SAFe® for Teams Build the skills needed to become a high-performing team member of an Agile Release Train (ART) and learn how to collaborate effectively with other teams by becoming a SAFe® 5 Practitioner (SP). During this course, you will gain an in-depth understanding of the ART, how it delivers value, and what you can do to effectively perform the role using Scrum, Kanban, and Extreme Programming (XP). You will also learn how to write stories and break down features, plan and execute iterations, and plan Program Increments. Finally, you'll learn about the continuous delivery pipeline and DevOps culture, how to effectively integrate with other teams in the program, and what it takes to continuously improve the train. What you will Learn To perform the role of a SAFe® Practitioner, you should be able to: Apply SAFe® to scale Lean and Agile development in their enterprise Know their team and its role on the Agile Release Train Know all other teams on the train, their roles, and the dependencies between the teams Plan Iterations Execute Iterations and demonstrate value Plan Program Increments Integrate and work with other teams on the train Introducing the Scaled Agile Framework® (SAFe®) Building an Agile Team Planning the Iteration Executing the Iteration Executing the Program Increment Practicing SAFe®
About this Virtual Instructor Led Training (VILT) Hydrogen will play an increasingly critical role in the future of energy system as it moves forward to supplement and potentially replace fossil fuels in the long run. Offshore wind offers a clean and sustainable renewable resource for green hydrogen production. However, it can also be volatile and presents inherent risks that need to be managed. Even though offshore production of hydrogen has yet to achieve a high state of maturity, many current projects are already dealing with the conditions and effects of offshore production of hydrogen and are grappling with the technological requirements and necessary gas transportation with grid integration. This 2 half-day Virtual Instructor Lead Training (VILT) course will examine the technological options for on-site production of hydrogen by electrolysis (onshore or offshore directly at the platform) as well as the transport of hydrogen (pipeline or ship). This VILT course will also explore the economic considerations and the outlook on future market opportunities. There will be exercises for the participants to work on over the two half-days. This course is delivered in partnership with Fraunhofer IEE. Training Objectives By the end of this VILT course, participants will be able to: Understand the technological attributes and options for green hydrogen production based on electricity from offshore wind. Explore the associated economic analysis for offshore wind hydrogen production, including CAPEX, OPEX, LCOE and LCOH Identify the critical infrastructure and technical configuration required for offshore green hydrogen including transportation networks and grid connectivity Learn from recent findings from current Research & Development projects concerning the differences between onshore and offshore hydrogen production. Target Audience This VILT course is intended: Renewable energy developers and operators Offshore oil & gas operators Energy transport and marine operators Energy policy makers and regulators IPPs and power utilities Training Methods The VILT course will be delivered online in 2 half-day sessions comprising 4 hours per day, including time for lectures, discussion, quizzes and short classroom exercises. Course Duration: 2 half-day sessions, 4 hours per session (8 hours in total). Trainer Trainer 1: Your expert course leader is Director of Energy Process Technology Division at the Fraunhofer Institute for Energy Economics and Energy System Technology, IEE. The research activities of the division link the areas of energy conversion processes and control engineering. The application fields covered are renewable energy technologies, energy storage systems and power to gas with a strong focus on green hydrogen. From 2006 - 2007, he worked as a research analyst of the German Advisory Council on Global Change, WBGU, Berlin. He has extensive training experience from Bachelor and Master courses at different universities as well as in the context of international training activities - recently on hydrogen and PtX for partners in the MENA region and South America. He holds a University degree (Diploma) in Physics, University of Karlsruhe (KIT). Trainer 2: Your expert course leader is Deputy Head of Energy Storage Department at Fraunhofer IEE. Prior to this, he was the director of the Grid Integration Department at SMA Solar Technology AG, one of the world's largest manufacturers of PV power converters. Before joining SMA, he was manager of the Front Office System Planning at Amprion GmbH (formerly RWE TSO), one of the four German transmission system operators. He holds a Degree of Electrical Engineering from the University of Kassel, Germany. In 2003, he finished his Ph.D. (Dr.-Ing.) on the topic of wind power forecasting at the Institute of Solar Energy Supply Technology (now known as Fraunhofer IEE) in Kassel. In 2004, he started his career at RWE TSO with a main focus on wind power integration and congestion management. He is Chairman of the IEC SC 8A 'Grid Integration of Large-capacity Renewable Energy (RE) Generation' and has published several papers about grid integration of renewable energy source and forecasting systems on books, magazines, international conferences and workshops. Trainer 3: Your expert course leader is Deputy Director of the Energy Process Technology division and Head of the Renewable Gases and Bio Energy Department at Fraunhofer IEE. His work is mainly focused on the integration of renewable gases and bioenergy systems into the energy supply structures. He has been working in this field since more than 20 years. He is a university lecturer in national and international master courses. He is member of the scientific advisory council of the European Biogas Association, member of the steering committee of the Association for Technology and Structures in Agriculture, member of the International Advisory Committee (ISAC) of the European Biomass Conference and member of the scientific committees of national bioenergy conferences. He studied mechanical engineering at the University of Darmstadt, Germany. He received his Doctoral degree on the topic of aerothermodynamics of gas turbine combustion chambers. He started his career in renewable energies in 2001, with the topic of biogas fired micro gas turbines. Trainer 4: Your expert course leader has an M. Sc. and she joined Fraunhofer IEE in 2018. In the Division of Energy Process Technology, she is currently working as a Research Associate on various projects related to techno-economic analysis of international PtX projects and advises KfW Development Bank on PtX projects in North Africa. Her focus is on the calculation of electricity, hydrogen and derivative production costs (LCOE, LCOH, LCOA, etc) based on various methods of dynamic investment costing. She also supervises the development of models that simulate different PtX plant configurations to analyze the influence of different parameters on the cost of the final product, and to find the configuration that gives the lowest production cost. She received her Bachelor's degree in Industrial Engineering at the HAWK in Göttingen and her Master's degree in renewable energy and energy efficiency at the University of Kassel. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations
Cyber security training course description This cyber security course focusses on the network side of security. Technologies rather than specific products are studied focussing around the protection of networks using firewalls and VPNs. What will you learn Describe: - Basic security attacks - RADIUS - SSL - VPNs Deploy firewalls and secure networks Explain how the various technologies involved in an IP VPN work. Describe and implement: - L2TP - IPsec - SSL - MPLS, L3, VPNs. Cyber security training course details Who will benefit: Anyone working in the security field. Prerequisites: TCP/IP foundation for engineers Duration 5 days Cyber security training course contents Security review Denial of service, DDOS, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits IP spoofing, SYN attacks, hijacking, reflectors and amplification, keeping up to date with new threats. Hands on port scanning, use a 'hacking' tool. Client and Server security Windows, Linux, Log files, syslogd, accounts, data security. Hands on Server hardening. Firewall introduction What is a firewall? Firewall benefits, concepts. HAnds on launching various attacks on a target. Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls. Firewall products. Hands on Simple personal firewall configuration. Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on SPI firewalls. Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall plusses and minuses. Hands on Proxy firewalls. Firewall architectures Small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Password cracking. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, RADIUS. Hands on Using certificates. VPN overview What is a VPN? What is an IP VPN? VPNs vs. Private Data Networks, Internet VPNs, Intranet VPNs, Remote access VPNs, Site to site VPNs, VPN benefits and disadvantages. VPN Tunnelling VPN components, VPN tunnels, tunnel sources, tunnel end points, tunnelling topologies, tunnelling protocols, which tunnelling protocol? Requirements of tunnels. L2TP Overview, components, how it works, security, packet authentication, L2TP/IPsec, L2TP/PPP, L2 vs L3 tunnelling. Hands on Implementing a L2TP tunnel. IPsec AH, HMAC, ESP, transport and tunnel modes, Security Association, encryption and authentication algorithms, manual vs automated key exchange, NAT and other issues. Hands on Implementing an IPsec VPN. SSL VPNs Layer 4 VPNs, advantages, disadvantages. SSL. TLS. TLS negotiation, TLS authentication. TLS and certificates. Hands on Implementing a SSL VPN. MPLS VPNs Introduction to MPLS, why use MPLS, Headers, architecture, label switching, LDP, MPLS VPNs, L2 versus L3 VPNs. Point to point versus multipoint MPLS VPNs. MBGP and VRFs and their use in MPLS VPNs. Hands on Implementing a MPLS L3 VPN. Penetration testing Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology. Hands on Hacking tools and countermeasures.
About this Virtual Instructor Led Training (VILT) A decision to drill an exploration well with the objective to find a new oil or gas field must be based on sound assessment of the prospect risk and of the volumes. What is the chance that a well will find hydrocarbons, and how much could it be? Risk and volume assessments form the basis for decisions to drill a well or not, and as such form the link between subsurface evaluation and the business aspects of the petroleum industry. This Virtual Instructor Led Training (VILT) course explains how risks and volumes can be assessed in a realistic manner, based on a sound understanding of the geological details of the prospect as well as its regional geological setting and current play understanding. Participants of this VILT course will receive a softcopy of Risk and Volume Assessment Handbook which explains the concepts that are associated with probabilistic Risk & Volume (R & V) Assessment and contains many practical recommendations on how to translate geological understanding into meaningful inputs for probabilistic R &V assessments. The book is fully compatible with any probabilistic R & V tool in the industry. Training Objectives By the end of this VILT course, participants will be able to understand: The fundamentals of risk and volumes assessment; translating geological understanding into reasonable numbers and ranges. The difference between risk and uncertainty. Fundamentals of statistics; including explanation of distribution curves, understanding of expectation curves, do's and don'ts for adding risked volumes, and Bayes theorem. Uncertainty of trap, reservoir, seal and charge, illustrated by examples. Guidelines and exercises for estimating risks realistically and consistently. Calculating volume ranges for prospects and for portfolios of prospects; how to add prospect volumes for a correct representation of prospect portfolios. Incorporation of geophysical evidence (DHIs) in a realistic risk assessment. Target Audience This VILT course has been designed in the first place for geoscientists working in exploration, for prospect portfolio analysts and for their direct supervisors. It will also benefit staff from disciplines working closely with exploration staff, such as reservoir engineers, petrophysicists and geophysicists. Course Level Intermediate Training Methods Learning, methods and tools The VILT course will be delivered online in 5 half-day sessions comprising 4 hours per day, with 2 breaks of 10 minutes per day. It is the intention to have at least 2 smaller exercises per day. Time will be reserved for recapitulation, questions and discussions. VILT will be conducted either via Zoom or Microsoft Teams. Presenting materials can easily be done on this platform. When participants need to ask a question, they can raise their hand, write notes or interrupt the Instructor by using their microphone. The presenter can switch to a screen where he/she can see all participants (also when each participant is sitting in another location e.g. at home). There is also a whiteboard functionality that can be used as one would use a flip chart. Exercises will be done on an online platform which provides each participant with a private work area that can be accessed by the Instructor to discuss the exercise in a similar manner as in a classroom course. Each topic is introduced by a lecture, and learning is re-enforced by practical exercises and discussions. Handout material in electronic format will be provided. Trainer Dr. Jan de Jager has a PhD in Geology from the University of Utrecht. He joined Shell in 1979 as an exploration geologist, and worked in several locations around the world such as Netherlands, Gabon, USA, Australia, Argentina, and Malaysia in technical and management positions. During the last 10 years of his career, he was responsible for the quality assurance of Shell's exploration prospects in many parts of the world and for upgrading and replenishing Shell's global exploration portfolio. During this period, he had also developed extensive expertise in Prospect Risk and Volume assessments for which he ran successful internal training programmes. Following his retirement from Shell in 2010, Dr Jan de Jager took on a position as part-time professor at the University of Amsterdam and also serves as a consultant exploration advisor for various E&P companies. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations
During this 1 day intermediate level course you will learn how to utilise the powerful image editing capabilities of Adobe Photoshop. Building on the topics covered in our Introduction to Photoshop, you will learn how to work with multiple layers, use layer masks, learn how to use smart objects, add sophisticated filters. Re-touching and repairing, montages and image correction techniques are also covered.
Securing Linux systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure Linux accounts. Secure Linux file systems. Secure Linux access through the network. Securing Linux systems training course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing Linux systems training course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.
Python training course description This Python course focusses on teaching Python for use in network automation and network DevOps. We focus on getting delegates up and running with Python and network automation as quickly as possible rather than making them great programmers. In other words we concentrate on enabling delegates to use network automation libraries such as netmiko, NAPALM and Nornir, and APIs such as NETCONF and RESTCONF rather than enabling delegates to produce object oriented programs. Hands on sessions use Cisco and Juniper devices. What will you learn Run Python programs. Read Python programs. Write Python programs. Debug Python programs. Automate network tasks with Python programs. Configure network devices with Python. Collect data from network devices with Python. Python training course details Who will benefit: Network engineers. Prerequisites: TCP/IP Foundation Duration 5 days Python training course contents What is Python? Programming languages, Why Python? Python in interactive mode, Python scripts, ipython, Python version 2 versus version 3. A simple Python script. Comments. Hands on Installing Python, Hello world. A network example On box vs off box Python. telnet, ssh, NETCONF, HTTP, APIs, manufacturers and API support, analysis of a simple telnetlib program. Hands on Using Python to retrieve the configuration from a network device. Using wireshark to analyse the actions. Python basics I/O, operators, variables and assignment, types, indentation, loops and conditionals. Hands on Modifying the telnet program, changing configurations on a network devices. Functions, classes and methods What are functions, calling functions, builtin functions, useful builtin functions, file handling, classes, objects, creating instances. Hands on Storing configurations in files, configuring devices from files, using an inventory file to work on multiple devices. Libraries and modules Modules, files and packages, import, from-import, Python standard library, other packages, pip install, executing other programs. Managing python libraries. Hands on Using pip, installing and using ipaddress, subprocess to access netsnmp. For the more advanced, using the sockets library. Paramiko and netmiko SSH, enabling SSH on devices, keys. Paramiko versus netmiko, example scripts. pexpect. Hands on Configuring VLANs from Python. pySNMP Gathering facts using previous methods, SNMP review, pySNMP GET, pySNMP and SNMPv3. easySNMP library. Hands on Walking a MIB from Python. NETCONF What is NETCONF? Enabling NETCONF on devices, A first ncclient script, device handlers, get_config, edit_config, copy_config, delete_config, commit, validate, pyEZ, utils_config, utils.sw. Hands on Configuration using ncclient and PyEZ. This session is expanded for those interesting in JunOS automation. Manipulating configuration files Builtin functions, string handling. Unicode. Sequences, strings, lists, tuples. Dictionaries. TextFSM. Regular expressions. JSON, YAML, XML, YANG, Jinja2, templates. Hands on Jinja2 templating with Python to configure network devices. NAPALM Getters, configuration operations, supported devices, NAPALM transport, Config-replace, Config-merge, Compare config, Atomic changes, rollback. Example NAPLAM scripts. Hands on Using NAPALM to gather facts, Using NAPALM for configuration management REST and RESTCONF What is REST, HTTP methods, GET, POST, cURL, Postman, Python requests library. RESTCONF, a RESTCONF example. Hands on Modifying a configuration using RESTCONF. Scapy What is scapy, Scapy in interactive mode, Scapy as a module. Hands on Packet crafting from Python. Warning Errors and exceptions, Exception handling, try, except. Memory management. Garbage collection. Context management, With. Hands on Improving Python code. Nornir What is Nornir? A network automation framework, inventories, connection management and parallelization. Nornir architecture and other libraires. Hands on Setting up nornir, nornir fact gathering, nornir tasks. Optional Writing your own functions, Writing your own classes. pyntc. Hands on Writing reusable code.
About this Training Course This course will begin with a presentation of topics to familiarize Process and Instrumentation Engineers with procedures and practices involved in the choice of sensors related to the measurement of temperature, pressure, level and flow in relation to single-phase flows. It will provide guidance on the optimum commercially available devices through a detailed comparison of their relative merits. At the heart of this course is sensor calibration which is a crucial element for these topics. The course will also examine the various types of flow control valve, including Globe, Slide, Needle, Eccentric plug and Ball valves and their characteristics in industrial application, while focusing on the problems of Cavitation and Flashing and methods to minimise or eradicate these issues. With the use of examples, industry case studies and a wide range of videos, this course will also cover all aspects of proportional (P), derivative (D) and integral (I) control. In particular, it will address the advantages and disadvantages of PI and PID control. It will also describe Cascade, Feed forward, Split Range, Override and Ratio Control techniques. Training Objectives By attending this course, participants will acquire the following knowledge and skills: Apply an in-depth knowledge to the measurement of temperature, pressure, level and flow as well as to the fluid mechanics of pipe flows Assess the advantages and disadvantages of the major flowmeter types including the differential pressure, rotary positive displacement, rotary-inferential, electromagnetic, ultrasonic and Coriolis mass flowmeters to determine the optimum choice for a given application Make a considered judgement of the choice of fluid level measurement devices Understand the various types of flow calibration, metering systems and provers Carry out tank measurement and tank calibration methods and to calculate net sellable quantities Discuss valve characteristics & trim selection and illustrate the process of control valve sizing Explain the terms Open and Closed loop Define Process Variable, Measured Variable, Set Point and Error Define Direct and Reverse controller actions Explain the terms Process Lag, Measurement Lag, Transmission Lag, and Response Lag and their effect on controllability Explain ON/ OFF Control and the inherent disadvantages Explain Proportional Control, Offset, Gain and Proportional Band and the advantages and disadvantages of Proportional only control Explain the fundamentals and operation principles of Integral (I) Action and the disadvantages of proportional plus integral control Explain the fundamentals and operation principles of Derivative (D) Action in conjunction with P action Describe the operating principles of a PID Controller and explain the applications and advantages of PID control Describe Cascade, Forward, Split Range and Ratio Control operation principles Target Audience This course will benefit instrumentation, inspection, control, custody metering and process engineers and other technical staff. It is also suitable for piping engineers, pipelines engineers, mechanical engineers, operations engineers, maintenance engineers, plant/field supervisors and foremen and loss control coordinators. Trainer Your expert course leader is a Senior Mechanical & Instrumentation Engineer (UK, B. Sc., M.Eng., Ph D) with over 45 years of industrial experience in Process Control & Instrumentation, Pumps, Compressors, Turbines and Control Valve Technology. He is currently a Senior Independent Consultant to various petrochemical industries in the UK, USA, Oman, Kuwait and KSA where he provides consultancy services on both the application and operational constraints of process equipment in the oil & gas industries. During his early career, he held key positions in Rolls Royce (UK) where he was involved in the design of turbine blading for jet engines, subject to pre-specified distributions of pressure. During this period and since, he has also been closely involved in various aspects of Turbomachinery, Thermodynamics and Fluid Mechanics where he has become a recognised authority in these areas. Later, he joined the academic staff of University of Liverpool in the UK as a Professor in Mechanical Engineering Courses. A substantial part of his work has been concerned with detailed aspects of Flowmetering - both of single & multiphase flows. He has supervised doctoral research students in this area in collaboration with various European flowmeter manufacturers. He joined Haward Technology Middle East in 2002 and was later appointed as European Manager (a post which has since lapsed) and has delivered over 150 training courses in Flowmeasurement (single- and multi-phase), Control, Heat Exchangers, Pumps, Turbines, Compressors, Valve and Valve Selection as well as other topics throughout the UK, USA, Oman and Kuwait. During the last two years, he has delivered courses with other training companies operating in the Far and Middle East. He has published about 150 papers in various Engineering Journals and International Conferences and has contributed to textbooks on the topics listed above. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
A four-hour workshop for HR Professionals in the area of Attraction, Selection and Recruitment of Neurodiverse people.