If you have no intention of removing asbestos but work on buildings built or refurbished before the year 2000, asbestos could be present. You will need awareness training so you know how to avoid the risks. Asbestos awareness training should be given to employees whose work could foreseeably disturb the fabric of a building and expose them to asbestos or who supervise or influence the work. In particular, it should be given to those workers in the refurbishment, maintenance and allied trades where it is foreseeable that ACMs may become exposed during their work.
Duration 4 Days 24 CPD hours This course is intended for This course is for network and system administrators, IT managers, IT support personnel, and other network operations staff who are responsible for deploying new computers across their organizations, managing ongoing software and hardware configuration tasks for computers, and retiring outdated computers. Overview By the completion of this course, you will be able to: Install and configure Ghost Solution Suite 3.0. Use the Ghost Console to create and use jobs and tasks to manage computes. Configure image deployments. Manage ?unknown? and predefined computers. Perform disk wipes and create disk partitions. Create Windows scripted OS installations. Create PC transplant templates. Capture a computer personality, and deploy personality packages. Perform a computer migration from Win 7 to Win 8.1. This course is designed for the professional tasked with installing, configuring, and managing a Deployment Solution system. Overview of Endpoint Lifecycle Management Introduction to Endpoint Lifecycle Management Phases of Endpoint Lifecycle Management ELM Business Objectives and Goals ELM Solution Mapping to Business Objectives Ghost Solution Suite 3.0 Product Overview Implementation Assessment ELM Requirements Gathering Solution Analysis of ELM Requirements Implementation Design GSS 3.0 Technical Overview Installation Options and Prerequisites Defining the Solution Infrastructure Defining the ELM Solution Configuration Installation and Configuration of the ELM Solution Base Software Installation Navigating the Console Core & Solution Configuration Driver Management Pre-boot Environment Endpoint Identification & Gathering IT Requirements Overview Analyzing and Defining IT Requirements Using ELM to Forecast IT Requirements Endpoint Configuration Standards Endpoint Standards Overview Defining Endpoint Standards Implementation of Endpoint Standards Endpoint Provisioning Endpoint Provisioning Overview Standard Build and Image Methodology Software Compatibility Analysis Software Packaging requirements for use in the ELM Solution Software Quality Assurance Methodology Endpoint Deployment & Staging Endpoint Lifecycle Automation Endpoint Lifecycle Automation Scenario Exercise Backup and restore Automating the backup of a computer image Scripted OS Installation Capturing an image for deployment Automating the creation of a master image Automating the deployment of computer images Software Distribution Software Delivery Methods Software Installation Methods Understanding Software Delivery Reporting and Analysis of Software Distribution Tasks Image and Build Maintenance Image maintenance overview Restoring a computer image Capturing the updated image Updating Jobs Managing Software Upgrades Software Upgrade Process Overview Distribution of Software Updates Supporting the Business Ensuring Business Continuity in an ELM System Endpoint Restoration/Recovery Managing Service Support Activities Endpoint Monitoring & Alerting Endpoint Configuration & Maintenance Automating Problem Resolution Application Self-Healing Desired State Management Hardware Refresh & Migration Hardware Refresh & Migration Process Overview Personality Capture and Restore Gathering Current State Inventory for Requirements and Planning Activities Performing Data capture and storage activities Gathering User state or PC personality information Automating the Migration Process Endpoint Retirement/Disposal Ensuring Compliant Disposal Methods and Procedures End to End Endpoint Lifecycle Use Case Endpoint Management Lifecycle Use Case for GSS Additional course details: Nexus Humans Symantec Ghost Solution Suite 3.0 - Administration training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Symantec Ghost Solution Suite 3.0 - Administration course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Cloud deployment training course description This course covers the important topics every cloud professional needs, including, configuration and deployment, security, maintenance, management, and troubleshooting. It covers all aspects of cloud computing infrastructure and administration, with a practical focus on real-world skills. It will help you to master the fundamental concepts, terminology, and characteristics of cloud computing. Deploy and implement cloud solutions, manage the infrastructure, and monitor performance. You will also be able to install, configure, and manage virtual machines. What will you learn Cloud services, models, and characteristics. Virtualization components, installation, and configuration. Infrastructure configurations and optimization. Resource management and specific allocations. IT security concepts, tools, and best practices. Recovery, availability and continuity in the cloud. Cloud deployment training course details Who will benefit: IT professionals looking to deploy and implement cloud solutions, manage the infrastructure, and monitor performance, Install, configure, and manage virtual machines. Prerequisites: Introduction to virtualization. Duration 5 days Cloud deployment training course contents Preparing to Deploy Cloud Solutions Deploying a Pilot Project Testing Pilot Project Deployments Designing a Secure and Compliant Cloud Infrastructure Designing and Implementing a Secure Cloud Environment Planning Identity and Access Management for Cloud Deployments Determining CPU and Memory Sizing for Cloud Deployments Determining Storage Requirements for Cloud Deployments Analysing Workload Characteristics to Ensure Successful Migration Maintaining Cloud Systems Implementing Backup, Restore, Disaster Recovery, and Business Continuity Measures Analysing Cloud Systems for Performance Analysing Cloud Systems for Anomalies and Growth Forecasting Troubleshooting Deployment, Capacity, Automation, and Orchestration Issues Troubleshooting Connectivity Issues Troubleshooting Security Issues
If you have no intention of removing asbestos but work on buildings built or refurbished before the year 2000, asbestos could be present. You will need awareness training so you know how to avoid the risks. Asbestos awareness training should be given to employees whose work could foreseeably disturb the fabric of a building and expose them to asbestos or who supervise or influence the work. In particular, it should be given to those workers in the refurbishment, maintenance and allied trades where it is foreseeable that ACMs may become exposed during their work.
