• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

1510 Courses in Edinburgh

Effective Leadership Skill and Team Building

5.0(10)

By GBA Corporate

Overview In this competitive era, it is very important to continuously upgrade the skills to lead successful and high-performing careers. The course Effective Leadership Skills and Team Building is designed to improve leadership skills and lead high-performing teams. The course is designed with a lot of training exercises, techniques, strategies and all other essential tools to learn to enhance skills to lead effectively and to become successful managers and team leaders.

Effective Leadership Skill and Team Building
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Preventive and Predictive Maintenance

By EnergyEdge - Training for a Sustainable Energy Future

About this Virtual Instructor Led Training (VILT) Preventive and Predictive maintenance are not new concepts. Both have been used across industry all over the world and when done properly, can yield impressive results (cost reductions of 20% or greater and a leap forward in equipment reliability and performance are very achievable). However, for every company using these concepts effectively, there are many others who are not. This 8 half-day Virtual Instructor Led Training (VILT) course has been derived from the Plant Performance Improvement Road Map developed by practitioners that guarantee the reliability of your operations. The VILT training focuses on how to improve profitability of any business by identifying the right maintenance strategy for any equipment. The aim of the VILT training is to help practitioners run programmes that will deliver real benefits as fast as possible with minimum zero wasted effort. The VILT training will also cover the core principles of Reliability Centred Maintenance, Total Productive Maintenance and Six Sigma and the increasingly important role of operations in achieving optimised asset performance. This is a certified course with the option of sitting for a short exam on the final day of the course to give participants the opportunity to gain a Certificate from petroEDGE and the Carcharodon Maintenance Academy. Training Objectives Master the critical skills by acquiring the following: An understanding of how maintenance can add profit The ability to develop improvement programmes that deliver maximum benefit in the shortest time A fundamental understanding of the principles of Preventive, Predictive and other maintenance types A practical understanding of the latest methods of solving problems at root cause level An appreciation of maintenance methodologies such as Reliability Centred Maintenance Strategies for ensuring your company gets value for money from your Contractors How to use the Maintenance Model of Excellence and Plant Performance Improvement Road Map Target Audience This VILT course has been designed for maintenance managers and engineers, reliability professionals, planners, project engineers, operations team members, and functional specialists. Training Methods The VILT course will be delivered online in 8 half-day sessions comprising 4 hours per day, with 2 breaks of 10 minutes per day. Course Duration: 8 half-day sessions, 4 hours per session (32 hours in total). Trainer Your expert course leader is an award-winning consultant and trainer with 30 years' experience in maintenance and reliability improvement. He has worked across five continents, in a wide variety of environments from the world's largest oil refinery to a small drinks production line. He has 10 years of maintenance management experience in the process industry, so he brings a very practical approach to training. He moved into consulting with ABB Eutech as their global maintenance specialist where he led maintenance and reliability best practice panels, delivered a wide range of maintenance improvement projects and trained other consultants. He is a fully qualified CMRP professional, an approved SMRP* Proctor, authorised to conduct CMRP exams and a globally respected maintenance consultant and best practice trainer. He founded his consultancy and training business in 2002 to focus on maintenance and reliability improvement. As part of this, he developed a range of maintenance 'models of excellence' with inputs from authors, international lecturers and some of the world's leading consultants and operators. His work has been recognised as being at the leading edge of industry best practice, winning independent awards such as the UK Chemical Industries Association 'Excellence in Engineering' award. He remains close to the industry as a respected specialist helping operating companies to achieve changes in performance. This ongoing field work enables him to continue to refine and extend best practice and the learning from this is continually fed into his training. His unique experience of facilitating two major turnarounds when the Coronavirus escalated into lockdown have given him a unique insight into how events of this type can disrupt maintenance. Moreover, his involvement in developing management processes and leading a Coronavirus response on a major industrial asset means he can talk with direct experience about how to cope and innovate in this global pandemic. *SMRP refers to Society of Maintenance and Reliability Professionals. PetroEdge is not affiliated with SMRP POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Preventive and Predictive Maintenance
Delivered in Internationally or OnlineFlexible Dates
£1,642 to £3,099

Python for network engineers

5.0(3)

