• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

2674 Learning courses delivered Live Online

EC-Council Certified Ethical Hacker (CEH) v12

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview Information security controls, laws, and standards. Various types of footprinting, footprinting tools, and countermeasures. Network scanning techniques and scanning countermeasures Enumeration techniques and enumeration countermeasures Vulnerability analysis to identify security loopholes in the target organization?s network, communication infrastructure, and end systems. System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities. Different types of malware (Trojan, Virus, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures. Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing. Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures. DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures. Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures. Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures. Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures. SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures. Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools. Mobile platform attack vector, android vulnerability exploitations, and mobile security guidelines and tools. Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures. Cloud computing concepts (Container technology, serverless computing), the working of various threats and attacks, and security techniques and tools. Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap. Threats to IoT and OT platforms and defending IoT and OT devices. Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools. CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. 1 - Introduction to Ethical Hacking Information Security Overview Cyber Kill Chain Concepts Hacking Concepts Ethical Hacking Concepts Information Security Controls Information Security Laws and Standards 2 - 2 - Foot-printing and Reconnaissance Footprinting Concepts Footprinting through Search Engines Footprinting through Web Services Footprinting through Social Networking Sites Website Footprinting Email Footprinting Who is Footprinting DNS Footprinting Network Footprinting Footprinting through Social Engineering Footprinting Tools Footprinting Countermeasures 3 - Scanning Networks Network Scanning Concepts Scanning Tools Host Discovery Port and Service Discovery OS Discovery (Banner Grabbing/OS Fingerprinting) Scanning Beyond IDS and Firewall Draw Network Diagrams 4 - Enumeration Enumeration Concepts NetBIOS Enumeration SNMP Enumeration LDAP Enumeration NTP and NFS Enumeration SMTP and DNS Enumeration Other Enumeration Techniques Enumeration Countermeasures 5 - Vulnerability Analysis Vulnerability Assessment Concepts Vulnerability Classification and Assessment Types Vulnerability Assessment Solutions and Tools Vulnerability Assessment Reports 6 - System Hacking System Hacking Concepts Gaining Access Escalating Privileges Maintaining Access Clearing Logs 7 - Malware Threats Malware Concepts APT Concepts Trojan Concepts Virus and Worm Concepts Fileless Malware Concepts Malware Analysis Countermeasures Anti-Malware Software 8 - Sniffing Sniffing Concepts Sniffing Technique: MAC Attacks Sniffing Technique: DHCP Attacks Sniffing Technique: ARP Poisoning Sniffing Technique: Spoofing Attacks Sniffing Technique: DNS Poisoning Sniffing Tools Countermeasures Sniffing Detection Techniques 9 - Social Engineering Social Engineering Concepts Social Engineering Techniques Insider Threats Impersonation on Social Networking Sites Identity Theft Countermeasures 10 - Denial-of-Service DoS/DDoS Concepts DoS/DDoS Attack Techniques BotnetsDDoS Case Study DoS/DDoS Attack Tools Countermeasures DoS/DDoS Protection Tools 11 - Session Hijacking Session Hijacking Concepts Application Level Session Hijacking Network Level Session Hijacking Session Hijacking Tools Countermeasures 12 - Evading IDS, Firewalls, and Honeypots IDS, IPS, Firewall, and Honeypot Concepts IDS, IPS, Firewall, and Honeypot Solutions Evading IDS Evading Firewalls IDS/Firewall Evading Tools Detecting Honeypots IDS/Firewall Evasion Countermeasures 13 - Hacking Web Servers Web Server Concepts Web Server Attacks Web Server Attack Methodology Web Server Attack Tools Countermeasures Patch Management Web Server Security Tools 14 - Hacking Web Applications Web Application Concepts Web Application Threats Web Application Hacking Methodology Web API, Webhooks, and Web Shell Web Application Security 15 - SQL Injection SQL Injection Concepts Types of SQL Injection SQL Injection Methodology SQL Injection Tools Evasion Techniques Countermeasures 16 - Hacking Wireless Networks Wireless Concepts Wireless Encryption Wireless Threats Wireless Hacking Methodology Wireless Hacking Tools Bluetooth Hacking Countermeasures Wireless Security Tools 17 - Hacking Mobile Platforms Mobile Platform Attack Vectors Hacking Android OS Hacking iOS Mobile Device Management Mobile Security Guidelines and Tools 18 - IoT and OT Hacking IoT Hacking IoT Concepts IoT Attacks IoT Hacking Methodology IoT Hacking Tools Countermeasures OT Hacking OT Concepts OT Attacks OT Hacking Methodology OT Hacking Tools Countermeasures 19 - Cloud Computing Cloud Computing Concepts Container Technology Serverless Computing Cloud Computing Threats Cloud Hacking Cloud Security 20 - Cryptography Cryptography Concepts Encryption Algorithms Cryptography Tools Public Key Infrastructure (PKI) Email Encryption Disk Encryption Cryptanalysis Countermeasures Additional course details: Nexus Humans EC-Council Certified Ethical Hacker (CEH) v.12 training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the EC-Council Certified Ethical Hacker (CEH) v.12 course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