About this Training Course This 3 full-day course provides a sound review of Pipeline Integrity Management strategies, in compliance with regulatory requirements, including self-assessment. The course is highly interactive and takes the form of lectures and case studies. On completion of the course, the participants will have a solid understanding of the procedures, strengths, limitations, and applicability of the main issues that comprise a Pipeline Integrity Management Program. The course incorporates API 1160 / 1173 and ASME B31.8S, and explains in detail the pipeline integrity requirements described in these standards. This course can also be offered through Virtual Instructor Led Training (VILT) format. Training Objectives Objectives of this course: Explore the latest techniques used to develop a comprehensive integrity management program covering both pipelines and their associated facilities Determine the necessary elements of such a program described in detail with examples of typical program content including an overarching view of where detailed risk analysis and defect assessment fits in the program Understand the scopes and contents of pipeline integrity standards i.e. API 1160 / 1173 and ASME B31.8S On completion of this course, the participants will be able to understand: Codes used in developing Integrity Management Plans, API 1160 / 1173 and ASME B31.8S, others The elements of an Integrity Management Plan Threat assessment Critical aspects of risk assessment Prevention and mitigation measures Characteristics and limitations of different inspection methods A risk-based approach to maintenance Target Audience The course is intended for supervisors, engineers and technicians responsible for ensuring the adequate protection of pipeline assets. In addition, maintenance planners, regulators and service providers to the pipeline industry will also benefit from attending this course. Course Level Basic or Foundation Trainer Your expert course leader is a Ph.D. Metallurgical Engineer with advanced expertise in asset integrity management of oil & gas production facilities, corrosion control, materials selection, chemical treatments, pipeline pigging, inspections, fitness-for-service evaluations, failure analysis and related consulting. He has 40 years of experience working for BP in Asia and South America, Amoco in the US, Intertek, and four years with Applus-Velosi in Southeast Asia. Practical Work Experience: AIM consultant with focus on Southeast Asia operations and clients Direct technical interface with clients on Velosi services Technical consultant for ongoing regional contracts and lead roles as auditor, instructor or facilitator Main clients have included the following organisations: BP and Vico Indonesia, Pertamina Offshore Northwest Java and West Madura Offshore (Indonesia), NCSP (Vietnam), ADCO-OPCO (Abu Dhabi), Thang Long (Vietnam), Exxon-Mobil (Malaysia) and Mubadala Petroleum (Indonesia). POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable
About this Training Course This 5 full-day course covers all the main elements of IChemE's Process Safety Competency framework: culture, knowledge and competence, engineering and design, human factors, systems and procedures, and assurance. Participants will achieve at least the second level of competence 'Basic Application', which is defined as 'Performs fundamental and routine tasks. Requires occasional supervision. Increased functional expertise and ability. Works with others.' This course examines the interrelation of the various techniques of process safety for analysing and managing process hazards in the hydrocarbon and chemical processing industries. There is a particular emphasis on engineering design aspects with extensive participation in individual and group exercises, tutored exercises and video case studies throughout the course to underpin key learning points. The learning is consolidated in a comprehensive case study and requires collaboration between members of each syndicate. This course has been reviewed and approved by the Institution of Chemical Engineers. IChemE is the global professional membership organisation for chemical, biochemical and process engineers and other professionals involved in the chemical, process and bioprocess industries. Their knowledge of professional standards, close involvement with industry, education and regulators, and their expertise as a leading global training provider, means they are uniquely positioned to independently assess and approve training courses and professional development programmes across the world. Training Objectives By the end of this course, participants will be able to: Acquire the underpinning knowledge required to achieve process safety competency Gain a comprehensive understanding of process safety management Understand the concept of the safety life cycle of a process plant from conceptual design onwards including operation, maintenance and modification Understand the hazard scenarios associated with a process plant Understand how risks can be controlled by hardware and procedural measures Identify and analyse hazard causes and consequences Recognise when specialist analytical expertise is required Generate effective and