By Systems & Network Training

Python training course description This Python course focusses on teaching Python for use in network automation and network DevOps. We focus on getting delegates up and running with Python and network automation as quickly as possible rather than making them great programmers. In other words we concentrate on enabling delegates to use network automation libraries such as netmiko, NAPALM and Nornir, and APIs such as NETCONF and RESTCONF rather than enabling delegates to produce object oriented programs. Hands on sessions use Cisco and Juniper devices. What will you learn Run Python programs. Read Python programs. Write Python programs. Debug Python programs. Automate network tasks with Python programs. Configure network devices with Python. Collect data from network devices with Python. Python training course details Who will benefit: Network engineers. Prerequisites: TCP/IP Foundation Duration 5 days Python training course contents What is Python? Programming languages, Why Python? Python in interactive mode, Python scripts, ipython, Python version 2 versus version 3. A simple Python script. Comments. Hands on Installing Python, Hello world. A network example On box vs off box Python. telnet, ssh, NETCONF, HTTP, APIs, manufacturers and API support, analysis of a simple telnetlib program. Hands on Using Python to retrieve the configuration from a network device. Using wireshark to analyse the actions. Python basics I/O, operators, variables and assignment, types, indentation, loops and conditionals. Hands on Modifying the telnet program, changing configurations on a network devices. Functions, classes and methods What are functions, calling functions, builtin functions, useful builtin functions, file handling, classes, objects, creating instances. Hands on Storing configurations in files, configuring devices from files, using an inventory file to work on multiple devices. Libraries and modules Modules, files and packages, import, from-import, Python standard library, other packages, pip install, executing other programs. Managing python libraries. Hands on Using pip, installing and using ipaddress, subprocess to access netsnmp. For the more advanced, using the sockets library. Paramiko and netmiko SSH, enabling SSH on devices, keys. Paramiko versus netmiko, example scripts. pexpect. Hands on Configuring VLANs from Python. pySNMP Gathering facts using previous methods, SNMP review, pySNMP GET, pySNMP and SNMPv3. easySNMP library. Hands on Walking a MIB from Python. NETCONF What is NETCONF? Enabling NETCONF on devices, A first ncclient script, device handlers, get_config, edit_config, copy_config, delete_config, commit, validate, pyEZ, utils_config, utils.sw. Hands on Configuration using ncclient and PyEZ. This session is expanded for those interesting in JunOS automation. Manipulating configuration files Builtin functions, string handling. Unicode. Sequences, strings, lists, tuples. Dictionaries. TextFSM. Regular expressions. JSON, YAML, XML, YANG, Jinja2, templates. Hands on Jinja2 templating with Python to configure network devices. NAPALM Getters, configuration operations, supported devices, NAPALM transport, Config-replace, Config-merge, Compare config, Atomic changes, rollback. Example NAPLAM scripts. Hands on Using NAPALM to gather facts, Using NAPALM for configuration management REST and RESTCONF What is REST, HTTP methods, GET, POST, cURL, Postman, Python requests library. RESTCONF, a RESTCONF example. Hands on Modifying a configuration using RESTCONF. Scapy What is scapy, Scapy in interactive mode, Scapy as a module. Hands on Packet crafting from Python. Warning Errors and exceptions, Exception handling, try, except. Memory management. Garbage collection. Context management, With. Hands on Improving Python code. Nornir What is Nornir? A network automation framework, inventories, connection management and parallelization. Nornir architecture and other libraires. Hands on Setting up nornir, nornir fact gathering, nornir tasks. Optional Writing your own functions, Writing your own classes. pyntc. Hands on Writing reusable code.

Python for network engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697

Securing Linux systems

5.0(3)

By Systems & Network Training

Securing Linux systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure Linux accounts. Secure Linux file systems. Secure Linux access through the network. Securing Linux systems training course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing Linux systems training course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing Linux systems
Delivered in Internationally or OnlineFlexible Dates
£3,697

Cyber security for engineers

5.0(3)

By Systems & Network Training

Cyber security training course description This cyber security course focusses on the network side of security. Technologies rather than specific products are studied focussing around the protection of networks using firewalls and VPNs. What will you learn Describe: - Basic security attacks - RADIUS - SSL - VPNs Deploy firewalls and secure networks Explain how the various technologies involved in an IP VPN work. Describe and implement: - L2TP - IPsec - SSL - MPLS, L3, VPNs. Cyber security training course details Who will benefit: Anyone working in the security field. Prerequisites: TCP/IP foundation for engineers Duration 5 days Cyber security training course contents Security review Denial of service, DDOS, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits IP spoofing, SYN attacks, hijacking, reflectors and amplification, keeping up to date with new threats. Hands on port scanning, use a 'hacking' tool. Client and Server security Windows, Linux, Log files, syslogd, accounts, data security. Hands on Server hardening. Firewall introduction What is a firewall? Firewall benefits, concepts. HAnds on launching various attacks on a target. Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls. Firewall products. Hands on Simple personal firewall configuration. Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on SPI firewalls. Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall plusses and minuses. Hands on Proxy firewalls. Firewall architectures Small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Password cracking. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, RADIUS. Hands on Using certificates. VPN overview What is a VPN? What is an IP VPN? VPNs vs. Private Data Networks, Internet VPNs, Intranet VPNs, Remote access VPNs, Site to site VPNs, VPN benefits and disadvantages. VPN Tunnelling VPN components, VPN tunnels, tunnel sources, tunnel end points, tunnelling topologies, tunnelling protocols, which tunnelling protocol? Requirements of tunnels. L2TP Overview, components, how it works, security, packet authentication, L2TP/IPsec, L2TP/PPP, L2 vs L3 tunnelling. Hands on Implementing a L2TP tunnel. IPsec AH, HMAC, ESP, transport and tunnel modes, Security Association, encryption and authentication algorithms, manual vs automated key exchange, NAT and other issues. Hands on Implementing an IPsec VPN. SSL VPNs Layer 4 VPNs, advantages, disadvantages. SSL. TLS. TLS negotiation, TLS authentication. TLS and certificates. Hands on Implementing a SSL VPN. MPLS VPNs Introduction to MPLS, why use MPLS, Headers, architecture, label switching, LDP, MPLS VPNs, L2 versus L3 VPNs. Point to point versus multipoint MPLS VPNs. MBGP and VRFs and their use in MPLS VPNs. Hands on Implementing a MPLS L3 VPN. Penetration testing Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology. Hands on Hacking tools and countermeasures.

