Complete Ruby programming training course description This course starts with a quick-start session and then explains the language in detail from the bottom up. Hands on sessions follow all the major sessions to reinforce the theory. What will you learn Read Ruby programs. Write Ruby programs. Debug Ruby programs. Complete Ruby programming training course details Who will benefit: Anyone wishing to program in Ruby. Prerequisites: Software development fundamentals Duration 3 days Complete Ruby programming training course contents Introduction A tour of Ruby, Try Ruby, A suduko solver in Ruby. The Structure and execution of Ruby Lexical structure, Syntactic structure, Files structure, Program encoding, Program execution. Datatypes and objects Numbers, text, Arrays, Hashes, Ranges, Symbols, True, false, and nil, Objects. Expressions and operators Literals and keyword literals, Variable references, Constant references, Method invocations, Assignments, Operators. Statements and control structures Conditionals, loops, Iterators and enumerable objects, Blocks, Altering flow control, Exceptions and exception handling, BEGIN and END, Threads, fibres and continuations. Methods, Procs, Lambdas and closures Defining simple methods, Method names, Methods and parentheses, Method arguments, Procs and lambdas, Closures, Method objects, Functional programming. Classes and modules Defining a simple class, Method visibility: public, protected, privates, Subclassing and inheritance, Object creation and initialization, Modules, Loading and requiring modules, Singleton methods and Eigenclass, Method lookup, Constant lookup. Reflection and metaprogramming Types, classes and modules, Evaluating strings and blocks, Variables and constants, Methods, Hooks, Tracing, ObjectSpace and GV, Custom control structures, Missing methods and missing constants, Dynamically creating methods, Alias chaining. The Ruby platform Strings, Regular expressions, Numbers and Math, Dates and times, Collections, Files and directories, Input/output, Networking, Threads and concurrency. The Ruby environment Invoking the Ruby interpreter, The Top-level environment, Practical extraction and reporting shortcuts, Calling the OS, Security.
About this Virtual Instructor Led Training (VILT) Governments, regulators and energy companies are pursuing CO2 storage technologies to meet their net-zero carbon commitments as well as targets set by the international Paris Agreement on climate change. For successfully executing Carbon Capture & Storage (CCS) projects, various technical, operational, economic and environmental risks and associated stakeholders need to be managed. In this 5 half-day Virtual Instructor Led Training (VILT) course, the methods for managing risk in CCS projects are addressed with a focus on CO2 injection and storage. The VILT course will also demonstrate how to assess storage capacity of a potential CO2 storage reservoir, model framing techniques, and well injectivity issues related to CO2 injection. The potential leak paths will be discussed such as reservoir seals, leakage along faults and aspects of well integrity. In the VILT course, the design of a monitoring programme will also be discussed. The VILT course will be supported by various case studies. This VILT course will cover the following modules: CCS projects in an international context Site selection and site characterization Storage capacity assessment Injectivity assessment Containment assessment Measurement, monitoring & verification Training Objectives On completion of this VILT course, participants will be able to: Uncover the functions and associated components required to capture, transport and store CO2 in subsurface aquifers and (depleted) hydrocarbon reservoirs Find a systematic and integrated approach to risk identification and assessment for CO2 storage projects (maturation) Appreciate the requirements (physics modelling) and uncertainties to assess the CO2 storage capacity of a selected site. Understand the challenges, data and methods to assess CO2 well injectivity and well integrity Identify the leakage pathways of a selected storage site, and understand the assessment methods and associated uncertainties Learn how to design a monitoring program Target Audience This VILT course is intended for all surface and subsurface engineers such as facility engineers, geologists, geophysicists, reservoir engineers, petrophysicists, production technologists/engineers, well engineers and geomechanical specialists. Also, (sub)surface team leads, project managers, business opportunity managers, decision executives, and technical risk assessment & assurance specialists will benefit from this VILT course as it provides a common framework and workflow to develop a CCS project. For each class, it is highly recommended that a mix of disciplines mentioned above are represented to facilitate discussions from different perspectives. Course Level Basic or Foundation Training Methods This VILT course is built around cases in which teams work to identify and assess CO2 storage site issues using a systematic thought approach in this course. In addition, exercises are used to practise the aspects of the CCS risk assessment process. The VILT course provides a venue for discussion and sharing of good practices as well as opportunities to practise multi-discipline co-operation and facilitation. Participants are encouraged to bring their own work issues and challenges and seek advice from the expert course leaders and other participants about all aspects of CCS. This