Overview By the end of this Fundamentals of Transfer Pricing Strategies training course, participants will be able to: Acquire basic technical knowledge of transfer pricing Appreciate the importance of the arm's length principle Identify the different stages of a typical transfer pricing analysis Developing a high-level appreciation of the transfer pricing including tax areas and opportunities for multinationals Analyze the current transfer pricing legislative framework Be updated on recent developments in transfer pricing
Securing Linux systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure Linux accounts. Secure Linux file systems. Secure Linux access through the network. Securing Linux systems training course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing Linux systems training course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.
Python training course description This Python course focusses on teaching Python for use in network automation and network DevOps. We focus on getting delegates up and running with Python and network automation as quickly as possible rather than making them great programmers. In other words we concentrate on enabling delegates to use network automation libraries such as netmiko, NAPALM and Nornir, and APIs such as NETCONF and RESTCONF rather than enabling delegates to produce object oriented programs. Hands on sessions use Cisco and Juniper devices. What will you learn Run Python programs. Read Python programs. Write Python programs. Debug Python programs. Automate network tasks with Python programs. Configure network devices with Python. Collect data from network devices with Python. Python training course details Who will benefit: Network engineers. Prerequisites: TCP/IP Foundation Duration 5 days Python training course contents What is Python? Programming languages, Why Python? Python in interactive mode, Python scripts, ipython, Python version 2 versus version 3. A simple Python script. Comments. Hands on Installing Python, Hello world. A network example On box vs off box Python. telnet, ssh, NETCONF, HTTP, APIs, manufacturers and API support, analysis of a simple telnetlib program. Hands on Using Python to retrieve the configuration from a network device. Using wireshark to analyse the actions. Python basics I/O, operators, variables and assignment, types, indentation, loops and conditionals. Hands on Modifying the telnet program, changing configurations on a network devices. Functions, classes and methods What are functions, calling functions, builtin functions, useful builtin functions, file handling, classes, objects, creating instances. Hands on Storing configurations in files, configuring devices from files, using an inventory file to work on multiple devices. Libraries and modules Modules, files and packages, import, from-import, Python standard library, other packages, pip install, executing other programs. Managing python libraries. Hands on Using pip, installing and using ipaddress, subprocess to access netsnmp. For the more advanced, using the sockets library. Paramiko and netmiko SSH, enabling SSH on devices, keys. Paramiko versus netmiko, example scripts. pexpect. Hands on Configuring VLANs from Python. pySNMP Gathering facts using previous methods, SNMP review, pySNMP GET, pySNMP and SNMPv3. easySNMP library. Hands on Walking a MIB from Python. NETCONF What is NETCONF? Enabling NETCONF on devices, A first ncclient script, device handlers, get_config, edit_config, copy_config, delete_config, commit, validate, pyEZ, utils_config, utils.sw. Hands on Configuration using ncclient and PyEZ. This session is expanded for those interesting in JunOS automation. Manipulating configuration files Builtin functions, string handling. Unicode. Sequences, strings, lists, tuples. Dictionaries. TextFSM. Regular expressions. JSON, YAML, XML, YANG, Jinja2, templates. Hands on Jinja2 templating with Python to configure network devices. NAPALM Getters, configuration operations, supported devices, NAPALM transport, Config-replace, Config-merge, Compare config, Atomic changes, rollback. Example NAPLAM scripts. Hands on Using NAPALM to gather facts, Using NAPALM for configuration management REST and RESTCONF What is REST, HTTP methods, GET, POST, cURL, Postman, Python requests library. RESTCONF, a RESTCONF example. Hands on Modifying a configuration using RESTCONF. Scapy What is scapy, Scapy in interactive mode, Scapy as a module. Hands on Packet crafting from Python. Warning Errors and exceptions, Exception handling, try, except. Memory management. Garbage collection. Context management, With. Hands on Improving Python code. Nornir What is Nornir? A network automation framework, inventories, connection management and parallelization. Nornir architecture and other libraires. Hands on Setting up nornir, nornir fact gathering, nornir tasks. Optional Writing your own functions, Writing your own classes. pyntc. Hands on Writing reusable code.