EC-Council Certified Ethical Hacker (CEH) v12
Delivered OnlineFlexible Dates
£3,495

Introduction to Carbon Capture and Storage (CCS) for Non-Technical Professionals

By EnergyEdge - Training for a Sustainable Energy Future

About this training Carbon Capture and Storage (CCS) is an upcoming new technology that has a vital place within global efforts to decarbonise. It has a unique set of challenges, opportunities and risks to be understood and accommodated within appropriate legal, regulatory, and social and public license frameworks. The course has a strong international and global south emphasis with case studies on CCS projects and will touch on the role of CCS in developing country energy transition. The course satisfies a part of the market that is not currently catered for - the wider science, risks, financing, regulation, planning and social license aspects of CCS. These are issues that are as important as the technical issues in the sense that any of them can be a show-stopper for CCS. Training Objectives Upon completion of this course, participants will be able to: Place CCS within the context of the global geological carbon cycle and the contribution to could make to carbon abatement Explore the basic engineering and other challenges and solutions of CO2 transport and capture Recognize the geological challenges and solutions of CO2 storage Learn the methods of geological and environmental monitoring of CCS sites and why monitoring is important Understand the policy and finance challenges and solutions of CCS projects Know the importance of social license to operate and how to gain a social license to operate Target Audience This course will cater for in-company legal specialists, finance, project managers, marketing and communications specialists; as well as geologists, planners and environmental scientists in regulatory or government roles in regions considering the development of CCS. The course will provide up to date and relevant information to help in understanding opportunities and in managing risk. Geoscientists Government energy regulators and policy makers Financiers and investors Government natural resource and planning department Environmental scientists Finance professionals Marketing and communication professionals Legal specialists Project managers Course Level Basic or Foundation Trainer Your expert course leader is one of the most influential figures in British geoscience. He has 25 years' experience in geological, energy, and palaeontological science and research, including 8 years national level science leadership as the UK's chief geologist (Executive Chief Scientist and Director of Science and Technology of the British Geological Survey). He has been providing geoscience advice to Government for almost 15 years and has an excellent overview of Government policy, industrial activity and funding landscape in applied and energy geoscience, including CCUS and shale gas. He is a well-known communicator of science and has published three single-author popular science books (one award-winning), including the best introductory book on CCS 'Returning Carbon to Nature' Elsevier 2013. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Introduction to Carbon Capture and Storage (CCS) for Non-Technical Professionals
Delivered in Internationally or OnlineFlexible Dates
£2,493 to £2,899

