• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

617 Courses in Bristol

Linux shell scripting

5.0(3)

By Systems & Network Training

Linux shell scripting training course description A practical introduction to writing scripts using the Bourne shell under any Linux operating system. Applicable for those using the Korn shell as well. What will you learn Read shell scripts. Write shell scripts. Use different types of quotes. Recognise the role of shell scripts within the Linux system. Linux shell scripting training course details Who will benefit: Programmers developing programs under UNIX. Administrators / support personnel who wish to find out more about the workings of Linux or write simple utility programs. Prerequisites: Linux Fundamentals Duration 2 days Linux shell scripting training course contents Review of Linux fundamentals Basic shell scripts What does the shell do? How are commands executed? Different shells. what is a shell script? Comments, creating shell scripts. Variables Setting variables, using variables, set, scope, export, sourcing, environmental variables, read. Positional parameters $0 to $9, $#, $* and others. shift parameter substitution. Control statements The test command The if statement while loops for loops The case statement. Special characters Redirection of errors, here documents, quoting. Arithmetic in shell scripts The expr command. System shell scripts Screen handling The terminfo database, The tput command. Advanced issues (optional session) Shell functions, getopts, xargs, debugging shell scripts, portability issues. Extras in the Korn shell. Optimising shell scripts The time command, performance tips.

Linux shell scripting
Delivered in Internationally or OnlineFlexible Dates
£1,497

COSHH & Spill Kit (Half Day) (On-Site)

4.9(182)

By You Can Do It .Training

COSHH training course will help to ensure that your business complies with relevant legislation...

COSHH & Spill Kit (Half Day) (On-Site)
Delivered In-Person in Stoke on Trent or UK WideFlexible Dates
£640

Microsoft Access

5.0(3)

By Systems & Network Training

Microsoft Access training course description A hands on course providing a solid grounding in Microsoft Access. What will you learn Use and customise the Microsoft Access environment. Select, use and customise queries. Define tables. Design forms and reports. Recognise the use of macros. Microsoft Access training course details Who will benefit: Anyone wishing to work with Microsoft Access. Prerequisites: Database fundamentals Duration 3 days Microsoft Access training course contents Introducing databases Flat file databases, Relational databases, the objects defined in an Access database, planning a simple relational database. Open Access and create a database The database wizards, tables, creating and amending tables, using field properties to improve the quality of data entry and system performance, the primary key. Working in datasheet view View, add, modify and delete records, find records. Advantages and disadvantages of entering data directly into a table. Queries Sort and select records form a single table, advantages and disadvantages of entering data via a query, define simple calculated expressions, use 'Totals' queries. Forms Use the form wizards, basic editing of objects created using the form wizards, Data-entry in form view. Reports Use the report wizard, basic editing of objects created using the report wizard, print reports. The multi table environment Plan and create a related table, define a one-to-many relationship, write multi-table queries and use the 'AutoLookup' feature, use the form wizard to create a subform and carry out data-entry in a main/subform, print and amend reports, use the report wizard to create reports based on multi-table. Relationships Working with one-to-one and one-to-many relationships, recognising and handling many-to-many relationships, referential integrity. Select queries Select queries based on related tables, parameter queries, Crosstab, find unmatched queries and Find Duplicate, the implications of the Join properties in a relational query, conditional expressions, and working with the expression builder. Action queries Make table queries, append queries, update queries, delete queries. Customising forms. Using the Toolbox, calculated controls, Combo and List boxes, query by form, working with form and control properties, domain aggregate functions. Reports Report and control properties, customising sorting and grouping, calculated controls on reports, Sub-reports, editing and altering a report's source. Macros Introduction to macros.