VILT course will be delivered online in 5 half-day sessions comprising 4 hours per day, with 2 breaks of 10 minutes per day. Trainer Trainer 1: Your expert course leader has more than 36 years of experience in the oil & gas industry with Shell. He gained broad experience in petroleum engineering, with expertise in integrated production systems from subsurface, wells and surface. He has had assignments in Production Technology, R&D, Production Chemistry, Rock Mechanics and Reservoir Engineering cEOR, with a proven track record in technology screening, development and deployment, field development planning, conceptual well design and Production System Optimization (PSO) of gas and oil fields as well as preparing Well, Reservoir & Facility Management (WRFM) strategies and plans. He had also worked on assignments in NAM and did fieldwork in Oman, Gabon and Shell Nigeria. He is a skilled workshop facilitator. He discovered his passion for teaching following an assignment in Shell Learning. During his time in Shell, he developed and taught technical courses to Shell professionals via blended learning. Trainer 2: Your second expert course leader has over 30 years of experience identifying, assessing and mitigating technical risks with Shell. The main focal point of his experience is in subsurface and Geomechanical risks. He is the the founding father of various innovations in how we assess risks by tool development (for bore hole stability, 3D geomechanical field evaluations and probabilistic assessment). He also developed an eye for people motivation, change management and facilitation. He was also responsible for the Geomechanical competence framework, and associated virtual and classroom training programme in Shell for 10 years. Trainer 3: Your third expert course leader has more than 30 years of experience in Shell, focusing on research and development in drilling and offshore systems. His areas of expertise is in project management, finance, business planning, investment, development studies and economics models. In 2021, he worked on a project that looked into the economic evaluation of P18A field complex for CO2 storage. He has an MSc in Mechanical Engineering (M.E.) TU Delft Netherlands (Hons) and a baccalaureate from Erasmus University Rotterdam. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations
About this Training Course Time is money in the oil business. Drilling time is big money. Whether in a technical, managerial or supporting role, you are a valuable asset to ensuring that project delivery targets are met and profits are realised. As drilling activities continue, professionals like you must grasp the language and technology of drilling operations in order to maximise expenditures throughout the producing life of a well. Drilling equipment and procedures have a unique language that must be conquered for maximum benefit. Clear and understandable explanations of drilling rig equipment, procedures, and their complex interactions provide an excellent foundation for smooth communication and increased efficiency in inter-department project team efforts. Drilling Essentials will help you de-mystify activities around the rig and well planning. It will explain the fundamentals of drilling with an emphasis on key areas such as logistical considerations, costing, and analysis of drilling contracts. Understand the urgency of drilling requests, know more about the cost implications of drilling-related problems, and understand the risks involved in a drilling contract. With the course director's drilling knowledge and skills, this is your opportunity to explore and understand important drilling concepts, principles, and technology which are presented in a reader-friendly format and illustrated with examples. As a non-drilling professional, you too can grow with the drilling industry with a deeper understanding of the critical role you play in contributing to its success! Training Objectives By attending this industry fundamentals Virtual Instructor Led Training (VILT) course, you will be better able to: Understand drilling terminology & drilling processes for completing onshore & offshore wells Appreciate major cost components of drilling operations and its impact for better project planning and management Better visualise major drilling equipment and their technical functions to promote a deeper understanding of the logistical and technical considerations Gain valuable insights on the drilling industry with a synopsis of recent technology developments that impact the drilling process Target Audience This Virtual Instructor Led Training (VILT) course has been developed for new engineers and forward-looking executives in the following fields who are interested in enhancing their knowledge and awareness of the drilling process for increased productivity & contribution to the team they're supporting: Accounting Commercial Finance & Administration General Management Logistics Procurement Tender Contract Administration E & P IT Finance Joint Ventures Materials Planning Sourcing Training Business Development Estimation & Proposal HSE Legal Planning & Budgeting Supply Chain Drilling Fluids Organisational Impact Your expert course leader has over 45 years of experience in the Oil & Gas industry. During that time, he has worked exclusively in the well engineering domain. After being employed in 1974 by Shell, one of the major oil & gas producing operators, he worked as an apprentice on drilling rigs in the Netherlands. After a year, he was sent for his first international