appropriate measures to reduce risks Justify and communicate practical solutions to non-technical personnel Explain the rationale for process safety measures to decision makers Target Audience This course is suitable for process industry professionals who need to acquire a comprehensive understanding of process safety management, those moving into process safety positions or those who wish to broaden their process safety knowledge within their existing discipline. It is particularly suited for anyone involved in the design, operation, modification or maintenance of a major hazard installation. This includes: Supervisors, operators and maintainers in Oil & Gas, Petrochemical and Chemical industries, process, mechanical and chemical engineers and technicians Design engineers, project engineers and HSE managers Control, automation and instrumentation engineers It will also demonstrate a substantial understanding of process safety for those engaged in Continuous Professional Development or aiming for the Chartered Engineer status. Course Level Basic or Foundation Trainer Your expert course leader has 50 years' experience in chemical and process safety engineering. His early career included 20 years in design and project engineering with various fine chemical and pharmaceutical companies where he designed chemical processes, specified plant equipment and selected materials for highly corrosive and toxic processes, often where textbook data was not available. This was followed by 10 years in offshore oil and gas design projects where he was responsible for setting up a Technical Safety group to change design safety practices in the aftermath of the 1988 Piper Alpha disaster. In recent years, he has been called upon to conduct various offshore and onshore incident investigations. His career has given him experience in project engineering, project management, process design and operations, safety engineering and risk management. He is a Fellow of the UK Institution of Chemical Engineers. He served on the Scottish Branch committee, and was elected chairman for a two-year term in 1991. He has also been chairman of the Safety and Reliability Society - North of Scotland Branch. He has delivered training courses in Process Hazard Analysis (HAZOP and HAZID), Process Safety Management, Hazard Awareness, Risk Assessment, Root Cause Analysis, Failure Modes & Effect Analysis and has lectured on Reliability Analysis to the M.Sc. course in Process Safety and Loss Prevention at Sheffield University. In addition to delivering training courses, he currently facilitates HAZOP / HAZID / LOPA studies and undertakes expert witness roles advising lawyers engaged in contractual disputes, usually involving the design or construction of chemical plants or Oil & Gas production facilities, or criminal prosecutions. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
Root Cause Analysis (RCA) is used to analyse the root causes of focus events with both positive and negative outcomes, but it is most commonly used for the analysis of failures and incidents. Causes for such events can be varied in nature, including design processes and techniques, organizational characteristics, human aspects and external events. RCA can be used for investigating the causes of non-conformances in quality (and other) management systems as well as for failure analysis, for example in maintenance or equipment testing.
Cloud technologies training course description This course provides an introduction to cloud technologies, including, configuration and deployment, security, maintenance, and management. It covers all aspects of cloud computing infrastructure. It will help you to master the fundamental concepts, terminology, and characteristics of cloud computing. . What will you learn Contrast and compare AWS, GCP and Azure. Explain the different cloud services, models and characteristics. Explain cloud virtualization components and options. Explain cloud security options. Describe cloud automation, orchestration, monitoring and performance options. Cloud technologies training course details Who will benefit: Anyone working with or looking to work with cloud technologies. Prerequisites: None. Duration 2 days Cloud technologies training course contents What is the cloud? The Internet Cloud computing Benefits Disadvantages Cloud services IaaS, PaaS, SaaS, others. Cloud service providers AWS, GCP Microsoft Azure, others Cloud architectures Private, public, hybrid others Cloud based delivery The cloud and virtualization Virtual Machines, networks, storage, deployment. Accessing the Virtual Machine Secure cloud environments Security considerations. Data privacy considerations Automation and orchestration Monitoring and performance Performance Cost issues Cost containment