Cyber security training course description This cyber security course focusses on the network side of security. Technologies rather than specific products are studied focussing around the protection of networks using firewalls and VPNs. What will you learn Describe: - Basic security attacks - RADIUS - SSL - VPNs Deploy firewalls and secure networks Explain how the various technologies involved in an IP VPN work. Describe and implement: - L2TP - IPsec - SSL - MPLS, L3, VPNs. Cyber security training course details Who will benefit: Anyone working in the security field. Prerequisites: TCP/IP foundation for engineers Duration 5 days Cyber security training course contents Security review Denial of service, DDOS, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits IP spoofing, SYN attacks, hijacking, reflectors and amplification, keeping up to date with new threats. Hands on port scanning, use a 'hacking' tool. Client and Server security Windows, Linux, Log files, syslogd, accounts, data security. Hands on Server hardening. Firewall introduction What is a firewall? Firewall benefits, concepts. HAnds on launching various attacks on a target. Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls. Firewall products. Hands on Simple personal firewall configuration. Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on SPI firewalls. Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall plusses and minuses. Hands on Proxy firewalls. Firewall architectures Small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Password cracking. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, RADIUS. Hands on Using certificates. VPN overview What is a VPN? What is an IP VPN? VPNs vs. Private Data Networks, Internet VPNs, Intranet VPNs, Remote access VPNs, Site to site VPNs, VPN benefits and disadvantages. VPN Tunnelling VPN components, VPN tunnels, tunnel sources, tunnel end points, tunnelling topologies, tunnelling protocols, which tunnelling protocol? Requirements of tunnels. L2TP Overview, components, how it works, security, packet authentication, L2TP/IPsec, L2TP/PPP, L2 vs L3 tunnelling. Hands on Implementing a L2TP tunnel. IPsec AH, HMAC, ESP, transport and tunnel modes, Security Association, encryption and authentication algorithms, manual vs automated key exchange, NAT and other issues. Hands on Implementing an IPsec VPN. SSL VPNs Layer 4 VPNs, advantages, disadvantages. SSL. TLS. TLS negotiation, TLS authentication. TLS and certificates. Hands on Implementing a SSL VPN. MPLS VPNs Introduction to MPLS, why use MPLS, Headers, architecture, label switching, LDP, MPLS VPNs, L2 versus L3 VPNs. Point to point versus multipoint MPLS VPNs. MBGP and VRFs and their use in MPLS VPNs. Hands on Implementing a MPLS L3 VPN. Penetration testing Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology. Hands on Hacking tools and countermeasures.
ISTQB® FOUNDATION TRAINING COURSE (2 persons minimum) The aim of this course is to provide you with the knowledge and skills to pass an exam certifying you as an ISTQB® Certified Tester - Foundation Level. Most organisations require this certification as a minimum skill requirement for software testers. In this course you will learn a standardized approach to software testing that will be immediately applicable to your projects. In order to get the certification you will be required to pass a 60-minute exam. Our trainers will fully prepare you by employing scenarios that mirror the exam questions, and by focusing course delivery with a balance of theory and practice. Target group: Functional Tester, Agile Tester, User Acceptance Tester, Test Automation Specialist, Performance Testing Specialist, Testing Team Lead, Test Manager, Business analyst Prerequisites: There are no specific prerequisites for this course. This course is suitable for anyone involved in software testing. Duration: 3 days. Training objectives: Learn aspects of test planning, estimation, monitoring and control. Understand and use international standards and terminology. Understand and implement effective testing techniques. Be well prepared for the exam. Identify the missing testing skills for the career development purposes. This course covers the following areas: Fundamentals of software testing Testing throughout the life cycle (software development models, test levels, test types) Test design techniques (e.g. specification-based or black-box techniques, structure-based or white-box techniques) Static testing (static testing techniques, review process, tool-assisted static analysis) Test management (test organisation, test planning and estimation, test progress monitoring and control, risks) Tools to support testing (types, benefits and risks) Language: English
Enhance your expertise in compressor and pump selection, operation, troubleshooting, and maintenance with EnergyEdge's comprehensive classroom training. Elevate your skills today!
