• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

23 Courses in Leicester

Effective technical writing (In-House)

By The In House Training Company

The aim of this programme is to help attendees create better quality technical documents in an organised and efficient manner. It will give those new to the topic an appreciation of how to approach the task professionally whilst those with more experience will be able to refresh and refine their skills. The programme comprises three complementary one-day modules: The programme presents a structured methodology for creating technical documents and provides a range of practical techniques that help delegates put principles into practice. Although not essential, it is strongly advised that delegates for modules 2 and 3 have already attended module 1, or another equivalent course. Note: the content of each module as shown here is purely indicative and can be adapted to suit your particular requirements. This course will: Explain the qualities and benefits of well written technical documents Present a structured approach for producing technical documents Review the essential skills of effective technical writing Demonstrate practical methods to help create better documents Provide tools and techniques for specification and report writing Review how technical documents should be issued and controlled Note: the content of each module as shown here is purely indicative and can be adapted to suit your particular requirements. Module 1: Essential skills for technical writers 1 Introduction to the programme Aims and objectives of the module Introductions and interests of participants 2 Creating effective technical documents What is technical writing? how does it differ from other writing? Key qualities of an effective technical document Communication essentials and the challenges faced by technical writers The lessons of experience: how the best writers write The five key steps : prepare - organise - write - edit - release (POWER) 3 Preparing to write Defining the document aims and objectives; choosing the title Understanding technical readers and their needs Getting organised; planning and managing the process Integrating technical and commercial elements The role of intellectual property rights (IPR), eg, copyright 4 Organising the content The vital role of structure in technical documents Deciding what to include and how to organise the information Categorising information: introductory, key and supporting Tools and techniques for scoping and structuring the document Creating and using document templates - pro's and con's 5 Writing the document Avoiding 'blinding them with science': the qualities of clear writing Problem words and words that confuse; building and using a glossary Using sentence structure and punctuation to best effect Understanding the impact of style, format and appearance Avoiding common causes of ambiguity; being concise and ensuring clarity Using diagrams and other graphics; avoiding potential pitfalls 6 Editing and releasing the document Why editing is difficult; developing a personal editing strategy Some useful editing tools and techniques Key requirements for document issue and control Module 2: Creating better specifications 1 Introduction Aims and objectives of the day Introductions and interests of participants The 'POWER' writing process for specifications 2 Creating better specifications The role and characteristics of an effective specification Specifications and contracts; the legal role of specifications Deciding how to specify; understanding functional and design requirements Developing the specification design; applying the principles of BS 7373 Getting organised: the key stages in compiling an effective specification 3 Preparing to write a specification Defining the scope of the specification; deciding what to include and what not Scoping techniques: scope maps, check lists, structured brainstorming The why/what/how pyramid; establishing and understanding requirements Clarifying priorities; separating needs and desires: the MoSCoW method Useful quantitative techniques: cost benefit analysis, QFD, Pareto analysis Dealing with requirements that are difficult to quantify 4 Organising the content The role of structure in specifications Typical contents and layout for a specification What goes where: introductory, key and supporting sections Creating and using model forms: the sections and sub sections Detailed contents of each sub-section Exercise: applying the tools and techniques 5 Writing the specification Identifying and understanding the specification reader Key words: will, shall, must; building and using a glossary Writing performance targets that are clear and unambiguous Choosing and using graphics Exercise: writing a specification 6 Editing and releasing the document Key editing issues for specifications Issue and control of specifications Module 3: Writing better reports 1 Introduction Aims and objectives of the day Introductions and interests of participants The 'POWER' technical writing process for technical reports 2 Creating better reports What is a technical report? types and formats of report The role and characteristics of an effective technical report Understanding technical report readers and their needs The commercial role and impact of technical reports Getting organised: the key stages in compiling a technical report 3 Preparing to write reports Agreeing the terms of reference; defining aims and objectives Being clear about constraints; defining what is not to be included Legal aspects and intellectual property rights (IPR) for reports Preparing the ground; gathering information and reference documents Keeping track of information: note making, cataloguing and cross referencing Tools and techniques for developing a valid and convincing argument 4 Organising the content The role of structure reviewed; some typical report structures Who needs what: identifying the varied needs of the readership What goes where: introductory, key and supporting sections Creating and using model forms: the sections and sub sections Detailed contents of each sub-section Exercise: applying the tools and techniques 5 Writing the report Planning the storyline: the report as a journey in understanding Recognising assumptions about the reader; what they do and don't know Converting complex concepts into understandable statements Presenting technical data and its analysis; the role of graphics Presenting the case simply whilst maintaining technical integrity Exercise: writing a technical report 6 Editing and releasing the report Key editing issues for technical reports Issue and control of technical reports

Effective technical writing (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Project management 'masterclasses' (In-House)