This training course aims to equip you with in-depth knowledge on ISO 9001 requirements, as well as the best practices and approaches used for the implementation and subsequent maintenance of a QMS. By attending this training course, you can help organizations utilize a structured and evidence-based approach for managing the quality of their products and services. Apart from this, you will also learn about the importance of customer focus and benefits of setting the foundations of an organizational culture which enables and supports quality. The training course is followed by a certification exam. If you pass, you can gain the "Certified ISO 9001 Lead Implementer' credential. This certificate validates your competence to implement a QMS based on the requirements of ISO 9001. About This Course Learning objectives By the end of this training course, the participant will be able to: Explain the fundamental concepts and principles of a quality management system (QMS) based on ISO 9001 Interpret the requirements of ISO 9001 for a QMS from the perspective of an implementer Initiate and plan the implementation of a QMS based on ISO 9001, by utilizing best practice Support an organization in operating, maintaining, and continually improving a QMS based on ISO 9001 Prepare an organization to undergo a third-party certification audit Educational approach This training course is learner-centred and contains: Theories, approaches, and best practices used in management system implementation, operation, maintenance, and continual improvement Theoretical basis supported by practical examples, throughout the four days of the training course Interaction between the trainers and participants by means of questions and discussions Essay-type homework exercises at the end of each day Quizzes with stand-alone items (after each section) and scenario-based quizzes (at the end of each day), intended to prepare the participants for the certification exam Accreditation Assessment The exam covers the following competency domains: Domain 1: Fundamental principles and concepts of a quality management system Domain 2: Initiation of a QMS implementation Domain 3: Planning of a QMS implementation based on ISO 9001 Domain 4: Implementation of a QMS based on ISO 9001 Domain 5: Monitoring and measurement of a QMS based on ISO 9001 Domain 6: Continual improvement of a QMS based on ISO 9001 Domain 7: Preparation for a QMS certification audit The exam itself is a 12 question, essay type format, to be completed within a 150 minute window. The exam pass mark is 70%. Exam results are provided within 24 hours. Our Guarantee We are an official IECB Training Provider If you fail an exam, you can try again for free If you feel you need additional training, you can train for free too Prerequisites The main requirements for participating in this training course are a basic knowledge of ISO management system standards, overall knowledge of ISO 9001, and the MS implementation principles. An understanding of ISO's quality management principles may also facilitate the learning process. What's Included? Official Study Guides 4 day's Instructor led training Exam fees Who Should Attend? The ISO 9001 Lead Implementer training course is intended for: Personnel responsible for maintaining and improving the quality of the products and services of the organization Personnel responsible for meeting customer requirements Consultants, advisors, professionals wishing to obtain in-depth knowledge of ISO 9001 requirements for a QMS Professionals wishing to acquaint themselves with best practice methodology for implementing a QMS Individuals responsible for maintaining the conformity of QMS to ISO 9001 requirements Members of QMS implementation and operation teams Individuals aspiring to pursue a career in quality management Provided by This course is Accredited by NACSand Administered by the IECB.
Advanced Asterisk training course description This 2 day hands-on Asterisk training course covers advanced Asterisk configuration including fault tolerant clusters, upgrading and patching Asterisk servers, firewall and NAT transversal, using databases to store Asterisk data. Practical sessions follow each major section to reinforce the theory. What will you learn Configure advanced Asterisk features. Utilise databases from Asterisk Integrate Asterisk with SIP servers. Build High Availability Asterisk clusters. Maintain and secure Asterisk servers. Advanced Asterisk training course details Who will benefit: Technical staff working with or evaluating Asterisk. Prerequisites: Definitive Asterisk for engineers Duration 2 days Advanced Asterisk training course contents Best Practice Review of basics, Channel best practice, dial plan best practise. Call Centre Features GUI, Asterisk Manager Interface, billing, CDR, advanced IVR, ACD, Vici Dial. Hands on Install Vici-Dial Asterisk and Databases MySQL, LDAP, ODBC, dial plan from a Database, storing CDR in a Database, Hands on Dial plan in MySQL, CDR in MySQL. TDM over Ethernet What is TDMoE, Asterisk to Asterisk TDMoE, Phone Bridge. Hands on * 2 * via TDMoE. High Availability Asterisk HA Linux - Virtual Servers, Fail-over steps, setting up HA Linux, configuring Asterisk for fail-over on HA Linux, Hands on Configure Asterisk HA. Advanced Dial plans Asterisk Gateway Interface, AGI IVR applications, Multiple switches sharing Dial plans, ENUM, DUNDI. Hands on Configure DUNDI. Integration Legacy PBX, SIP Proxys, OpenSER. Hands on Configure SER to work with Asterisk. Asterisk Maintenance Asterisk upgrades, implementing patches, advanced debugging, Security Firewalls, NAT, Asterisk security issues. Hands on Configure Asterisk to work through a Firewall and NAT.