Microsoft Access
Delivered in Internationally or OnlineFlexible Dates
£1,697

Data Analytics Workflows for Artificial Lift, Production and Facility Engineers

By EnergyEdge - Training for a Sustainable Energy Future

About this training course Business Impact: The main aim is to provide insight and understanding of data analytics and machine learning principles through applications. Field data is used to explain data-analysis workflows. Using easy to follow solution scripts, the participants will assess and extract value from the data sets. Hands-on solution approach will give them confidence to try out applicable techniques on data from their field assets. Data analysis means cleaning, inspecting, transforming, and modeling data with the goal of discovering new, useful information and supporting decision-making. In this hands-on 2-day training course, the participants learn some data analysis and data science techniques and workflows applied to petroleum production (specifically artificial lift) while reviewing code and practicing. The focus is on developing data-driven models while keeping our feet closer to the underlying oil and gas production principles. Unique Features: Eight business use cases covering their business impact, code walkthroughs for most all and solution approach. Industry data sets for participants to practice on and take home. No software or complicated Python frameworks required. Training Objectives After the completion of this training course, participants will be able to: Understand digital oil field transformation and its impact on business Examine machine learning methods Review workflows and code implementations After completing the course, participants will have a set of tools and some pathways to model and analyze their data in the cloud, find trends, and develop data-driven models Target Audience This training course is suitable and will greatly benefit the following specific groups: Artificial lift, production and facilities engineers and students to enhance their knowledge base, increase technology awareness, and improve the facility with different data analysis techniques applied on large data sets Course Level Intermediate Advanced Training Methods The course discusses several business use-cases that are amenable to data-driven workflows. For each use case, the instructor will show the solution using a data analysis technique with Python code deployed in the Google cloud. Trainees will solve a problem and tweak their solution. Course Duration: 2 days in total (14 hours). Training Schedule 0830 - Registration 0900 - Start of training 1030 - Morning Break 1045 - Training recommences 1230 - Lunch Break 1330 - Training recommences 1515 - Evening break 1530 - Training recommences 1700 - End of Training The maximum number of participants allowed for this training course is 20. This course is also available through our Virtual Instructor Led Training (VILT) format. Prerequisites: Understanding of petroleum production concepts Knowledge of Python is not a must but preferred to get the full benefit. The training will use the Google Collaboratory environment available in Google-Cloud for hands-on exercises Trainees will need to bring a computer with a Google Chrome browser and a Google email account (available for free) Trainer Your expert course leader has over 35 years' work-experience in multiphase flow, artificial lift, real-time production optimization and software development/management. His current work is focused on a variety of use cases like failure prediction, virtual flow rate determination, wellhead integrity surveillance, corrosion, equipment maintenance, DTS/DAS interpretation. He has worked for national oil companies, majors, independents, and service providers globally. He has multiple patents and has delivered a multitude of industry presentations. Twice selected as an SPE distinguished lecturer, he also volunteers on SPE committees. He holds a Bachelor's and Master's in chemical engineering from the Gujarat University and IIT-Kanpur, India; and a Ph.D. in Petroleum Engineering from the University of Tulsa, USA. Highlighted Work Experience: At Weatherford, consulted with clients as well as directed teams on digital oilfield solutions including LOWIS - a solution that was underneath the production operations of Chevron and Occidental Petroleum across the globe. Worked with and consulted on equipment's like field controllers, VSDs, downhole permanent gauges, multiphase flow meters, fibre optics-based measurements. Shepherded an enterprise-class solution that is being deployed at a major oil and gas producer for production management including artificial lift optimization using real time data and deep-learning data analytics. Developed a workshop on digital oilfield approaches for production engineers. Patents: Principal inventor: 'Smarter Slug Flow Conditioning and Control' Co-inventor: 'Technique for Production Enhancement with Downhole Monitoring of Artificially Lifted Wells' Co-inventor: 'Wellbore real-time monitoring and analysis of fracture contribution' Worldwide Experience in Training / Seminar / Workshop Deliveries: Besides delivering several SPE webinars, ALRDC and SPE trainings globally, he has taught artificial lift at Texas Tech, Missouri S&T, Louisiana State, U of Southern California, and U of Houston. He has conducted seminars, bespoke trainings / workshops globally for practicing professionals: Companies: Basra Oil Company, ConocoPhillips, Chevron, EcoPetrol, Equinor, KOC, ONGC, LukOil, PDO, PDVSA, PEMEX, Petronas, Repsol, , Saudi Aramco, Shell, Sonatrech, QP, Tatneft, YPF, and others. Countries: USA, Algeria, Argentina, Bahrain, Brazil, Canada, China, Croatia, Congo, Ghana, India, Indonesia, Iraq, Kazakhstan, Kenya, Kuwait, Libya, Malaysia, Oman, Mexico, Norway, Qatar, Romania, Russia, Serbia, Saudi Arabia, S Korea, Tanzania, Thailand, Tunisia, Turkmenistan, UAE, Ukraine, Uzbekistan, Venezuela. Virtual training provided for PetroEdge, ALRDC, School of Mines, Repsol, UEP-Pakistan, and others since pandemic. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Data Analytics Workflows for Artificial Lift, Production and Facility Engineers
Delivered in Internationally or OnlineFlexible Dates
£2,132 to £2,480

