo Crusher Training? Crusher Training is essential for anyone involved in operating or working around crushers, including quarry workers, machine operators, maintenance personnel, and site supervisors. Proper training ensures that individuals understand equipment operation procedures and safety protocols. What topics are covered in Crusher Training programs? Crusher Training programs cover a range of topics, as above, including equipment familiarisation, safety precautions, preventive maintenance, operational techniques, troubleshooting, and emergency procedures. Participants learn how to operate crushers efficiently while prioritising safety and minimising risks. How long does Crusher Training take? The duration of Crusher Training programs varies depending on factors such as the complexity of the equipment and the depth of the curriculum. Basic training courses may last a couple of days, while more comprehensive programs could extend over 1 week to cover advanced concepts and practical applications. Is Crusher Training mandatory in certain industries? While Crusher Training may not be legally mandated in all areas, many employers in the mining, construction, and recycling industries require operators to undergo training as part of their occupational health and safety policies. Compliance with training requirements helps prevent accidents and ensures regulatory compliance along with productivity. Where can I find reputable Crusher Training courses? Reputable Crusher Training courses are offered by various institutions, including industry associations, equipment manufacturers, and specialised training providers like Vally Plant Training. It’s important to choose a program that offers accredited certification and covers relevant industry standards and best practices. Crusher Courses Available 7 days a week to suit your business requirements. VPT have a team of friendly and approachable Crusher instructors, who have a wealth of knowledge of crushers and the construction industry We have our own training centre conveniently located close to the M5 junction 9, In Tewkesbury. With its own purpose-built practical training area to simulate an actual working environment, however, Crusher Training can only be conducted on your sites Our Crusher course and test packages are priced to be competitive. Discounts are available for multiple bookings We can send a fully qualified NPORS Crusher Tester to your site nationwide, to reduce the amount of time away from work and complete the crusher test Our more courses: Polish your abilities with our dedicated Lift Supervision Training, Slinger Signaller Training, Telehandler Training, Cat & Genny Training, Plant Loader Securer, Ride-On Road Roller, Abrasive Wheel Training, Lorry Loader Training and Scissor Lift Training sessions. Learn the safe and effective operation of these vital machines, crucial for construction and maintenance tasks. Elevate your skills and career prospects by enrolling in our comprehensive courses today.
Starting a small business can be a rewarding journey, but it requires careful planning and the right strategies to succeed. From creating a solid business plan to organizing finances and finding the right support, this guide will help you establish a foundation for a thriving business. For entrepreneurs in Calgary, key resources like reliable bookkeeping services can make a significant difference. Here’s how to start a small business and set it up for lasting success. Developing a business plan A clear, well-researched business plan serves as a roadmap for your business. It outlines your goals, target market, competitive advantage, and financial projections. This plan will also help attract investors or secure loans. To create an effective business plan: Define your mission and vision: Explain why your business exists and what you aim to achieve. Identify your target audience: Determine who your customers are and what problems your business will solve for them. Analyze competitors: Study your competitors to understand what they offer and find ways to differentiate your business. Set realistic financial projections: Estimate costs, revenue, and profits. This will give potential investors confidence in your business. Choosing a business structure Selecting the right business structure is essential, as it affects your taxes, liability, and daily operations. Common options include: Sole proprietorship: Simple to set up, with minimal paperwork, but offers no separation of personal and business liability. Partnership: Ideal for two or more owners, allowing shared responsibilities, but partners share liabilities. Corporation: Provides liability protection, but involves more paperwork and regulatory requirements. LLC (Limited Liability Company): Offers liability protection without the complexity of a corporation. Choose a structure that best suits your needs, and consult a legal professional to ensure compliance with Calgary’s business regulations. Securing funding Most small businesses require some level of funding to get started. Consider various financing options to find the best fit: Personal savings or family support: Often the first source of funding for many entrepreneurs. Business loans: Many banks offer small business loans with varying interest rates. Grants and government programs: Explore government grants and programs specifically designed to support small businesses in Calgary. Angel investors or venture capital: For businesses with high growth potential, attracting investors may be an option. Registering your business To operate legally, you’ll need to register your business. This process involves choosing a unique name, filing the necessary documents, and obtaining a business license in Calgary. You may also need specific permits depending on your industry. Completing these steps ensures that your business complies with all local regulations. Organizing your finances Managing finances effectively is crucial for any small business. Accurate bookkeeping keeps your business organized, tracks income and expenses, and prepares you for tax season. Many small businesses in Calgary choose to hire a bookkeeper in Calgary to handle these responsibilities, allowing owners to focus on growth. Working with one of the best bookkeeping services in Calgary can provide: Accurate financial records: Professional bookkeepers help maintain up-to-date records, which is essential for financial health. Compliance with tax laws: Calgary’s best bookkeeping services are familiar with local tax regulations, ensuring that you file correctly and on time. Insights for decision-making: With accurate records, you can make informed decisions on budgeting, spending, and investments. Creating a strong brand identity Building a brand that resonates with your target audience is essential. Your brand identity includes your business name, logo, colors, and messaging, as well as the experience you offer customers. Developing a consistent brand identity sets you apart from competitors and builds trust with customers. Here are some steps to create a strong brand identity: Design a logo and visual theme: Choose a professional logo, color scheme, and design elements that reflect your brand’s personality. Develop a unique brand voice: Whether it’s friendly, professional, or playful, keep your brand voice consistent in all communications. Focus on customer experience: Aim to provide exceptional service that keeps customers coming back and sharing their positive experiences. Building an online presence In today’s digital world, an online presence is crucial for reaching potential customers. Start by creating a professional website where customers can learn more about your products or services. Next, consider establishing a presence on social media platforms that suit your audience. Key components of a strong online presence include: User-friendly website: Make sure your website is easy to navigate, mobile-friendly, and includes essential information about your business. Social media profiles: Engage with customers and share updates on platforms like Facebook, Instagram, or LinkedIn. Google My Business: Setting up a Google My Business profile helps customers in Calgary find you more easily. Building a support network Running a small business can be challenging, and having a network of support is invaluable. Surround yourself with people who can provide advice, resources, and encouragement. Consider these ways to build a support network: Join local business associations: Groups like the Calgary Chamber of Commerce offer networking opportunities, resources, and workshops. Seek mentorship: Experienced business owners can offer guidance and insights that help you avoid common pitfalls. Hire professionals for specialized tasks: For financial and legal matters, work with professionals like accountants, lawyers, and bookkeepers. Tracking progress and making adjustments As your business grows, it’s essential to review your progress and adjust your strategies. Regularly assessing financial performance, customer feedback, and market trends can help you refine your approach and stay competitive. Working with one of the best bookkeeping services in Calgary can make tracking your financial performance much easier, giving you insight into profit margins, cash flow, and budgeting. Consider these strategies for tracking progress: Set measurable goals: Establish specific goals for growth, such as revenue targets or customer acquisition numbers. Analyze performance data: Use financial statements, sales reports, and customer feedback to assess performance. Stay flexible: Be willing to make changes to products, services, or marketing strategies if they aren’t meeting customer needs. Conclusion Starting a small business takes effort, planning, and ongoing management. By creating a solid business plan, organizing your finances, and developing a strong brand, you can set your business up for success. In Calgary, many new business owners choose to hire a bookkeeper in Calgary to ensure accurate financial management and stay compliant with local regulations. Taking advantage of the best bookkeeping services in Calgary can free up your time, allowing you to focus on growing your business and achieving long-term success. With dedication and the right strategies, your small business can thrive in today’s competitive market.