By The In House Training Company

Masterclasses? Refreshers? Introductions? It depends what you're looking for and where you want to pitch them, but here are six tried-and-tested highly focused sessions that organisations can take individually or as a series, to help develop their teams' project management capabilities one topic at a time. Objectives for each individual session are set out below, as part of the session outlines. Taken together, as a series, however, these modules are an ideal opportunity to develop your team's levels of project management capability maturity, whether that's by introducing them to the basic principles, refreshing them on best practice, or giving them the opportunity to really drill down into a specific area of challenge in your particular operating environment. Session outlines 1 Stakeholder management Session objectives This session will help participants: Understand why stakeholders matter to projects Be able to identify and engage stakeholders Be able to categorise stakeholders by their significance 1 Key principles What does 'stakeholder' mean - in theory? What does this mean in practice? Why stakeholders matter Consequences of missing stakeholders The stakeholder management process:IdentifyAssessPlanEngage 2 Identifying stakeholders Rapid listing CPIG analysis PESTLE analysis Drawing on the knowledge and experience of others Other ways to identify stakeholders 3 Assessing stakeholders Which stakeholders are significant? Stakeholder radar Power-interest maps Power-attitude maps 4 Planning The adoption curve Dealing with obstacles Who should engage which stakeholder? How should the project's organisation be structured? How will communication happen? 5 Engaging Seven principles of stakeholder engagement 2 Requirements and prioritisation Session objectives This session will help participants: Understand how clarity of requirements contributes to project success Use different techniques for prioritising requirements Agree requirements with stakeholders Manage changes to requirements 1 Understanding and managing stakeholder needs and expectations What are 'requirements'? What is 'requirements management'? Sources of requirements - and the role of stakeholders Are stakeholders sufficiently expert to specify their needs? Do they understand the detail of what they want, or do they need help to tease that out? What do stakeholders want to achieve? Working within constraints Prioritising requirements - three techniques 2 MoSCoW prioritisation 'Must have', should have', 'could have, 'won't have this time' When to use MoSCoW 3 The Kano Model Customer satisfaction - 'attractive' and 'must-be' qualities When to use Kano 4 Value-based prioritisation Understanding risk v value Using risk v value to prioritise features and schedules 5 Agreeing requirements Perfect v 'good enough' Establishing acceptance criteria Requirements traceability Agreeing project scope 6 Changing requirements Why requirements change Why change control matters Impact on projects A formal change control process Paying for change - managing change for different types of project 3 Estimating Session objectives This session will help participants: Understand the different purposes estimates satisfy Be able to use different estimating techniques Understand how to achieve different levels of accuracy 1 Key principles What's an estimate? Informed guesswork What needs to be estimated? Costs, resources, effort, duration Tolerances Precision v accuracy 2 Estimating through the lifecycle Start Plan Do 3 Early estimates Comparative ('analogous') estimating Parametric estimating Using multiple estimating techniques 4 Bottom-up estimating Bottom-up ('analytical') estimating Pros Cons 5 Three-point estimating Three-point ('PERT': Programme Evaluation and Review Technique) estimating Uncertainty and the range of estimates Calculating a weighted average Three-point with bottom-up 4 Scheduling Session objectives This session will help participants: Understand how to create a viable schedule Be able to use different forms of schedule Understand the concept of the critical path 1 Key principles The planning horizon Rolling wave planning Release planning 2 Viable scheduling Creating a viable schedule Define the scope Sequence the work Identify the risks and build in mitigations Identify the resources Estimate the effort and durations Check resource availability Refine until a workable schedule is produced 3 Critical path analysis The critical path Network diagrams Sequence logic Practical application:Network diagram with estimated durationsThe 'forward pass'The 'backward pass'Calculating total floatIdentifying the critical pathCalculating free float Gantt charts 5 Risk and issue management Session objectives This session will help participants: Understand the difference between risks and issues Be able to identify and assess risks Understand ways of mitigating risks Manage issues 1 Key principles Understanding risk Threats and opportunities The risk management processPreparation - proactive risk managementThe process - identify, assess, plan, implementStakeholder communication Roles and responsibilities Risk management strategy The risk register Risk appetite 2 Risk identification Brainstorming Interviews Assumption analysis Checklists 3 Risk assessment and prioritisation Probability, impact and proximity Triggers Qualitative risk assessment Qualitative impact assessment Qualitative probability assessment Probability / impact grid Bubble charts Risk tolerance 4 Planning countermeasures To mitigate or not to mitigate? Categories of risk response Avoid and exploit Reduce and enhance Transfer Share Accept Contingency Secondary risks 5 Issue management What is an issue? Tolerances Issues and tolerances The PRINCE2 view of issues Ownership of issues An issue management process Issue register 6 Budgeting and cost control Session objectives This session will help participants: Understand what to include in a budget - and why Choose - and use - the appropriate estimating technique Align the budget with the schedule Understand how to monitor spend and control costs Trouble-shoot effectively to get projects back within budget Session format Flexible. The session can be tailored to the participants' average level of project management maturity - a 60-minute session (delivered virtually) is an effective introduction. A 90-minute session allows for more in-depth treatment. A half-day session (face-to-face or virtual) gives time for a more challenging workshop, particularly to discuss specific cost control issues with any of the participants' current projects. 1 Where is the money coming from? Can we pay from revenue? Do we need to borrow? How long will the project take to pay back? The lifecycle of the budget Through-life costs Stakeholder involvement 2 Estimating costs Reminder: the relationship between estimates Reminder: possible estimating techniques What do we need to estimate?PeopleEquipmentMaterialsFacilities and operating costsWork package estimateEstimated project costs Estimating agile projects 3 Aligning budget and schedule Scheduling and financial periods Spreading the budget 4 Reserves and agreeing the budget Contingency reserve Management reserve Agreeing the budget 5 Cost control Planned spend over time Actual spend over time Work completed over time Evaluating different scenarios: delivery v spend 6 Trouble-shooting Why are we where we are? What has caused the project to spend at the rate it is? Why is it delivering at the rate it is? What are the root causes? What can we do about it?