assignment to the Sultanate of Oman where he climbed up the career ladder from Assistant Driller, to Driller, to wellsite Petroleum Engineer and eventually on-site Drilling Supervisor, actively engaged in the drilling of development and exploration wells in almost every corner of this vast desert area. At that time, drilling techniques were fairly basic and safety was just a buzz word, but such a situation propels learning and the fruits of 'doing-the-basics' are still reaped today when standing in front of a class. After some seven years in the Middle East, a series of other international assignments followed in places like the United Kingdom, Indonesia, Turkey, Denmark, China, Malaysia, and Russia. Apart from on-site drilling supervisory jobs on various types of drilling rigs (such as helicopter rigs) and working environments (such as jungle and artic), he was also assigned to research, to projects and to the company's learning centre. In research, he was responsible for promoting directional drilling and surveying and advised on the first horizontal wells being drilled, in projects, he was responsible for a high pressure drilling campaign in Nigeria while in the learning centre, he looked after the development of new engineers joining the company after graduating from university. He was also involved in international well control certification and served as chairman for a period of three years. In the last years of his active career, he worked again in China as a staff development manager, a position he nurtured because he was able to pass on his knowledge to a vast number of new employees once again. After retiring in 2015, he has delivered well engineering related courses in Australia, Indonesia, Brunei, Malaysia, China, South Korea, Thailand, India, Dubai, Qatar, Kuwait, The Netherlands, and the United States. The training he provides includes well control to obtain certification in drilling and well intervention, extended reach drilling, high pressure-high temperature drilling, stuck pipe prevention and a number of other ad-hoc courses. He thoroughly enjoys training and is keen to continue taking classes as an instructor for some time to come. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
LPIC-1 training course description This five day hands on course provides a comprehensive coverage of core Linux administration tasks. The course covers generic Linux and is available for any Linux distribution required. It closely follows the LPIC curriculum allowing delegates to achieve the relevant certification if required. What will you learn Administer & configure Linux systems. Maintain Linux by handling disk space and taking regular backups. Manage software packages. Perform basic troubleshooting. Maintain a secure Linux system. Describe the organisation and implementation of the filesystem. LPIC-1 training course details Who will benefit: System administrators. Network administrators. Prerequisites: Linux fundamentals (LPI 010) Duration 5 days LPIC-1 training course contents Part I Exam 101 Exploring Linux Command-Line Tools Using a Shell, Shell Configuration, Environment Variables, Getting Help, Streams, Redirection and Pipes, Processing Text Using Filters, Manipulating files, Regular Expressions, grep,sed. Managing Software Package Concepts, Comparison of package formats, RPM, rpm Commands, Yum, Debian Packages, dpkg, apt-cache, apt-get, dselect, aptitude, Converting Between Package Formats, Dependencies and Conflicts, Startup Script Problems, Shared Libraries, Library Management, Managing Processes, the Kernel: The First Process, Process Lists, Foreground & Background Processes, Process Priorities, Killing Processes. Configuring Hardware Configuring Firmware and Hardware, IRQs, I/O Addresses, DMA Addresses, Boot Disks, Coldplug and Hotplug Devices, Configuring Expansion Cards and PCI Cards, Kernel Modules, USB Devices, Linux USB Drivers, Configuring Hard Disks, Partitioning Systems, LVM, Common Layouts, Creating Partitions and Filesystems, Maintaining Filesystem Health, Tuning, Journals, Checking Filesystems, Monitoring Disk Use, Mounting and Unmounting Filesystems. Managing Files File Management Commands, File Naming and Wildcards, File Archiving, Links, Directory Commands, File Ownership and Group, File access control, Permissions, chmod, Defaults, File Attributes, Disk Quotas, Enabling and setting Quotas, Locating Files, The FHS. Booting Linux and Editing Files Installing Boot Loaders, GRUB Legacy, GRUB 2, Alternative Boot Loaders, the Boot Process, Boot Messages, Runlevels and the Initialization Process, Runlevel Functions, Runlevel Services, Alternative Boot Systems , Upstart, system. Part II Exam 102 265 Securing the X Window System Localization, Configuring Basic X Features, X Server Options, Methods of Configuring X, X Display Information, X Fonts, The X GUI Login System, XDMCP Server, Using X for Remote Access, Screen Display Settings, Setting Your Time Zone, Your Locale, Configuring Printing, Conceptualizing the Linux Printing Architecture, Understanding PostScript and Ghostscript, Running a Printing System, Configuring CUPS, Monitoring and Controlling the Print Queue. Administering the System Managing Users and Groups, Tuning User and System Environments, Using System Log Files, Understanding syslogd , Setting Logging Options, Manually Logging Data, Rotating Log Files, Reviewing Log File Contents, Maintaining the System Time, Linux Time Concepts, Manually Setting the Time, Using NTP, Running Jobs in the Future, Understanding the Role of cron, Creating