Abrasive Wheels Training Nearly half of the workplace accidents involving abrasive wheels are due to an unsafe work system or operator error. This indicates that many of these incidents can be avoided if the risks of working with abrasive wheels are clearly communicated, and the correct safety measures are adopted, Abrasive Wheels Training will eliminate most accidents with Abrasive Wheels. With the appropriate Abrasive wheels training in place, you could significantly reduce the risk of an injury such as friction burns, crushed fingers and loss of eyesight which are the most common amongst abrasive wheel operators with the misuse of machines. This Abrasive Wheels Training Course is designed to assist in reducing the risk of injury for anyone who uses abrasive wheels at work. It guides you through the different types of abrasive wheels, how to identify and store them, how they should be used safely, and how they should be inspected prior to use. Our Abrasive Wheels Training will give all candidates hands-on practical training. Book with Confidence at Vally Plant Training At Vally Plant Training, we guarantee unbeatable value with our Price Match Promise. When you choose us, you can book with confidence, knowing that we will not be beaten on price. If you find a lower price for the same NPORS Experienced Worker Test, we’ll match it—ensuring you receive top-quality training at the best possible rate. Your skills, our commitment—always at the best price. Abrasive Wheels Course Duration 3-4 Hours Petrol Cut Off Saw 1 Day for all candidates Certification NPORS Traditional card – lasts for 5 years and is mainly accepted with housebuilders, utilities, port and marine as proof of competence OR NPORS card with CSCS logo – accepted by all major building contractor’s. The initial card is the RED trained operator card which lasts for 2 years and can be upgraded to BLUE competent operator card further to completion of relevant NVQ. In house certificates: suitable as proof of operator competence accepted for insurance and HSE compliance. Introduction to Abrasive Wheels Definition of Abrasive Wheels Abrasive wheels are tools used for cutting, grinding, and polishing various materials. They are made from abrasive particles, like grit, bonded together to form a solid wheel. When these wheels spin at high speeds, they can shape or finish different surfaces effectively. Types of Abrasive Wheels Commonly Used in Industry Bonded Abrasive Wheels: These are made by combining abrasive particles with a bonding material to form a solid wheel. Bonded abrasive wheels are typically used for tasks like grinding, cutting, and finishing metal or stone. Coated Abrasive Wheels: These have an abrasive layer attached to a backing material, like paper or cloth. Coated abrasive wheels are commonly used for sanding and smoothing surfaces, often in woodworking or metalworking. Abrasive wheel training is essential for learning how to use these tools safely and effectively. Understanding the different types of abrasive wheels and their applications can help you choose the right wheel for your job, ensuring efficiency and safety. Importance of Proper Training Overview of the Risks Associated with Improper Use Using abrasive wheels without proper training can be very dangerous. The importance of proper training cannot be overstated when it comes to the safe and effective use of abrasive wheels. Improper use of abrasive wheels can lead to serious accidents, such as wheel breakage, which can cause flying debris and severe injuries. Other risks include cuts, burns, and eye injuries from sparks or fragments. Not knowing how to handle the equipment properly can also result in damaged materials and inefficient work, leading to wasted time and resources. Benefits of Trained Versus Untrained Usage Undergoing abrasive wheel training is crucial for several reasons: Safety: Trained individuals know how to handle abrasive wheels safely, reducing the risk of accidents and injuries. They learn to inspect the wheels for damage, choose the right type of wheel for the job, and use protective gear correctly. Efficiency: Training ensures that users understand how to use abrasive wheels effectively, leading to faster and more accurate work. Trained users can achieve better results with less effort and time. Cost-Effectiveness: Proper training helps prevent damage to the wheels and the materials being worked on, saving money on replacements and repairs. It also minimizes downtime due to accidents or improper usage. Compliance: Many industries require certification for using abrasive wheels. Completing abrasive wheel training ensures compliance with safety regulations and industry standards, which is essential for legal and insurance purposes. In summary, abrasive wheel training equips users with the knowledge and skills needed to use abrasive wheels safely and efficiently, making the workplace safer and more productive. Getting Started with Abrasive Wheels Essential Equipment and Setup Before using abrasive wheels, it’s important to have the right equipment and ensure everything is set up properly. Here’s what you need: Protective Gear: Always wear safety goggles, gloves, ear protection, and a dust mask to protect yourself from flying debris, noise, and dust. Abrasive Wheels: Have a selection of abrasive wheels suitable for the tasks you plan to perform. This includes grinding wheels, cutting wheels, and sanding discs. Mounting Equipment: Ensure you have the correct flanges, spacers, and mounting hardware to secure the wheel to the machine properly. Tools and Machines: Use the appropriate tools and machines for your abrasive wheels, such as grinders, sanders, or cut-off saws. Make sure these machines are in good working condition. Work Area: Set up your work area with adequate lighting, ventilation, and space to move around safely. Ensure there are no flammable materials nearby. Completing an abrasive wheels training course will guide you on how to properly set up and use this equipment. Selecting the Right Wheel for the Job Choosing the right abrasive wheel is crucial for getting the job done efficiently and safely. Here’s how to select the right wheel: Material to Be Worked On: Different materials require different types of wheels. For example, use a grinding wheel for metal and a sanding disc for wood. Wheel Specification: Check the specifications of the wheel, including its grit size, bonding material, and hardness. Finer grits are better for finishing, while coarser grits are used for rough grinding. Machine Compatibility: Ensure the wheel is compatible with your machine. Check the wheel’s size, speed rating, and mounting requirements. Type of Task: Match the wheel to the task. Use cutting wheels for cutting, grinding wheels for grinding, and polishing wheels for finishing tasks. Enrolling in a grinding wheel training course can provide detailed guidance on selecting and using the right wheels for different jobs. Proper selection and setup not only improve efficiency but also enhance safety and prolong the life of the abrasive wheels. Safe Operation Techniques Step-by-Step Guide on How to Operate Abrasive Wheels Safely Inspect the Wheel: Before using any abrasive wheel, inspect it for cracks, chips, or other damage. Do not use a damaged wheel. Mount the Wheel Properly: Ensure the wheel is properly mounted on the machine. Follow the manufacturer’s instructions for correct mounting and balancing. Check Machine Guards: Make sure all safety guards are in place and functioning correctly. Guards help protect you from flying debris and accidental contact with the wheel. Wear Protective Gear: Always wear safety goggles, gloves, ear protection, and a dust mask to protect against sparks, noise, and dust. Start the Machine Safely: Stand to the side of the machine when starting it, not directly in front of the wheel. Allow the wheel to reach full speed before using it. Use Proper Technique: Apply light, even pressure to the workpiece. Avoid forcing the wheel or using excessive pressure, as this can cause the wheel to break. Maintain Control: Keep a firm grip on the tool or workpiece to prevent it from slipping or catching. Avoid Overheating: Use intermittent cuts and allow the wheel to cool down to avoid overheating, which can weaken the wheel and cause it to break. Regular Breaks: Take regular breaks to avoid fatigue, which can lead to mistakes and accidents. Completing an abrasive wheel training course can provide practical demonstrations of these safety techniques. Comparison with Other Cutting Methods Feature Abrasive Wheels Saws (Circular/Band) Laser Cutters Versatility High: Can cut metals, stone, ceramics. Moderate: Best for wood and certain metals. High: Can cut metals, plastics, composites. Precision High: Provides precise cuts and finishes. Moderate: Effective for straight cuts, less precise for intricate designs. Very High: Capable of intricate designs and clean cuts. Cost Low: Generally cheaper initial and maintenance costs. Moderate: Higher initial cost than abrasive wheels but longer lifespan. High: Expensive initial investment and maintenance costs. Portability High: Many tools are portable for on-site cutting and grinding. Low: Often require stationary setups. Low: Typically not portable and integrated into fixed setups. Safety Risks High: Requires proper training to prevent accidents (e.g., HSE, OSHA). Moderate: High-speed blades can be dangerous, need safety measures. Moderate: Requires specialized training to handle safety risks (e.g., reflective materials). Dust/Debris High: Generates significant dust and debris. Low: Produces less dust and debris. Very Low: Minimal dust and debris, cleaner cutting process. Wear and Tear High: Abrasive wheels wear down with use and need regular replacement. Low: Blades have a longer lifespan, less frequent replacement needed. Low: Lasers do not wear down, but components may need maintenance. Training Availability High: Numerous training courses available (e.g., HSE, OSHA). Moderate: Training available but not as comprehensive as abrasive wheel training. High: Specialized training required for safe operation and maintenance. Compliance High: Training helps meet regulatory requirements (e.g., PUWER 1998). Moderate: Safety training helps meet general safety regulations. High: Requires adherence to safety standards and protocols. Operational Speed Moderate: Suitable for detailed work, not as fast as saws for straight cuts. High: Faster cutting speeds for straight cuts. Moderate: Speed depends on material and thickness, generally slower than saws for thicker materials. Common Mistakes and How to Avoid Them Using a Damaged Wheel: Mistake: Using an abrasive wheel with cracks or chips. Solution: Always inspect the wheel before use and replace damaged wheels immediately. Improper Mounting: Mistake: Incorrectly mounting the wheel, leading to imbalance and breakage. Solution: Follow the manufacturer’s instructions and ensure the wheel is securely mounted. Skipping Protective Gear: Mistake: Not wearing safety gear, increasing the risk of injury. Solution: Always wear the recommended protective equipment, including goggles, gloves, and ear protection. Excessive Pressure: Mistake: Applying too much pressure, which can cause the wheel to break. Solution: Use light, even pressure and let the wheel do the work. Incorrect Wheel for the Job: Mistake: Using the wrong type of wheel for the material or task. Solution: Select the appropriate wheel based on the material and the task. Refer to the specifications and guidelines provided during abrasive wheels training. By understanding and avoiding these common mistakes, you can ensure safer and more efficient use of abrasive wheels. Proper training, like an abrasive wheel course, is essential to master these techniques and avoid potential hazards. Maintenance and Care Tips for Maintaining Abrasive Wheels Regular Cleaning: Clean the abrasive wheels regularly to remove any debris or buildup. Use a brush or compressed air to clean the wheel, ensuring it remains effective and prevents clogging. Proper Storage: Store abrasive wheels in a dry, cool place to