UNIX shell programming

5.0(3)

By Systems & Network Training

UNIX shell programming training course description This course has been designed as a follow on course for the XML primer course. The course looks at the use of XSLT in the transforming and styling XML documents. What will you learn Read shell scripts. Write shell scripts. Use different types of quotes. Recognise the role of shell scripts within the UNIX system. UNIX shell programming training course details Who will benefit: Programmers developing programs under UNIX. Anyone working with XML. Administrators Support personnel who wish to find out more about the workings of UNIX or write simple utility programs. Prerequisites: UNIX fundamentals Some programming experience would be useful although not essential. Duration 2 days UNIX shell programming training course contents Review of UNIX fundamentals Basic shell scripts What does the shell do? How are commands executed? Different shells. What is a shell script? Comments, creating shell scripts. Variables Setting variables, using variables, set, scope, export, sourcing, environmental variables, read. Positional parameters 0 to $9, $#, $* and others. shift parameter substitution. Control statements The test command, The if statement, while loops, for loops, The case statement, Special characters, Redirection of errors, here documents, quoting. Arithmetic in shell scripts The expr command. System shell scripts Screen handling The terminfo database The tput comand Avanced issues (optional session) Shell functions, getopts, xargs, debugging shell scripts, portability issues. Extras in the Korn shell. Optimising shell scripts The time command, performance tips.

UNIX shell programming
Delivered in Internationally or OnlineFlexible Dates
£1,497

Mobile communications demystified

5.0(3)

By Systems & Network Training

Mobile comms training course description A complete overview of mobile communications covering all the major technologies in a 2-day format. What will you learn GSM GPRS UMTS LTE Alternative mobile strategies Mobile comms training course details Who will benefit: Anyone involved in mobile communications. Prerequisites: None. Duration 2 days Mobile comms training course contents Introduction Telephony, RF, mobile and wireless technologies, distances, mobile phone generations, base stations, cells, frequencies, cell types, MSC, handoffs, channels, internetworking, the Internet, wireless Internet access. UK operators, worldwide operators. GSM What is it? Timeline, digitising voice, channels, GSM architecture, Abis, A, Um, MS, BTS, BSC, MSC, HLR, VLR, EIR, AuC. Radio link aspects, GSM signalling overview, signalling protocols, roaming, GSM call flows, authentication. IMEI. SIM cards. GPRS What it is, 2G to 3G, GPRS user features, GPRS network features, GPRS elements, GPRS architecture, overlay, SGSN, GGSN, GPRS ATTACH, GPRS protocol stack, GPRS timeslots, EDGE, GPRS classes, GPRS routing, GPRS packet format. UMTS and 3G What is 3G? IMT-2000, 3G proposals, what is UMTS? Speed comparison, evolution to 3G, CDMA, CDMA 2000, W-CDMA, UMTS components, UMTS infrastructure, RNC, Node B, network architecture, packet switched attach, mobility in 3G, HSDPA. LTE and 4G LTE architecture and principles, Physical layer, Air interface, E-UTRAN, Evolved packet core, service provision. Other wireless solutions Integration of services, Bluetooth, Blackberry, VoIP, Mobile IP, 802.11, WiFi, 802.16, WiMax, What is 5G?