Project management 'masterclasses' (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Environmental awareness and management (In-House)

By The In House Training Company

A flexible, modular-based, programme to heighten participants' awareness of ways in which their operations can affect the environment, the principles of environmental management and the practical steps they need to take as individuals and as an organisation to improve environmental performance. Depending on the course modules selected, this programme will give participants: Increased awareness of relevant environmental issues A greater understanding of, and commitment to, the organisation's environmental management programme Preparation for any responsibilities they may have under an Environmental Management System Further benefits according to options chosen 1 Environmental awareness Definition of 'the environment' Key environmental issuesGlobal warmingOzone depletionAcid rainAir qualityWater pollutionContaminated landLand take and green belt shrinkageResource usageHabitat destruction and species extinctions. Option: This module can be used to explain the key environmental issues related to the activities of your own organisation. Diagrams, photos, pictures, examples and statistics relevant to your own organisation are used where possible to illustrate the points being made. 2 Environmental legislation Key elements of environmental legislation affecting the activities of your organisation - including international, European and UK legislation. Legislation of particular relevance to your organisation - how it affects the operations of your organisation Option: Legislation can be dealt with according to which aspect of the environment it protects (eg, air, water, waste) or which part of your organisation's activities it affects Consequences of breaching legislation 3 Environmental management systems Overview of what an environmental management system isHow is an Environmental Management System (EMS) designed and put together?Key elements (emphasising Plan - Do - Check - Review cycle)The need to continually improve Pros and consReasons for having an EMSBenefits of an EMSConsequences of not managing the environmentCosts of installing an EMS Explanation of ISO 14001 and EMAS standards and guidance as applicable to the EMSs of your organisationOverview of your organisation's EMSHow it was set up / is being developed / operatesWho is responsible for itKey parts of system (eg, environmental policy, objectives and targets) identified and discussedEMS documentation - what and where it is. Workshop option: Brainstorm 'Pros and cons' with the participants, come up with all their ideas for good and bad things about EMS and demonstrate that the 'good' list is longer than the 'bad' 4 Environmental consequences Define what an environmental impact is and discuss how they are determined, with reference to the EMS Identify why we want to determine the environmental consequences of operations and activities; how they are used in the EMS for planning, and reducing the impact on the environment Establish key environmental consequences of construction and operational activities on the site; discuss significance ranking and the control measures in place in your organisation. Workshop option: In small groups, participants are asked to identify the impact on the environment of your organisation's activities or a part of their activities. They are then asked to rank these impacts in terms of their significance, using guidelines provided to help them be aware of the contributing factors (eg, frequency, severity). For a selected number of the impacts, the participants are asked to identify what control measures there are and which of these they play a part in. All stages can be discussed with trainers as a whole group at various stages during the workshop. 5 Protected species, nature conservation and invasive weeds Nature conservation, landscape and visual issues in the planning process - overview of key nature UK wildlife legislation, EIA, appropriate timing of surveys, Hedgerow regulations and landscape and visual impact issues Ecological issues - ecological legislation, significant species, hedgerows Archaeology in the development process - why archaeology is important, organisation in the UK, legislation and planning guidance Construction phase issues and consents - major environmental issues during construction, including water resources and land drainage consents, discharges to land or water, water abstraction, public rights of way, tree protection, waste management, Special waste, noise, good practice pollution control and Environmental Audits Identification and management of invasive weeds - including legal position regarding management 6 Chemicals and fuels handling and storage How health and safety management is closely linked to environmental management of materials Planning - what mechanisms are in place for planning materials use; legislation, guidance and policies which define how to manage materials Materials storage - what are the considerations for storing materials, covering:Labels: what are the different types and what do they tell us?Storage facilities: what are the requirements for safe storage of materials (eg, signs, secondary containment, access, segregation, lids/covers)Handling: safe handling for protecting the environment, organisational procedures, high risk situations (eg, decanting, deliveries), how to reduce the risks (eg, use of funnels, proper supervision, training)COSHH and MSDS: brief explanation of legislation and its role in environmental control of hazardous materials, how to use the information provided by COSHH assessments Option: These sessions can be illustrated with photographs/pictures and examples of good and bad storage and handling practices Workshop Options: Labelling Quiz - quick-fire quiz on what different labels tell us; Build a Storage Facility - participants are asked to consider all the environmental requirements for building a safe storage facility for their organisation 7 On-site control measures Overview of the legislation associated with nuisance issues on site and mitigating problems when they arise Examples of bad practice, including fuel storage tanks and mobile equipment - costs involved with prosecution of fuel spills, remediation costs, management costs, legal fees, bad PR coverage Identification and management of contaminated land and relevant legislation Workshop option: Participants are provided with a site plan containing information on site features, environmental conditions and indications of potential issues 8 Waste management Why worry about waste? - a look at how waste disposal can impact on the environment, illustrated by examples of waste-related incidents, statistics on waste production on national, industry-wide and organisational levels, landfill site space, etc Legislation - overview of the relevant legislation, what the main requirements of the regulations are, what penalties there are, and the associated documentation (waste transfer notes) Waste classification - a more in-depth look at how waste is classified under legislation according to hazardous properties, referring to Environment Agency guidance Handling and storage requirements - what are the requirements of the applicable waste legislation and how are they covered by organisational procedures? Examples of good and bad environmental practice associated with handling and storing waste. Workshop option: 'Brown bag' exercise - participants pass round a bag containing tags each with a different waste printed on. They are asked to pick out a tag and identify the classification and the handling, storage and disposal requirements for the waste they select Waste minimisation - overview of the waste minimisation 'ladder' and its different options (elimination, reduction, reuse and recycling), benefits of waste minimisation, examples of waste minimisation techniques Workshop option: Participants are asked to identify opportunities that actually exist within the organisation for minimising production of waste that are not currently being taken advantage of 9 Auditing Requirements for environmental auditing of operations Auditing the EMS Types of internal and external audits Requirements EMS standards (ISO 14001 and EMAS) Carrying out internal audits and being prepared for external audits Workshop options:Mock audit 'Brown Bag' - can be used either for trainers to test participants as if they were in an audit situation, or for the participants to test each other and practice their auditing technique. The bag contains tags each with a different topic printed on (eg, waste skips); participants pass the bag round and select a tag; they are then questioned by the trainer or another participant about that topic as if they were in an audit situation. If the participants are auditing each other, they will be provided with a set of guidelines to keep in mind during the workshop.Virtual auditing - a more practical workshop where participants review photographs of situations/activities relevant to the organisation's operations. They are asked to identify all the good and bad environmental practices that are occurring in the situations. 10 Incident response What should you do when an incident does happen? What should be in a spill kit? When should you call in the experts? When should you inform the Environment Agency or Environmental Health Officer? Workshop option: The participants are provided with some incident scenarios and asked to develop a response to the incident 11 Monitoring and reporting Environmental monitoring programmes and procedures Monitoring and reporting as control measures for environmental consequences Monitoring and environmental 'STOP' card systems - personal and behavioural monitoring and reporting