prevent moisture damage. Keep them on a flat surface or in a vertical position to avoid warping or deformation. Wheel Dressing: Dress the wheel regularly using a wheel dresser to maintain its shape and expose fresh abrasive particles. This helps keep the wheel sharp and efficient. Avoid Overloading: Do not overload the wheel by forcing it to cut or grind faster than its capacity. Overloading can cause excessive wear and reduce the wheel’s lifespan. Use Correct Speed: Always operate the wheel at the recommended speed. Check the maximum speed rating of the wheel and ensure your machine does not exceed this limit. Balanced Use: Use the entire surface of the wheel evenly to prevent uneven wear. Avoid focusing on one spot for too long, which can create grooves and weaken the wheel. Lubrication: If applicable, use the appropriate lubricant to reduce friction and heat buildup. This can extend the life of the wheel and improve performance. How to Check for Wear and Damage Visual Inspection: Before each use, visually inspect the wheel for cracks, chips, or other damage. A damaged wheel can be dangerous and should be replaced immediately. Sound Test: Perform a sound test by gently tapping the wheel with a non-metallic object (like a wooden handle). A clear ringing sound indicates the wheel is intact, while a dull sound suggests it may be cracked and unsafe to use. Check for Unusual Vibrations: When the wheel is running, check for unusual vibrations or wobbling. This can indicate imbalance or damage. Stop using the wheel if you notice these signs and inspect it further. Measure Wheel Wear: Measure the diameter of the wheel regularly to monitor wear. Replace the wheel when it reaches the minimum usable diameter specified by the manufacturer. Surface Condition: Examine the surface of the wheel for glazing or loading. A glazed wheel appears shiny and smooth, indicating it is worn out and needs dressing or replacement. A loaded wheel is clogged with material and may require cleaning or dressing. Mounting Hardware: Check the flanges, spacers, and other mounting hardware for wear or damage. Ensure they are secure and in good condition to maintain proper wheel alignment. Regular maintenance and careful inspection of abrasive wheels can significantly extend their lifespan and ensure safe, efficient operation. Abrasive wheels training provides detailed guidelines on maintaining and checking wheels for wear and damage, helping users develop good maintenance habits. Health and Safety Guidelines Detailed Safety Precautions and Protective Gear Wear Appropriate Protective Gear: Safety Goggles or Face Shield: Protect your eyes and face from flying debris and sparks. Gloves: Wear sturdy gloves to protect your hands from sharp edges and hot materials. Ear Protection: Use earplugs or earmuffs to protect your hearing from the noise produced by grinding operations. Dust Mask or Respirator: Prevent inhalation of dust and particles, especially when working with materials that produce harmful dust. Apron or Protective Clothing: Wear a durable apron or long-sleeved clothing to shield your body from sparks and debris. Machine Safety Checks: Guarding: Ensure all machine guards are in place and secure before operation. Speed Check: Confirm that the machine’s speed does not exceed the wheel’s maximum rated speed. Work Area: Keep the work area clean and free of clutter to prevent tripping hazards. Safe Operation Practices: Proper Setup: Mount the abrasive wheel correctly, following the manufacturer’s instructions. Ensure it is balanced and secure. Correct Usage: Use the abrasive wheel only for its intended purpose. Avoid side grinding unless the wheel is specifically designed for it. Pressure Application: Apply light, even pressure to avoid overloading the wheel and causing it to break. Regular Inspections: Pre-Use Inspection: Check the wheel for any cracks, chips, or signs of wear before each use. During Use: Monitor the wheel for unusual vibrations or noises, and stop the machine immediately if any issues arise. What to Do in Case of an Accident Immediate Response: Stop the Machine: Turn off the machine immediately to prevent further injury. First Aid: Administer first aid for minor injuries. This may include cleaning cuts, applying bandages, and using cold compresses for burns or abrasions. Seek Medical Help: For serious injuries, seek professional medical assistance immediately. Call emergency services if necessary. Report the Incident: Inform Supervisors: Report the accident to your supervisor or safety officer. Provide details about how the incident occurred and the extent of the injuries. Document the Incident: Fill out an accident report form, including information about the equipment used, the nature of the injury, and any contributing factors. Review and Improve Safety Practices: Incident Analysis: Analyze the accident to determine its cause. Review whether safety protocols were followed and identify any gaps in training or equipment maintenance. Safety Training: Consider additional abrasive wheels training or a refresher course to reinforce safe practices and prevent future accidents. Online courses can be a convenient way to update your knowledge. Preventive Measures: Review Procedures: Ensure that all safety procedures are up-to-date and that all employees are familiar with them. Safety Drills: Conduct regular safety drills to prepare for potential accidents and improve response times. Legal Requirements and Certifications Overview of Relevant Laws and Regulations Using abrasive wheels involves adhering to specific safety laws and regulations to ensure the safety and health of workers. Here’s an overview of the key legal requirements: Occupational Safety and Health Administration (OSHA): In the United States, OSHA sets standards for the safe use of abrasive wheels. Employers must comply with OSHA regulations, including proper machine guarding, employee training, and the use of personal protective equipment (PPE). Provision and Use of Work Equipment Regulations (PUWER): In the UK, PUWER requires that work equipment, including abrasive wheels, is suitable for its intended use, properly maintained, and only operated by trained personnel. European Safety Standards: In Europe, EN 12413 is the standard for bonded abrasive products. It sets out requirements for safety, marking, and product testing to ensure the safe use of abrasive wheels. Regular Inspections and Maintenance: Laws often require regular inspections and maintenance of abrasive wheels and related machinery to ensure they remain in safe working condition. Record Keeping: Employers must keep records of all training, inspections, and maintenance activities related to abrasive wheels. How to Get Certified in Abrasive Wheels Training Getting certified in abrasive wheels training involves completing a recognized course and passing the necessary assessments. Here’s how you can achieve certification: Find a Training Provider: Look for accredited training providers that offer courses on abrasive wheels. Valley Plant Training is a well-known provider that offers comprehensive abrasive wheel training courses. You can also search for “abrasive wheel training near me” to find local providers or explore online options. Enroll in an Abrasive Wheel Course: Choose a course that covers both theoretical and practical aspects of abrasive wheel safety. The course should include topics such as wheel selection, proper mounting, safe operation techniques, and maintenance. Valley Plant Training offers courses that meet these criteria. Complete the Training: Attend the training sessions and participate actively. Training can be done in-person or online, depending on your preference and availability. Online courses can be convenient and flexible for busy schedules. Pass the Assessment: At the end of the course, you’ll need to pass an assessment to demonstrate your understanding of the material. This may include a written test and a practical demonstration of your skills. Receive Your Abrasive Wheels Certificate: Upon successful completion of the course and assessment, you will receive an abrasive wheels certificate. This certificate is proof that you have been trained in the safe use of abrasive wheels. Regular Refresher Courses: It’s important to stay updated with the latest safety practices and regulations. Consider taking refresher courses periodically to keep your skills and knowledge current. Valley Plant Training also offers refresher courses to help you stay up-to-date. Obtaining an abrasive wheel training certification from Valley Plant Training or another reputable provider not only enhances your safety and efficiency but also ensures compliance with legal requirements. It demonstrates to employers and regulatory bodies that you are qualified to handle abrasive wheels safely and effectively. Frequently Asked Questions What is abrasive wheel training? This is a training course that teaches you how to safely use and take care of machines that have abrasive wheels, like grinders. It covers choosing the right wheel, setting it up, and learning safety rules to prevent accidents. How much does abrasive wheels training cost? The price can change depending on where you are and who’s teaching the course. Generally, it might cost between £150.00 and £250 for the basic training. How long does abrasive wheels training last? Most basic courses take about a day to complete, around 6 to 8 hours. More detailed courses might take longer, especially if they include hands-on practice. Can abrasive wheel training be done online? Yes, you can learn the theory part online at your own pace. For learning how to actually use the wheels, you might need to attend a session in person to get practical experience. What are the two types of abrasive wheels? There are two main kinds: bonded and coated abrasive wheels. Bonded wheels are made of abrasive particles stuck together and are used for tasks like grinding or cutting. Coated wheels have a layer of abrasive glued to a backing material and are used for smoothing surfaces. What are the rules for abrasive wheels? The main rules include setting up the wheel correctly, wearing the right safety gear, checking the wheel regularly for damage, and following specific steps when using it to stay safe. There are also official safety standards you need to follow. Testing Of Candidates We will assess the delegates throughout the course on their levels of participation and understanding, they will demonstrate the inspection of various Abrasive wheels for damage and suitability. Then the delegates will complete a 25 question assessment paper at the end of the course. Successful delegates will be issued with the NPORS operator card Abrasive Wheels Training Covers: The requirements of the HASAW and PUWER and all associated regulations in respect of Abrasive Wheels. Hazards arising from the use of Abrasive Wheels and the precautions that should be taken. How to identify the Abrasive Wheel types and characteristics. Storage, handling and transportation of Abrasive Wheels. Inspecting and testing Abrasive Wheels. Personal protective equipment. Abrasive Wheels Training Available 7 days a week to suit your business requirements. VPT have a team of friendly and approachable instructors, who have a wealth of knowledge of abrasive wheels and the construction industry We have our own training centre for abrasive wheels conveniently located close to the M5 junction 9, In Tewkesbury. With its own purpose-built practical training area to simulate an actual working environment. Our abrasive wheels training and test packages are priced to be competitive. Discounts are available for multiple bookings We can send a fully qualified NPORS abrasive wheels Tester to your site nationwide, to reduce the amount of time away from work Other course: Enhance your skills with our specialized courses, including Lift Supervision Training, Appointed Person Training, Telehandler Training, Cat & Genny Training, Slinger Signaller Training, Lorry Loader Training and Crusher Training. Each program is designed to equip you with the expertise needed for excellence in your field.