Pipeline Integrity Management - Incorporating API 1160 / 1173 and ASME B31.8S

By EnergyEdge - Training for a Sustainable Energy Future

About this Training Course This 3 full-day course provides a sound review of Pipeline Integrity Management strategies, in compliance with regulatory requirements, including self-assessment. The course is highly interactive and takes the form of lectures and case studies. On completion of the course, the participants will have a solid understanding of the procedures, strengths, limitations, and applicability of the main issues that comprise a Pipeline Integrity Management Program. The course incorporates API 1160 / 1173 and ASME B31.8S, and explains in detail the pipeline integrity requirements described in these standards. This course can also be offered through Virtual Instructor Led Training (VILT) format. Training Objectives Objectives of this course: Explore the latest techniques used to develop a comprehensive integrity management program covering both pipelines and their associated facilities Determine the necessary elements of such a program described in detail with examples of typical program content including an overarching view of where detailed risk analysis and defect assessment fits in the program Understand the scopes and contents of pipeline integrity standards i.e. API 1160 / 1173 and ASME B31.8S On completion of this course, the participants will be able to understand: Codes used in developing Integrity Management Plans, API 1160 / 1173 and ASME B31.8S, others The elements of an Integrity Management Plan Threat assessment Critical aspects of risk assessment Prevention and mitigation measures Characteristics and limitations of different inspection methods A risk-based approach to maintenance Target Audience The course is intended for supervisors, engineers and technicians responsible for ensuring the adequate protection of pipeline assets. In addition, maintenance planners, regulators and service providers to the pipeline industry will also benefit from attending this course. Course Level Basic or Foundation Trainer Your expert course leader is a Ph.D. Metallurgical Engineer with advanced expertise in asset integrity management of oil & gas production facilities, corrosion control, materials selection, chemical treatments, pipeline pigging, inspections, fitness-for-service evaluations, failure analysis and related consulting. He has 40 years of experience working for BP in Asia and South America, Amoco in the US, Intertek, and four years with Applus-Velosi in Southeast Asia. Practical Work Experience: AIM consultant with focus on Southeast Asia operations and clients Direct technical interface with clients on Velosi services Technical consultant for ongoing regional contracts and lead roles as auditor, instructor or facilitator Main clients have included the following organisations: BP and Vico Indonesia, Pertamina Offshore Northwest Java and West Madura Offshore (Indonesia), NCSP (Vietnam), ADCO-OPCO (Abu Dhabi), Thang Long (Vietnam), Exxon-Mobil (Malaysia) and Mubadala Petroleum (Indonesia). POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable

Pipeline Integrity Management - Incorporating API 1160 / 1173 and ASME B31.8S
Delivered in Internationally or OnlineFlexible Dates
£3,100