Cyber security for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697

M.D.D I WANT TO ATTRACT MY DREAM WOMAN PACKAGE(V.I.P) (MEN DATING SERVICES)

4.9(27)

By Miss Date Doctor Dating Coach London, Couples Therapy

Arrange dates Dating training Daily coaching 30 mins Confidence training Needs analysed Matchmaking Your own personal coach to support you daily 10 weeks service Support on all dates Dating relationships assessed Problem areas resolved https://relationshipsmdd.com/product/i-want-to-attract-my-dream-woman-packagev-i-p/

M.D.D I WANT TO ATTRACT MY DREAM WOMAN PACKAGE(V.I.P) (MEN DATING SERVICES)
Delivered in London or UK Wide or OnlineFlexible Dates
£3,500

Transferring Pricing Method Strategies

5.0(10)

By GBA Corporate

Overview By the end of this Fundamentals of Transfer Pricing Strategies training course, participants will be able to: Acquire basic technical knowledge of transfer pricing Appreciate the importance of the arm's length principle Identify the different stages of a typical transfer pricing analysis Developing a high-level appreciation of the transfer pricing including tax areas and opportunities for multinationals Analyze the current transfer pricing legislative framework Be updated on recent developments in transfer pricing

Transferring Pricing Method Strategies
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

Effective Presentation Skills: In-House Training

By IIL Europe Ltd

Effective Presentation Skills: In-House Training In today's results-oriented, global working environment, the ability to create and deliver presentations effectively is a necessary skill set for people at all levels of an organization. Regardless of your role, it's important to know how to synthesize your ideas into a coherent and focused narrative, add visuals that support and reinforce your message, and deliver it in a way that resonates with your audience. In this highly interactive course, we will unpack and practice some of the tools and techniques used by top speakers and influencers all over the world. In this engaging two-day course, you will plan, write, refine, practice, and deliver a presentation to the class. Your presentation will be filmed on both days, and you will leave the course with a flash-drive copy of your videos; participants of the virtual classroom workshop should be prepared to present via webcam. In addition to discovering and enhancing your own personal delivery style, you will learn how to create an overarching goal for your presentation and then organize and structure it for maximum impact. You'll gain insight into how to anticipate your audience's needs and tailor the content and delivery in a way that connects with them and sustains their attention and engagement. You will also learn skills that will help you control nervous energy, remain focused on and attuned to your audience, improvise under pressure, deal effectively with questions, and build a compelling call to action. What you will Learn At the end of this program, you will be able to: Construct an effective presentation goal statement, opening, body, and closing that connect with an audience Analyze an audience's needs and style preferences, including relevant DiSC®-related elements Deliver a complete criteria-based presentation that will persuade others Align usage of visuals as well as verbal and non-verbal techniques to maximize the impact of your presentation Getting Started Introductions and social agreements Course structure Course goals and objectives Opening activities Planning and Organizing Video: 'The Art of Misdirection' Setting your presentation goal Writing a goal statement Analyzing your audience Applying the 'reality' test Creating and strengthening supports Structuring your presentation 5 components of an effective opening Presentation body Presentation closing Write your presentation opening Audience Analysis Video: 'How to Tie Your Shoes' Everything DiSC® introduction Audience DiSC® Styles Analyzing your audience Further audience analysis Effective Delivery Delivery challenges: virtual and in-person Keeping your audience engaged Your body as your instrument Verbal / paraverbal elements Body stance and nonverbal communication What are your 'tells?' Controlling nervousness Staying attuned to your audience Responding to questions Review and edit your opening Deliver your opening Visuals and Enriching Elements Using images in your presentation Guidelines for visual composition Using questions to engage your audience The power of the pause Practicing and Applying What You've Learned Preparation Delivery Feedback Opportunity to put into practice the program content and receive a video copy Summary and Next Steps What did we learn and how can we implement this in our work environment? Your personal action plan

Effective Presentation Skills: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,295

Security+

5.0(3)

By Systems & Network Training

Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.