Overview This 2 day course focuses on best practice bank ALM in today’s environment of a multiplicity of regulatory constraints on the balance sheet Who the course is for Asset Liability Committee (ALCO) members Treasury Risk Finance and internal audit capital management Funding management Liquidity buffer investment team Derivative structurers and salespeople; IT software providers Regulators Course Content To learn more about the day by day course content please request a brochure To learn more about schedule, pricing & delivery options, book a meeting with a course specialist now
Duration 4 Days 24 CPD hours This course is intended for Successful students have experience and knowledge in IT operations, including networking, virtualization, identity, security, business continuity, disaster recovery, data platforms, and governance. Students also have experience designing and architecting solutions. Before attending this course, students must have previous experience deploying or administering Azure resources and strong conceptual knowledge of: Azure compute technologies such as VMs, containers and serverless solutions Azure virtual networking to include load balancers Azure Storage technologies (unstructured and databases) General application design concepts such as messaging and high availability This course teaches Azure Solution Architects how to design infrastructure solutions. Course topics cover governance, compute, application architecture, storage, data integration, authentication, networks, business continuity, and migrations. The course combines lecture with case studies to demonstrate basic architect design principles. Prerequisites Before attending this course, students must have previous experience deploying or administering Azure resources and conceptual knowledge of: Azure Active Directory Azure compute technologies such as VMs, containers and serverless solutions Azure virtual networking to include load balancers Azure Storage technologies (unstructured and databases) General application design concepts such as messaging and high availability AZ-104T00 - Microsoft Azure Administrator 1 - Design governance Design for governance Design for management groups Design for subscriptions Design for resource groups Design for resource tags Design for Azure Policy Design for role-based access control (RBAC) Design for Azure landing zones 2 - Design an Azure compute solution Choose an Azure compute service Design for Azure Virtual Machines solutions Design for Azure Batch solutions Design for Azure App Service solutions Design for Azure Container Instances solutions Design for Azure Kubernetes Service solutions Design for Azure Functions solutions Design for Azure Logic Apps solutions 3 - Design a data storage solution for non-relational data Design for data storage Design for Azure storage accounts Design for data redundancy Design for Azure Blob Storage Design for Azure Files Design for Azure managed disks Design for storage security 4 - Design a data storage solution for relational data Design for Azure SQL Database Design for Azure SQL Managed Instance Design for SQL Server on Azure Virtual Machines Recommend a solution for database scalability Recommend a solution for database availability Design security for data at rest, data in motion, and data in use Design for Azure SQL Edge Design for Azure Cosmos DB and Table Storage 5 - Design data integration Design a data integration solution with Azure Data Factory Design a data integration solution with Azure Data Lake Design a data integration and analytic solution with Azure Databricks Design a data integration and analytic solution with Azure Synapse Analytics Design strategies for hot, warm, and cold data paths Design an Azure Stream Analytics solution for data analysis 6 - Design an application architecture Describe message and event scenarios Design a messaging solution Design an Azure Event Hubs messaging solution Design an event-driven solution Design a caching solution Design API integration Design an automated app deployment solution Design an app configuration management solution 7 - Design authentication and authorization solutions Design for identity and access management (IAM) Design for Microsoft Entra ID Design for Microsoft Entra business-to-business (B2B) Design for Azure Active Directory B2C (business-to-customer) Design for conditional access Design for identity protection Design for access reviews Design service principals for applications Design managed identities Design for Azure Key Vault 8 - Design a solution to log and monitor Azure resources Design for Azure Monitor data sources Design for Azure Monitor Logs (Log Analytics) workspaces Design for Azure Workbooks and Azure insights Design for Azure Data Explorer 9 - Design network solutions Recommend a network architecture solution based on workload requirements Design patterns for Azure network connectivity services Design outbound connectivity and routing Design for on-premises connectivity to Azure Virtual Network Choose an application delivery service Design for application delivery services Design for application protection services 10 - Design a solution for backup and disaster recovery Design for backup and recovery Design for Azure Backup Design for Azure blob backup and recovery Design for Azure files backup and recovery Design for Azure virtual machine backup and recovery Design for Azure SQL backup and recovery Design for Azure Site Recovery 11 - Design migrations Evaluate migration with the Cloud Adoption Framework Describe the Azure migration framework Assess your on-premises workloads Select a migration tool Migrate your structured data in databases Select an online storage migration tool for unstructured data Migrate offline data 12 - Introduction to the Microsoft Azure Well-Architected Framework Azure Well-Architected Framework pillars Cost optimization Operational excellence Performance efficiency Reliability Security 13 - Microsoft Azure Well-Architected Framework - Cost Optimization Develop cost-management discipline Design with a cost-efficiency mindset Design for usage optimization Design for rate optimization Monitor and optimize over time 14 - Microsoft Azure Well-Architected Framework - Operational excellence Embrace DevOps culture Establish development standards Evolve operations with observability Deploy with confidence Automate for efficiency Adopt safe deployment practices 15 - Microsoft Azure Well-Architected Framework - Performance efficiency Negotiate realistic performance targets Design to meet capacity requirements Achieve and sustain performance Improve efficiency through optimization 16 - Microsoft Azure Well-Architected Framework - Reliability Design for business requirements Design for resilience Design for recovery Design for operations Keep it simple 17 - Microsoft Azure Well-Architected Framework - Security Plan your security readiness Design to protect confidentiality Design to protect integrity Design to protect availability Sustain and evolve your security posture 18 - Getting started with the Microsoft Cloud Adoption Framework for Azure Customer narrative Common blockers 19 - Prepare for successful cloud adoption with a well-defined strategy Customer narrative Capture strategic motivation Define objectives and key results Evaluate financial considerations Understand technical considerations Create a business case 20 - Prepare for cloud adoption with a data-driven plan Customer narrative 21 - Choose the best Azure landing zone to support your requirements for cloud operations Customer narrative Common operating models Design areas for Azure landing zones Design principles for Azure landing zones Journey to the target architecture Choose an Azure landing zone option Deploy the Azure landing zone accelerator Enhance your landing zone 22 - Migrate to Azure through repeatable processes and common tools Customer narrative Migration process Migration tools Common tech platforms 23 - Address tangible risks with the Govern methodology of the Cloud Adoption Framework for Azure Customer narrative Govern methodology Corporate policies Governance disciplines Deploy a cloud governance foundation The Cost Management discipline 24 - Ensure stable operations and optimization across all supported workloads deployed to the cloud Establish business commitments Deploy an operations baseline Protect and recover Enhance an operations baseline Manage platform and workload specialization 25 - Innovate applications by using Azure cloud technologies Follow the innovation lifecycle Azure technologies for the build process Infuse your applications with AI Azure technologies for measuring business impact Azure technologies for the learn process 26 - Prepare for cloud security by using the Microsoft Cloud Adoption Framework for Azure Customer narrative Methodology Security roles and responsibilities Simplify compliance and security Simplify security implementation Security tools and policies Additional course details: Nexus Humans AZ-305T00: Designing Microsoft Azure Infrastructure Solutions training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the AZ-305T00: Designing Microsoft Azure Infrastructure Solutions course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 2 Days 12 CPD hours This course is intended for The primary audience for this course is any IT, facilities or data centre professional who works in and around the data centre and who has the responsibility to achieve and improve the availability and manageability of the data centre. Overview After completion of the course the participant will be able to:? Choose an optimum site for mission-critical data centre based on current and future needs? Describe all components that are important for high availability in a data centre and how to effectively setup the data centre? Name and apply the various industry standards? Describe the various technologies for UPS, fire suppression, cooling, monitoring systems, cabling standards, etc, and to select and apply them effectively to cost-efficiently enhance the high-availability of the data centre.? Review the electrical distribution system to avoid costly downtime? Enhance cooling capabilities and efficiency in the data centre by using existing and new techniques and technologies for the increased cooling requirements of the future? Design a highly reliable and scalable network architecture and learn how to ensure installers apply proper testing techniques? Create effective maintenance contracts with equipment suppliers ensuring the best return on investment? Setup effective data centre monitoring