About this Virtual Instructor Led Training (VILT)  The Advanced Reservoir Engineering VILT course will address modern practical aspects of reservoir engineering during 5 half-days packed with lectures, virtual exercises, discussions and literature reviews. The participants' understanding of fundamental concepts and modern practical reservoir engineering methods will be deepened and a wide range of topics will be addressed. Topics covered The VILT course will emphasise reservoir engineering applications and include topics such as: Rock properties of clastic and carbonate reservoirs Reservoir characterisation Reservoir fluid behaviour Identification of main production mechanisms Design and analysis of well tests Production forecasting Application of Decline Curve Analysis in mature fields Detailed modeling of wells and reservoirs Water flooding Application of EOR methods Reserves and resource estimation Reservoir simulation approaches, model construction and well, aquifer and fluid modelling Development planning Uncertainty handling and scenario methods Depending on the background and requirements of the participants, some topics may be given more emphasis.   Training Objectives In this VILT course, reservoir engineering methods will be addressed which are of use in the daily reservoir engineering practice. The focus will be on practical applicability. Use is made of practical and actual reservoir engineering problems and examples to illustrate relevant subjects. By attending this VILT course, participants will have a deeper knowledge of modern reservoir engineering practices for reservoir development and production, including the construction and use of reservoir models. Target Audience The VILT course is intended for experienced reservoir engineers with prior technical or engineering exposure to production activities. Petroleum engineers and geoscientists who require more than general knowledge of reservoir engineering will also find this course useful. Participants are invited but not obliged to bring a short presentation (max of 15 minutes) on a practical problem they encountered in their work. This will then be explained and discussed in the VILT class. A short test or quiz will be held at the end the VILT course. Training Methods This VILT course will be delivered online over 5 half-days. There will be 2 blocks of two hours per day, including lectures, discussion, quizzes and short classroom exercises. Additionally, some self-study will be required. Two breaks of 10 minutes will be provided each day. Course Duration: 5 half-day sessions, 4 hours per session (20 hours in total). Trainer Your course leader is an independent Reservoir Engineering Consultant. He provides project consultancy, quality assurance and reservoir engineering training for major oil companies, governments, engineering firms and other global customers. Before he retired from Shell in 2012, he held positions as Senior Reserves Consultant for the Middle East and Reservoir Engineering Discipline Lead. He is a petroleum engineering professional, with global experience, mostly in Shell companies and joint ventures (NAM, SSB, SCL, PDO, SKDBV). He has been involved in reserves and resource management, has extensive reservoir modelling and reservoir simulation expertise, and wide experience in the design and delivery of training programmes for employee development. PROFESSIONAL EXPERIENCE 2012 - 2016 Independent Reservoir Engineering Consultant Project consultancy, quality assurance and reservoir engineering training for major oil companies, governments, engineering firms and other global customers. Delivering specialised and general Reservoir Engineering courses to a multitude of international companies. 2008 - 2012 Shell International E&P, the Hague, the Netherlands Senior Reserves Consultant for the Middle East Region Assurance of SEC and SPE compliance of reserves and resources in Shell Middle East region. Contributor to the 2012 SPE guidelines on reserves and resources assessment. 2006 - 2008 Shell E&P Technology Solutions, Rijswijk, the Netherlands Reservoir Engineering Discipline Lead Responsible for QA/QC of Reservoir Engineering in global E&P projects as well as for staff development. (over 60 international Reservoir Engineers) 2001 - 2005 Centre for Carbonate Studies, SQU, Oman / Shell International E&P Technology Applications and Research /Shell Representative Office Oman Petroleum Engineering Manager PE manager in the Carbonate Research centre, at Sultan Qaboos University in Oman. Industrial research projects and support to teaching on recovery aspects of carbonate reservoir development. Design and delivery of industrial courses on carbonate reservoirs 1997- 2000 Shell International E&P, Rijswijk, the Netherlands Principal Reservoir engineer. Acting Shell Group Reserves Co-ordinator in 1997-1998. Facilitation of workshops with government shareholders, including discussions on sensitive reserves issues (BSP Petroleum Unit Brunei, PDO Oman, SPDC government Nigeria). Co-ordination of the NOV subsurface team in Shell Kazakhstan Development BV in 2000. Leading role in Shell Gamechanger project on natural gas hydrates. 1992- 1996 Shell Training Centre, Noordwijkerhout, the Netherlands Reservoir Engineering Programme Training Director Directed Shell Group Reservoir Engineering Training. Introduced advanced PE training events, QA/QC and learning transfer measures, Design and delivery of reservoir engineering and multidiscipline courses to Shell staff from a wide range of nationalities. 1985- 1992 Shell International, SIPM, the Hague, The Netherlands Senior Reservoir Engineer Full field reservoir simulation projects supporting Field Development Plans, operational strategies and unitisation negotiations for Shell Group Operating Companies in the United Kingdom, New Zealand and Egypt. Major contributor to the Shell internal Gas Field Planning Tool development. 1984- 1985 Geological Survey of the Netherlands (RGD), Ministry of Economic Affairs Reservoir Engineering Section Head Responsible for Petroleum Engineering advice on oil and gas licences to the Ministry of Economic Affairs. First-hand experience with a government view on resource management. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations

Advanced Reservoir Engineering
Delivered in Internationally or OnlineFlexible Dates
£1,536 to £2,899