Mobile communications demystified
Delivered in Internationally or OnlineFlexible Dates
£1,497

Jenkins for network engineers

5.0(3)

By Systems & Network Training

Jenkins training course description An introduction to Continuous Integration and development (CI/CD) in network automation using Jenkins. The course focusses specifically on the network Devops case of using Jenkins. What will you learn Explain how Jenkins can help with network automation. Configure Jenkins for network Devops. Use Jenkins for network automation. Jenkins training course details Who will benefit: Network engineers. Prerequisites: TCP/IP Foundation Duration 1 day Jenkins training course contents What is Jenkins? DevOps, CI/CD, version control systems, git, automating execution of tasks, Jenkins job, Jenkins pipeline, Jenkins plugins, CI server. Hands on Installing Jenkins. Example pipeline for network automation YAML, GitHub, Jenkins, ansible, network devices. Hands on Investigating a workflow: Auto deploying network configurations. Configuring Jenkins Code repository, build triggers, gerrit and reviews, build environment. A Jenkins job, build step, post build actions, running a Jenkins job, build log, home directory. Hands on Configuring Jenkins. CI using Jenkins Branches, pipeline, git, the git plugin. Hands on A Jenkins job to poll, build and unit test network configurations.

Jenkins for network engineers
Delivered in Internationally or OnlineFlexible Dates
£1,397

Biohazard Safety: Managing Blood and Body Fluid Spillages Instructor

By Guardian Angels Training

Gain expertise in biohazard safety with our "Biohazard Safety: Managing Blood and Body Fluid Spillages Instructor Training" course. Ideal for healthcare professionals, lab staff, and emergency responders.

Biohazard Safety: Managing Blood and Body Fluid Spillages Instructor
Delivered In-Person in InternationallyFlexible Dates
£1,175

Securing UNIX systems

5.0(3)

By Systems & Network Training

Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing UNIX systems
Delivered in Internationally or OnlineFlexible Dates
£4,997

Total FabricPath for engineers

5.0(3)

By Systems & Network Training

Total FabricPath training course description A comprehensive look at Cisco's FabricPath. This course starts with the problems in traditional switched networks then moves onto to how FabricPath solves these problems. As IS-IS is key to loop free topologies in FabricPath networks, this protocol is also studied. What will you learn Explain the benefits of FabricPath. Explain how FabricPath works Explain the role of IS-IS in FabricPath. Integrate FabricPath into existing networks. Total FabricPath training course details Who will benefit: Technical staff working with FabricPath. Prerequisites: Definitive Ethernet switching for engineers Duration 1 day Total FabricPath training course contents What is FabricPath? Layer 2 versus Layer 3, STP problems: One path, convergence, MAC explosion. Frame routing. Shortest path. Comparison with TRILL. FabricPath architecture Core and edge, VLANs, vPC+. IS-IS Link layer IS-IS, SPF trees, traffic management. IS -IS extensions for FabricPath. ISIS TLV. FabricPath forwarding Routing table, Switch IDs, multi destination trees, IGMP snooping. Roots. MAC versus switch tables. FabricPath Dynamic Resource Allocation Protocol (DRAP). FabricPath frames Encapsulation, frame format, Switch ID, Forwarding tag. Miscellaneous Basic configuration, interoperation with STP, TCN forwarding

Total FabricPath for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,397