ensuring the right people get the right message? Ensure proper security measures, both procedural and technical, are established to safeguard your company's valuable information in the data centre The course will address how to setup and improve key aspects such as power, cooling, security, cabling, safety, etc., to ensure a high available data centre. It will also address key operations and maintenance aspects. The Data Centre, it?s Importance and Causes for DowntimeData Centre Standards and Best PracticesData Centre Location, Building and Construction Selecting appropriate sites and buildings and how to avoid pitfalls Various components of an effective data centre and supporting facilities setup Raised Floor/Suspended Ceiling Uniform, concentrated and rolling load definitions Applicable standards Raised Floor guidelines Signal Reference Grid, grounding of racks Disability act and regulations Suspended ceiling usage and requirements Light Standards Light fixture types and placement Emergency lighting, Emergency Power Supply (EPS) Power Infrastructure Power infrastructure layout from generation to rack level ATS and STS systems Redundancy levels and techniques Three-phase and single-phase usage Power distribution options within the computer room Power cabling versus bus bar trunking Bonding versus grounding Common Mode Noise and isolation transformers Distribution boards, form factors and IP-protection grades Power quality guidelines Real power versus apparent power How to size and calculate load in the data centre Generators Static and dynamic UPS systems, selection criteria, how they operate and energy efficiency option Battery types, correct selection and testing Thermo-graphics Electro Magnetic Fields Electrical fields and magnetic fields definitions and units of measurements Sources of EMF Effects of EMF on human health and equipment (H)EMP Standards EMF shielding solutions Equipment Racks Rack standards, properties and selection criteria Security considerations Power rail/strip options Cooling Infrastructure Temperature and humidity recommendations Cooling measurement units and conversion rates Sensible and latent heat definitions Differences between comfort and precision cooling Overview of different air conditioner technologies Raised floor versus non-raised floor cooling Placement of air conditioner units and limitations to be observed Supplemental cooling options Cold aisle/hot aisle containment Water Supply Importance of water supply and application areas Backup water supply techniques Designing a Scalable Network Infrastructure The importance of a Structured Cabling System Planning considerations Copper and Fiber cable technology and standards ANSI/TIA-942 Cabling hierarchy and recommendations Testing and verification SAN storage cabling Network redundancy Building-to-building connectivity Network monitoring system requirements Fire Suppression Standards for fire suppression Detection systems Various total flooding fire suppression techniques and systems, their benefits and disadvantages Handheld extinguishers Signage and safety Regulatory requirements and best practices Data Centre Monitoring Data centre monitoring requirements EMS versus BMS Water leak detection systems Notification options and considerations Operational Security and Safety Practices Data centre security layers Physical, infrastructure and organisational security Safety measures and essential signage Labelling Choosing a labelling scheme Recommended labelling practices Network labelling Documentation How to setup proper documentation Document management policies and procedures Cleaning Cleaning practices for the data centre MTBF/MTTR Standards and definitions Calculation models The ?real? value Maintenance Contracts/SLA/OLAEXAM: Certified Data Centre Professional Additional course details: Nexus Humans Certified Data Centre Professional (CDCP) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Data Centre Professional (CDCP) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for CxO?s IT Managers/ Directors Senior Project Officers Project & Program Coordinator/Managers Operations Managers Quality Managers Business Analysts Engineering Managers IT Infrastructure Managers Internal Consultants Professional Consultants Overview Change and the individual Change and the organization Communication and stakeholder engagement Change practice Dealing with change and more importantly, the impact of change is a high priority for all organisations. The Change Management Certification has been developed by APMG in partnership with the Change Management Institute (CMI), an independent, global professional association of change managers. Together they have developed a professional ?body of knowledge? for the discipline of change management. This body of knowledge now provides an independent benchmark for the professional knowledge expected of an effective change manager. APMG?s refreshed Change Management certification is fully aligned with the change management body of knowledge. Prerequisites There is no prerequisite to attending this foundation course, although it is recommended that candidates should have a good understanding of business practices. 1 - Change and the Organization Drivers for change Developing a vision Culture and climate Emergent change and lifecycle Organizational metaphors Models of change Roles required for change 2 - Stakeholders Principles Identification Analysis Influencing and listening Emotion and demonstration Communications Cognitive biases Remaining people focused Improving Communications Communications channels Collaboration Communications Planning Larger workshops 2 - Change Impact Assessing impact McKinsey 7 S Stakeholder impact assessment Assessing change readiness Large change ? how to staff Building a change team Preparing for resistance Building team effectiveness 4 - Individual Change Learning theory Motivation Change Curve Personality differences
Duration 5 Days 30 CPD hours This course is intended for Students in this course are interested in Azure development or in passing the Microsoft Azure Developer Associate certification exam. This course teaches developers how to create end-to-end solutions in Microsoft Azure. Students will learn how to implement Azure compute solutions, create Azure Functions, implement and manage web apps, develop solutions utilizing Azure storage, implement authentication and authorization, and secure their solutions by using KeyVault and Managed Identities. Students will also learn how to connect to and consume Azure services and third-party services, and include event- and message-based models in their solutions. The course also covers monitoring, troubleshooting, and optimizing Azure solutions. Prerequisites To be successful in this course, learners should have the following: Hands-on experience with Azure IaaS and PaaS solutions, and the Azure Portal. Experience writing in an Azure supported language at the intermediate level. (C#, JavaScript, Python, or Java) Ability to write code to connect and perform operations on, a SQL or NoSQL database product. (SQL Server, Oracle, MongoDB, Cassandra or similar) Experience writing code to handle authentication, authorization, and other security principles at the intermediate level. A general understanding of HTML, the HTTP protocol and REST API interfaces. 1 - Explore Azure App Service Examine Azure App Service Examine Azure App Service plans Deploy to App Service Explore authentication and authorization in App Service Discover App Service networking features 2 - Configure web app settings Configure application settings Configure general settings Configure path mappings Enable diagnostic logging Configure security certificates 3 - Scale apps in Azure App Service Examine autoscale factors Identify autoscale factors Enable autoscale in App Service Explore autoscale best practices 4 - Explore Azure App Service deployment slots Explore staging environments Examine slot swapping Swap deployment slots Route traffic in App Service 5 - Explore Azure Functions Discover Azure Functions Compare Azure Functions hosting options Scale Azure Functions 6 - Develop Azure Functions Explore Azure Functions development Create triggers and bindings Connect functions to Azure services 7 - Explore Azure Blob storage Explore Azure Blob storage Discover Azure Blob storage resource types Explore Azure Storage security features Discover static website hosting in Azure Storage 8 - Manage the Azure Blob storage lifecycle Explore the Azure Blob storage lifecycle Discover Blob storage lifecycle policies Implement Blob storage lifecycle policies Rehydrate blob data from the archive tier 9 - Work with Azure Blob storage Explore Azure Blob storage client library Create a client object Manage container properties and metadata by using .NET Set and retrieve properties and metadata for blob resources by using REST 10 - Explore Azure Cosmos DB Identify key benefits of Azure Cosmos DB Explore the resource hierarchy Explore consistency levels Choose the right consistency level Explore supported APIs Discover request units 11 - Work with Azure Cosmos DB Explore Microsoft .NET SDK v3 for Azure Cosmos DB Create stored procedures Create triggers and user-defined functions Explore change feed in Azure Cosmos DB 12 - Manage container images in Azure Container Registry Discover the Azure Container Registry Explore storage capabilities Build and manage containers with tasks Explore elements of a Dockerfile 13 - Run container images in Azure Container Instances Explore Azure Container Instances Run containerized tasks with restart policies Set environment variables in container instances Mount an Azure file share in Azure Container Instances 14 - Implement Azure Container Apps Explore Azure Container Apps Explore containers in Azure Container Apps Implement authentication and authorization in Azure Container Apps Manage revisions and secrets in Azure Container Apps Explore Dapr integration with Azure Container Apps 15 - Explore the Microsoft identity platform Explore the Microsoft identity platform Explore service principals Discover permissions and consent Discover conditional access 16 - Implement authentication by using the Microsoft Authentication Library Explore the Microsoft Authentication Library Initialize client applications 17 - Implement shared access signatures Discover shared access signatures Choose when to use shared access signatures Explore stored access policies 18 - Explore Microsoft Graph Discover Microsoft Graph Query Microsoft Graph by using REST Query Microsoft Graph by using SDKs Apply best practices