Overview An ineffective audit can mean severe consequences; resulting in process failure, customer dissatisfaction and regulatory noncompliance. Optimize your generic auditing skills with this Internal Auditing training course not aimed at any specific ISO management systems standard or Process. Boost your internal audit capabilities by gaining confidence in planning and performing an effective audit and reporting and taking corrective action where necessary. This course develops the necessary skills to assess and report on the conformance and implementation of processes based on management systems. You'll learn how to initiate an audit, prepare and conduct audit activities, compile and distribute audit reports and complete follow-up activities
Overview Many hospitals and clinics will use a smile, âcustomer serviceâ and good intentions to hide the fact they have poor or no training in service and professional staff about the different care that medical tourists or expat local patients need. At the heart of appropriate care for medical travellers is a need for institutional awareness of the unique differences between local patients and medical tourists. Having a better understanding of what medical tourists, their care managers and home-based doctors expect from the receiving hospital or clinic at the medical destination will lead to a better quality of patient care for medical travellers.
About this Training Course This five-day training course will cover aspects of FPSO operations with an emphasis on management of safety. A background of the methodology used to generate the various safety plans and codes used in the operational safety case will be covered. The course will also review general operational guidelines in the offshore environment to ensure that the operations are completed as designed. This will include offtake operations and maintenance processes for the plant and vessel as well as a session on subsea. Training Objectives To enable participants to obtain an in-depth understanding of FPSO operations, safety and maintenance: Provide a broad overview of how an FPSO operation is set up and established in the field Grasp the various methods used to moor the production units Analyse information and methods required to establish the operation according to local and international regulations. Assess the methods used to calculate the safety parameters and requirements to construct an approved valid safety case Explore conditions to monitor during operations with regards to safety and structure Inspect various types of hazards associated with production and produced materials Review regular and emergency operational maintenance requirements Examine cyclones and weather events causing disconnection Comprehend manning, training requirements and operations including cargo Case studies and Exercises: The training course uses real life examples and case studies to explain the setup, preparation, implementation and operational activities required to successfully complete FPSO operations from a safety and maintenance perspective. This will allow the application of participants' newly-acquired knowledge. Case studies also stimulate independent thinking and discussion among the participants. Case Studies The case studies proposed for this course will include: A group exercise to consider what is the minimum requirement for the production of a safety case Generic plan for the development of a maintenance management system using computer software systems (e.g. Amos) Construction of a UWILD plan to include scope and potential tendering requirements Quizzes The various quizzes can be expanded or arranged to suit the group/interests and topics covered but will generally include the following topics: Mooring types and location where they are primarily used Safety cases Safety management systems Process hazards and mitigation UWILD components and regulations Operations management Offtake operations Target Audience The course is generally aimed at personnel who are involved in FPSO operations as either offshore crew or onshore support team members. This course will also greatly benefit the following groups but not limited to: Process engineers Surveyors Facility engineers Naval architects Operations engineer Health, Safety, Environment (HSE) specialists and managers Maintenance engineers Course Level Intermediate Training Methods The training course is presented in an interactive workshop format that allows for discussion. The course will be delivered through analysis of case studies and running examples of problems. Course Duration: 5 days in total (35 hours) The training instructor relies on a highly interactive training method to enhance the learning process. This method ensures that all participants gain a complete understanding of all the topics covered. The training comprises of information supplemented by visual activities including photographs from various operations and videos of operational and safety activities. Interaction verbally will be necessary to achieve the best learning outcome from the materials. Course timings and breaks 0830 - Registration 0900 - Start of training 1030 - Morning break 1045 - Training recommences 1230 - Lunch break 1330 - Training recommences 1515 - Afternoon break 1530 - Training recommences 1700 - End of training Trainer Your expert course leader has been involved in the Oil and Gas industry for over 28 years in several different roles commencing as a second deck officer on FPSO's and moving through the industry from deck officer to Master, OIM and Field Superintendent. He has also been in charge of semisubmersible and fixed production platforms as field superintendent before moving ashore into senior management roles. On completion of industry specific activities, he moved to teaching roles at South Tyneside Maritime College in the department of marine and simulation and presented live courses to maritime students from cadet to Master. Prior to returning to Perth in March 2019, he was training manager for a subsidiary of Gaz Transport and Technigaz of France. He has a Master Class 1 certificate with endorsements for hazardous cargoes and a Graduate Certificate in Business Administration as well as multiple course certificates required to operate FPSO's, platforms and semisubmersible facilities. He has been involved in the preparation of national standards for Safety Cases (Australia); Designing and structural setup of competency-based training systems in South East Asia. He was also involved in the development of minimum standards, competency profiles position based and preparation and implementation of training plans to ensure competency in the local staff in Asian operations. He was part of the development team for minimum standards of offshore safety in Australian offshore operations including the implementation of the Common Safety Training Program (CSTP). He was also involved in implementing training plans for both simulator and classroom based courses in LNG operations and cargo tank design and construction. Highlighted work experience: Premier Petroleum Myanmar Ltd Petronas Carigali Newfield Australia (Cartier) Pty Ltd: FPSO Jabiru Venture FPSO Challis Venture Onshore OIM Australian FPSO Management Pty. Ltd. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
About this Training Course This 5 full-day course provides a comprehensive understanding of the various types of generators, exciters, automatic voltage regulators (AVRs), governing systems, and protective systems. The focus will be on maximizing the efficiency, reliability and longevity of these equipment by providing an understanding of the characteristics, selection criteria, common problems and repair techniques, preventive and predictive maintenance. The emphasis of this course is on protective systems, inspection methods, diagnostic testing, troubleshooting, modern maintenance techniques, refurbishment, rewind and upgrade options, as well as advanced methods for preventing partial discharge and other failures. Training Objectives Equipment Operation: Gain a thorough understanding of the operating characteristics of generators, exciters, AVR's and protective systems Equipment Diagnostics and Inspection: Learn in detail all the diagnostic techniques and inspections required of critical components of generators, exciters, AVR's and protective systems Equipment Testing: Understand thoroughly all the tests required for the various types of generators, exciters, AVR's and protective systems Electrical Generator Protective Systems: Gain a thorough understanding of all Electrical generator protective systems including: all electrical relays, tripping mechanisms, protective systems for negative phase sequence (unbalance loading), loss of excitation, over fluxing protection (over-voltage and underfrequency), reverse power (generator monitoring), over-speeding, pole slipping / out of step (sudden increase in torque or weakness in excitation), Class A protection, Class B protection Equipment Maintenance and Troubleshooting: Determine all the maintenance and troubleshooting activities required to minimize the downtime and operating cost of generators, exciters, AVR's and protective systems Equipment Repair and Refurbishment: Gain a detailed understanding of the various methods used to repair and refurbish generators, exciters, AVR's and protective systems Equipment Rewind and Upgrade Options: Discover all options available to rewind and upgrade the generator rotor and stator to enhance the output and reduce downtime Efficiency, Reliability, and Longevity: Learn the various methods used to maximize the efficiency, reliability, and longevity of generators, exciters, AVR's and protective systems Advanced Methods to Prevent Failure: Gain a thorough understanding of all the methods used to prevent partial discharge, and other failures in generators, exciters, AVR's and protective systems Equipment Sizing: Gain a detailed understanding of all the calculations and sizing techniques used for generators, exciters, AVR's and protective systems Design Features: Understand all the design features that improve the efficiency, reliability of generators, exciters, AVR's and protective systems Equipment Selection: Learn how to select generators, exciters, AVR's and protective systems by using the performance characteristics