55321 SQL Server Integration Services

By Nexus Human

Duration 5 Days 30 CPD hours This course is intended for The primary audience for this course is database professionals who need to fulfil a Business Intelligence Developer role. They will need to focus on hands-on work creating BI solutions including Data Warehouse implementation, ETL, and data cleansing. Overview Create sophisticated SSIS packages for extracting, transforming, and loading data Use containers to efficiently control repetitive tasks and transactions Configure packages to dynamically adapt to environment changes Use Data Quality Services to cleanse data Successfully troubleshoot packages Create and Manage the SSIS Catalog Deploy, configure, and schedule packages Secure the SSIS Catalog SQL Server Integration Services is the Community Courseware version of 20767CC Implementing a SQL Data Warehouse. This five-day instructor-led course is intended for IT professionals who need to learn how to use SSIS to build, deploy, maintain, and secure Integration Services projects and packages, and to use SSIS to extract, transform, and load data to and from SQL Server. This course is similar to the retired Course 20767-C: Implementing a SQL Data Warehouse but focuses more on building packages, rather than the entire data warehouse design and implementation. Prerequisites Working knowledge of T-SQL and SQL Server Agent jobs is helpful, but not required. Basic knowledge of the Microsoft Windows operating system and its core functionality. Working knowledge of relational databases. Some experience with database design. 1 - SSIS Overview Import/Export Wizard Exporting Data with the Wizard Common Import Concerns Quality Checking Imported/Exported Data 2 - Working with Solutions and Projects Working with SQL Server Data Tools Understanding Solutions and Projects Working with the Visual Studio Interface 3 - Basic Control Flow Working with Tasks Understanding Precedence Constraints Annotating Packages Grouping Tasks Package and Task Properties Connection Managers Favorite Tasks 4 - Common Tasks Analysis Services Processing Data Profiling Task Execute Package Task Execute Process Task Expression Task File System Task FTP Task Hadoop Task Script Task Introduction Send Mail Task Web Service Task XML Task 5 - Data Flow Sources and Destinations The Data Flow Task The Data Flow SSIS Toolbox Working with Data Sources SSIS Data Sources Working with Data Destinations SSIS Data Destinations 6 - Data Flow Transformations Transformations Configuring Transformations 7 - Making Packages Dynamic Features for Making Packages Dynamic Package Parameters Project Parameters Variables SQL Parameters Expressions in Tasks Expressions in Connection Managers After Deployment How It All Fits Together 8 - Containers Sequence Containers For Loop Containers Foreach Loop Containers 9 - Troubleshooting and Package Reliability Understanding MaximumErrorCount Breakpoints Redirecting Error Rows Logging Event Handlers Using Checkpoints Transactions 10 - Deploying to the SSIS Catalog The SSIS Catalog Deploying Projects Working with Environments Executing Packages in SSMS Executing Packages from the Command Line Deployment Model Differences 11 - Installing and Administering SSIS Installing SSIS Upgrading SSIS Managing the SSIS Catalog Viewing Built-in SSIS Reports Managing SSIS Logging and Operation Histories Automating Package Execution 12 - Securing the SSIS Catalog Principals Securables Grantable Permissions Granting Permissions Configuring Proxy Accounts Additional course details: Nexus Humans 55321 SQL Server Integration Services training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55321 SQL Server Integration Services course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

55321 SQL Server Integration Services
Delivered OnlineFlexible Dates
£2,975

About this Training Growing global competitiveness in the refining products' market requires an in-depth knowledge of fuel technology processes, global quality standards and quality monitoring procedures. As the global market turns to cleaner fuels with more stringent specifications, the market in which refiners operate in, is getting more sophisticated and challenging. Training Objectives Upon completion of this course, participants will be able to: Get a clear overview of processing background and how white products are produced and blended Understand the blending impact on product quality and how to deal with quality giveaways, stability of blends and specification margins Get a clear overview of fuel blending operations, blending principles, specifics and operations Understand the role of additives and how additives are selected and used to meet the specification for different products and different markets Realize the importance of specifications, their limitations and how to ensure that the product is fit for purpose Be able to correctly interpret the laboratory results Target Audience The course is intended for individuals who are interested in the field of refining blending. The following personnel will benefit from the knowledge shared in this course: Plant operative planning and scheduling specialists Oil products trading and blending personnel Laboratory supervisors and technical personnel Sales, marketing and product trading personnel Refinery market and research analysts Process and chemical Engineers Personnel from the oil, fuel, biofuel, additive and auto industries Regulatory and policy-makers personnel Course Level Basic or Foundation Trainer Your expert course leader is an experienced manager with more than 25 years of operational experience in the downstream Oil & Gas industry. She is a recognised expert in conventional, biofuels and alternative fuels with extensive experience in the crude selection process and formulation of finished products including product portfolio strategy, product quality road mapping and benchmarking. She is a long-time laboratory manager with comprehensive experience in laboratory processes, including financing, benchmarking, efficiency improvement and total quality management processes. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Refining Blending
Delivered in Internationally or OnlineFlexible Dates
£2,321 to £2,699