to Microsoft Graph 19 - Implement Azure Key Vault Explore Azure Key Vault Discover Azure Key Vault best practices Authenticate to Azure Key Vault 20 - Implement managed identities Explore managed identities Discover the managed identities authentication flow Configure managed identities Acquire an access token 21 - Implement Azure App Configuration Explore the Azure App Configuration service Create paired keys and values Manage application features Secure app configuration data 22 - Explore API Management Discover the API Management service Explore API gateways Explore API Management policies Create advanced policies Secure APIs by using subscriptions Secure APIs by using certificates 23 - Explore Azure Event Grid Explore Azure Event Grid Discover event schemas Explore event delivery durability Control access to events Receive events by using webhooks Filter events 24 - Explore Azure Event Hubs Discover Azure Event Hubs Explore Event Hubs Capture Scale your processing application Control access to events Perform common operations with the Event Hubs client library 25 - Discover Azure message queues Choose a message queue solution Explore Azure Service Bus Discover Service Bus queues, topics, and subscriptions Explore Service Bus message payloads and serialization Explore Azure Queue Storage Create and manage Azure Queue Storage and messages by using .NET 26 - Monitor app performance Explore Application Insights Discover log-based metrics Instrument an app for monitoring Select an availability test Troubleshoot app performance by using Application Map 27 - Develop for Azure Cache for Redis Explore Azure Cache for Redis Configure Azure Cache for Redis Interact with Azure Cache for Redis by using .NET 28 - Develop for storage on CDNs Explore Azure Content Delivery Networks Control cache behavior on Azure Content Delivery Networks Interact with Azure Content Delivery Networks by using .NET
Duration 4 Days 24 CPD hours This course is intended for This four-day course is intended for Windows Server Hybrid Administrators who have experience working with Windows Server and want to extend the capabilities of their on-premises environments by combining on-premises and hybrid technologies. Windows Server Hybrid Administrators implement and manage on-premises and hybrid solutions such as identity, management, compute, networking, and storage in a Windows Server hybrid environment. This course teaches IT Professionals how to manage core Windows Server workloads and services using on-premises, hybrid, and cloud technologies. The course teaches IT Professionals how to implement and manage on-premises and hybrid solutions such as identity, management, compute, networking, and storage in a Windows Server hybrid environment. Prerequisites Experience with managing Windows Server operating system and Windows Server workloads in on-premises scenarios, including AD DS, DNS, DFS, Hyper-V, and File and Storage Services Experience with common Windows Server management tools (implied in the first prerequisite). Basic knowledge of core Microsoft compute, storage, networking, and virtualization technologies (implied in the first prerequisite). Experience and an understanding of core networking technologies such as IP addressing, name resolution, and Dynamic Host Configuration Protocol (DHCP) Experience working with and an understanding of Microsoft Hyper-V and basic server virtualization concepts Basic experience with implementing and managing IaaS services in Microsoft Azure Basic knowledge of Azure Active Directory Experience working hands-on with Windows client operating systems such as Windows 10 or Windows 11 Basic experience with Windows PowerShell 1 - Introduction to AD DS Define AD DS Define users, groups, and computers Define AD DS forests and domains Define OUs Manage objects and their properties in AD DS 2 - Manage AD DS domain controllers and FSMO roles Deploy AD DS domain controllers Maintain AD DS domain controllers Manage the AD DS Global Catalog role Manage AD DS operations masters Manage AD DS schema 3 - Implement Group Policy Objects Define GPOs Implement GPO scope and inheritance Define domain-based GPOs Create and configure a domain-based GPO Define GPO storage Define administrative templates 4 - Manage advanced features of AD DS Create trust relationships Implement ESAE forests Monitor and troubleshoot AD DS Create custom AD DS partitions 5 - Implement hybrid identity with Windows Server Select a Microsoft Entra integration model Plan for Microsoft Entra integration Prepare on-premises Active Directory for directory synchronization Install and configure directory synchronization with Microsoft Entra Connect Implement Seamless Single Sign-On Enable Microsoft Entra login in for Windows VM in Azure Describe Microsoft Entra Domain Services Implement and configure Microsoft Entra Domain Services Manage Windows Server 2019 in a Microsoft Entra Domain Services environment Create and configure a Microsoft Entra Domain Services instance Join a Windows Server VM to a managed domain 6 - Deploy and manage Azure IaaS Active Directory domain controllers in Azure Select an option to implement directory and identity services using Active Directory Domain Services in Azure Deploy and configure Active Directory Domain Services domain controllers in Azure VMs Install a replica Active Directory domain controller in an Azure VM Install a new Active Directory forest on an Azure VNet 7 - Perform Windows Server secure administration Define least privilege administration Implement delegated privileges Use privileged access workstations Use jump servers 8 - Describe Windows Server administration tools Explore Windows Admin Center Use Server Manager List Remote Server Administration Tools Use Windows PowerShell Use Windows PowerShell to remotely administer a server 9 - Perform post-installation configuration of Windows Server List the available post-installation configuration tools Configure Server Core using Sconfig Use DSC to configure Windows Server Perform post-installation configuration with Windows Admin Center Configure a server with answer files 10 - Just Enough Administration in Windows Server Explain the concept of Just Enough Administration (JEA) Define role capabilities for a JEA endpoint Create a session configuration file to register a JEA endpoint Describe how JEA endpoints work to limit access to a PowerShell session Create and connect to a JEA endpoint Demonstration: Connect to a JEA endpoint 11 - Administer and manage Windows Server IaaS Virtual Machine remotely Select the appropriate remote administration tool Manage Windows Virtual Machines with Azure Bastion Create an Azure Bastion host Configure just-in-time administration 12 - Manage hybrid workloads with Azure Arc Describe Azure Arc Onboard Windows Server instances Connect hybrid machines to Azure from the Azure portal Use Azure Arc to manage Windows Server instances Restrict access with RBAC 13 - Configure and manage Hyper-V Define Hyper-V Define Hyper-V Manager Configure Hyper-V hosts using best practices Configure Hyper-V networking Assess advanced Hyper-V networking features Define nested virtualization 14 - Configure and manage Hyper-V virtual machines List the virtual machine configuration versions List the virtual machine generation versions List available VHD formats and types Create and configure VMs Determine storage options for VMs Define shared VHDs and VHD Sets Implement guest clusters using shared VHDX 15 - Secure Hyper-V workloads Define guarded fabric Define the Host Guardian Service Explore TPM-trusted attestation Define KPS Determine key features of shielded VMs Compare encryption-supported and shielded VMs in a guarded fabric Implement a shielded VM 16 - Run containers on Windows Server Define containers List the differences between containers and VMs Define Windows Server and Hyper-V containers and isolation modes Explore Docker Prepare a Windows Server 2019 host for container deployment Security, Storage, and Networking with Windows containers 17 - Orchestrate containers on Windows Server using Kubernetes Define orchestration Define Kubernetes Deploy Kubernetes resources Create a Kubernetes cluster on Windows Define Azure Arc Connect an Azure Arc-enabled Kubernetes cluster to Azure Arc 18 - Plan and deploy Windows Server IaaS Virtual Machines Describe Azure compute Describe Virtual Machine storage Deploy Azure Virtual Machines Create a windows Virtual Machine using the portal Create a windows Virtual Machine using Azure CLI Deploy Azure Virtual Machines using templates Describe additional management optimization options 19 - Customize Windows Server IaaS Virtual Machine images Create a generalized image Create a new Virtual Machine from a managed image Create a managed image of a generalized virtual machine in Azure Create a Virtual Machine from a managed image Implement Azure Image Builder Create a windows Virtual Machine using Azure Image Builder template Create a Windows Virtual Machine with Azure Image Builder using PowerShell 20 - Automate the configuration of Windows Server IaaS Virtual Machines Describe Azure Automation Implement Azure Automation with DSC Remediate noncompliant servers Describe Custom Script Extensions Configure a Virtual Machine by using DSC 21 - Deploy and manage DHCP Use DHCP to simplify IP configuration Install and configure the DHCP role Configure DHCP options Configure DHCP scopes Select DHCP high availability options Implement DHCP Failover 22 - Implement Windows Server DNS Explore the DNS architecture Work with DNS zones and records Install and configure the DNS role Implement DNS forwarding 23 - Implement IP Address Management Define IP Address Management Deploy IP Address Management Administer IP Address Management Configure IP Address Management options Manage DNS zones with IP Address Management Manage DHCP servers with IP Address Management Use IP Address Management to manage IP addressing 24 - Implement remote access Examine the remote access options in Windows Server Select and set up VPNs Use NPS to create and enforce network access policies Plan and implement NPS Deploy a PKI for remote access Use WAP as a reverse web proxy 25 - Implement hybrid network infrastructure Describe Azure network topologies Implement Azure VPN options Create a route-based VPN gateway using the Azure portal Implement Azure ExpressRoute Configure Azure Virtual WAN Implement DNS in hybrid environments 26 - Implement DNS for Windows Server IaaS VMs Understand Azure DNS Implement Azure DNS Create an Azure DNS zone and record using the Azure portal Implement DNS with Azure