Security+
Delivered in Internationally or OnlineFlexible Dates
£2,797

Basin Analysis and Petroleum Systems

By EnergyEdge - Training for a Sustainable Energy Future

About this Training Course This 5 full-day course will focus on geological fundamentals: how different basin types differ in subsidence mechanisms, basin cycles, heat flow through time, depositional systems, structural styles and their type of petroleum systems. This will allow participants to make realistic interpretations in new areas; interpretations that are consistent with the specific basin type and to be expected depositional systems and structural styles. In addition, through simple paper-based exercises, the course will provide background and understanding of how some of the typical PBE products are made: creaming curves, Field-size plots and Yet-to-find. Finally, the essentials of commercial assessments will be covered. Training Objectives To provide participants with a sound understanding how, and under which conditions different basin types develop, and what the impact of their development is on the typical petroleum systems of these different basin types. To teach evaluation techniques that assist in the regional understanding and illustration of sedimentary basins and their development. While some of these techniques can be done using computers, in the course these will be done 'by hand' for maximum understanding. Target Audience This course is designed in the first place for geoscientists working in exploration and their direct supervisors. The course is also very instructive for specialist staff working closely with exploration staff such as (bio)stratigraphers, geochemists, basin modelers, structural geologists, geophysicists, reservoir engineers and petrophysicists. Course Level Intermediate Training Methods Each topic is introduced by a lecture, and leaning is re-enforced by practical exercises (on paper). There is ample time for discussions of general issues and any specific questions participants may have. For several exercises participants will be invited to do exercises on a basin of their choice, which will make the course more impactful for the participants. Participants will be provided with the following pre-read material: Concepts of Conventional Petroleum Systems. De Jager, J. (2020). Invited contribution for Regional Geology and Tectonics Volume 1: Global Concepts, Techniques and Methodology (eds: Adam, J., Chiarelly, D. & Scarselli, N. Play-Based Exploration of the petroleum potential of the Tremp-Graus, Ainsa and eastern Jaca Sub-basins in the southern De Jager, J & van Winden, M. (2020). invited contribution for Digital Learning - Multi-scale analysis of depositional systems and their subsurface workflows (eds: Grötsch, J. & Pöppelreiter, M.), EAGE. Trainer Your expert course leader has a PhD in Geology from the University of Utrecht. He worked for 31 years (1979 -2010) with Shell as an exploration geologist in a variety of functions across the globe. As Principle Technical Expert, he was responsible for ensuring that Risk & Volume assessments were carried out consistently and correctly in all of Shell's exploration units. In this capacity, he led and participated in countless prospect review sessions and developed and conducted a successful in-house course on Risks & Volume assessment. As manager of the Exploration Excellence Team, he performed in depth analysis of basins and plays and provided advice on exploration opportunities to senior management. Together with his team, he visited most of Shell's exploration offices, working hands-on with Shell's local exploration teams to generate new play and prospect ideas and to suggest evaluation techniques and technologies to apply. In 2010, he was appointed as extraordinary professor Regional and Petroleum Geology at the VU university of Amsterdam and in 2012 also at the University of Utrecht. He was visiting professor at the University of Malaya (Malaysia). Through his own consultancy, as of 2010, he provides advice on exploration activities to several companies and is regularly invited to carry out technical reviews. Activities cover all continents and include Portfolio Reviews, Prospect assessment, Play-based Exploration, and Geothermal activities. He conducts courses on several topics including Risk & Volume Assessment, Prospect Maturation, Basin Analysis, Play-based Exploration, Trap & Seal Analysis, Petroleum Geology for Non-geologists. Some of his recent publications include: De Jager, J. & van Winden, M. (2020): Play-Based Exploration of the petroleum potential of the Tremp-Graus, Aínsa and eastern Jaca Sub-basins in the southern Pyrenees. Invited contribution for Digital Geology, EAGE special publication (eds: Grötsch, J. & Pöppelreiter, M.) De Jager, J. (2020). Concepts of Conventional Petroleum Systems. Invited contribution for Regional Geology and Tectonics Volume 1: Global Concepts, Techniques and Methodology (eds: Adam, J., Chiarelly, D. & Scarselli, N.) De Jager, J. (2021): Handbook Risk & Volume Assessment. Self-published De Jager, J., Van Ojik, K & Smit, R. (2023 - in preparation): Geological Development of The Netherlands. In: Geology of The Netherlands (eds: Ten Veen, J., Vis, G-J., De Jager, J. @ Wong, T.) POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Basin Analysis and Petroleum Systems
Delivered in Internationally or OnlineFlexible Dates
£3,439 to £3,999