Energy Insurance and Risk Management

By EnergyEdge - Training for a Sustainable Energy Future

About this Training Energy insurance is a type of insurance designed to protect businesses that work in the energy industry. This type of insurance covers a wide range of risks that are unique to the energy industry, such as damage to oil rigs, power plants, pipelines, or other energy infrastructure, as well as accidents, explosions, fires, and environmental damage. Energy insurance can also provide coverage for business interruption caused by unforeseen events that can disrupt energy production or supply, such as natural disasters, equipment breakdown, and cyber-attacks. It may also include coverage for liability and loss of income resulting from lawsuits and legal claims. Training Objectives Upon completion of this course, participants will be able to: Understand the risk sharing between oil companies and contractors Know how this is dealt within the insurance products available Understand insurer's perception of risk Create awareness of how market insurance products meet industry needs Be familiar with insurer's pricing methodologies Better understanding of the broker interface Understand technical evaluation of the coverage wordings Putting technical knowledge into practice with claims workshop Target Audience The course is intended for individuals who work in the energy industry, particularly those who are involved in managing risk or making decisions related to insurance coverage. The following personnel will benefit from the knowledge shared in this course: Insurers Brokers Adjusters Lawyers Risk Managers Treasury Contracts Legals Contract Adjustor Project Managers Course Level Basic or Foundation Trainer Your expert course leader has worked in the insurance sector for 59 years. He has worked as a broker for reputable firms, such as Marsh, where he served as the managing director of Energy Construction. He has also participated in peer review for different Lloyds Syndicates. He also served as a broker for Sedgwick, AAA, and Miller in the offshore energy sector. He has helped businesses including Shell, BP, Chevron, ConocoPhillips, Petrofina, Woodside, ENI, and Brunei Shell for their policy reviews during his career. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations

Energy Insurance and Risk Management
Delivered in Internationally or OnlineFlexible Dates
£2,321 to £2,699

ITIL 4 Specialist: Create, Deliver and Support: In-House Training

By IIL Europe Ltd

ITIL® 4 Specialist: Create, Deliver and Support: In-House Training The ITIL® 4 Specialist: Create, Deliver, and Support module is part of the Managing Professional stream for ITIL® 4. Candidates need to pass the related certification exam for working towards the Managing Professional (MP) designation. This course is based on the ITIL® 4 Specialist: Create, Deliver, and Support exam specifications from AXELOS. With the help of ITIL® 4 concepts and terminology, exercises, and examples included in the course, candidates acquire the relevant knowledge required to pass the certification exam. What You Will Learn The learning objectives of the course are based on the following learning outcomes of the ITIL® 4 Specialist: Create, Deliver, and Support exam specification: Understand how to plan and build a service value stream to create, deliver, and support services Know how relevant ITIL® practices contribute to the creation, delivery, and support across the SVS and value streams Know how to create, deliver, and support services Organization and Culture Organizational Structures Team Culture Continuous Improvement Collaborative Culture Customer-Oriented Mindset Positive Communication Effective Teams Capabilities, Roles, and Competencies Workforce Planning Employee Satisfaction Management Results-Based Measuring and Reporting Information Technology to Create, Deliver, and Support Service Integration and Data Sharing Reporting and Advanced Analytics Collaboration and Workflow Robotic Process Automation Artificial Intelligence and Machine Learning CI / CD Information Model Value Stream Anatomy of a Value Stream Designing a Value Stream Value Stream Mapping Value Stream to Create, Deliver, and Support Services Value Stream for Creation of a New Service Value Stream for User Support Value Stream Model for Restoration of a Live Service Prioritize and Manage Work Managing Queues and Backlogs Shift-Left Approach Prioritizing Work Commercial and Sourcing Considerations Build or Buy Sourcing Models Service Integration and Management

ITIL 4 Specialist: Create, Deliver and Support: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£2,295