IaaS virtual machines Implement split-horizon DNS in Azure Troubleshoot DNS 27 - Implement Windows Server IaaS VM IP addressing and routing Implement a virtual network Implement IaaS VM IP addressing Assign and manage IP addresses Configure a private IP address for a virtual machine using the Azure portal Create a virtual machine with a static public IP address using the Azure portal Implement IaaS virtual machine IP routing Implement IPv6 for Windows Server IaaS virtual machines 28 - Manage Windows Server file servers Define the Windows Server file system List the benefits and uses of File Server Resource Manager Define SMB and its security considerations Configure SMB protocol Define Volume Shadow Copy Service 29 - Implement Storage Spaces and Storage Spaces Direct Define the Storage Spaces architecture and its components List the functionalities, benefits, and use cases of Storage Spaces Implement Storage Spaces List the functionalities, components, benefits, and use cases of Storage Spaces Direct Implement Storage Spaces Direct 30 - Implement Windows Server Data Deduplication Define the architecture, components, and functionality of Data Deduplication Define the use cases and interoperability of Data Deduplication Implement Data Deduplication Manage and maintain Data Deduplication 31 - Implement Windows Server iSCSI List the functionalities, components, and use cases of iSCSI List the considerations for implementing iSCSI Implement iSCSI Configure high availability for iSCSI 32 - Implement Windows Server Storage Replica List the functionalities and components of Storage Replica Examine the prerequisites for implementing Storage Replica Implement Storage Replica by using Windows Admin Center Implement Storage Replica by using Windows PowerShell 33 - Implement a hybrid file server infrastructure Describe Azure File services Configure Azure Files Configure connectivity to Azure Files Describe Azure File Sync Implement Azure File Sync Deploy Azure File Sync Deploy Azure File Sync 2 Manage cloud tiering Migrate from DFSR to Azure File Sync
Duration 4 Days 24 CPD hours This course is intended for This course is for Azure Administrators. The Azure Administrator implements, manages, and monitors identity, governance, storage, compute, and virtual networks in a cloud environment. The Azure Administrator will provision, size, monitor, and adjust resources as appropriate. This course teaches IT Professionals how to manage their Azure subscriptions, secure identities, administer the infrastructure, configure virtual networking, connect Azure and on-premises sites, manage network traffic, implement storage solutions, create and scale virtual machines, implement web apps and containers, back up and share data, and monitor your solution. Prerequisites Successful Azure Administrators start this role with experience in virtualization, networking, identity, and storage. Understanding of on-premises virtualization technologies, including: VMs, virtual networking, and virtual hard disks. Understanding of network configurations, including TCP/IP, Domain Name System (DNS), virtual private networks (VPNs), firewalls, and encryption technologies. Understanding of Active Directory concepts, including users, groups, and role-based access control. Understanding of resilience and disaster recovery, including backup and restore operations. 1 - Configure Microsoft Entra ID Describe Microsoft Entra ID benefits and features Describe Microsoft Entra concepts Compare Active Directory Domain Services to Microsoft Entra ID Select Microsoft Entra editions Implement Microsoft Entra join Implement Microsoft Entra self-service password reset 2 - Configure user and group accounts Create user accounts Manage user accounts Create bulk user accounts Create group accounts Create administrative units 3 - Configure subscriptions Identify Azure regions Implement Azure subscriptions Obtain an Azure subscription Identify Azure subscription usage Implement Microsoft Cost Management Apply resource tagging Apply cost savings 4 - Configure Azure Policy Create management groups Implement Azure policies Create Azure policies Create policy definitions Create an initiative definition Scope the initiative definition Determine compliance 5 - Configure role-based access control Implement role-based access control Create a role definition Create a role assignment Compare Azure roles to Microsoft Entra roles Apply role-based access control Review fundamental Azure RBAC roles 6 - Configure Azure resources with tools Use the Azure portal Use Azure Cloud Shell Use Azure PowerShell Use Azure CLI 7 - Use Azure Resource Manager Review Azure Resource Manager benefits Review Azure resource terminology Create resource groups Create Azure Resource Manager locks Reorganize Azure resources Remove resources and resource groups Determine resource limits 8 - Configure resources with Azure Resource Manager templates Review Azure Resource Manager template advantages Explore the Azure Resource Manager template schema Explore the Azure Resource Manager template parameters Consider Bicep templates Review QuickStart templates 9 - Configure virtual networks Plan virtual networks Create subnets Create virtual networks Plan IP addressing Create public IP addressing Associate public IP addresses Allocate or assign private IP addresses 10 - Configure network security groups Implement network security groups Determine network security group rules Determine network security group effective rules Create network security group rules Implement application security groups 11 - Configure Azure DNS Identify domains and custom domains Verify custom domain names Create Azure DNS zones Delegate DNS domains Add DNS record sets Plan for Azure Private DNS zones Review Azure Private DNS zone scenarios 12 - Configure Azure Virtual Network peering Determine Azure Virtual Network peering uses Determine gateway transit and connectivity Create virtual network peering Extend peering with user-defined routes and service chaining 13 - Configure network routing and endpoints Review system routes Identify user-defined routes Determine service endpoint uses Determine service endpoint services Identify private link uses 14 - Configure Azure Load Balancer Determine Azure Load Balancer uses Implement a public load balancer Implement an internal load balancer Determine load balancer SKUs Create back-end pools Create health probes Create load balancer rules 15 - Configure Azure Application Gateway Implement Azure Application Gateway Determine Azure Application Gateway routing Configure Azure Application Gateway components 16 - Configure storage accounts Implement Azure Storage Explore Azure Storage services Determine storage account types Determine replication strategies Access storage Secure storage endpoints 17 - Configure Azure Blob Storage Implement Azure Blob Storage Create blob containers Assign blob access tiers Add blob lifecycle management rules Determine blob object replication Upload blobs Determine Blob Storage pricing 18 - Configure Azure Storage security Review Azure Storage security strategies Create shared access signatures Identify URI and SAS parameters Determine Azure Storage encryption Create customer-managed keys Apply Azure Storage security best practices 19 - Configure Azure Files and Azure File Sync Compare storage for file shares and blob data Manage Azure file shares Create file share snapshots Implement Azure File Sync Identify Azure File Sync components Deploy Azure File Sync 20 - Configure Azure Storage with tools Use Azure Storage Explorer Use the Azure Import/Export service Use the WAImportExport tool Use the AzCopy tool 21 - Configure virtual machines Review cloud services responsibilities Plan virtual machines Determine virtual machine sizing Determine virtual machine storage Create virtual machines in the Azure portal Connect to virtual machines 22 - Configure virtual machine availability Plan for maintenance and downtime Create availability sets Review update domains and fault domains Review availability zones Compare vertical and horizontal scaling Implement Azure Virtual Machine Scale Sets Create Virtual Machine Scale Sets Implement autoscale Configure autoscale 23 - Configure Azure App Service plans Implement Azure App Service plans Determine Azure App Service plan pricing Scale up and scale out Azure App Service Configure Azure App Service autoscale 24 - Configure Azure App Service Implement Azure App Service Create an app with App Service Explore continuous integration and deployment Create deployment slots Add deployment slots Secure your App Service app Create custom domain names Back up and restore your App Service app Use Azure Application Insights 25 - Configure Azure Container Instances Compare containers to virtual machines Review Azure Container Instances Implement container groups Review the Docker platform 26 - Configure file and folder backups Describe Azure Backup benefits Implement Backup Center for Azure Backup Configure Azure Recovery Services vault backup options Use the Microsoft Azure Recovery Services (MARS) agent Configure on-premises file and folder backups 27 - Configure virtual machine backups Explore options to protect virtual machine data Create virtual machine snapshots in Azure Backup Set up Azure Recovery Services vault backup options Back up your virtual machines Restore your virtual machines Implement System Center DPM and Azure Backup Server Compare the MARS agent and Azure Backup Server Implement soft delete for your virtual machines Implement Azure Site Recovery 28 - Configure Azure Monitor Describe Azure Monitor key capabilities Describe Azure Monitor components Define metrics and logs Identify monitoring data and tiers Describe activity log events Query the activity log 29 - Configure Azure alerts Describe Azure Monitor alerts Manage Azure Monitor alerts Create alert rules Create action groups 30 - Configure Log Analytics Determine Log Analytics uses Create a Log Analytics workspace Create Kusto (KQL) queries Structure Log Analytics queries 31 - Configure Network Watcher Describe Azure Network Watcher features Review IP flow verify diagnostics Review next hop diagnostics Visualize the network topology