Environmental awareness and management (In-House)
Delivered in Harpenden or UK Wide or OnlineFlexible Dates
Price on Enquiry

Online Options

Show all 303

CompTIA Network+

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for This course is intended for entry-level computer support professionals with a basic knowledge of computer hardware, software, and operating systems who wish to increase their knowledge and understanding of networking concepts and acquire the required skills to prepare for a career in network support or administration, or who wish to prepare for the CompTIA Network+ certification. CompTIA Network+ is the first certification IT professionals specializing in network administration and support should earn. Network+ is aimed at IT professionals with job roles such as network administrator, network technician, network installer, help desk technician, and IT cable installer. This course is also designed for students who are seeking the CompTIA Network+ certification and who want to prepare for the CompTIA Network+ N10-008 Certification Exam. Overview In this course, you will describe the major networking technologies and systems of modern networks and configure, manage, and troubleshoot modern networks. Explain the OSI and TCP/IP Models. Explain properties of network traffic. Install and configure switched networks. Configure IP networks. Install and configure routed networks. Configure and monitor ports and protocols. Explain network application and storage issues. Monitor and troubleshoot networks. Explain network attacks and mitigations. Install and configure security devices. Explain authentication and access controls. Deploy and troubleshoot cabling solutions. Implement and troubleshoot wireless technologies. Compare and contrast WAN technologies. Use remote access methods. Identify site policies and best practices. CompTIA's Network+ certification is a foundation-level certification designed for IT professionals with around one year of experience, whose job role is focused on network administration. The CompTIA Network+ exam will certify the successful candidate has the knowledge and skills required to troubleshoot, configure, and manage common network devices; establish basic network connectivity; understand and maintain network documentation; identify network limitations and weaknesses; and implement network security, standards, and protocols. The candidate will have a basic understanding of enterprise technologies, including cloud and virtualization technologies. The Official CompTIA© Network+© (Exam N10-008): will teach you the fundamental principles of installing, configuring, and troubleshooting network technologies and help you to progress a career in network administration. In this course, you will build on your existing user-level knowledge and experience with personal computer operating systems and networks to master the fundamental skills and concepts that you will need to use on the job in any type of networking career. Prerequisites CompTIA A+ Certification (Exams 220-1001 and 220-1002) 1 - Explaining the OSI and TCP/IP Models Topic A: Explain OSI Model Layers Topic B: Explain the TCP/IP Suite 2 - Explaining Properties of Network Traffic Topic A: Explain Media Types and Access Methods Topic B: Deploy Ethernet Standards Topic C: Configure and Monitor Network Interfaces 3 - Installing and Configuring Switched Networks Topic A: Install and Configure Hubs and Bridges Topic B: Install and Configure Switches Topic C: Compare and Contrast Network Topologies Topic D: Compare and Contrast Network Types 4 - Configuring IP Networks Topic A: Configure IPv4 Addressing Components Topic B: Test IP Interfaces with Command Line Tools Topic C: Configure IPv4 Subnets Topic D: Configure Private and Public IPv4 Addressing Schemes Topic E: Configure IPv6 Addressing Components Topic F: Configure DHCP Services 5 - Installing and Configuring Routed Networks Topic A: Explain Characteristics of Routing Topic B: Install and Configure Routers 6 - Configuring and Monitoring Ports and Protocols Topic A: Explain the Uses of Ports and Protocols Topic B: Use Port Scanners and Protocol Analyzers Topic C: Explain the Use of Name Resolution Services Topic D: Configure DNS and IPAM Services 7 - Explaining Network Application and Storage Services Topic A: Explain the Uses of Network Applications Topic B: Explain the Uses of Voice Services and Advanced Networking Devices Topic C: Explain the Uses of Virtualization and Network Storage Services Topic D: Summarize the Concepts of Cloud Services 8 - Monitoring and Troubleshooting Networks Topic A: Monitor Network Interfaces and Logs Topic B: Explain Network Troubleshooting Methodology Topic C: Troubleshoot Common Network Services Issues 9 - Explaining Networking Attacks and Mitigations Topic A: Summarize Common Networking Attacks Topic B: Explain the Characteristics of VLANs Topic C: Explain the Characteristics of NAT and Port Forwarding 10 - Installing and Configuring Security Devices Topic A: Install and Configure Firewalls and Proxies Topic B: Explain the Uses of IDS/IPS and UTM 11 - Explaining Authentication and Access Controls Topic A: Explain Authentication Controls and Attacks Topic B: Explain the Uses of Authentication Protocols and Directory Services Topic C: Explain the Uses of Port Security and NAC Topic D: Implement Network Device Hardening Topic E: Explain Patch Management and Vulnerability Scanning Processes 12 - Deploying and Troubleshooting Cabling Solutions Topic A: Deploy Structured Cabling Systems Topic B: Deploy Twisted Pair Cabling Solutions Topic C: Test and Troubleshoot Twisted Pair Cabling Solutions Topic D: Deploy Fiber Optic Cabling Solutions 13 - Implementing and Troubleshooting Wireless Technologies Topic A: Install and Configure Wireless Technologies Topic B: Troubleshoot Wireless Performance Issues Topic C: Secure and Troubleshoot Wireless Connectivity 14 - Comparing and Contrasting WAN Technologies Topic A: Compare and Contrast WAN Core Service Types Topic B: Compare and Contrast WAN Subscriber Service Types Topic C: Compare and Contrast WAN Framing Service Types Topic D: Compae and Contrast Wireless and IoT WAN Technologies 15 - Using Remote Access Methods Topic A: Use Remote Access VPNs Topic B: Use Remote Access Management Methods 16 - Identifying Site Policies and Best Practices Topic A: Manage Networks with Documentation and Diagrams Topic B: Summarize the Purposes of Physical Security Devices Topic C: Compare and Contrast Business Continuity and Disaster Recovery Concepts Topic D: Identify Policies and Best Practices

CompTIA Network+
Delivered Online + more
£2,475

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered Online
£3,495

Certificate in UX Design Fundamentals

By UX Design Institute

A comprehensive introduction to UX design. Learn the key principles and concepts behind the UX process. Take your first steps into UX Whether you want to explore UX as a career or expand your professional skillset, this UX design fundamentals course is the perfect starting point. Follow 65 expert lessons that will immerse you in the theory and principles of UX Design Learn about the techniques that underpin the UX process, like user research, affinity diagrams, and prototyping Earn a globally recognised and university credit-rated professional qualification Who is it for? Anybody who needs to understand UX Format Online, self-paced Duration 6 weeks (recommended) Commitment 3 hours per week How you’ll benefit If you want to really understand UX, this UX design fundamentals course for you. Speak confidently about UX design Develop a mindset for problem-solving Learn to advocate for the user - and make better business decisions as a result Become a more rounded, valuable professional Showcase your knowledge with a university credit-rated certificate Learn the key UX design fundamentals concepts in just six weeks. Everything you need to truly grasp UX, over five engaging modules. Module 1 Introduction to UX design Gain a comprehensive overview of the UX design process. Module 2 User research methods Learn how to gain deep insights into customer needs and behaviours. Module 3 Analysis techniques Discover how research gets translated into actionable insights. Module 4 Defining the experience Explore problem-solving techniques and design principles. Module 5 Prototyping techniques Understand the different forms of prototyping and when to use them. Exam 40-minute final exam Get assessed on your knowledge through a final exam.

Certificate in UX Design Fundamentals
Delivered Online + more
£675 to £850

Certified Data Centre Specialist (CDCS)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is an IT, facilities or data centre operations professional working in and around the data centre and having the responsibility to achieve and improve high-availability and manageability of the data centre. Overview After completion of the course the participant will be able to:? Understand the design life cycle of data centres and the stages involved? Discuss the data centre requirements in great level of detail with vendors, suppliers and contractors to ensure that these requirements are met? Validate design plans, quotes and offers proposed by vendors/contractors? Understand redundancy levels for both the data centre design/setup and maintenance? Understand the various building considerations such as bullet proofing, mitigation of seismic activity, fire ratings and thermal stability? Understand how to install a raised floor that meets requirements, avoiding misalignment, level differences and leakage? Understand how to read a Single Line Electrical Diagram to identify and avoid the most common design issues? Choose the correct UPS and parallel configuration, learn and avoid classic parallel installation mistakes? Understand how to calculate battery banks, validate offered configurations to ensure they meet requirements? Understand what distance to keep to avoid EMF issues for human safety and equipment disturbances? Understand the fundamental cooling setup, CFM, Delta-T and other important factors? Understand contamination factors and limitations? Understand full details of fire suppression options, how to calculate gas content and verify installations? Understand how to measure data centre energy efficiency and how to improve it The course will bring participants to the level of a suitable sparring partner with suppliers. They will be able to verify offers provided by vendors for correctness, effectiveness and efficiency. Data Centre Design/Life Cycle Overview Overview of the phases of a data centre life cycle Planning, re-alignment and continuous improvement Standards and Rating Level Definitions Rating level history Difference between Uptime and TIA-942 Rating level definitions Redundancy options (N+1), 2N, 2(N+1) Concurrent Maintainability/Compartmentalisation Example configurations Substation and feed requirements Maintenance options Operational processes guidelines/standards Skill development Building Considerations Building location considerations Floor and hanging loads requirements Fire rating for walls and glass Blast protection Bullet proofing Forced entry protection Advanced Raised Floor & Suspended Ceiling Raised floor installation guidelines Techniques to install a proper and leveled raised access floor Common mistakes Choosing the right tiles and their locations Seismic-mitigating floor constructions Choosing the correct suspended ceiling Advanced Power Power infrastructure layout; Formulas which you should know for the data centre Single Line Electrical diagrams; how to read to ensure key components are present for protection Over current protection devices (MCB/MCCB/VCB/ACB/Fuses) definitions and what to use where Earth Leakage devices (RCB/RCD/ELCB/GFCI/ALCI/RCBO), definitions and what to use where Sizing of protective components Lightning strikes and surge protection devices (TVSS/SPD), how they operate, where to use and how to install Power cabling and cable run considerations PDU/DB setup and minimum requirements Generators; Generator types: Standy/Prime/Continuous Component make up and functions Fuel storage and calculation Paralleling of gen-sets Generator room/area requirements UPS Systems; Required specifications for UPS systems How to read data sheets and select the correct UPS Requirements for parallel configurations and avoid pitfalls such as single point of failures How parallel installation should be done, classic mistakes made by installers and how to avoid these Harmonic Filters; Active/Passive filters and their application Battery Banks; Battery bank terminology Designing battery banks, how to calculate, and double check the battery bank to be installed Battery charging pitfalls and ensuring the right charger is being installed and used Using parallel battery banks; how to properly install them, limitations and risks when using batteries in parallel How to test batteries correctly and make decisions on cell/block or string replacement Battery casing choices; ABS, V0, V1, V2 Alternative energy storage; flywheel, re-usable cell, compressed air UPS, etc. Advanced Electro Magnetic Fields Sources of EMF Difference between single, three phase and bus-bar EMF Options available to measure EMF and how to interpret the results from single-axes and composite measurements Guidance on safe distance for equipment and humans Calculation of EMF attenuation factor for shielding material permeability and saturation factors Advanced Cooling Important definitions; dry-bulb, wet-bulb, dew-point, RH, sensible and latent heat Psychometric chart and ASHRAE recommendations Environmental class definitions and thermal specifications Temperature/humidity measurements guideline Heat dissipation methods Altitude impact on temperature intake to ICT equipment Floor plan setup for effective cooling Differences in tile surface and supporting structure and the air-flow performance impact Rack door construction and the flow performance impact Equipment Delta-T and its impact Optimising air flow Thermal units conversions Calculations for air volume displacement (CFM/CMH) Cooling capacity calculations Air-conditioning selection De- / humidifying options Air conditioning efficiency SHR impact on cost saving Efficiency indicator New cooling principle and techniques (Submerged, VSD/VRF/ECF/water- and air side economisers) Redundancy guidelines for air-conditioners avoiding classic misconceptions and mistakes for meeting ANSI/TIA-942 compliant designs Installation requirements Connections to fire panel and EPO Commissioning of air conditioners Set points and calibration CFD (Computational Fluid Dynamics) Advanced Fire Protection The fire triangle and elements to stop a fire Detection systems in detail (VESDA, VIEW, smoke sensors) Considerations for installation of sensors Proper testing of smoke sensors Water based systems i.e. deluge, wet-pipe, dry-pipe, pre-action and why most of them don't work and how to detect this Details on Inert and Halocarbon systems and how to select the correct system for your data centre How to calculate the gas content ensuring the appropriate level is installed to suppress the fire including safety considerations Other requirements for gas systems such as release times, hold times, pipe install requirements and other important factors Requirements for the fire detection panel Installation verification, methods, what to check and how New advanced fire suppression technologies Design and Install Scalable Networking Cabling System ANSI/TIA942 cabling structure topology ToR, EoR Design Intelligent patching systems Installation best practice such as routing, bending radius, separation from power, containment fill ratio, fiber link loss calculator, bonding and grounding requirement Standard for telecommunications labeling and administration Environmental Specifications and Contamination Control Acoustic noise effects, regulations, specifications and limits Data centre contaminations and classifications Measurements, standards and limits Preventive measures and avoidance Data Centre Efficiency Business drivers to go Green High-availability or Green? Green guidelines and standards How to measure it and what are acceptable numbers compared to the general industry PUE classes defined by Green Grid and issues with PUE Techniques for saving energy in all parts of the data centre i.e. application/system level, cooling, power distribution Mock ExamEXAM: Certified Data Centre Specialist

Certified Data Centre Specialist (CDCS)
Delivered Online
£2,050

Professional Certificate in User Research

By UX Design Institute

The industry standard course in UX research Master the research skills that make UX professionals so valuable. Become a confident, credible and effective user researcher with a globally recognised qualification. Who is it for? UX professionals Aspiring UX researchers Duration 16 weeks Commitment 3 hours per week Format Online, self-paced with live support and mentoring Why take this user research course: Gain the most in-demand skills* and boost your career in a thriving industry. Learn a complete range of UX research methods. Expand your toolkit to conduct high-quality research at pace. Become an insights expert. Translate findings into actionable insights and communicate them with conviction. Showcase your expertise. Build a professional user research portfolio and earn a university credit-rated qualification. Get the confidence to succeed. Count on our mentors, career advisors and student community throughout your journey. *Research is one of the top 10 most in-demand skills globally (LinkedIn, 2023). A comprehensive, in-depth curriculum This user research course has been created and validated by experts in UX research. It is credit-rated by Glasgow Caledonian University. Self-paced learning gives you the flexibility to study in your own time. Monthly deadlines and submissions give you structure and accountability. The best of both worlds. Module 1 Introduction to user research Understand the role of a UX researcher. Explore the types, methods and ethics of research. Module 2 Planning the research Learn how to build a research plan, collaborate with stakeholders, recruit participants and manage data. Module 3 Fundamental user research skills Master the core skills of interviewing and usability testing. Learn how to moderate and take notes. Module 4 Expanding your toolkit Explore qualitative research methods like ethnography, contextual enquiry, service safaris and diary studies. Module 5 Analysing qualitative research Learn to analyse research data and translate it into user goals, affinity diagrams, personas and journey maps. Module 6 Quantitative research Learn to design, conduct and analyse online surveys, A/B tests and more. Module 7 Communicating the research Learn how to report and present your findings with confidence. Module 8 AI for user research Explore how AI tools can assist researchers. Project Portfolio project Build a professional portfolio to showcase your research expertise.

Professional Certificate in User Research
Delivered Online + more
£1,575 to £1,750

Advanced Piping & Instrumentation Diagrams P&IDs

By Course Cloud

The comprehensive Advanced Piping & Instrumentation Diagrams P&IDs has been designed by industry experts to provide learners with everything they need to enhance their skills and knowledge in their chosen area of study. Enrol on the Advanced Piping & Instrumentation Diagrams P&IDs today, and learn from the very best the industry has to offer! This best selling Advanced Piping & Instrumentation Diagrams P&IDs has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth Advanced Piping & Instrumentation Diagrams P&IDs is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The Advanced Piping & Instrumentation Diagrams P&IDs is CPD-accredited, so you can be confident you're completing a quality training course which will boost your CV and enhance your career potential. The Advanced Piping & Instrumentation Diagrams P&IDs is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the Advanced Piping & Instrumentation Diagrams P&IDs, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the Advanced Piping & Instrumentation Diagrams P&IDs will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the Advanced Piping & Instrumentation Diagrams P&IDs to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

Advanced Piping & Instrumentation Diagrams P&IDs
Delivered Online On Demand
£319

UML Class Diagrams Level 2

By Course Cloud

Course Overview Are you looking to become a Computer Programmer? Then you will need to know how to communicate your designs and ideas to other programmers, analysts and architects, in an effective way. This is where UML comes in.  The UML Class Diagrams Level 2 course will teach you the skills required to read and create UML class diagrams. It will show you how to use them as a valuable communication and software tool, where you will explore its different concepts from basic to advanced. By the end of this course, you will be able to design object-oriented classes in UML, write code based on UML class diagrams, and much more. You will also have an excellent understanding of the different elements of UML class diagrams. This course has no particular entry requirements, however, a basic understanding of object-oriented programming concepts is ideal. This best selling UML Class Diagrams Level 2 has been developed by industry professionals and has already been completed by hundreds of satisfied students. This in-depth UML Class Diagrams Level 2 is suitable for anyone who wants to build their professional skill set and improve their expert knowledge. The UML Class Diagrams Level 2 is CPD-accredited, so you can be confident you're completing a quality training course will boost your CV and enhance your career potential. The UML Class Diagrams Level 2 is made up of several information-packed modules which break down each topic into bite-sized chunks to ensure you understand and retain everything you learn. After successfully completing the UML Class Diagrams Level 2, you will be awarded a certificate of completion as proof of your new skills. If you are looking to pursue a new career and want to build your professional skills to excel in your chosen field, the certificate of completion from the UML Class Diagrams Level 2 will help you stand out from the crowd. You can also validate your certification on our website. We know that you are busy and that time is precious, so we have designed the UML Class Diagrams Level 2 to be completed at your own pace, whether that's part-time or full-time. Get full course access upon registration and access the course materials from anywhere in the world, at any time, from any internet-enabled device.  Our experienced tutors are here to support you through the entire learning process and answer any queries you may have via email.

UML Class Diagrams Level 2
Delivered Online On Demand
£25

Piping & Instrumentation Diagrams P&IDs

4.8(9)

By Skill Up

Learn Piping and Instrumentation Diagrams (P&IDs) and enhance your engineering knowledge. Master P&ID symbols, control theory, and safety systems!

Piping & Instrumentation Diagrams P&IDs
Delivered Online On Demand8 hours 4 minutes
£25

Visio Flowcharts and Diagrams

By Underscore Group

Ensure you can fully utilize this powerful tool to create a range of flowcharts and diagrams. Course overview Duration: 1 day (6.5 hours)  Microsoft Visio is a powerful tool designed to simplify complex information through the creation of simple, professional-looking diagrams. While Visio is capable of producing almost any type of drawing this training concentrates on flowcharts, swim lane process diagrams and organisation charts. You will also discover the real power of Visio by adding essential data to the content of your diagrams and producing reports in Excel using this data. This course is designed for either new users of Visio or those who have dabbled and can create basic diagrams. Our course will give you the skills and knowledge you need to navigate your way around this powerful program and produce different types of diagram. Objectives  By the end of the course you will be able to: Create and amend flowcharts Create cross functional (Swim Lane) process flows Produce organisation charts by importing data Add essential data to shapes Export diagram data reports to Excel Present, publish and print Visio diagrams Content Visio essentials Finding your way around Visio Using the ribbon and Quick Access toolbar Keyboard shortcuts Shapes and stencils explained What Visio can do for you Creating basic flowcharts Working with shapes Adding and deleting shapes Joining, aligning and sizing shapes Using Auto-Connect Labelling shapes and connectors Editing and improvinC flowcharts Amending shape and connector labels Using colours to emphasise Changing line styles Moving and copying objects Grouping diagram elements Quick ways of working Cross functional flowcharts Creating Cross-Functional Flowcharts Manipulating functional bands Creating off-page references within diagrams and hyperlinks to other documentation Organising charts and shape data Using the wizard to create an organisation Chart Importing existing Data into to create an organisation chart Modifying an organisation chart Shape Data Adding shape data to a shape Creating shape data sets Diagram reports Exporting data to a report in Excel Exporting to HTML Creating and customizing reports Presenting, publishing and printing Using Page Setup Print previewing Embedding backgrounds Adding headers and footers Converting your final documentation to PDF Saving as HTML Visio with PowerPoint

Visio Flowcharts and Diagrams
Delivered in Horsham or OnlineFlexible Dates
Price on Enquiry

Understand Piping & Instrumentation Diagrams P&IDs

5.0(10)

By Apex Learning

Overview This comprehensive course on Understand Piping & Instrumentation Diagrams P&IDs will deepen your understanding on this topic. After successful completion of this course you can acquire the required skills in this sector. This Understand Piping & Instrumentation Diagrams P&IDs comes with accredited certification from CPD, which will enhance your CV and make you worthy in the job market. So enrol in this course today to fast track your career ladder. How will I get my certificate? At the end of the course there will be an online written test, which you can take either during or after the course. After successfully completing the test you will be able to order your certificate, these are included in the price. Who is This course for? There is no experience or previous qualifications required for enrolment on this Understand Piping & Instrumentation Diagrams P&IDs. It is available to all students, of all academic backgrounds. Requirements Our Understand Piping & Instrumentation Diagrams P&IDs is fully compatible with PC's, Mac's, Laptop, Tablet and Smartphone devices. This course has been designed to be fully compatible with tablets and smartphones so you can access your course on Wi-Fi, 3G or 4G. There is no time limit for completing this course, it can be studied in your own time at your own pace. Career Path Having these various qualifications will increase the value in your CV and open you up to multiple sectors such as Business & Management, Admin, Accountancy & Finance, Secretarial & PA, Teaching & Mentoring etc. Course Curriculum 14 sections • 119 lectures • 08:26:00 total length •Introduction: 00:04:00 •What's a P&ID ?: 00:03:00 •Why is a P&ID so important ?: 00:02:00 •Who uses P&ID's ?: 00:06:00 •How do P&ID's look like ?: 00:08:00 •Introduction- PID READING: 00:02:00 •Anatomy of a P&ID: 00:01:00 •The title block: 00:03:00 •The drawing scale: 00:03:00 •The grid system: 00:02:00 •The revision block: 00:03:00 •Changes: 00:02:00 •Notes and legends: 00:03:00 •Valve symbols: 00:14:00 •Valve actuator symbols: 00:09:00 •Control valve designations: 00:02:00 •Standards and conventions for valve status: 00:07:00 •Process equipment symbols: 00:12:00 •Piping symbols: 00:03:00 •Pipe fitting symbols: 00:03:00 •Isolating, venting & draining symbols for ease of maintenance: 00:05:00 •Instrumentation: 00:03:00 •Sensing devices and detectors: 00:04:00 •Location symbols: 00:04:00 •Modifiers and transmitters: 00:05:00 •Indicators and recorders: 00:03:00 •Controllers: 00:03:00 •Example #1 : Identifying process equipment and flow paths: 00:05:00 •Example #2 : Identifying valve position and failure mode: 00:03:00 •Example #3 : Identifying the symbols: 00:02:00 •Piping designation code: 00:06:00 •Equipment designation code: 00:03:00 •Instrument designation code: 00:02:00 •Miscellaneous designation codes: 00:02:00 •The process: 00:01:00 •Process control: 00:06:00 •The control loop: 00:02:00 •Process control terms: 00:10:00 •Control loops : Feedback control: 00:02:00 •Pressure control loops: 00:01:00 •Flow control loops: 00:01:00 •Level control loops: 00:01:00 •Temperature control loops: 00:01:00 •Multi-variable loops: 00:02:00 •Feedforward control: 00:02:00 •Feedforward + Feedback: 00:01:00 •Cascade control: 00:08:00 •Split range control: 00:03:00 •Operations on control signals: 00:02:00 •Ratio control: 00:02:00 •Batch control: 00:01:00 •Selective control: 00:01:00 •Do we need to control at all ?: 00:01:00 •Principles of equipment-wise control: 00:10:00 •Pipe control system: 00:02:00 •Control of a single pipe: 00:02:00 •Control of pressure in a pipe: 00:03:00 •Control of flow in a pipe: 00:04:00 •Flow merging: 00:08:00 •Flow splitting: 00:05:00 •Centrifugal pump control: 00:04:00 •Control valve vs Variable Frequency Drive (VFD) for centrifugal pumps: 00:03:00 •Minimum flow control for centrifugal pumps: 00:09:00 •Positive displacement pump control: 00:02:00 •Control by a recirculation pipe for PD pumps: 00:03:00 •Variable Speed Drive (VSD) control for PD pumps: 00:01:00 •Control by stroke adjustment for PD pumps: 00:01:00 •Compressor control system: 00:02:00 •Compressor capacity control: 00:12:00 •Compressor anti-surge control: 00:03:00 •Heat transfer equipment control: 00:02:00 •Heat exchanger direct control system: 00:04:00 •Heat exchanger bypass control system: 00:04:00 •Reactor temperature control: 00:06:00 •Air cooler control: 00:02:00 •Heat exchanger for heat recovery: 00:01:00 •Heat exchanger back pressure control: 00:02:00 •Basic fired heater control: 00:08:00 •Complex fired heater control: 00:05:00 •Container and vessel control: 00:07:00 •Container blanket gas control: 00:02:00 •Safety strategies: 00:01:00 •Concept of Safety Instrumented Systems (SIS): 00:01:00 •SIS actions and types: 00:14:00 •SIS extent: 00:02:00 •SIS requirement: 00:03:00 •Anatomy of a SIS: 00:02:00 •SIS element symbols: 00:01:00 •SIS primary elements : Sensors: 00:03:00 •SIS final elements: 00:04:00 •Switching valve actuator arrangements: 00:02:00 •Valve position validation: 00:02:00 •Merging a switching valve and a control valve: 00:03:00 •SIS logics: 00:01:00 •Showing safety instrumented functions on P&ID's: 00:07:00 •Discrete control: 00:05:00 •Alarm system: 00:02:00 •Anatomy of alarm systems: 00:02:00 •Alarm requirements: 00:06:00 •Alarm system symbology in P&ID's: 00:06:00 •Concept of common alarms: 00:01:00 •Fire and Gas Detection Systems (FGS): 00:03:00 •Electric motor control: 00:07:00 •P&ID representation of commands and responses: 00:05:00 •P&ID representation of inspection and repair: 00:05:00 •P&ID example of electro-motor control: 00:04:00 •P&ID example #1 : Legend and specifications: 00:05:00 •P&ID example #2 : Hydrogen delivery station: 00:16:00 •P&ID example #3 : Acid system: 00:13:00 •P&ID example #4 : Centrifugal pump: 00:09:00 •P&ID example #5 : Utility station: 00:04:00 •P&ID example #6 : Waste water filter: 00:08:00 •P&ID example #7 : Steam separator: 00:15:00 •P&ID example #8 : Flare knock-out drum: 00:14:00 •P&ID example #9 : Centrifugal compressor: 00:05:00 •P&ID example #10 : Hydrogen production from shale gas: 00:11:00 •P&ID example #11 : Fired heater: 00:07:00 •Resources - Understand Piping & Instrumentation Diagrams P&IDs: 00:00:00 •Assignment - Understand Piping & Instrumentation Diagrams P&IDs: 00:00:00

Understand Piping & Instrumentation Diagrams P&IDs
Delivered Online On Demand8 hours 26 minutes
£12