ITIL 4 Foundation: In-House Training

By IIL Europe Ltd

ITIL® 4 Foundation: In-House Training ITIL® 4 is built on the established core of best practice in the ITIL® guidance. ITIL® 4 provides a practical and flexible approach to move to the new world of digital transformation and embrace an end-to-end operating model for the delivery and operation of products and services. ITIL® 4 also provides a holistic end-to-end picture that integrates frameworks such as Lean IT, Agile, and DevOps. The ITIL® 4 Foundation is based on the exam specifications specified by AXELOS for the ITIL® 4 Foundation certification. The fundamental objective of this course is to help the participants understand the key concepts of service management and the ITIL® 4 service management framework and prepare for the ITIL® 4 Foundation exam. In addition, this course offers a rich learning experience that helps the participants relate ITIL® to their own work environment. The course includes a case study (based on a fictitious organization, 'Axle Car Hire') that will help the participants understand and experience the ITIL® guiding principles, service value, practices through real-world challenges and opportunities. The rich learning experience is supported by additional learning tools such as pre-course reading materials, post-course reading material, and a set of quick reference cards. What You Will Learn At the end of this program, you will be able to: Understand the key concepts of ITIL® service management Understand how ITIL® guiding principles can help an organization to adopt and adapt ITIL® service management Understand the four dimensions of ITIL® service management Understand the purpose and components of the ITIL® service value system, and activities of the service value chain, and how they interconnect Understand the key concepts of continual improvement Learn the various ITIL® practices and how they contribute to value chain activities Course Introduction Let's Get to Know Each Other Course Overview Course Learning Objectives Course Structure Course Agenda Introduction to IT Service Management in the Modern World Introduction to ITIL® 4 Structure and Benefits of ITIL® 4 Case Study: Axle Car Hire Case Study: Meet the Key People at Axle Case Study: The CIOs Vision for Axle Exam Details ITIL® 4 Certification Scheme Service Management - Key Concepts Intent and Context Key Terms Covered in the Module Module Learning Objectives Value and Value Co-Creation Value: Service, Products, and Resources Service Relationships Value: Outcomes, Costs, and Risks Exercise: Multiple-Choice Questions The Guiding Principles Intent and Context Identifying Guiding Principles Key Terms Covered in the Module Module Learning Objectives The Seven Guiding Principles Applying the Guiding Principles Exercise: Multiple-Choice Questions The Four Dimensions of Service Management Intent and Context The Four Dimensions Key Terms Covered in the Module The Four Dimensions and Service Value System Module Learning Objectives Organizations and People Information and Technology Partners and Suppliers Value Streams and Processes External Factors and Pestle Model Exercise: Multiple-Choice Questions Service Value System Intent and Context Service Value System and Service Value Chain Module Learning Objectives Overview of Service Value System Overview of the Service Value Chain Exercise: Multiple-Choice Questions Continual Improvement Intent and Context Key Terms Covered in the Module Introduction to Continual Improvement Module Learning Objectives The Continual Improvement Model Relationship between Continual Improvement and Guiding Principles Exercise: Multiple-Choice Questions The ITIL® Practices Intent and Context ITIL® Management Practices Key Terms Covered in the Module Module Learning Objectives The Continual Improvement Practice The Change Control Practice The Incident Management Practice The Problem Management Practice The Service Request Management Practice The Service Desk Practice The Service Level Management Practice Purpose of ITIL® Practices Exercise: Crossword Puzzle

ITIL 4 Foundation: In-House Training
Delivered in London or UK Wide or OnlineFlexible Dates
£1,995

AAT Distance Learning

By Osborne Training

AAT Distance Learning AAT Distance Learning simply allows you to study at a time and place to suit you, whether that be at home or at work. We understand that it can sometimes be difficult to get to a centre, for various reasons. That's why distance learning offers you the perfect way to fit your studies around your daily commitments, instead of the other way round, which is often the case. Our friendly course advisers will supply you with all of the learning materials such as course books, workbooks and software required to get you started. Moreover, you would get access to our State of the art VLC (Virtual Learning Campus), where you would be able to access ample study resources to support your studies. Moreover, with AAT home study, from time to time you can contact your personal tutor by email or by phone if you have any issue . For AAT distance learning courses courses we deliver the study books to your home address. In summary, AAT Distance Learning courses are self study method with tutorial support and you do not have to join any lecture sessions as you study according to your own pace. AAT Level 2 Distance learning course covers Coursebooks and workbooks delivered to your home address. Access to VLC or online student portal for additional aat study materials. Sage 50 Accounts software included in the study package. 4 computer based tests and 1 final Synoptic assessment. AAT Level 3 Distance learning course covers No of Coursebooks and workbooks delivered to your home address. Access to VLC(Virtual Learning Campus) or online student portal for additional aat study materials. 4 computer based tests and 1 final Synoptic assessment at an approved AAT Exam Centre. AAT Level 4 Distance learning course covers Coursebooks and workbooks for chosen subjects delivered to your home address. Access to VLC(Virtual Learning Campus) or online student portal for additional aat study materials. 5 computer based tests and 1 final Synoptic assessment at an approved AAT Assessment venue.

AAT Distance Learning
Delivered OnlineFlexible Dates
Price on Enquiry