Duration 3 Days 18 CPD hours This course is intended for This course is ideal for Professionals preparing to become CRISC certified. Risk practitioners Students or recent graduates Overview At course completions, students will understand the essential concepts in the 4 ISACA CRISC domains: Governance IT Risk Assessment Risk Response and Reporting Information Technology and Security This 3 Day CRISC course is geared towards preparing students to pass the ISACA Certified in Risk and Information Systems Control examination. The course covers all four of the CRISC domains, and each section corresponds directly to the CRISC job practice. CRISC validates your experience in building a well-defined, agile risk-management program, based on best practices to identify, analyze, evaluate, assess, prioritize and respond to risks. This enhances benefits realization and delivers optimal value to stakeholders. GOVERNANCE - a. Organizational Governance Organizational Strategy, Goals, and Objectives Organizational Structure, Roles, and Responsibilities Organizational Culture Policies and Standards Business Processes Organizational Assets GOVERNANCE - b. Risk Governance Enterprise Risk Management and Risk Management Framework Three Lines of Defense Risk Profile Risk Appetite and Risk Tolerance Legal, Regulatory, and Contractual Requirements Professional Ethics of Risk Management IT RISK ASSESSMENT - a. IT Risk Identification Risk Events (e.g., contributing conditions, loss result) Threat Modelling and Threat Landscape Vulnerability and Control Deficiency Analysis (e.g., root cause analysis) Risk Scenario Development IT RISK ASSESSMENT - b. IT Risk Analysis and Evaluation Risk Assessment Concepts, Standards, and Frameworks Risk Register Risk Analysis Methodologies Business Impact Analysis Inherent and Residual Risk RISK RESPONSE AND REPORTING - a. Risk Response Risk Treatment / Risk Response Options Risk and Control Ownership Third-Party Risk Management Issue, Finding, and Exception Management Management of Emerging Risk RISK RESPONSE AND REPORTING - b. Control Design and Implementation Control Types, Standards, and Frameworks Control Design, Selection, and Analysis Control Implementation Control Testing and Effectiveness Evaluation RISK RESPONSE AND REPORTING - c. Risk Monitoring and Reporting Risk Treatment Plans Data Collection, Aggregation, Analysis, and Validation Risk and Control Monitoring Techniques Risk and Control Reporting Techniques (heatmap, scorecards, dashboards) Key Performance Indicators Key Risk Indicators (KRIs) Key Control Indicators (KCIs) INFORMATION TECHNOLOGY AND SECURITY - a. Information Technology Principles Enterprise Architecture IT Operations Management (e.g., change management, IT assets, problems, incidents) Project Management Disaster Recovery Management (DRM) Data Lifecycle Management System Development Life Cycle (SDLC) Emerging Technologies INFORMATION TECHNOLOGY AND SECURITY - b. Information Security Principles Information Security Concepts, Frameworks, and Standards Information Security Awareness Training Business Continuity Management Data Privacy and Data Protection Principles
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is an IT, facilities or data centre operations professional working in and around the data centre and having the responsibility to achieve and improve high-availability and manageability of the data centre. Overview After completion of the course the participant will be able to:? Understand the design life cycle of data centres and the stages involved? Discuss the data centre requirements in great level of detail with vendors, suppliers and contractors to ensure that these requirements are met? Validate design plans, quotes and offers proposed by vendors/contractors? Understand redundancy levels for both the data centre design/setup and maintenance? Understand the various building considerations such as bullet proofing, mitigation of seismic activity, fire ratings and thermal stability? Understand how to install a raised floor that meets requirements, avoiding misalignment, level differences and leakage? Understand how to read a Single Line Electrical Diagram to identify and avoid the most common design issues? Choose the correct UPS and parallel configuration, learn and avoid classic parallel installation mistakes? Understand how to calculate battery banks, validate offered configurations to ensure they meet requirements? Understand what distance to keep to avoid EMF issues for human safety and equipment disturbances? Understand the fundamental cooling setup, CFM, Delta-T and other important factors? Understand contamination factors and limitations? Understand full details of fire suppression options, how to calculate gas content and verify installations? Understand how to measure data centre energy efficiency and how to improve it The course will bring participants to the level of a suitable sparring partner with suppliers. They will be able to verify offers provided by vendors for correctness, effectiveness and efficiency. Data Centre Design/Life Cycle Overview Overview of the phases of a data centre life cycle Planning, re-alignment and continuous improvement Standards and Rating Level Definitions Rating level history Difference between Uptime and TIA-942 Rating level definitions Redundancy options (N+1), 2N, 2(N+1) Concurrent Maintainability/Compartmentalisation Example configurations Substation and feed requirements Maintenance options Operational processes guidelines/standards Skill development Building Considerations Building location considerations Floor and hanging loads requirements Fire rating for walls and glass Blast protection Bullet proofing Forced entry protection Advanced Raised Floor & Suspended Ceiling Raised floor installation guidelines Techniques to install a proper and leveled raised access floor Common mistakes Choosing the right tiles and their locations Seismic-mitigating floor constructions Choosing the correct suspended ceiling Advanced Power Power infrastructure layout; Formulas which you should know for the data centre Single Line Electrical diagrams; how to read to ensure key components are present for protection Over current protection devices (MCB/MCCB/VCB/ACB/Fuses) definitions and what to use where Earth Leakage devices (RCB/RCD/ELCB/GFCI/ALCI/RCBO), definitions and what to use where Sizing of protective components Lightning strikes and surge protection devices (TVSS/SPD), how they operate, where to use and how to install Power cabling and cable run considerations PDU/DB setup and minimum requirements Generators; Generator types: Standy/Prime/Continuous Component make up and functions Fuel storage and calculation Paralleling of gen-sets Generator room/area requirements UPS Systems; Required specifications for UPS systems How to read data sheets and select the correct UPS Requirements for parallel configurations and avoid pitfalls such as single point of failures How parallel installation should be done, classic mistakes made by installers and how to avoid these Harmonic Filters; Active/Passive filters and their application Battery Banks; Battery bank terminology Designing battery banks, how to calculate, and double check the battery bank to be installed Battery charging pitfalls and ensuring the right charger is being installed and used Using parallel battery banks; how to properly install them, limitations and risks when using batteries in parallel How to test batteries correctly and make decisions on cell/block or string replacement Battery casing choices; ABS, V0, V1, V2 Alternative energy storage; flywheel, re-usable cell, compressed air UPS, etc. Advanced Electro Magnetic Fields Sources of EMF Difference between single, three phase and bus-bar EMF Options available to measure EMF and how to interpret the results from single-axes and composite measurements Guidance on safe distance for equipment and humans Calculation of EMF attenuation factor for shielding material permeability and saturation factors Advanced Cooling Important definitions; dry-bulb, wet-bulb, dew-point, RH, sensible and latent heat Psychometric chart and ASHRAE recommendations Environmental class definitions and thermal specifications Temperature/humidity measurements guideline Heat dissipation methods Altitude impact on temperature intake to ICT equipment Floor plan setup for effective cooling Differences in tile surface and supporting structure and the air-flow performance impact Rack door construction and the flow performance impact Equipment Delta-T and its impact Optimising air flow Thermal units conversions Calculations for air volume displacement (CFM/CMH) Cooling capacity calculations Air-conditioning selection De- / humidifying options Air conditioning efficiency SHR impact on cost saving Efficiency indicator New cooling principle and techniques (Submerged, VSD/VRF/ECF/water- and air side economisers) Redundancy guidelines for air-conditioners avoiding classic misconceptions and mistakes for meeting ANSI/TIA-942 compliant designs Installation requirements Connections to fire panel and EPO Commissioning of air conditioners Set points and calibration CFD (Computational Fluid Dynamics) Advanced Fire Protection The fire triangle and elements to stop a fire Detection systems in detail (VESDA, VIEW, smoke sensors) Considerations for installation of sensors Proper testing of smoke sensors Water based systems i.e. deluge, wet-pipe, dry-pipe, pre-action and why most of them don't work and how to detect this Details on Inert and Halocarbon systems and how to select the correct system for your data centre How to calculate the gas content ensuring the appropriate level is installed to suppress the fire including safety considerations Other requirements for gas systems such as release times, hold times, pipe install requirements and other important factors Requirements for the fire detection panel Installation verification, methods, what to check and how New advanced fire suppression technologies Design and Install Scalable Networking Cabling System ANSI/TIA942 cabling structure topology ToR, EoR Design Intelligent patching systems Installation best practice such as routing, bending radius, separation from power, containment fill ratio, fiber link loss calculator, bonding and grounding requirement Standard for telecommunications labeling and administration Environmental Specifications and Contamination Control Acoustic noise effects, regulations, specifications and limits Data centre contaminations and classifications Measurements, standards and limits Preventive measures and avoidance Data Centre Efficiency Business drivers to go Green High-availability or Green? Green guidelines and standards How to measure it and what are acceptable numbers compared to the general industry PUE classes defined by Green Grid and issues with PUE Techniques for saving energy in all parts of the data centre i.e. application/system level, cooling, power distribution Mock ExamEXAM: Certified Data Centre Specialist