and selection criteria that you will learn in this course Equipment Enclosures and Sealing Methods: Learn about the various types of enclosures and sealing arrangements used for generators, exciters, AVR's and protective systems Equipment Commissioning: Understand all the commissioning requirements for generators, exciters, AVR's and protective systems Equipment Codes and Standards: Learn all the codes and standards applicable for generators, exciters, AVR's and protective systems Equipment Causes and Modes of Failures: Understand causes and modes of failures of generators, exciters, AVR's and protective systems System Design: Learn all the requirements for designing different types of generators, exciters, AVR's and protective systems Target Audience Engineers of all disciplines Managers Technicians Maintenance personnel Other technical individuals Course Level Basic or Foundation Training Methods Your specialist course leader relies on a highly interactive training method to enhance the learning process. This method ensures that all participants gain a complete understanding of all topics covered. The training environment is highly stimulating, challenging, and effective because the participants will learn by case studies which will allow them to apply the material taught to their own organization. Each delegate will receive a copy of the following materials written by the instructor: ELECTRICAL EQUIPMENT HANDBOOK' published by McGraw-Hill in 2003 (600 pages) Generator Inspection, Testing, Maintenance, Protective Systems and Refurbishment Manual (this manual covers all the inspection and maintenance activities as well as all protective systems required for generators - 400 pages) Trainer Your specialist course leader has more than 32 years of practical engineering experience with Ontario Power Generation (OPG), one of the largest electric utility in North America. He was previously involved in research on power generation equipment with Atomic Energy of Canada Limited at their Chalk River and Whiteshell Nuclear Research Laboratories. While working at OPG, he acted as a Training Manager, Engineering Supervisor, System Responsible Engineer and Design Engineer. During the period of time, he worked as a Field Engineer and Design Engineer, he was responsible for the operation, maintenance, diagnostics, and testing of gas turbines, steam turbines, generators, motors, transformers, inverters, valves, pumps, compressors, instrumentation and control systems. Further, his responsibilities included designing, engineering, diagnosing equipment problems and recommending solutions to repair deficiencies and improve system performance, supervising engineers, setting up preventive maintenance programs, writing Operating and Design Manuals, and commissioning new equipment. Later, he worked as the manager of a section dedicated to providing training for the staff at the power stations. The training provided by him covered in detail the various equipment and systems used in power stations. In addition, he has taught courses and seminars to more than four thousand working engineers and professionals around the world, specifically Europe and North America. He has been consistently ranked as 'Excellent' or 'Very Good' by the delegates who attended his seminars and lectures. He written 5 books for working engineers from which 3 have been published by McGraw-Hill, New York. Below is a list of the books authored by him; Power Generation Handbook: Gas Turbines, Steam Power Plants, Co-generation, and Combined Cycles, second edition, (800 pages), McGraw-Hill, New York, October 2011. Electrical Equipment Handbook (600 pages), McGraw-Hill, New York, March 2003. Power Plant Equipment Operation and Maintenance Guide (800 pages), McGraw-Hill, New York, January 2012. Industrial Instrumentation and Modern Control Systems (400 pages), Custom Publishing, University of Toronto, University of Toronto Custom Publishing (1999). Industrial Equipment (600 pages), Custom Publishing, University of Toronto, University of Toronto, University of Toronto Custom Publishing (1999). Furthermore, he has received the following awards: The first 'Excellence in Teaching' award offered by PowerEdge, Singapore, in December 2016 The first 'Excellence in Teaching' award offered by the Professional Development Center at University of Toronto (May, 1996). The 'Excellence in Teaching Award' in April 2007 offered by TUV Akademie (TUV Akademie is one of the largest Professional Development centre in world, it is based in Germany and the United Arab Emirates, and provides engineering training to engineers and managers across Europe and the Middle East). Awarded graduation 'With Distinction' from Dalhousie University when completed Bachelor of Engineering degree (1983). Lastly, he was awarded his Bachelor of Engineering Degree 'with distinction' from Dalhousie University, Halifax, Nova Scotia, Canada. He also received a Master of Applied Science in Engineering (M.A.Sc.) from the University of Ottawa, Canada. He is also a member of the Association of Professional Engineers in the province of Ontario, Canada. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations