Video coding training course description This course investigates the characteristics of video coding with an emphasis on compression and the standards used in IP networks. What will you learn Explain how video coding works. Describe the main video coding standards. Evaluate and compare the major video coding standards. Video coding training course details Who will benefit: Anyone working with MPEG. Prerequisites: None. Duration 2 days Video coding training course contents Introduction Video coding systems, encoding, transmission, decoding. Digital video formats: Old formats (CIFâ¦), PC formats (VGAâ¦), SD, HD, UHD. Video codecs What is a CODEC, pictures and audio, digitisation, sampling, quantisation, encoding, compressing. Codec types Lossy, lossless, uncompressed. Quality, bandwidth. Video Fps, bitstreams, pictures, frames, fields. Aspect ratios. Colour Colour perception, RGB, YUV, YCbCr sampling, 4:00, 4:2:0, 4:2:2, 4:4:4. Hybrid video coding scheme Picture partitioning, intra prediction, inter prediction, motion estimation, residual coding, in loop filtering, entropy coding. Containers Relationship with codecs, audio, video. Audio Video Interleave (.avi), .asf, QuickTime, AVCHD, Flash, .mp4, 3gp. MPEG-TS. MPEG Analysing MPEG frames. Video coding standards H.264/AVC: Profiles MPEG, bit rates, resolution. I, B, P frames, GOP. MPEG 2, MPEG 4, H.264, H.265, VP9, AV1. Hands onand levels, how it works. H.265/HEVC: Profiles and levels, Quadtrees, slices, how it works. Open video coding: VP8, VP9, AV1.
MRTG training course description A hands on course focusing on the installation, configuration and use of the MRTG network monitoring and graphing tools. What will you learn Install MRTG. Configure MRTG. Use MRTG to monitor networks. MRTG training course details Who will benefit: Anyone working with MRTG. Prerequisites: Total SNMP for engineers Duration 2 days MRTG training course contents What is MRTG? Network monitoring, review of SNMP. What MRTG does do, what MRTG doesn't do, MRTG architecture, MRTG components. Hands on configuring SNMP support on network devices, configuring extended SNMP support on Windows. Installing MRTG Configuring MRTG tasks, .cfg files, index.html files, running MRTG tasks, instances. Hands on Configuring and running MRTG tasks. MRTG tasks Configuring MRTG tasks, .cfg files, index.html files, running MRTG tasks, instances. Hands on Configuring and running MRTG tasks. MRTG graphs Daily, weekly, monthly, yearly, MRTG database support, RRDTOOL. Hands on MRTG graphs. Using MRTG MRTG examples, custom SNMP OIDs, using the MRTG configuration reference. Hands on MRTG examples. RRDTOOL Installing RRD database support, MRTG instances with the RRD database, RRD database structure, resizing and extending the database. Exporting database records into plain text and XML formats, on demand MRTG graphs using the database. Hands on Using MRTG with RRD database support. Alternatives to MRTG MRTG strengths and weaknesses, scalability, cricket, cacti, other SNMP tools.
About this training course This 5-day intensive training course is designed to improve the skills of those involved in the financial and contractual auditing of upstream Oil & Gas Exploration and Production activities. The objective of this course is to enhance your understanding of the various audit principles and practices being applied in this industry today and to equip you with the knowledge and tools to deal with complex audit cases. The course concentrates on aspects of auditing unique to the E&P business. Training Objectives After the completion of this training course, participants will be able to: Apply a structured methodology for conducting oil industry internal, production sharing and joint venture audits Implement the benefits of a multi-discipline team audit approach Adopt a model of best practice for conducting audits Analyse, interpret and decide complex cases using the contracts and documents, the principles and auditor's judgement Target Audience This training course is suitable and will greatly benefit the following specific groups: Personnel with an Internal audit background who are totally new to the discipline of Joint Venture (JV) or Production Sharing Contract (PSC) audit Experienced audit practitioners who wish to update their auditing techniques Personnel from Finance or any discipline who intend to take part in internal or joint venture audits Personnel with a background in statutory audit in the accountancy profession who require an insight into the internal and joint venture audit areas Course Level Intermediate Training Methods The training instructor relies on a highly interactive training method to enhance the learning process. This method ensures that all participants gain a complete understanding of all the topics covered. The training environment is highly stimulating, challenging, and effective because the participants will learn by case studies which will allow them to apply the material taught in their own organization. Course Duration: 5 days in total (35 hours). Training Schedule 0830 - Registration 0900 - Start of training 1030 - Morning Break 1045 - Training recommences 1230 - Lunch Break 1330 - Training recommences 1515 - Evening break 1530 - Training recommences 1700 - End of Training The maximum number of participants allowed for this training course is 25. Trainer Your expert course leader has more than 30 years of experience in the international oil and gas industry, covering all areas of Finance and Audit, including involvement in Commercial roles. During her 19 years with ENI she worked in Italy, Netherlands, Egypt and UK and was CFO for 2 major ENI subsidiaries. She has delivered training courses in Accounting, Audit, Economics and Commercial topics in many Countries. She has a Degree in Economics & Accounting and is a Certified Chartered Accountant. She is also a Chartered Auditor and an International Petroleum Negotiator. Outside of work, she is inspired by the beauty of nature and art, helping disadvantaged people, sports (football, golf) and her cat. Courses Delivered Internationally: E&P Accounting, Auditing in the Oil & Gas Industry Cost Control & Budgeting Introduction to the Oil & Gas Industry Petroleum Project Economics Contracts Strategy International O&G Exploitation Contracts POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
Sockets programming training course description A hands on course for programmers using Sockets. It is important to recognise that the course assumes that delegates are already familiar with TCP/IP and Python. Practical exercises follow all the major theory sessions. What will you learn Read Python programs which use Sockets. Write Python programs which use Sockets. Debug Python programs which use Sockets. Sockets programming training course details Who will benefit: Programmers working with network applications. Prerequisites: TCP/IP foundation for engineers Python for network engineers Duration 2 days Sockets programming training course contents What is a socket? Review of IP, ICMP, UDP vs TCP, IP addresses, protocol numbers, ports. API's, UNIX I/O, sockets. SOCK_STREAM, SOCK_DGRAM. Hands on Compile and run code. The systems calls Clients and servers, structs, socket(), bind(), connect(), listen(), accept(), send(), recv(), sendto (), recvfrom(), close(), shutdown(), getpeername(), gethostname(). Hands on Walk through of example client and server code. First code TCP connections, passive opens, active opens. Hands on Write a simple 'hello world' server and client. Application protocols User character stream, ASCII turn taking, binary protocols. Hands on Raw SMTP, Writing a mail client. Clients Concurrency, polling, threads, event driven programming. Hands on Conferencing application. Servers Concurrency, stateful, stateless. Forks and execs. inetd. Hands on Running servers with and without inetd, chroot jails, conferencing server modifications. Advanced techniques Blocking, select(), partial send(s). Raw sockets, example sockets using Java, Perl and PHP. Hands on A broadcast application.
Definitive Nagios training course description Nagios is an open source application designed to provide system and network monitoring. This hands on course gives a comprehensive coverage of using Nagios to provide monitoring of Linux, Windows and network devices. The course is based on Nagios core but contact us if you would like Nagios XI. What will you learn Install Nagios. Configure Nagios. Monitor Windows, Linux and Cisco (and other network equipment) using Nagios. Configure notifications Definitive Nagios training course details Who will benefit: Technical staff working with Nagios. Prerequisites: None. Duration 2 days Definitive Nagios for engineers Nagios architecture Downloading Nagios, Installing Nagios, Nagios core, plugins, frontends, addons. Nagios XI. Nagios Fusion. Hands on Installing Nagios. Getting started with Nagios Nagios files, nagios.cfg, minimal.cfg. Starting and stopping Nagios. Hands on Controlling Nagios. Using Nagios Nagios web interface. Maps, Hosts, host groups, services, service groups, problems. Reports. Configuration. Hands on Using the web interface. Monitoring Linux systems SSH, NRPE. Hands on Monitoring Linux system health. Monitoring Windows systems Installing NSClient++, Configuring NSClient++, check_nt plugin, monitoring uptime, CPU, memory, disks, services, processes. Hands on Monitoring Windows system health. Monitoring network devices SNMP architecture, MIBs. Polling. Hands on Configuring Nagios for SNMP. Agents Configuring Cisco devices for SNMP support, communities, traps, syslog. Hands on Monitoring network devices. Nagios alerts and notifications SNMP traps. Email notifications, SMS alerts other messaging
Linux engineer certification training course description LPIC-2 is the second certification in LPI's multi level professional certification program. This course teaches the skills necessary to pass the LPI 201 exam; the first of two LPIC-2 exams. Specifically, the course covers the administration of Linux systems in small to medium sized mixed networks. What will you learn Perform advanced administration tasks. Perform advanced file system administration. Linux engineer certification training course details Who will benefit: Linux administrators. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Linux engineer certification fundamentals training course contents Part I The LPI 201 Exam Starting a System The Linux Boot Process, Firmware Startup, BIOS Startup, UEFI Startup, Linux Bootloaders, GRUB Legacy, GRUB 2, Alternative Bootloaders, Secure Bootloaders, Process Initialization, SysV Method, systemd Method, Upstart Method, System Recovery, Kernel Failures, Root Drive Failure. Maintaining the System Fluid Messaging, Static Messaging, System backups, Backup Strategies, Performing Backups, Installing Programs from Source, Obtaining and unpacking Installation Files, Compiling Programs, Resource Usage: Managing, measuring, predicting and troubleshooting. Mastering the Kernel What Is the Kernel? Kernel Features, Parts of the Kernel, Kernel Versions, Obtaining Source Code, Creating the Configuration File, Compiling and Installing the Kernel, Compiling and Installing Modules, Creating an Initial RAM Disk, Booting the New Kernel, Creating a Kernel Package, Maintaining the Kernel, Working with Module Files, Module Commands, Working with Hardware, Automatically Detecting Hardware, Troubleshooting the Kernel. Managing the Filesystem The Linux Filesystem, Filesystem Structures, Filesystem Types, Making Filesystems, Attaching Filesystems, Memory-Based Linux Filesystems, the Btrfs Filesystem, Btrfs Subvolumes, Btrfs Snapshots, Optical Filesystems, Swap Filesystems, Network-Based Filesystems, Auto-Mounting, Encrypted Filesystems, Maintaining Linux Filesystems, Adjusting a Filesystem, Checking and Repairing a Filesystem, SMART. Administering Advanced Storage Devices Configuring RAID, Implementing RAID on Linux, Managing a RAID Array, Adjusting Storage Devices, Looking at Drive Interface Concepts, Testing and Tuning Drives, Implementing iSCSI, Managing Logical Volumes, LVM, Creating Logical Volumes, Supporting Logical Volumes, Understanding the Device Mapper. Navigating Network Services Networking Basics, The Physical Layer, The Network Layer, The Transport Layer, The Application Layer, Configuring Network Features, Network Configuration Files, Graphical Tools, Command-Line Tools, Basic Network Troubleshooting, Checking the Log Files, the ARP Cache, Sending Test Packets, Testing Network Routes, Testing Client/Server Connectivity, Finding Host Information, Network Security, Advanced Network Troubleshooting, Viewing Open Network Connections, Viewing Network Statistics, Scanning the Network, Capturing Network Traffic.
ID LINER RUN ONE SKILL UP PERMANENT MAKEUP TRAINING COURSE PER QUARTER TO HELP TRAINEES HONE AND DEVELOP THEIR SKILLSET. THESE COURSES REVIEW AND IMPROVE HOW YOU CURRENTLY WORK, INTRODUCING MORE ADVANCED TECHNIQUES TO TAKE YOU TO THE NEXT LEVEL.
Kerberos for engineers training course description This hands on course covers the details of Kerberos, from installation and administration through to how it all works including the protocols. What will you learn Describe what Kerberos is. Explain how Kerberos works. Install Kerberos. Configure Kerberos. Troubleshoot Kerberos. Kerberos for engineers training course details Who will benefit: Engineers interested in security. Prerequisites: TCP/IP foundation for engineers Duration 2 days Kerberos for engineers training course contents What is Kerberos? Single Sign On, The protocol, the standard, history, v4, v5, RFCs, Linux, Windows. Kerberos concepts and technology AAA, Authentication, Authorization, Accounting. Kerberos vs LDAP and directories. Privacy, integrity. Kerberos realms, principles, instances. Keys, salts, passwords. Key Distribution Centre, Authentication server, ticket granting server. Tickets. Installation and administration of Kerberos Installing Kerberos, creating realms, testing. DNS and Kerberos, Kerberos clients. Hands on Windows and Linux Kerberos. Kerberos protocols The Needham-Schroeder protocol, Kerberos v4. Authentication server, ticket granting server, Kerberos v5, encryption options, ticket options, other protocol features and extensions. Related protocols: GSSAPI, SPNEGO. Hands on Using Wireshark to 'see' Kerberos. Troubleshooting Kerberos Approach, debugging tools, errors and solutions. Hands on Kerberos troubleshooting. Kerberos security concerns Kerberos attacks, protocol security issues. Dictionary attacks, brute force attacks, replay attacks, MITM attacks, security solutions, protecting the KDC, firewalls, NAT and Kerberos. Hands on Kerberos logging. Software which uses Kerberos Kerberos logins, Kerberos and web based applications, Directory services. Advanced Kerberos issues Cross realm authentication, Windows issues, Windows and UNIX interoperability, Hands on Using a Windows DC for UNIX clients.
Overview This training course is structured around the ISO 31000:2009 framework, principles and processes. It will also demonstrate how to develop internal control mechanisms and explain how to measure risk in terms of probability and potential impact, at the same time as ensuring that the organisation complies with increasingly strict international standards of corporate governance.
Overview This training course will empower you to recognize the root causes of fraud and white-collar crime in the current economy, understand the categories of fraud, equip you with methodologies of fraud detection and prevention, and heighten your ability to detect potential fraudulent situations. In addition to the fundamentals of fraud investigation and detection in a digital environment; profit-loss evaluation, analysis of accounting books, legal concepts, and quantification of financial damages are also examined in this course