System cron Jobs, Creating User cron Jobs, Using anacron, Using at. Configuring Basic Networking TCP/IP, Network Hardware, Network Addresses, Hostnames, Network Ports, Configuring Linux for a Local Network, Configuring with DHCP, Static IP Address, Configuring Routing, Using GUI Configuration Tools, ifup and ifdown, Diagnosing Network Connections, Testing Connectivity, Tracing a Route, Checking Network Status , Examining Network Traffic, Additional Tools. Writing Scripts, Configuring Email, and Using Databases The Shell Environment, Aliases, Shell Configuration Files, Writing Scripts, Commands, Variables, Conditional Expressions, Loops, Functions, Managing Email, Choosing Email Software, Securing Your Email Server, Managing Data with SQL, Picking a SQL Package, Understanding SQL Basics, Using MySQL Securing Your System Administering Network Security, Super Server Restrictions, Disabling Unused Servers, Administering Local Security, Securing Passwords, Limiting root Access, Setting Login, Process, SUID/SGID Files, Configuring SSH, Using GPG, Generating, Importing and Revoking Keys, Encrypting and Decrypting Data, Signing Messages and Verifying Signatures.
UNIX system administration training course description This five day hands on course provides a comprehensive coverage of core UNIX administration tasks. The course covers generic UNIX and is available for any UNIX distribution required. What will you learn Administer & configure UNIX systems. Maintain UNIX by handling disk space and taking regular backups. Manage software packages. Perform basic troubleshooting. Maintain a secure UNIX system. Describe the organisation and implementation of the filesystem. UNIX system administration training course details Who will benefit: System administrators Network administrators. Prerequisites: UNIX fundamentals. Duration 5 days UNIX system administration training course contents Part 1 Exploring UNIX command-line tools Using a shell, shell configuration, environment variables, getting help, streams, redirection and pipes, processing text using filters, manipulating files, regular expressions, grep, sed. Managing software Package concepts, comparison of package formats, RPM, rpm commands, yum, dpkg, apt-cache, apt-get, dselect, aptitude, converting between package formats, dependencies and conflicts, startup script problems, shared libraries, library management, managing processes, the kernel: the first process, process lists, foreground & background processes, process priorities, killing processes. Configuring hardware Configuring firmware and hardware, RQs, I/O addresses, DMA addresses, Boot disks, coldplug and hotplug devices, configuring expansion cards and PCI cards, kernel modules, USB devices, UNIX USB crivers, configuring hard disks, partitioning systems, LVM, common layouts, creating partitions and filesystems, maintaining filesystem health, tuning, journals, checking filesystems, monitoring disk use, mounting and unmounting filesystems. Managing files File management commands, file naming and wildcards, file archiving, links, directory commands, file ownership and group, file access control, permissions, chmod, defaults, file attributes, disk quotas, enabling and setting quotas, locating files, the FHS. Booting UNIX and editing files Installing boot loaders, GRUB legacy, GRUB 2, alternative boot loaders, the boot process, boot messages, runlevels and the initialization process, runlevel functions, runlevel services, alternative boot systems, upstart, system. Part 2 Configuring the X window system Localization, configuring basic X features, X server options, methods of configuring X, X display information, X fonts, the X GUI login system, XDMCP server, using X for remote access, screen display settings, setting your time zone, your locale, configuring printing, conceptualizing the UNIX printing architecture, understanding PostScript and ghostscript, running a printing system, configuring CUPS, monitoring and controlling the print queue. Administering the system Managing users and groups, tuning user and system environments, using system log files, understanding syslogd, setting logging options, manually logging data, rotating l;og files, reviewing log file contents, maintaining the system time, UNIX time concepts, manually setting the time, using NTP, running jobs in the future, understanding the role of cron, creating system cron jobs, creating user cron jobs, using anacron, using at. Configuring basic networking TCP/IP, network hardware, network addresses, hostnames, network ports, configuring UNIX for a local network, configuring with DHCP, static IP address, configuring routing, using GUI configuration tools, ifup and ifdown, diagnosing network connections, testing connectivity, tracing a route, checking network status , examining network traffic, additional tools. Writing scripts, configuring email, and using databases The shell environment, aliases, shell configuration files, writing scripts, commands, variables, conditional expressions, loops, functions, managing email, choosing email software, securing your email server, managing data with SQL, picking a SQL package, understanding SQL basics, using MySQL. Securing your system Administering network security, super server restrictions, disabling unused servers, administering local security, securing passwords, limiting root access, setting login, process, SUID/SGID files, configuring SSH, using GPG, generating, importing and revoking keys, encrypting and decrypting data, signing messages and verifying signatures.
CCNA training course description The Implementing and Administering Cisco Solutions (CCNA) course gives you a broad range of fundamental knowledge for all IT careers. Through a combination of lecture, hands-on labs, and self-study, you will learn how to install, operate, configure, and verify basic IPv4 and IPv6 networks. The course covers configuring network components such as switches, routers, and wireless LAN controllers; managing network devices; and identifying basic security threats. It also gives a foundation in network programmability, and software-defined networking What will you learn Install, configure, and operate a small to medium sized network Gain a foundation in the essentials of networking, security, and automation Prepare for the 200-301 CCNA exam, which earns CCNA certification CCNA training course details Who will benefit: Network support help desk technicians involved in the basic installation, operation, and verification of Cisco networks. Anyone seeking CCNA certification. Prerequisites: Introduction to Data communications & networking Duration 5 days CCNA training course content After taking this course, you should be able to: Identify the components of a computer network and describe their basic characteristics. Understand the model of host-to-host communication. Describe the Cisco IOS software. Describe LANs and the role of switches within LANs. Describe Ethernet and describe the operation of switches. Install a switch and perform the initial configuration. Describe the TCP/IP Internet layer, IPv4, its addressing scheme, and subnetting. Describe the TCP/IP Transport and Application layers Explore functions of routing. Implement basic configuration on a Cisco router. Explain host-to-host comms across switches and routers. Identify and resolve common switched network issues and common problems associated with IPv4 addressing. Describe IPv6 main features and addresses, and configure and verify basic IPv6 connectivity. Describe static routing. Describe, implement, and verify VLANs and trunks. Describe inter VLAN routing. Explain the basics of dynamic routing protocols and describe components and terms of OSPF. Explain how STP and RSTP work. Configure link aggregation using EtherChannel. Describe the purpose of Layer 3 redundancy protocols. Describe basic WAN and VPN concepts. Describe the operation of access control lists (ACLs) and their applications in the network. Configure Internet access using DHCP clients and explain and configure NAT on Cisco routers. Describe basic QoS concepts. Describe the concepts of wireless networks, which types of wireless networks can be built, and how to use Wireless LAN Controllers (WLCs). Describe network and device architectures, introduce virtualization, network programmability and SDN and describe smart network management solutions such as Cisco DNA Centerâ¢, SD-Access, and SD-WAN. Configure basic IOS system monitoring tools. Describe the management of Cisco devices. Describe the current security threat landscape. Describe threat defence technologies. Implement a basic security configuration of the device management plane. Implement basic steps to harden network devices. Detailed course outline Exploring the Functions of Networking. The Host-to-Host Communications Model. Operating Cisco IOS Software. Introducing LANs. Exploring the TCP/IP Link Layer. Starting a Switch. The TCP/IP IP layer, IPv4 Addressing, and Subnets. The TCP/IP Transport Layer and Application Layer. Exploring the Functions of Routing. Configuring a Cisco Router. Exploring the Packet Delivery Process. Troubleshooting a Simple Network. Introducing Basic IPv6. Configuring Static Routing. Implementing VLANs and Trunks. Routing Between VLANs. Introducing OSPF. Redundant Switched Topologies with EtherChannel. Explaining Basics of ACL. Enabling Internet Connectivity. Explaining the Evolution of Intelligent Networks. Introducing System Monitoring. Managing Cisco Devices. Securing Administrative Access. Implementing Device Hardening. Self-Study: Building Redundant Switched Topologies. Exploring Layer 3 Redundancy. Introducing WAN Technologies. Introducing QoS. Explaining Wireless Fundamentals. Introducing Architectures and Virtualization. Examining the Security Threat Landscape. Threat Defense Technologies.
ZigBee training course description A hands on course covering the entire ZigBee protocol stack. ZigBee operation, primitives and frame formats are covered in detail using software tools to test and analyse ZigBee commands and demonstrate how these affect the 802.15.4 MAC. Analysers are used to decode packet formats. What will you learn Describe the ZigBee architecture and applications. Explain the workings of ZigBee protocol stack including the 802.15.4, NWK, APS and ZDO sub layers. Describe in detail the ZigBee primitives and how they are used to pass data; make networks; join networks and repair networks. Secure ZigBee networks. ZigBee training course details Who will benefit: Technical staff requiring grounding in ZigBee including application engineers. Prerequisites: RF fundamentals. Duration 2 days ZigBee training course contents Wireless data overview What is 802.15.4 and ZigBee? WLAN, WPAN, Bluetooth vs. ZigBee. Markets. Applications and architecture. ZigBee demonstration. ZigBee Standards and technology The 7-layer model, IEEE WPAN standards overview, 802.15.4 & ZigBee, ZigBee alliance. ZigBee Protocol stack The ZigBee 5 layer model, The network (NWK) sub layer, Application support sub layer (APS), the ZigBee Device Object (ZDO). 802.15.4 Radio Frequencies, modulation, power, DSSS, BPSK/ O-QPSK, channels, symbols, chips and bit rate. 802.15.4 PHY PHY data transfer primitives. The PHY packet. PHY PIB management. 802.15.4 MAC layer The MAC layer overview, CSMA/CA, addresses, frame types, super frames, MAC layer: Data, Data control, Scan and join, PAN maintenance, MAC PIB. Hands on 802.15.4 frame analysis. ZigBee Topologies Point to point topology, star topology, cluster tree, wired integration. Hands on Building a ZigBee network. ZigBee frame formats General frame format, data frames, command frames. Hands on Analysing ZigBee frames. ZigBee NWK NWK data primitives: Request. Confirm. Indication. NWK management primitives: Network discovery, network formation. Permit joining. Start router. Join. Direct join. Leave. Reset. Sync. NWK database management. Hands on NWK analysis ZigBee APS Address mapping, matching devices, binding devices, binding tables. Hands on APS analysis. ZigBee ZDO Device roles, binding requests, initiating and responding, device discovery, service discovery, network management. ZDO Endpoint 0. ZigBee Security Security issues, security modes, MAC security, NWK security, APS security. Applications Writing ZigBee applications, application profiles, End points, Endpoint addressing, clusters of attributes, broadcasts. Hands on Sample ZigBee application.
Project Stakeholder Relationship Skills: In-House Training This course is designed to provide project managers with the ability to: Analyze the complexities of major stakeholder relationship categories Apply the most appropriate interpersonal relationship skills to the different categories of relationships Align the dynamic needs of the stakeholders with a project's objective throughout the project life cycle What you Will Learn Examine traditional and non-traditional ways to identify and assess stakeholders Explain how competence, character, and trust lead to project success and strong relationships with stakeholders Utilize 'Embodied Leadership' skills to build stakeholder relationships Apply stakeholder engagement best practices to case study and real-life scenarios Getting Started Stakeholders and project success Stakeholder management research Managing stakeholder relationships Identifying Stakeholders Stakeholder categories Stakeholder relationships across the project life cycle Tools and techniques for identifying stakeholders Assessing Stakeholders Assessing stakeholder relationships Recognizing stakeholder attitudes toward the project Analyzing stakeholders Using other types of stakeholder assessments Building Stakeholder Relationships The importance of psychological safety Building trust and getting results The anatomy of trust Navigating Challenging Situations Dynamics of conflict Responding to conflict Managing difficult conversations
Disciplined Agile Scrum Master (DASM): In-House Training Is your team treading water using waterfall? Do you feel trapped in an agile framework? Would you like to find solutions to the problems you've been wrestling with? Are you looking for ways to enhance your team's agility? Break free from your old ways by choosing a way of working that fits your team's context. Find strategies to improve your processes and strengthen your team with the Disciplined Agile® tool kit. Disciplined Agile Scrum Master is a nine-lesson, instructor-led course that shows you how to use Disciplined Agile (DA™) to improve your team's way of working. In just two days, you will become familiar with foundational agile and lean practices that DA supports, practice using the tool kit to solve problems, and learn how to build high-performance teams. Filled with activities, animations, supplemental reading, and more, this course will prepare you to take the Disciplined Agile Scrum Master (DASM) exam and, equally important, start using Disciplined Agile immediately. #BBD0E0 » What You Will Learn After the completion of this course, you will be able to: Apply foundational agile and lean practices in your own team setting Describe what business agility is and how it is core to value proposition of Disciplined Agile® Describe the significance of the Disciplined Agile mindset Define the DA™ principles, promises, and guidelines and how they set Disciplined Agile apart from other frameworks Explain how people are organized into DA teams Define the primary DA roles and how they each are key to the success of a self-organizing agile team Explain how to help your team work well together using the Lean principle of 'respect people' Analyze your team's context to make better process-related decisions Select the best-fit DA life cycles for your teams Apply the five DA steps of choosing your team's way of working (WoW) Apply the relevant agile and lean techniques to successfully initiate your team Apply the relevant agile and lean techniques to support your team producing business value Apply the relevant agile and lean techniques to support your team releasing their work into production Apply the relevant agile and lean techniques to support your team on an ongoing basis Recognize when to be resilient List and define the principles of Lean Significance of the Disciplined Agile® Mindset Business agility and how it is core to value proposition of Disciplined Agile Eight DA principles and how they are core to what sets Disciplined Agile apart from other agile frameworks Which situations each of the DA™ life cycles is best applied DA Practice of choosing a team's way of working (WoW) Foundations of Agile How people are organized into DA teams Primary DA roles and how they each are key to the success of a self-organizing agile team Help your team work well together (Lean principle 'Respect people') Inception phase and why it is important DA tool kit to tailor your way of working within a select phase according to context Agile techniques and ceremonies relevant to Inception Construction phase and why it is important Agile techniques and ceremonies that take place during Construction Eliminate Waste and Build Quality (Lean principles) Deliver Value Quickly (Lean principle) Transition phase and why it is important Ongoing phase and why it is important Learn Pragmatically (Lean principle) Elements of the process blade (onion) diagram Principles of Lean When to be resilient Benefits of explicit workflow Kaizen loops and PDSA techniques for continuous improvement Options for cross-team learning: "community of practice" and "center of excellence"
QA Level 2 Award In Principles Of Risk Assessment (RQF) Face to Face: One-day course Virtual Classroom: Spread over 3 sessions of 2½ hr duration Don't run risks with the safety of your people - it will cost you a lot more when things start to go wrong... Risk Assessments are vital for Health and Safety, and vital for the whole process Course Contents: Main causes of Work-related Fatalities, Injuries and ill health Moral, Legal and Economic Reasons for Preventing Accidents and ill health at Work Key Terms associated with Risk Assessments in Health and Safety at Work:AccidentNear MissAccident TriangleHazardRiskRisk AssessmentSuitable and SufficientCompetence The Role of Risk Assessments in Accident and ill Health Prevention Legal Requirements for Risk Assessments Importance of Personal hygiene Basic Process for Undertaking a Risk Assessment The Five Steps of a Risk Assessment Benefits of this course: In 2020/21, a whopping 1.7 million people suffered from a work-related illness 441,000 of those sustained an injury 142 People, plus 60 members of the public, lost their lives... The estimated cost of injuries and ill health was £15 billion 28.2 million working days, or 108,045 working years, were lost due to work-related illnesses and injuries It is an employer's duty to protect the health, safety and welfare of their employees and other people who might be affected by their business. This includes providing sufficient information, instruction and training of employees, so they can work in a way that does not put themselves or others at risk Our QA Level 2 Award in Principles of Risk Assessment (RQF) course is ideal for all employees, helping them to create a better understanding of health and safety issues and risk assessments Accredited, Ofqual regulated qualification: QA Level 2 Award in Principles of Risk Assessment (RQF) training course is a nationally recognised, Ofqual regulated qualification accredited by Qualsafe Awards.This means that you can be rest assured that your Principles of Risk Assessment certificate fulfils the legal requirements and is a very good way to make sure you and your employees are trained appropriately.The Ofqual Register number for this course is 603/0857/9